{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:34:40Z","timestamp":1750307680432,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,4,4]],"date-time":"2009-04-04T00:00:00Z","timestamp":1238803200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,4,4]]},"DOI":"10.1145\/1520340.1520490","type":"proceedings-article","created":{"date-parts":[[2009,4,6]],"date-time":"2009-04-06T16:34:53Z","timestamp":1239035693000},"page":"3383-3388","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Facilitating benign deceit in mediated communication"],"prefix":"10.1145","author":[{"given":"Wendy","family":"Moncur","sequence":"first","affiliation":[{"name":"Universities of Aberdeen and Dundee, Aberdeen &amp; Dundee, United Kingdom"}]},{"given":"Judith","family":"Masthoff","sequence":"additional","affiliation":[{"name":"University of Aberdeen, Aberdeen, United Kingdom"}]},{"given":"Ehud","family":"Reiter","sequence":"additional","affiliation":[{"name":"University of Aberdeen, Aberdeen, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2009,4,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1054998"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010025403776"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8640.00223"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011868232549"},{"key":"e_1_3_2_1_5_1","volume-title":"Identity and deception in the virtual community","author":"Donath J.","year":"1998","unstructured":"Donath , J. Identity and deception in the virtual community . In Kollock, P. and Smith, M. eds.Communities in cyberspace. Routledge , London , 1998 . Donath, J. Identity and deception in the virtual community. In Kollock, P. and Smith, M. eds.Communities in cyberspace. Routledge, London, 1998."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985709"},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. 5th Conference on Prestigious Applications of Intelligent Systems","author":"Hunter J.","year":"2008","unstructured":"Hunter , J. , Gatt , A. , Portet , F. , Reiter , E. and Sripada , S . Using natural language generation technology to improve information flows in intensive care units . In Proc. 5th Conference on Prestigious Applications of Intelligent Systems ( 2008 ). Hunter, J., Gatt, A., Portet, F., Reiter, E. and Sripada, S. Using natural language generation technology to improve information flows in intensive care units. In Proc. 5th Conference on Prestigious Applications of Intelligent Systems (2008)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240866.1240983"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CBMS.2008.36"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/265013"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180875.1180946"},{"key":"e_1_3_2_1_12_1","volume-title":"G. Computational Mechanisms for Pun Generation. In Proceedings of the 10th European Natural Language Generation Workshop.","author":"Ritchie","year":"2005","unstructured":"Ritchie , G. Computational Mechanisms for Pun Generation. In Proceedings of the 10th European Natural Language Generation Workshop. ( 2005 ), 125--132. Ritchie, G. Computational Mechanisms for Pun Generation. In Proceedings of the 10th European Natural Language Generation Workshop. (2005), 125--132."}],"event":{"name":"CHI '09: CHI Conference on Human Factors in Computing Systems","sponsor":["ACM Association for Computing Machinery","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Boston MA USA","acronym":"CHI '09"},"container-title":["CHI '09 Extended Abstracts on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1520340.1520490","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1520340.1520490","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:45Z","timestamp":1750253385000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1520340.1520490"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4,4]]},"references-count":12,"alternative-id":["10.1145\/1520340.1520490","10.1145\/1520340"],"URL":"https:\/\/doi.org\/10.1145\/1520340.1520490","relation":{},"subject":[],"published":{"date-parts":[[2009,4,4]]},"assertion":[{"value":"2009-04-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}