{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T14:36:53Z","timestamp":1776091013889,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,4,10]],"date-time":"2010-04-10T00:00:00Z","timestamp":1270857600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,4,10]]},"DOI":"10.1145\/1753326.1753559","type":"proceedings-article","created":{"date-parts":[[2010,4,12]],"date-time":"2010-04-12T18:13:40Z","timestamp":1271096020000},"page":"1553-1562","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":152,"title":["Friends only"],"prefix":"10.1145","author":[{"given":"Fred","family":"Stutzman","sequence":"first","affiliation":[{"name":"University of North Carolina at Chapel Hill, Chapel Hill, NC, USA"}]},{"given":"Jacob","family":"Kramer-Duffield","sequence":"additional","affiliation":[{"name":"University of North Carolina at Chapel Hill, Chapel Hill, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,4,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"KS: AAPOR","author":"Standard Dentitions","year":"2008"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/290159.290160"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_3"},{"key":"e_1_3_2_1_4_1","volume-title":"Brooks\/Cole","author":"Altman I.","year":"1975"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v11i9.1394"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. Statistics Canada Symposium 2001","author":"Bose J.","year":"2001"},{"key":"e_1_3_2_1_7_1","first-page":"142","article-title":"The Role of Networked Publics in Teenage Social Life. In Buckingham, D. (Ed.), The John D. and Catherine T. MacArthur Foundation Series on Digital Media and Learning. MIT Press, Cambridge","volume":"119","author":"Why Youth","year":"2007","journal-title":"MA"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00383.x"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.1978.tb00603.x"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssresearch.2005.10.002"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01885.x"},{"key":"e_1_3_2_1_12_1","first-page":"1","article-title":"Signals","volume":"13","author":"Donath J","year":"2007","journal-title":"Social Supernets. JCMC"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:BTTJ.0000047585.06264.cc"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci2103_2"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00367.x"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.08.006"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518736"},{"key":"e_1_3_2_1_18_1","first-page":"5","article-title":"Nonresponse Rates and Nonresponse Bias","volume":"70","author":"Groves R.M","year":"2006","journal-title":"Household Surveys. POQ"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460563.1460675"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180875.1180901"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1531674.1531717"},{"key":"e_1_3_2_1_22_1","volume-title":"Pew Internet and American Life Project. Retrieved","author":"Lenhart A.","year":"2009"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2008.01432.x"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1111\/1540-4560.00071"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.1979.tb00651.x"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"key":"e_1_3_2_1_27_1","volume-title":"SUNY","author":"Petronio S.","year":"2002"},{"key":"e_1_3_2_1_28_1","first-page":"3","article-title":"Applying Common Identity and Bond Theory to Design of Online Communities","volume":"28","author":"Ren Y.","year":"2007","journal-title":"Organizational Studies"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Sassenberg K. Common bond and common identity groups on the Internet: Group Dynamics: Theory Research and Practice 6 1 (2002) 27--37.  Sassenberg K. Common bond and common identity groups on the Internet: Group Dynamics: Theory Research and Practice 6 1 (2002) 27--37.","DOI":"10.1037\/1089-2699.6.1.27"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1531674.1531689"},{"key":"e_1_3_2_1_31_1","unstructured":"Solove D.J. The Future of Reputation: Gossip Rumor and Privacy on the Internet. Yale: New Haven CT 2007.   Solove D.J. The Future of Reputation: Gossip Rumor and Privacy on the Internet. Yale: New Haven CT 2007."},{"key":"e_1_3_2_1_32_1","first-page":"1","article-title":"Can You See Me Now?","volume":"28","author":"Tufekci Z","year":"2008","journal-title":"Bulletin STS"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1086\/229572"},{"key":"e_1_3_2_1_34_1","first-page":"4","article-title":"Is There Social Capital in a Social Network Site?","volume":"14","author":"Valenzuela S.","year":"2000","journal-title":"JCMC"}],"event":{"name":"CHI '10: CHI Conference on Human Factors in Computing Systems","location":"Atlanta Georgia USA","acronym":"CHI '10","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the SIGCHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1753326.1753559","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1753326.1753559","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:30Z","timestamp":1750250490000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1753326.1753559"}},"subtitle":["examining a privacy-enhancing behavior in facebook"],"short-title":[],"issued":{"date-parts":[[2010,4,10]]},"references-count":34,"alternative-id":["10.1145\/1753326.1753559","10.1145\/1753326"],"URL":"https:\/\/doi.org\/10.1145\/1753326.1753559","relation":{},"subject":[],"published":{"date-parts":[[2010,4,10]]},"assertion":[{"value":"2010-04-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}