{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:31:29Z","timestamp":1730277089270,"version":"3.28.0"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T00:00:00Z","timestamp":1694563200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T00:00:00Z","timestamp":1694563200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,13]]},"DOI":"10.1109\/istas57930.2023.10306178","type":"proceedings-article","created":{"date-parts":[[2023,11,7]],"date-time":"2023-11-07T18:55:50Z","timestamp":1699383350000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Social Media Self-Disclosure: A Research Agenda"],"prefix":"10.1109","author":[{"given":"Raji","family":"Raman","sequence":"first","affiliation":[{"name":"Business Information Technology, Virginia Tech,Blacksburg,Virginia,USA"}]},{"given":"Christine Abdalla","family":"Mikhaeil","sequence":"additional","affiliation":[{"name":"IESEG School of Management,Innovation, Entrepreneurship and Information Systems,Lille,France"}]},{"given":"Tabitha","family":"James","sequence":"additional","affiliation":[{"name":"Business Information Technology, Virginia Tech,Blacksburg,Virginia,USA"}]},{"given":"Viswanath","family":"Venkatesh","sequence":"additional","affiliation":[{"name":"Business Information Technology, Virginia Tech,Blacksburg,Virginia,USA"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/08824090802021756"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.98.2.219"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.34.4.578"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.110.1.145"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1207\/S15327957PSPR0402_05"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1037\/a0012590"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/08824090600668915"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.54.6.1063"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1080\/02699939208411068"},{"journal-title":"Qualitative Data Analysis A Sourcebook of New Methods","year":"2014","author":"miles","key":"ref30"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1521\/jscp.1987.5.2.205"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.07.055"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/0022-1031(73)90065-6"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2022.111647"},{"journal-title":"Attack of the clones the rise of identity theft on social media","year":"2022","author":"allison","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.30935\/ojcmt\/5704"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.1.02"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1037\/h0030377"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12106"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0159915"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1177\/1094428103257361"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00433"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1080\/0960085X.2018.1496883"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.52.6.1061"},{"journal-title":"Daily time spent consuming selected media by internet users worldwide in the 1 st half of 2022 by age group (in hours minutes) [Graph]","year":"2022","key":"ref23"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1006\/obhd.1999.2837"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1177\/1073191113514105"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/j.jrp.2006.02.001","article-title":"Measuring personality in one minute or less: A 10-item short version of the Big Five Inventory in English and German","volume":"41","author":"rammstedt","year":"2007","journal-title":"Journal of Research in Personality"},{"journal-title":"Intensive longitudinal methods An introduction to diary and experience sampling research","year":"2013","author":"bolger","key":"ref20"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2010.15"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.1988.tb00169.x"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.54.101601.145030"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.1978.tb00604.x"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1027\/1866-5888\/a000009"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.1976.tb00494.x"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.54.6.1063"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2006.03.017"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.60.6.895"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01885.x"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1037\/0022-006X.44.3.376"},{"key":"ref9","first-page":"151","article-title":"Appropriateness of self-disclosure","author":"derlega","year":"1979","journal-title":"Self-Disclosure Origins patterns and implications of openness in interpersonal relationships"},{"key":"ref4","article-title":"Friend Game - Behind the online hoax that led to a girl's suicide","author":"collins","year":"0","journal-title":"(2008 01\/13\/2008)"},{"journal-title":"A problem for Facebook users Identity scams","year":"2018","author":"picchi","key":"ref3"},{"key":"ref6","article-title":"Liking for the norm-breaker in self-disclosure","author":"chaikin","year":"1974","journal-title":"Journal of Personality"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1037\/h0036614"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1177\/1948550611427608"}],"event":{"name":"2023 IEEE International Symposium on Technology and Society (ISTAS)","start":{"date-parts":[[2023,9,13]]},"location":"Swansea, United Kingdom","end":{"date-parts":[[2023,9,15]]}},"container-title":["2023 IEEE International Symposium on Technology and Society (ISTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10305708\/10305722\/10306178.pdf?arnumber=10306178","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,11]],"date-time":"2023-12-11T19:22:27Z","timestamp":1702322547000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10306178\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,13]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/istas57930.2023.10306178","relation":{},"subject":[],"published":{"date-parts":[[2023,9,13]]}}}