{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T12:21:41Z","timestamp":1761740501831,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,16]],"date-time":"2010-10-16T00:00:00Z","timestamp":1287187200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["216483"],"award-info":[{"award-number":["216483"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10,16]]},"DOI":"10.1145\/1868914.1868957","type":"proceedings-article","created":{"date-parts":[[2010,10,19]],"date-time":"2010-10-19T12:41:35Z","timestamp":1287492095000},"page":"363-372","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Privacy-awareness information for web forums"],"prefix":"10.1145","author":[{"given":"Stefanie","family":"P\u00f6tzsch","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Dresden, Dresden, Germany"}]},{"given":"Peter","family":"Wolkerstorfer","sequence":"additional","affiliation":[{"name":"Center for Usablitity Research and Engineering, Vienna, Austria"}]},{"given":"Cornelia","family":"Graf","sequence":"additional","affiliation":[{"name":"Center for Usablitity Research and Engineering, Vienna, Austria"}]}],"member":"320","published-online":{"date-parts":[[2010,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_3"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.22"},{"key":"e_1_3_2_1_3_1","unstructured":"Burger J. L\u00fcgnerin! Betr\u00fcgerin! http:\/\/www.zeit.de\/2009\/53\/Internetmobbing?page=all December 2009.  Burger J. L\u00fcgnerin! Betr\u00fcgerin! http:\/\/www.zeit.de\/2009\/53\/Internetmobbing?page=all December 2009."},{"key":"e_1_3_2_1_4_1","first-page":"2","article-title":"Distributed presence and community in cyberspace","volume":"3","author":"Cutler R. H","year":"1995","unstructured":"Cutler , R. H . Distributed presence and community in cyberspace . Interpersonal Computer and Technology 3 , 2 ( 1995 ), 12--32. Cutler, R. H. Distributed presence and community in cyberspace. Interpersonal Computer and Technology 3, 2 (1995), 12--32.","journal-title":"Interpersonal Computer and Technology"},{"volume-title":"Why youth (heart) social network sites: The role of networked publics in teenage social life","year":"2007","key":"e_1_3_2_1_5_1","unstructured":"danah boyd. Why youth (heart) social network sites: The role of networked publics in teenage social life . In MacArthur Foundation Series on Digital Learning - Youth, Identity, and Digital Media Volume, D. Buckingham, Ed. MIT Press , Cambridge, MA, 2007 . danah boyd. Why youth (heart) social network sites: The role of networked publics in teenage social life. In MacArthur Foundation Series on Digital Learning - Youth, Identity, and Digital Media Volume, D. Buckingham, Ed. MIT Press, Cambridge, MA, 2007."},{"key":"e_1_3_2_1_6_1","first-page":"290","volume-title":"Medienpsychologie. Schl\u00fcsselbegriffe und Konzepte (Stuttgart","author":"D\u00f6ring N.","year":"2008","unstructured":"D\u00f6ring , N. Reduced social cues \/ cues filtered out . In Medienpsychologie. Schl\u00fcsselbegriffe und Konzepte (Stuttgart , 2008 ), N. C. Kr\u00e4mer, S. Schwan, D. Unz, and M. Suckf\u00fcll, Eds., Kohlhammer , pp. 290 -- 297 . D\u00f6ring, N. Reduced social cues \/ cues filtered out. In Medienpsychologie. Schl\u00fcsselbegriffe und Konzepte (Stuttgart, 2008), N. C. Kr\u00e4mer, S. Schwan, D. Unz, and M. Suckf\u00fcll, Eds., Kohlhammer, pp. 290--297."},{"key":"e_1_3_2_1_7_1","series-title":"UTB","volume-title":"Social Web","author":"Ebersbach A.","year":"2008","unstructured":"Ebersbach , A. , Glaser , M. , and Heigl , R . Social Web , vol. 3065 of UTB . UVK , Konstanz , 2008 . Ebersbach, A., Glaser, M., and Heigl, R. Social Web, vol. 3065 of UTB. UVK, Konstanz, 2008."},{"key":"e_1_3_2_1_8_1","volume-title":"January","author":"Eckersley P.","year":"2010","unstructured":"Eckersley , P. A primer on information theory and privacy. https:\/\/www.eff.org\/deeplinks\/2010\/01\/primer-information-theory-and-privacy , January 2010 . Eckersley, P. A primer on information theory and privacy. https:\/\/www.eff.org\/deeplinks\/2010\/01\/primer-information-theory-and-privacy, January 2010."