{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:51:39Z","timestamp":1755838299353,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,2,23]],"date-time":"2013-02-23T00:00:00Z","timestamp":1361577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,2,23]]},"DOI":"10.1145\/2441955.2442032","type":"proceedings-article","created":{"date-parts":[[2013,2,22]],"date-time":"2013-02-22T19:25:33Z","timestamp":1361561133000},"page":"315-320","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Measuring networked social privacy"],"prefix":"10.1145","author":[{"given":"Xinru","family":"Page","sequence":"first","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Karen","family":"Tang","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Fred","family":"Stutzman","sequence":"additional","affiliation":[{"name":"University of North Carolina - Chapel Hill, Chapel Hill, NC, USA"}]},{"given":"Airi","family":"Lampinen","sequence":"additional","affiliation":[{"name":"Helsinki Institute for Information Technology &amp; Aalto University, Aalto, Finland"}]}],"member":"320","published-online":{"date-parts":[[2013,2,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Acquisti A. and Grossklags J. 2006. Privacy and Rationality. Privacy and Technologies of Identity: A Cross-Disciplinary Conversation. K. J. Strandburg and D. S. Raicu eds. Springer US. 15--29.  Acquisti A. and Grossklags J. 2006. Privacy and Rationality. Privacy and Technologies of Identity: A Cross-Disciplinary Conversation. K. J. Strandburg and D. S. Raicu eds. Springer US. 15--29.","DOI":"10.1007\/0-387-28222-X_2"},{"key":"e_1_3_2_1_2_1","unstructured":"Altman I. 1975. The Environment and Social Behavior: Privacy Personal Space Territory and Crowding. Brooks\/Cole Publishing Company.  Altman I. 1975. The Environment and Social Behavior: Privacy Personal Space Territory and Crowding. Brooks\/Cole Publishing Company."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v58:2"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1054985"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1561\/1100000004"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979420"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"volume-title":"Washington Law Review. 79","year":"2004","author":"Nissenbaum H.","key":"e_1_3_2_1_8_1"},{"volume-title":"Proc. ICWSM 2012","year":"2012","author":"Page X.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1006\/jevp.1999.0140"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2208940.2208950"},{"key":"e_1_3_2_1_12_1","unstructured":"Solove D. J. 2008. Understanding Privacy. Harvard University Press.  Solove D. J. 2008. Understanding Privacy. Harvard University Press."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.10.017"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864349.1864363"},{"key":"e_1_3_2_1_15_1","first-page":"119","article-title":"Location-Sharing Technologies","volume":"6","author":"Tsai J. Y.","year":"2010","journal-title":"Privacy Risks and Controls. I\/S: A Journal of Law and Policy for the Information Society."},{"key":"e_1_3_2_1_16_1","unstructured":"Westin A. 1967. Privacy and Freedom. Atheneum.  Westin A. 1967. Privacy and Freedom. Atheneum."},{"volume-title":"Proc. ICIS 2011","year":"2011","author":"Zhang N.","key":"e_1_3_2_1_17_1"}],"event":{"name":"CSCW '13: Computer Supported Cooperative Work","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"San Antonio Texas USA","acronym":"CSCW '13"},"container-title":["Proceedings of the 2013 conference on Computer supported cooperative work companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2441955.2442032","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2441955.2442032","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:35:25Z","timestamp":1750235725000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2441955.2442032"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2,23]]},"references-count":17,"alternative-id":["10.1145\/2441955.2442032","10.1145\/2441955"],"URL":"https:\/\/doi.org\/10.1145\/2441955.2442032","relation":{},"subject":[],"published":{"date-parts":[[2013,2,23]]},"assertion":[{"value":"2013-02-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}