{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T15:49:17Z","timestamp":1777996157136,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,7,20]],"date-time":"2011-07-20T00:00:00Z","timestamp":1311120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,7,20]]},"DOI":"10.1145\/2078827.2078847","type":"proceedings-article","created":{"date-parts":[[2011,12,20]],"date-time":"2011-12-20T17:47:13Z","timestamp":1324403233000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":63,"title":["Indirect content privacy surveys"],"prefix":"10.1145","author":[{"given":"Alex","family":"Braunstein","sequence":"first","affiliation":[{"name":"Chomp"}]},{"given":"Laura","family":"Granka","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Jessica","family":"Staddon","sequence":"additional","affiliation":[{"name":"Google"}]}],"member":"320","published-online":{"date-parts":[[2011,7,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Workshop on Information Systems and Economics (WISE)","author":"Acquisti A.","year":"2009"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1086\/268949"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"J. Barabas and J. Jerit. Are Survey Experiments Externally Valid? American Political Science Review 104 (May): 226--42. 2010.  J. Barabas and J. Jerit. Are Survey Experiments Externally Valid? American Political Science Review 104 (May): 226--42. 2010.","DOI":"10.1017\/S0003055410000092"},{"key":"e_1_3_2_1_4_1","unstructured":"Blippy. http:\/\/blippy.com\/  Blippy. http:\/\/blippy.com\/"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v58:2"},{"key":"e_1_3_2_1_6_1","volume-title":"Misplaced Confidences: Privacy and the Control Paradox. WEIS","author":"Brandimarte L.","year":"2010"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v58:2"},{"key":"e_1_3_2_1_8_1","volume-title":"ArsTechnica","year":"2010"},{"key":"e_1_3_2_1_9_1","unstructured":"M. J. Culnan and G. R. Milne. The culnan-milne survey on consumers and online privacy notices 2001. http:\/\/intra.som.umass.edu\/georgemilne\/pdffiles\/culnan-milne.pdf.  M. J. Culnan and G. R. Milne. The culnan-milne survey on consumers and online privacy notices 2001. http:\/\/intra.som.umass.edu\/georgemilne\/pdffiles\/culnan-milne.pdf."},{"key":"e_1_3_2_1_10_1","unstructured":"Electronic Frontier Foundation. http:\/\/www.eff.org\/  Electronic Frontier Foundation. http:\/\/www.eff.org\/"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240866.1241089"},{"key":"e_1_3_2_1_12_1","unstructured":"Facebook + Husband = grrrrrrrr!. Anonymous post at iVillage. http:\/\/forums.ivillage.com\/t5\/Girl-Talk\/Facebook-Husband-grrrrrrrr\/td-p\/116924103 February 23 2011.  Facebook + Husband = grrrrrrrr!. Anonymous post at iVillage. http:\/\/forums.ivillage.com\/t5\/Girl-Talk\/Facebook-Husband-grrrrrrrr\/td-p\/116924103 February 23 2011."},{"key":"e_1_3_2_1_13_1","first-page":"399433","article-title":"The correlation between relatives on the supposition of Mendelian inheritance","volume":"52","author":"Fisher R. A.","year":"1918","journal-title":"Transactions of the Royal Society of Edinburgh"},{"key":"e_1_3_2_1_14_1","unstructured":"D. Freedman R. Pisani R. Purves. Statistics. W. W. Norton and Company 1997.  D. Freedman R. Pisani R. Purves. Statistics. W. W. Norton and Company 1997."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143137"},{"key":"e_1_3_2_1_16_1","unstructured":"E. Goldman. The Internet Privacy Fallacy. http:\/\/eric_goldman.tripodxom\/articles\/privacyfallacy.htm  E. Goldman. The Internet Privacy Fallacy. http:\/\/eric_goldman.tripodxom\/articles\/privacyfallacy.htm"},{"key":"e_1_3_2_1_17_1","unstructured":"H. Goldstein. Multilevel Statistical Models Second Edition London: Edward Arnold. 1995.  H. Goldstein. Multilevel Statistical Models Second Edition London: Edward Arnold. 1995."},{"key":"e_1_3_2_1_18_1","unstructured":"Harris Interactive. Identity Theft: New Survey & Trend Report August 2003.  Harris Interactive. Identity Theft: New Survey & Trend Report August 2003."