{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:09Z","timestamp":1750307049985,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":94,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,8,7]],"date-time":"2012-08-07T00:00:00Z","timestamp":1344297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002338","name":"Ministry of Education of the People's Republic of China","doi-asserted-by":"publisher","award":["10YJC630010"],"award-info":[{"award-number":["10YJC630010"]}],"id":[{"id":"10.13039\/501100002338","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fundamental Research Funds for the Central Universities, China","award":["2011221016"],"award-info":[{"award-number":["2011221016"]}]},{"name":"National Research Foundation for Doctoral Program of Higher Education of China","award":["2.01E+13"],"award-info":[{"award-number":["2.01E+13"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,8,7]]},"DOI":"10.1145\/2346536.2346602","type":"proceedings-article","created":{"date-parts":[[2012,8,14]],"date-time":"2012-08-14T12:18:56Z","timestamp":1344946736000},"page":"328-334","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Self-disclosure under social networking sites"],"prefix":"10.1145","author":[{"given":"Xi","family":"Chen","sequence":"first","affiliation":[{"name":"Zhejiang University, China"}]},{"given":"Shun","family":"Cai","sequence":"additional","affiliation":[{"name":"Xiamen University, China"}]}],"member":"320","published-online":{"date-parts":[[2012,8,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"X. Lur \"If Facebook Were a Country It Would Be the 3rd Most Populated \" 2010. URL: http:\/\/www.techxav.com\/2010\/03\/19\/if-facebook-were-a-country\/{Accessed on 25 June 2012}.  X. Lur \"If Facebook Were a Country It Would Be the 3rd Most Populated \" 2010. URL: http:\/\/www.techxav.com\/2010\/03\/19\/if-facebook-were-a-country\/{Accessed on 25 June 2012}."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180875.1180901"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00396.x"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.appdev.2008.07.002"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2006.9946"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/ejsp.36"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/mar.20232"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1089\/109493102760147240"},{"key":"e_1_3_2_1_9_1","first-page":"1","article-title":"An Experimental Test of Processes Underlying Self-Disclosure in Computer-Mediated Communication","volume":"3","author":"Schouten A. P.","year":"2009","journal-title":"CyberPsychology &amp; Behavior"},{"key":"e_1_3_2_1_10_1","first-page":"35","volume-title":"Eds. New York: Plenum","author":"Miller L. C.","year":"1987"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327957PSPR0402_05"},{"volume-title":"New York: Guilford","year":"1996","author":"Baxter L. A.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.4018\/jgim.2008070103"},{"volume-title":"New York: ACM Press","year":"2002","author":"Bos N.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.120.3.450"},{"key":"e_1_3_2_1_16_1","unstructured":"Deloitte \"Social Networking and Reputational Risk in the Workplace - Deloitte Llp 2009 Ethics &amp; Workplace Survey Results \" Deloitte. 2009.  Deloitte \"Social Networking and Reputational Risk in the Workplace - Deloitte Llp 2009 Ethics &amp; Workplace Survey Results \" Deloitte. 2009."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.75"},{"key":"e_1_3_2_1_18_1","unstructured":"E. Justice Facebook Suicide: The End of a Virtual Life: The Times 2007.  E. Justice Facebook Suicide: The End of a Virtual Life : The Times 2007."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2007.9930"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1177\/0265407598156003"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"V. J. Derlega \"Self-Disclosure and Intimate Relationships \" in Communication Intimacy and Close Relationships V. J. Derlega Ed. New York: Academic Press 1984 pp. 1--10.  V. J. Derlega \"Self-Disclosure and Intimate Relationships \" in Communication Intimacy and Close Relationships V. J. Derlega Ed. New York: Academic Press 1984 pp. 1--10.","DOI":"10.1016\/B978-0-12-210840-2.50006-0"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1086\/209566"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2005.8.114"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2006.9.46"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-5632(98)00032-6"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1037\/1089-2699.6.1.17"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1037\/1089-2699.6.1.3"},{"key":"e_1_3_2_1_28_1","unstructured":"C. Dwyer S. R. Hiltz and K. Passerini \"Trust and Privacy Concern within Social Networking Sites: A Comparison of Facebook and Myspace \" in AMCIS 2007.  