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/ejsp.36"},{"key":"e_1_3_2_1_11_1","volume-title":"Research-Based Web Design &amp","author":"Koyani S. J.","year":"2004","unstructured":"Koyani , S. J. , Bailey , R. W. , and Nall , J. R . Research-Based Web Design &amp ; Usability Guidelines. Computer Psychology , 2004 . Koyani, S. J., Bailey, R. W., and Nall, J. R. Research-Based Web Design &amp; Usability Guidelines. Computer Psychology, 2004."},{"key":"e_1_3_2_1_12_1","unstructured":"Nielsen J. Participation inequality. http:\/\/www.useit.com\/alertbox\/participation_inequality.html October 2006.  Nielsen J. Participation inequality. http:\/\/www.useit.com\/alertbox\/participation_inequality.html October 2006."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2006.00070.x"},{"key":"e_1_3_2_1_14_1","first-page":"102","volume-title":"Privacy and Identity, IFIP AICT 320 (Nice","author":"P\u00f6tzsch S.","year":"2010","unstructured":"P\u00f6tzsch , S. , and Borcea-Pfitzmann , K. Privacy-respecting access control in collaborative workspaces . In Privacy and Identity, IFIP AICT 320 (Nice , France, 2010 ), M. B. et al., Ed., Springer , pp. 102 -- 111 . P\u00f6tzsch, S., and Borcea-Pfitzmann, K. Privacy-respecting access control in collaborative workspaces. In Privacy and Identity, IFIP AICT 320 (Nice, France, 2010), M. B. et al., Ed., Springer, pp. 102--111."},{"key":"e_1_3_2_1_15_1","series-title":"Models of Bounded Rationality","volume-title":"Empirically Grounded Economic Reason","author":"Simon H. A.","year":"1997","unstructured":"Simon , H. A. Empirically Grounded Economic Reason , vol. 3 of Models of Bounded Rationality . MIT Press , Cambridge, MA , 1997 . Simon, H. A. Empirically Grounded Economic Reason, vol. 3 of Models of Bounded Rationality. MIT Press, Cambridge, MA, 1997."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/501158.501163"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.32.11.1492"},{"key":"e_1_3_2_1_18_1","first-page":"111","volume-title":"BCS HCI (1)","author":"Strater K.","year":"2008","unstructured":"Strater , K. , and Lipford , H. R . Strategies and struggles with privacy in an online social networking community . In BCS HCI (1) ( 2008 ), D. England, Ed ., BCS , pp. 111 -- 119 . Strater, K., and Lipford, H. R. Strategies and struggles with privacy in an online social networking community. In BCS HCI (1) (2008), D. England, Ed., BCS, pp. 111--119."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280706"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753559"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.185.4157.1124"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/238386.238387"}],"event":{"name":"NordiCHI '10: 6th Nordic Conference on Human-Computer Interaction","sponsor":["Reykjavik University","University of Iceland","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Reykjavik Iceland","acronym":"NordiCHI '10"},"container-title":["Proceedings of the 6th Nordic Conference on Human-Computer Interaction: Extending Boundaries"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1868914.1868957","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1868914.1868957","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:08:30Z","timestamp":1750248510000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1868914.1868957"}},"subtitle":["results from an empirical study"],"short-title":[],"issued":{"date-parts":[[2010,10,16]]},"references-count":22,"alternative-id":["10.1145\/1868914.1868957","10.1145\/1868914"],"URL":"https:\/\/doi.org\/10.1145\/1868914.1868957","relation":{},"subject":[],"published":{"date-parts":[[2010,10,16]]},"assertion":[{"value":"2010-10-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}