{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T22:20:59Z","timestamp":1772058059697,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,2,25]],"date-time":"2017-02-25T00:00:00Z","timestamp":1487980800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,2,25]]},"DOI":"10.1145\/2998181.2998223","type":"proceedings-article","created":{"date-parts":[[2017,2,14]],"date-time":"2017-02-14T13:43:23Z","timestamp":1487079803000},"page":"567-580","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":57,"title":["What (or Who) Is Public?"],"prefix":"10.1145","author":[{"given":"Casey","family":"Fiesler","sequence":"first","affiliation":[{"name":"University of Colorado, Boulder, CO, USA"}]},{"given":"Michaelanne","family":"Dye","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Jessica L.","family":"Feuston","sequence":"additional","affiliation":[{"name":"Northwestern University, Chicago, IL, USA"}]},{"given":"Chaya","family":"Hiruncharoenvate","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"C.J.","family":"Hutto","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Shannon","family":"Morrison","sequence":"additional","affiliation":[{"name":"Syracuse University, New York , NY, USA"}]},{"given":"Parisa","family":"Khanipour Roshan","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Umashanthi","family":"Pavalanathan","sequence":"additional","affiliation":[{"name":"Georgia Tech, Atlanta, GA, USA"}]},{"given":"Amy S.","family":"Bruckman","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Munmun","family":"De Choudhury","sequence":"additional","affiliation":[{"name":"Georgia Tech, Atlanta, GA, USA"}]},{"given":"Eric","family":"Gilbert","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,2,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Alessandro Acquisti Laura Brandimarte and George Loewenstein. 2015. Privacy and human behavior in the age of information. Science 347 6221: 509--514.","DOI":"10.1126\/science.aaa1465"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531642"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433401"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12106"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1177\/0261927X12456384"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1177\/1745691610393980"},{"key":"e_1_3_2_1_7_1","volume-title":"Constructing Grounded Theory","author":"Charmaz Kathy","unstructured":"Kathy Charmaz. 2006. Constructing Grounded Theory. Sage Publications, Thousand Oaks, CA."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1111\/hcre.12053"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814543998"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00367.x"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772727"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819931"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2457317.2457344"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518736"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/bdm.1753"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1177\/0894439310397146"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1177\/0270467610385893"},{"key":"e_1_3_2_1_18_1","first-page":"261","article-title":"Alan Westin's Privacy Homo Economicus","volume":"49","author":"Hoofnagle Chris Jay","year":"2014","unstructured":"Chris Jay Hoofnagle and Jennifer M. Urban. 2014. Alan Westin's Privacy Homo Economicus. Wake Forest Law Review 49, 1: 261--317.","journal-title":"Wake Forest Law Review"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335369"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675211"},{"key":"e_1_3_2_1_21_1","volume-title":"Public. Proceedings of the Tenth Symposium On Usable Privacy and Security (SOUPS).","author":"Kang Ruogu","year":"2014","unstructured":"Ruogu Kang, Stephanie Brown, Laura Dabbish, and Sara Kiesle. 2014. Privacy Attitudes of Mechanical Turk Workers and the U.S. Public. Proceedings of the Tenth Symposium On Usable Privacy and Security (SOUPS)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1218772110"},{"key":"e_1_3_2_1_23_1","volume-title":"Privacy Indexes: A Survey of Westin's Studies","author":"Kumaraguru Ponnurangam","year":"2005","unstructured":"Ponnurangam Kumaraguru and Lorrie Faith Cranor. 2005. Privacy Indexes: A Survey of Westin's Studies. Carnegie Mellon University, Institute for Software Research International (ISRI)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531720"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.2307\/2529310"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.107.1.34"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531646"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068823"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the Eighth International AAAI Conference on Weblogs and Social Media (ICWSM).","author":"Liu Yabing","year":"2014","unstructured":"Yabing Liu, C Kliman-Silver, and Alan Mislove. 2014. The Tweets They are a-Changin': Evolution of Twitter Users and Behavior. Proceedings of the Eighth International AAAI Conference on Weblogs and Social Media (ICWSM)."},{"key":"e_1_3_2_1_30_1","first-page":"31","article-title":"Codebook Development for TeamBased Qualitative Analysis","volume":"10","author":"MacQueen K. M.","year":"1998","unstructured":"K. M. MacQueen, E. McLellan, K. Kay, and B. Milstein. 1998. Codebook Development for TeamBased Qualitative Analysis. Field Methods 10, 2: 31--36.","journal-title":"Field Methods"},{"key":"e_1_3_2_1_31_1","volume-title":"Privacy management on social media sites","author":"Madden Mary","unstructured":"Mary Madden. 2012. Privacy management on social media sites. Pew Research Center's Internet & American Life Project, Washington D.C."},{"key":"e_1_3_2_1_32_1","volume-title":"International Conference on Pervasive Computing and Communications, IEEE, 340--345","author":"Madejski Michelle","unstructured":"Michelle Madejski, Maritza Johnson, and Steven M. Bellovin. 2012. A study of privacy settings errors in an online social network. International Conference on Pervasive Computing and Communications, IEEE, 340--345."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702553"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753587"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718918.1718953"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2685553.2698996"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1017\/S1930297500002205"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1958824.1958865"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441865"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2181037.2181062"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v4i2.620"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753559"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the International Conference on Weblogs and Social Media (ICWSM).","author":"Tufekci Zeynep","year":"2014","unstructured":"Zeynep Tufekci. 2014. Big Questions for Social Media Big Data: Representativeness, Validity and Other Methodological Pitfalls. Proceedings of the International Conference on Weblogs and Social Media (ICWSM)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444812451566"},{"key":"e_1_3_2_1_45_1","first-page":"1485","article-title":"Balancing Audience and Privacy Tensions on Social Network Sites","volume":"9","author":"Vitak Jessica","year":"2015","unstructured":"Jessica Vitak, Stacy Blasiola, Sameer Patil, and Eden Litt. 2015. Balancing Audience and Privacy Tensions on Social Network Sites. International Journal of Communication 9, 1485--1504.","journal-title":"International Journal of Communication"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531672"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2132176.2132286"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820078"},{"key":"e_1_3_2_1_49_1","volume-title":"Profiling Facebook Users' Privacy Behaviors. Workshop on Privacy Personas and Segmentation.","author":"Wisniewski Pamela","year":"2014","unstructured":"Pamela Wisniewski, Bart P. Knijnenburg, and Heather Richter Lipford. 2014. Profiling Facebook Users' Privacy Behaviors. Workshop on Privacy Personas and Segmentation."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1556460.1556499"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470656"}],"event":{"name":"CSCW '17: Computer Supported Cooperative Work and Social Computing","location":"Portland Oregon USA","acronym":"CSCW '17","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2998181.2998223","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2998181.2998223","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:13Z","timestamp":1750218613000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2998181.2998223"}},"subtitle":["Privacy Settings and Social Media Content Sharing"],"short-title":[],"issued":{"date-parts":[[2017,2,25]]},"references-count":51,"alternative-id":["10.1145\/2998181.2998223","10.1145\/2998181"],"URL":"https:\/\/doi.org\/10.1145\/2998181.2998223","relation":{},"subject":[],"published":{"date-parts":[[2017,2,25]]},"assertion":[{"value":"2017-02-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}