{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:36Z","timestamp":1750307316907,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,5,7]],"date-time":"2011-05-07T00:00:00Z","timestamp":1304726400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,5,7]]},"DOI":"10.1145\/1979742.1979579","type":"proceedings-article","created":{"date-parts":[[2011,5,9]],"date-time":"2011-05-09T12:48:29Z","timestamp":1304945309000},"page":"2441-2444","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Privacy for a Networked World"],"prefix":"10.1145","author":[{"given":"Airi","family":"Lampinen","sequence":"first","affiliation":[{"name":"Helsinki Institute for Information Technology HIIT \/ Aalto University, Helsinki, Finland"}]},{"given":"Fred","family":"Stutzman","sequence":"additional","affiliation":[{"name":"University of North Carolina - Chapel Hill, Chapel Hill, NC, USA"}]},{"given":"Markus","family":"Bylund","sequence":"additional","affiliation":[{"name":"Swedish Institute of Computer Science, Stockholm, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2011,5,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"How Different are Young Adults from Older Adults when it Comes to Information Privacy Attitudes and Policies","author":"Hoofnagle C.","year":"2010","unstructured":"Hoofnagle , C. , King , J. , Li , S. , and Turow , J . How Different are Young Adults from Older Adults when it Comes to Information Privacy Attitudes and Policies . UC Berkeley Center for Law and Technology ( 2010 ). Hoofnagle, C., King, J., Li, S., and Turow, J. How Different are Young Adults from Older Adults when it Comes to Information Privacy Attitudes and Policies. UC Berkeley Center for Law and Technology (2010)."},{"key":"e_1_3_2_1_2_1","volume-title":"Reputation Management and Social Media: How people monitor their identity and search for others online. Pew Internet and American Life Project","author":"Madden M.","year":"2010","unstructured":"Madden , M. and Smith , A . Reputation Management and Social Media: How people monitor their identity and search for others online. Pew Internet and American Life Project ( 2010 ). Madden, M. and Smith, A. Reputation Management and Social Media: How people monitor their identity and search for others online. Pew Internet and American Life Project (2010)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1561\/1100000004"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/356546.356548"},{"key":"e_1_3_2_1_5_1","unstructured":"Westin A. Privacy and Freedom. Atheneum New York (1967).  Westin A. Privacy and Freedom. Atheneum New York (1967)."},{"key":"e_1_3_2_1_6_1","volume-title":"The Governance of Privacy: Policy Instruments in Global Perspective","author":"Bennett C.","year":"2006","unstructured":"Bennett , C. and Raab , C . The Governance of Privacy: Policy Instruments in Global Perspective . Cambridge, The MIT Press ( 2006 ). Bennett, C. and Raab, C. The Governance of Privacy: Policy Instruments in Global Perspective. Cambridge, The MIT Press (2006)."},{"key":"e_1_3_2_1_7_1","volume-title":"Personal Space, Territory, Crowding.","author":"Altman I.","year":"1975","unstructured":"Altman , I. The Environment and Social Behavior - Privacy , Personal Space, Territory, Crowding. Brooks\/Cole Publishing Company , Monterey, CA ( 1975 ). Altman, I. The Environment and Social Behavior - Privacy, Personal Space, Territory, Crowding. Brooks\/Cole Publishing Company, Monterey, CA (1975)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753560"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1620545.1620547"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753559"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1655884.1655894"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Snyder J. L. E-Mail Privacy in the Workplace. Journal of Business Communication 47 3 (2010) 266--294.  Snyder J. L. E-Mail Privacy in the Workplace. Journal of Business Communication 47 3 (2010) 266--294.","DOI":"10.1177\/0021943610369783"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1177\/0270467607311484"}],"event":{"name":"CHI '11: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Vancouver BC Canada","acronym":"CHI '11"},"container-title":["CHI '11 Extended Abstracts on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1979742.1979579","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1979742.1979579","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:05:49Z","timestamp":1750244749000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1979742.1979579"}},"subtitle":["bridging theory and design"],"short-title":[],"issued":{"date-parts":[[2011,5,7]]},"references-count":14,"alternative-id":["10.1145\/1979742.1979579","10.1145\/1979742"],"URL":"https:\/\/doi.org\/10.1145\/1979742.1979579","relation":{},"subject":[],"published":{"date-parts":[[2011,5,7]]},"assertion":[{"value":"2011-05-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}