{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:36:23Z","timestamp":1750307783446,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,4,5]],"date-time":"2008-04-05T00:00:00Z","timestamp":1207353600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,4,5]]},"DOI":"10.1145\/1358628.1358975","type":"proceedings-article","created":{"date-parts":[[2008,4,8]],"date-time":"2008-04-08T16:27:59Z","timestamp":1207672079000},"page":"3993-3996","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Secrets and lies in computer-mediated interaction"],"prefix":"10.1145","author":[{"given":"Adam N.","family":"Joinson","sequence":"first","affiliation":[{"name":"University of Bath, Bath, United Kingdom"}]},{"given":"Jeffrey","family":"Hancock","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Pam","family":"Briggs","sequence":"additional","affiliation":[{"name":"Northumbria University, Newcastle upon Tyne, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2008,4,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1054998"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124789"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240697"},{"key":"e_1_3_2_1_5_1","volume-title":"Real Lives. Basingstoke","author":"Joinson A. N.","year":"2003","unstructured":"Joinson , A. N. Understanding the Psychology of Internet Behaviour: Virtual Worlds , Real Lives. Basingstoke : Palgrave Macmillan , 2003 . Joinson, A. N. Understanding the Psychology of Internet Behaviour: Virtual Worlds, Real Lives. Basingstoke: Palgrave Macmillan, 2003."},{"key":"e_1_3_2_1_6_1","first-page":"237","volume-title":"A. N Joinson, K. Y. A McKenna, T. Postmes and U-D. Reips (Eds).","author":"Joinson A. N.","year":"2007","unstructured":"Joinson , A. N. &amp; Paine , C. B. Self-Disclosure , Privacy and the Internet . In A. N Joinson, K. Y. A McKenna, T. Postmes and U-D. Reips (Eds). Oxford Handbook of Internet Psychology (pp. 237 -- 252 ). Oxford University Press , 2007 . Joinson, A. N. &amp; Paine, C. B. Self-Disclosure, Privacy and the Internet. In A. N Joinson, K. Y. A McKenna, T. Postmes and U-D. Reips (Eds). Oxford Handbook of Internet Psychology (pp. 237--252). Oxford University Press, 2007."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","DOI":"10.4324\/9780203328064","volume-title":"Orality and Literacy","author":"Ong W. J.","year":"1982","unstructured":"Ong , W. J. Orality and Literacy . London : Methuen , 1982 . Ong, W. J. Orality and Literacy. London: Methuen, 1982."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.015"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.01.001"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985776"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1179\/030801803225008677"}],"event":{"name":"CHI '08: CHI Conference on Human Factors in Computing Systems","sponsor":["ACM Association for Computing Machinery","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Florence Italy","acronym":"CHI '08"},"container-title":["CHI '08 Extended Abstracts on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1358628.1358975","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1358628.1358975","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:09Z","timestamp":1750254969000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1358628.1358975"}},"subtitle":["theory, methods and design."],"short-title":[],"issued":{"date-parts":[[2008,4,5]]},"references-count":11,"alternative-id":["10.1145\/1358628.1358975","10.1145\/1358628"],"URL":"https:\/\/doi.org\/10.1145\/1358628.1358975","relation":{},"subject":[],"published":{"date-parts":[[2008,4,5]]},"assertion":[{"value":"2008-04-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}