{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T18:07:36Z","timestamp":1769623656443,"version":"3.49.0"},"reference-count":94,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/istas.2010.5514641","type":"proceedings-article","created":{"date-parts":[[2010,12,2]],"date-time":"2010-12-02T21:06:20Z","timestamp":1291323980000},"page":"157-171","source":"Crossref","is-referenced-by-count":27,"title":["Using a social informatics framework to study the effects of location-based social networking on relationships between people: A review of literature"],"prefix":"10.1109","author":[{"given":"Sarah Jean","family":"Fusco","sequence":"first","affiliation":[]},{"given":"Katina","family":"Michael","sequence":"additional","affiliation":[]},{"given":"M. G.","family":"Michael","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","first-page":"109","article-title":"You are here! Mapping the boundaries of the Fourth Amendment with GPS technology","volume":"32","author":"dowdell","year":"2005","journal-title":"Rutgers Computer and Technology Law Journal"},{"key":"ref72","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1111\/j.1931-0846.2007.tb00508.x","article-title":"The Panopticon's Changing Geography","volume":"97","author":"dobson","year":"2007","journal-title":"The Geographical Review"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1177\/0539018408092573"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/MTAS.2003.1188276"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1504\/IJIIM.2007.014370"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ISTAS.2009.5155910"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-006-0014-2"},{"key":"ref39","article-title":"Reflections on Friendster, Trust and Intimacy","author":"boyd","year":"2003","journal-title":"Ubiquitous Computing Workshop application for the Intimate Ubiquitous Computing Workshop"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.78"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1023\/B:BTTJ.0000047585.06264.cc"},{"key":"ref78","article-title":"Location-Based Services for Mobile Telephony: a study of user's privacy concerns","author":"barkhuus","year":"2003","journal-title":"Proceedings of the INTERACT 9th IFIP TC13 International Conference on Human-Computer Interaction"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICMB.2009.32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1460563.1460674"},{"key":"ref32","doi-asserted-by":"crossref","DOI":"10.1145\/1556460.1556500","article-title":"How much do you tell?: information disclosure behavior indifferent types of online communities","author":"schrammel","year":"2009","journal-title":"Proceedings of the Fourth International Conference on Communities and Technologies"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1358628.1358754"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1358628.1358818"},{"key":"ref37","article-title":"wConnect: a facebook-based developmental learning community to support women in information technology","author":"beth","year":"2009","journal-title":"Proceedings of the Fourth International Conference on Communities and Technologies"},{"key":"ref36","article-title":"The Role of Social Networking Services in eParticipation","author":"bystein","year":"2009","journal-title":"Proceedings of the 1st International Conference on Electronic Participation"},{"key":"ref35","doi-asserted-by":"crossref","DOI":"10.1145\/1345443.1345442","article-title":"The role of social networks in students' learning experiences","author":"liccardi","year":"2007","journal-title":"Working Group Reports on ITICSE on Innovation and Technology in Computer Science Education"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1531674.1531689"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2006.04.008"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/HEALTH.2008.4600115"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74853-3_21"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-006-9124-0"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1460563.1460629"},{"key":"ref64","article-title":"Analysis of a Location-Based Social Network","author":"nan","year":"2009","journal-title":"International Conference on Computational Science and Engineering"},{"key":"ref27","author":"joinson","year":"2008","journal-title":"Proceeding of the twenty-sixth annual SIGCHI Conference on Human Factors in Computing Systems"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.195"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.01.023"},{"key":"ref29","author":"ahn","year":"2007","journal-title":"Proceedings of the 16th international conference on World Wide Web"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2005.71"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ISTAS.2000.915635"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/1081992.1082017"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1111\/1540-4560.00248","article-title":"Internet paradox revisited","volume":"58","author":"robert","year":"2002","journal-title":"Journal of Social Issues"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240701441556"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/01972240802587562"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/985921.986043"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-930708-06-8.ch006"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2008.61"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.320"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1460563.1460675"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1180875.1180901"},{"key":"ref50","author":"levin","year":"2008","journal-title":"The Next Digital Divide Online Social Network Privacy"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84800-356-9_7"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1093\/sf\/63.4.967"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1177\/0268580905055477"},{"key":"ref92","doi-asserted-by":"crossref","first-page":"709","DOI":"10.5465\/amr.1995.9508080335","article-title":"An Integrative Model of Organizational Trust","volume":"20","author":"mayer","year":"1995","journal-title":"Academy of Management Review"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.1998.926617"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2008.02.001"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1632651"},{"key":"ref58","first-page":"1","article-title":"Expanding