C. Dwyer S. R. Hiltz and K. Passerini \"Trust and Privacy Concern within Social Networking Sites: A Comparison of Facebook and Myspace \" in AMCIS 2007."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1002\/jclp.10165"},{"volume-title":"Inc.","year":"1971","author":"Jourard S. M.","key":"e_1_3_2_1_30_1"},{"volume-title":"New York: John Wiley","year":"1971","author":"Jourard S. M.","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/01463378109369414"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1002\/1097-4679(198605)42:3<499::AID-JCLP2270420317>3.0.CO;2-I"},{"volume-title":"Albany: State University of New York Press","year":"2002","author":"Petronio S.","key":"e_1_3_2_1_34_1"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1556-6676.1993.tb02666.x"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.1999.tb01614.x"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.1997.tb01315.x"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.2307\/249753"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1177\/026540758700400303"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1177\/0265407587042001"},{"key":"e_1_3_2_1_41_1","first-page":"136","article-title":"The Relationship between Psychological Development Issues and Anticipated Self-Disclosure","volume":"27","author":"Brown M. T.","year":"1986","journal-title":"Journal of College Student Personnel"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-0167.29.5.523"},{"volume-title":"NJ: Hampton Press","year":"2005","author":"Baker A. J.","key":"e_1_3_2_1_43_1"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.55.090902.141922"},{"key":"e_1_3_2_1_45_1","first-page":"49","volume-title":"Eds.","author":"Brickson S.","year":"2001"},{"key":"e_1_3_2_1_46_1","first-page":"229","volume-title":"CA: Sage","author":"Prager K. J.","year":"2000"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1089\/109493100316003"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1089\/109493101753235214"},{"volume-title":"Eds. San Diego: CA: Academic Press","year":"1994","author":"Duck S.","key":"e_1_3_2_1_49_1"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.116.3.457"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.83.2.313"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1177\/14614440122226209"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.90.5.751"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.1988.tb00169.x"},{"key":"e_1_3_2_1_55_1","unstructured":"A. Etzioni The Limits of Privacy. New York: Basic Books 1999.  A. Etzioni The Limits of Privacy . New York: Basic Books 1999."},{"volume-title":"San Francisco: Jossey-Bass","year":"1997","author":"Kaplin W. A.","key":"e_1_3_2_1_56_1"},{"key":"e_1_3_2_1_57_1","first-page":"1321","article-title":"Posting Personal Information on the Internet: A Case for Changing the Legal Regime Created by S 230 of the Communications Decency Act","volume":"85","author":"Richards D. V.","year":"2007","journal-title":"Texas Law Review"},{"key":"e_1_3_2_1_58_1","unstructured":"J. Berman and P. Bruening \"Is Privacy Still Possible in the Twenty-First Century?.\" vol. 2007 2007.  J. Berman and P. Bruening \"Is Privacy Still Possible in the Twenty-First Century?.\" vol. 2007 2007."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"S. Barnes \"A Privacy Paradox: Social Networking in the United States.\" vol. 2006 2006.  S. Barnes \"A Privacy Paradox: Social Networking in the United States.\" vol. 2006 2006.","DOI":"10.5210\/fm.v11i9.1394"},{"key":"e_1_3_2_1_60_1","first-page":"410","volume-title":"Eds. London: Sage","author":"Stein L.","year":"2002"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2008.01432.x"},{"key":"e_1_3_2_1_62_1","first-page":"1","article-title":"The Privacy Paradox on Social Network Sites Revisited: The Role of Individual Characteristics and Group Norms","volume":"3","author":"Sonja U.","year":"2009","journal-title":"Cyberpsychology: Journal of Psychosocial Research on Cyberspace"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1080\/01449290410001715723"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.2307\/249477"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.50.1.569"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.2307\/4132332"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(02)00074-X"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.46.4.563.12061"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"crossref","unstructured":"D. Gefen and D. W. Straub \"Managing User Trust in B2c E-Services \" e-Service Journal vol. 2 pp. 7--24 2003.  