{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:36Z","timestamp":1750306656575,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,13]],"date-time":"2014-09-13T00:00:00Z","timestamp":1410566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,13]]},"DOI":"10.1145\/2638728.2641317","type":"proceedings-article","created":{"date-parts":[[2014,9,17]],"date-time":"2014-09-17T14:22:41Z","timestamp":1410963761000},"page":"695-698","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Failures in sharing personal data on social networking sites"],"prefix":"10.1145","author":[{"given":"Daniel A.","family":"Epstein","sequence":"first","affiliation":[{"name":"University of Washington"}]},{"given":"James","family":"Fogarty","sequence":"additional","affiliation":[{"name":"University of Washington"}]},{"given":"Sean A.","family":"Munson","sequence":"additional","affiliation":[{"name":"University of Washington"}]}],"member":"320","published-online":{"date-parts":[[2014,9,13]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/1124772.1124840"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/2493432.2493433"},{"author":"Epstein D. A.","unstructured":"Epstein , D. A. , Jacobson , B. H. , Bales , E. , McDonald , D. W. , and Munson , S. A. \" It's just another stupid post\": Design Dimensions to Improve Social Sharing in Personal Informatics. Under Review. Epstein, D. A., Jacobson, B. H., Bales, E., McDonald, D. W., and Munson, S. A. \"It's just another stupid post\": Design Dimensions to Improve Social Sharing in Personal Informatics. Under Review.","journal-title":"Review.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","volume-title":"Forbes, 2011","author":"Hill K.","year":"2011","unstructured":"Hill , K. Fitbit Moves Quickly After Users' Sex Stats Exposed . Forbes, 2011 . http:\/\/www.forbes.com\/sites\/kashmirhill\/ 2011 \/07\/05\/fitbit-moves-quickly-after-users-sex-stats-exposed\/. Hill, K. Fitbit Moves Quickly After Users' Sex Stats Exposed. Forbes, 2011. http:\/\/www.forbes.com\/sites\/kashmirhill\/2011\/07\/05\/fitbit-moves-quickly-after-users-sex-stats-exposed\/."},{"key":"e_1_3_2_1_5_1","first-page":"25","volume":"2012","author":"Munson S. A.","unstructured":"Munson , S. A. and Consolvo , S. Exploring Goal-Setting , Rewards, Self-Monitoring , and Sharing to Motivate Physical Activity. PervasiveHealth 2012 , 25 -- 32 . Munson, S. A. and Consolvo, S. Exploring Goal-Setting, Rewards, Self-Monitoring, and Sharing to Motivate Physical Activity. PervasiveHealth 2012, 25--32.","journal-title":"Motivate Physical Activity. PervasiveHealth"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1007\/978-3-642-13226-1_5"},{"key":"e_1_3_2_1_7_1","volume-title":"CNN Money, 2010","author":"Pepitone J.","year":"2010","unstructured":"Pepitone , J. Facebook broadcasts engagement ring purchase . CNN Money, 2010 . http:\/\/money.cnn.com\/galleries\/ 2010 \/technology\/1012\/gallery.5_data_breaches\/3.html. Pepitone, J. Facebook broadcasts engagement ring purchase. CNN Money, 2010. http:\/\/money.cnn.com\/galleries\/2010\/technology\/1012\/gallery.5_data_breaches\/3.html."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/1958824.1958855"}],"event":{"sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGSPATIAL ACM Special Interest Group on Spatial Information"],"acronym":"UbiComp '14","name":"UbiComp '14: The 2014 ACM Conference on Ubiquitous Computing","location":"Seattle Washington"},"container-title":["Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2638728.2641317","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2638728.2641317","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:16Z","timestamp":1750229776000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2638728.2641317"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,13]]},"references-count":8,"alternative-id":["10.1145\/2638728.2641317","10.1145\/2638728"],"URL":"https:\/\/doi.org\/10.1145\/2638728.2641317","relation":{},"subject":[],"published":{"date-parts":[[2014,9,13]]},"assertion":[{"value":"2014-09-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}