{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:54:21Z","timestamp":1776102861155,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,11,8]],"date-time":"2008-11-08T00:00:00Z","timestamp":1226102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,11,8]]},"DOI":"10.1145\/1460563.1460629","type":"proceedings-article","created":{"date-parts":[[2008,11,18]],"date-time":"2008-11-18T13:27:27Z","timestamp":1227014847000},"page":"413-416","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["I know something you don't"],"prefix":"10.1145","author":[{"given":"Jeffrey T.","family":"Hancock","sequence":"first","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Catalina L.","family":"Toma","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, USA"}]},{"given":"Kate","family":"Fenner","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,11,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511620539","volume-title":"Using Language","author":"Clark H. H.","year":"1996","unstructured":"Clark , H. H. ( 1996 ). Using Language . Cambridge, UK : Cambridge University Press . Clark, H. H. (1996). Using Language. Cambridge, UK: Cambridge University Press."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15324834BASP2402_8"},{"key":"e_1_3_2_1_3_1","first-page":"287","volume-title":"K. McKenna, T. Postmes, U. Reips &amp","author":"Hancock J. T.","year":"2007","unstructured":"Hancock , J. T. ( 2007 ). Digital deception: When, where and how people lie online . In K. McKenna, T. Postmes, U. Reips &amp ; A. N. Joinson (eds.) Oxford Handbook of Internet Psychology ( pp. 287 -- 301 ). Oxford : Oxford University Press . Hancock, J. T. (2007). Digital deception: When, where and how people lie online. In K. McKenna, T. Postmes, U. Reips &amp; A. N. Joinson (eds.) Oxford Handbook of Internet Psychology (pp. 287--301). Oxford: Oxford University Press."},{"key":"e_1_3_2_1_4_1","volume-title":"Ingratiation: A Social Psychological Analysis","author":"Jones E. E.","year":"1964","unstructured":"Jones , E. E. ( 1964 ). Ingratiation: A Social Psychological Analysis . New York : Meredith Publishing Company . Jones, E. E. (1964). Ingratiation: A Social Psychological Analysis. New York: Meredith Publishing Company."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180875.1180901"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adolescence.2005.08.008"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/03637757409375845"},{"key":"e_1_3_2_1_8_1","first-page":"213","article-title":"Information-seeking strategies, uncertainty, and computer-mediated communication: Toward a conceptual model","volume":"26","author":"Ramirez A., J.","year":"2002","unstructured":"Ramirez , A., J. Walther , J. Burgoon &amp; M. Sunnafrank ( 2002 ). Information-seeking strategies, uncertainty, and computer-mediated communication: Toward a conceptual model . Human Communication Research , 26 : 213 -- 228 Ramirez, A., J. Walther, J. Burgoon &amp; M. Sunnafrank (2002). Information-seeking strategies, uncertainty, and computer-mediated communication: Toward a conceptual model. Human Communication Research, 26: 213--228","journal-title":"Human Communication Research"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1086\/267838"},{"key":"e_1_3_2_1_10_1","volume-title":"Equity: Theory and research. Rockleigh NJ: Allyn and Bacon","author":"Walster E. H.","year":"1978","unstructured":"Walster , E. H. , Walster , G. W. , &amp; Berscheid , E. ( 1978 ). Equity: Theory and research. Rockleigh NJ: Allyn and Bacon . Walster, E. H., Walster, G. W., &amp; Berscheid, E. (1978). Equity: Theory and research. Rockleigh NJ: Allyn and Bacon."}],"event":{"name":"CSCW08: Computer Supported Cooperative Work","location":"San Diego CA USA","acronym":"CSCW08","sponsor":["ACM Association for Computing Machinery","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2008 ACM conference on Computer supported cooperative work"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1460563.1460629","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1460563.1460629","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:44Z","timestamp":1750253384000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1460563.1460629"}},"subtitle":["the use of asymmetric personal information for interpersonal advantage"],"short-title":[],"issued":{"date-parts":[[2008,11,8]]},"references-count":10,"alternative-id":["10.1145\/1460563.1460629","10.1145\/1460563"],"URL":"https:\/\/doi.org\/10.1145\/1460563.1460629","relation":{},"subject":[],"published":{"date-parts":[[2008,11,8]]},"assertion":[{"value":"2008-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}