},{"key":"e_1_3_2_1_19_1","article-title":"Rating Versus Ranking: What is the Best Way to Reduce Response and Language Bias","volume":"18","author":"Harzing A-W.","year":"2009","journal-title":"Cross-National Research. International Business Review"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0042210"},{"key":"e_1_3_2_1_21_1","volume-title":"Journal of Consumer Research","author":"John L.","year":"2010"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2007.10.005"},{"key":"e_1_3_2_1_23_1","volume-title":"Kohn, Class and Conformity: A Study in Values","author":"Kohn M. L.","edition":"2"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1086\/269128"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.21"},{"key":"e_1_3_2_1_26_1","unstructured":"Pew Research Center. http:\/\/pewresearch.org\/  Pew Research Center. http:\/\/pewresearch.org\/"},{"key":"e_1_3_2_1_27_1","first-page":"98957","article-title":"Mixed-Effects Models","volume":"0","author":"Pinheiro J. C.","year":"2000","journal-title":"S and S-PLUS. ISBN"},{"key":"e_1_3_2_1_28_1","unstructured":"Ponemon Institute. http:\/\/www.ponemon.org\/news-2\/40  Ponemon Institute. http:\/\/www.ponemon.org\/news-2\/40"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1093\/poq\/nfp002"},{"key":"e_1_3_2_1_30_1","unstructured":"Privacilla.org. Privacy Survey Design is Often Flawed. Available at: http:\/\/www.privacilla.org\/fundamentals\/surveyqs.html  Privacilla.org. Privacy Survey Design is Often Flawed. Available at: http:\/\/www.privacilla.org\/fundamentals\/surveyqs.html"},{"key":"e_1_3_2_1_31_1","unstructured":"Privacy Check. http:\/\/www.rabidgremlin.com\/fbprivacy\/  Privacy Check. http:\/\/www.rabidgremlin.com\/fbprivacy\/"},{"key":"e_1_3_2_1_32_1","unstructured":"Privacy Rights. http:\/\/www.privacyrights.org\/  Privacy Rights. http:\/\/www.privacyrights.org\/"},{"key":"e_1_3_2_1_33_1","volume-title":"New York: Free Press","author":"Rokeach M.","year":"1973"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"S. R. Searle R. Casella and C. E. McCulloch. Variance Components. New York: John Wiley and Sons. 1992.  S. R. Searle R. Casella and C. E. McCulloch. Variance Components. New York: John Wiley and Sons. 1992.","DOI":"10.1002\/9780470316856"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/501158.501163"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1093\/poq\/nfi028"},{"key":"e_1_3_2_1_37_1","unstructured":"T. A. B. Snijders and R. J. Bosker. Multilevel Analysis An Introduction to Basic and Advanced Multilevel Modeling. London: Sage. 1999.  T. A. B. Snijders and R. J. Bosker. Multilevel Analysis An Introduction to Basic and Advanced Multilevel Modeling. London: Sage. 1999."},{"key":"e_1_3_2_1_38_1","unstructured":"J. Turow. Americans & Online Privacy: The System is Broken. A report from the Annenberg Public Policy Center of the University of Pennsylvania. June 2003.  J. Turow. Americans & Online Privacy: The System is Broken. A report from the Annenberg Public Policy Center of the University of Pennsylvania. June 2003."},{"key":"e_1_3_2_1_39_1","volume-title":"February 21, 2007. http:\/\/patientprivacyrights.org\/2007\/02\/upi-poll-concern-on-health-privacy\/","author":"United Press International\/Zogby. UPI Poll"}],"event":{"name":"SOUPS '11: Symposium On Usable Privacy and Security","location":"Pittsburgh Pennsylvania","acronym":"SOUPS '11","sponsor":["Carnegie Mellon CyLab","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the Seventh Symposium on Usable Privacy and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2078827.2078847","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2078827.2078847","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:15Z","timestamp":1750241175000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2078827.2078847"}},"subtitle":["measuring privacy without asking about it"],"short-title":[],"issued":{"date-parts":[[2011,7,20]]},"references-count":39,"alternative-id":["10.1145\/2078827.2078847","10.1145\/2078827"],"URL":"https:\/\/doi.org\/10.1145\/2078827.2078847","relation":{},"subject":[],"published":{"date-parts":[[2011,7,20]]},"assertion":[{"value":"2011-07-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}