The Potential for GPS Evidence Acquisition","volume":"3","author":"strawn","year":"2009","journal-title":"Small Scale Digital Device Forensics Journal"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357133"},{"key":"ref56","first-page":"705","article-title":"Private eyes are watching you: with the implementation of the E-911 mandate, who will watch every move you make? (Telecommunications Act of 1996: Ten Years Later Symposium)","volume":"58","author":"smith","year":"2006","journal-title":"Federal Communications Law Journal"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.4018\/jthi.2006070102"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526784"},{"key":"ref53","article-title":"The Development of Trust in Close Friendships Formed within Social Network Sites","author":"gambi","year":"2009","journal-title":"Proceedings of the WebSci'09 Society On-Line"},{"key":"ref52","article-title":"Socialtrust: tamper-resilient trust establishment in online communities","author":"james","year":"2008","journal-title":"Proceedings of the 8th ACM\/IEEE-CS Joint Conference on Digital Libraries"},{"key":"ref10","first-page":"2","article-title":"Introductory Essay: The Social Shaping of Technology","author":"mackenzie","year":"1999","journal-title":"The Social Shaping of Technology"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"37","DOI":"10.4337\/9781035352937.00010","article-title":"Social Shaping of Technology: Frameworks, Findings and Implications for Policy With Glossary of Social Shaping Concepts","author":"russell","year":"2002","journal-title":"Shaping Technology Guiding Policy Concepts Spaces and Tools"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.176"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/0048-7333(96)00885-2"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/aris.1440360111"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.1995.9960200"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.1993.9960143"},{"key":"ref82","article-title":"Privacy in Location-Based Services, Concern vs. Coolness","author":"barkhuus","year":"2004","journal-title":"HCI 2004 workshop Location System Privacy and Control"},{"key":"ref16","author":"kahin","year":"1995","journal-title":"Public Access to the Internet"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ICMB-GMR.2010.35"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"365","DOI":"10.2307\/30036538","article-title":"Trust and the Unintended Effects of Behavior Control in Virtual Teams","volume":"27","author":"piccoli","year":"2003","journal-title":"MIS Quarterly"},{"key":"ref84","doi-asserted-by":"crossref","DOI":"10.1145\/1054972.1054985","article-title":"Location disclosure to social relations: why, when & what people want to share","author":"consolvo","year":"2005","journal-title":"Proceedings of the SIGCHI conference on Human factors in computing systems"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1080\/01972240701444196"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1054987"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2307\/249417"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/1056808.1056928"},{"key":"ref89","author":"schapsis","year":"2010","journal-title":"Location Based Social Networks Links A list of Location Based Social Networks"},{"key":"ref4","author":"misztal","year":"1998","journal-title":"Trust in Modern Societies The Search for the Bases of Social Order"},{"key":"ref3","author":"drummond","year":"2010","journal-title":"Teenager missing after Facebook meeting"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(1998)49:12<1047::AID-ASI1>3.0.CO;2-V"},{"key":"ref5","year":"2009","journal-title":"See Where Your Friends Are With Google Latitude"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00399.x"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/01972240050133661"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357134"},{"key":"ref7","first-page":"2656","article-title":"Social Informatics","author":"kling","year":"2003","journal-title":"Encyclopedia of Library and Information Science"},{"key":"ref49","article-title":"Strategies and struggles with privacy in an online social networking community","volume":"1","author":"katherine","year":"2008","journal-title":"Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008 People and Computers XXII Culture Creativity Interaction"},{"key":"ref87","article-title":"Who's viewed you?: the impact of feedback in a mobile location-sharing application","author":"tsai","year":"2009","journal-title":"Proceedings of the 27th international conference on Human factors in computing systems"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.MOBIQUITOUS2009.6847"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1080\/713692067"},{"key":"ref46","article-title":"Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace","author":"dwyer","year":"2007","journal-title":"Proceedings of the Thirteenth Americas Conference on Information Systems (AMCIS)"},{"key":"ref45","first-page":"3","article-title":"MySpace.com - A Social Networking Site and Social Contract Theory","volume":"5","author":"snyder","year":"2007","journal-title":"Information Systems Education Journal"},{"key":"ref48","article-title":"Privacy-enhanced sharing of personal content on the web","author":"mohammad","year":"2008","journal-title":"Proceeding of the 17th International Conference on World Wide Web"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.75"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00367.x"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452528"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1353\/foc.0.0006"}],"event":{"name":"2010 IEEE International Symposium on Technology and Society (ISTAS)","location":"Wollongong, Australia","start":{"date-parts":[[2010,6,7]]},"end":{"date-parts":[[2010,6,9]]}},"container-title":["2010 IEEE International Symposium on Technology and Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5507518\/5514600\/05514641.pdf?arnumber=5514641","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T11:30:28Z","timestamp":1740742228000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5514641\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":94,"URL":"https:\/\/doi.org\/10.1109\/istas.2010.5514641","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}