{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T16:59:12Z","timestamp":1730221152257,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1109\/eurospw59978.2023.00072","type":"proceedings-article","created":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T17:25:55Z","timestamp":1690824355000},"page":"609-618","source":"Crossref","is-referenced-by-count":1,"title":["Work in Progress: A Glance at Social Media Self-Censorship in North America"],"prefix":"10.1109","author":[{"given":"Wei","family":"Hu","sequence":"first","affiliation":[{"name":"University of Waterloo,Waterloo,ON,Canada"}]},{"given":"Diogo","family":"Barradas","sequence":"additional","affiliation":[{"name":"University of Waterloo,Waterloo,ON,Canada"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijforecast.2009.10.002"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1108\/JICES-07-2018-0060"},{"journal-title":"Our study&#x2019;s code repository","year":"2022","author":"hu","key":"ref12"},{"key":"ref34","first-page":"37","author":"tennant","year":"2017","journal-title":"It&#x2019;s Not You It&#x2019;s Me Sex Context and Individual Differences in Experimental Partner Choice"},{"key":"ref15","article-title":"Journalist Safety and Self-Censorship","author":"gr\u00f8ndahl larsen","year":"2021","journal-title":"Routledge"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2019.1621921"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.15412\/J.JCC.02010107"},{"key":"ref36","first-page":"359","article-title":"Cloudy with a chance of misconceptions: exploring users&#x2019; perceptions and expectations of security and privacy in cloud office suites","author":"wermke","year":"2020","journal-title":"Proceedings of the 16th Symposium on Usable Privacy and Security (SOUPS 2020)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1515\/jqas-2019-0102"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MIPRO.2015.7160485"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3647099"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.crbeha.2021.100035"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/13629387.2020.1771310"},{"key":"ref32","article-title":"The Decline of Social Media Censorship and the Rise of Self-Censorship after the 2016 Failed Turkish Coup","author":"tanash","year":"2017","journal-title":"Proceedings of the 7th USENIX Workshop on Free and Open Communications on the Internet"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/00071005.2018.1502872"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2018.8514215"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30634-6_4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.joi.2017.05.004"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v15i1.18110"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.7591\/9781501735486"},{"key":"ref18","first-page":"281","article-title":"Some methods for classification and analysis of multivariate observations","volume":"1","author":"macqueen","year":"1967","journal-title":"Proceedings of the 5th Berkeley Symposium on Mathematical Statistics and Probability"},{"key":"ref24","article-title":"Shouting Matches and Echo Chambers&#x201D;: Perceived Identity Threats and Political Self-Censorship on Social Media","volume":"13","author":"powers","year":"2019","journal-title":"International Journal of Communication"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1017\/gov.2019.18"},{"key":"ref26","article-title":"Raven&#x2019;s progressive matrices","author":"raven","year":"1938","journal-title":"Western Psychological Services"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/j.jrp.2006.02.001","article-title":"Measuring personality in one minute or less: A 10-item short version of the Big Five Inventory in English and German","volume":"41","author":"rammstedt","year":"2007","journal-title":"Journal of Research in Personality"},{"key":"ref20","first-page":"220","article-title":"MasterMind Chess: Design and Implementation of Classic, Capablanca and Fischer Modes with Real Time Match Observation","author":"vasiljevic mendes","year":"2014","journal-title":"Proceedings of the 2014 Brazilian Symposium on Computer Games and Digital Entertainment (SBGAMES)"},{"article-title":"Closed Minds? Is a &#x2019;Cancel Culture&#x2019; Stifling Academic Freedom and Intellectual Debate in Political Science? Technical report, HKS Working Paper No. RWP20-025","year":"2020","author":"norris","key":"ref22"},{"key":"ref21","article-title":"Measuring Offensive Speech in Online Political Discourse","author":"nithyanand","year":"2017","journal-title":"Proceedings of the 7th USENIX Workshop on Free and Open Communications on the Internet (FOCI 17)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jjimei.2022.100059"},{"journal-title":"Why do bloggers keep silent? Self-censorship in social media cases of Belarus and Russia","year":"2020","author":"rudnik","key":"ref27"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441865"},{"key":"ref8","article-title":"Self-censorship and the struggle for press freedom in Hong Kong","author":"yue cheung","year":"2021","journal-title":"Brill Nijhoff"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1037\/13620-004"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v7i1.14412"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1111\/pops.12391"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.51685\/jqd.2022.023"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1177\/1464884920941965"}],"event":{"name":"2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","start":{"date-parts":[[2023,7,3]]},"location":"Delft, Netherlands","end":{"date-parts":[[2023,7,7]]}},"container-title":["2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&amp;PW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10190553\/10190632\/10190716.pdf?arnumber=10190716","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T17:41:27Z","timestamp":1692639687000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10190716\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/eurospw59978.2023.00072","relation":{},"subject":[],"published":{"date-parts":[[2023,7]]}}}