D. Gefen and D. W. Straub \"Managing User Trust in B2c E-Services \" e-Service Journal vol. 2 pp. 7--24 2003.","DOI":"10.2979\/esj.2003.2.2.7"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0015"},{"key":"e_1_3_2_1_72_1","first-page":"105","article-title":"E-Loyalty: Your Secret Weapon on the Web","volume":"78","author":"Reichheld F. F.","year":"2000","journal-title":"Harvard Business Review"},{"key":"e_1_3_2_1_73_1","first-page":"55","article-title":"Production of Trust: Institutional Source of Electronic Structure, 1984--1920","volume":"8","author":"Zarker L. G.","year":"1986","journal-title":"Research in Organizational Behavior"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1571-9979.1992.tb00679.x"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1998.926617"},{"key":"e_1_3_2_1_76_1","first-page":"192","article-title":"Would You Do It Again? Relationship Skills Gained in a Long-Distance Relationship","volume":"39","author":"Mietzner S.","year":"2005","journal-title":"College Student Journal"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0483(00)00021-9"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.3.334.81"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.2466\/pr0.1991.68.3c.1319"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"crossref","unstructured":"D. Hoffman and T. Novak \"Information Privacy in the Market Space: Implications for the Commercial Uses of Anonymity on the Web \" The Information Society vol. 15 1999.  D. Hoffman and T. Novak \"Information Privacy in the Market Space: Implications for the Commercial Uses of Anonymity on the Web \" The Information Society vol. 15 1999.","DOI":"10.1080\/019722499128583"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2005.08.002"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.2753\/JOA0091-3367380405"},{"volume-title":"International Conference on Information Systems Montreal","year":"2007","author":"Xu H.","key":"e_1_3_2_1_83_1"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"crossref","unstructured":"M. T. Dianne and J. D. Carolyn \"Privacy and Social Networking Sites \" New directions for student services vol. 124 pp. 89--102 2008.  M. T. Dianne and J. D. Carolyn \"Privacy and Social Networking Sites \" New directions for student services vol. 124 pp. 89--102 2008.","DOI":"10.1002\/ss.297"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.71.3.549"},{"key":"e_1_3_2_1_86_1","unstructured":"J. Chen W. Ping Y. Xu and B. Y. C. Tan \"Am I Afraid of My Peers? Understanding the Antecedents of Information Privacy Concerns in the Online Social Context \" in International Conference on Information Systems Phoenix U. S. 2009.  J. Chen W. Ping Y. Xu and B. Y. C. Tan \"Am I Afraid of My Peers? Understanding the Antecedents of Information Privacy Concerns in the Online Social Context \" in International Conference on Information Systems Phoenix U. S. 2009."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017327.2017330"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.08.006"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224377701400320"},{"key":"e_1_3_2_1_90_1","first-page":"199","article-title":"Validity in Logistics Research","volume":"18","author":"Mentzer J. T.","year":"1997","journal-title":"Journal of Business Logistics"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.86.1.114"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.103.3.411"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.2307\/2393203"}],"event":{"name":"ICEC '12: Fourteenth International Conference on Electronic Commerce","sponsor":["Singapore Management University Singapore Management University"],"location":"Singapore Singapore","acronym":"ICEC '12"},"container-title":["Proceedings of the 14th Annual International Conference on Electronic Commerce"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2346536.2346602","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2346536.2346602","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:05Z","timestamp":1750238465000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2346536.2346602"}},"subtitle":["a risk-utility decision model"],"short-title":[],"issued":{"date-parts":[[2012,8,7]]},"references-count":94,"alternative-id":["10.1145\/2346536.2346602","10.1145\/2346536"],"URL":"https:\/\/doi.org\/10.1145\/2346536.2346602","relation":{},"subject":[],"published":{"date-parts":[[2012,8,7]]},"assertion":[{"value":"2012-08-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}