{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T10:33:04Z","timestamp":1770978784902,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T00:00:00Z","timestamp":1493683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/M027805\/1"],"award-info":[{"award-number":["EP\/M027805\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,2]]},"DOI":"10.1145\/3025453.3025668","type":"proceedings-article","created":{"date-parts":[[2017,5,3]],"date-time":"2017-05-03T12:34:28Z","timestamp":1493814868000},"page":"3821-3832","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":68,"title":["Photo Privacy Conflicts in Social Media"],"prefix":"10.1145","author":[{"given":"Jose M.","family":"Such","sequence":"first","affiliation":[{"name":"King's College, London, London, United Kingdom"}]},{"given":"Joel","family":"Porter","sequence":"additional","affiliation":[{"name":"Lancaster University, Lancaster, United Kingdom"}]},{"given":"S\u00f6ren","family":"Preibusch","sequence":"additional","affiliation":[{"name":"Google, Inc., Mountain View, CA, USA"}]},{"given":"Adam","family":"Joinson","sequence":"additional","affiliation":[{"name":"University of Bath, Bath, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2017,5,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781446212165"},{"key":"e_1_3_2_1_2_1","volume-title":"The environment and social behavior: Privacy, personal space, territory, and crowding","author":"Altman I.","year":"1975","unstructured":"I. Altman . The environment and social behavior: Privacy, personal space, territory, and crowding . 1975 . I. Altman. The environment and social behavior: Privacy, personal space, territory, and crowding. 1975."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470658"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753560"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518849"},{"key":"e_1_3_2_1_6_1","volume-title":"Social steganography: Privacy in networked publics","author":"Boyd D.","year":"2011","unstructured":"D. Boyd and A. Marwick . Social steganography: Privacy in networked publics . International Communication Association , Boston, MA , 2011 . D. Boyd and A. Marwick. Social steganography: Privacy in networked publics. International Communication Association, Boston, MA, 2011."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.29173\/irie98"},{"key":"e_1_3_2_1_8_1","volume-title":"Social Research Methods","author":"Bryman A.","year":"2012","unstructured":"A. Bryman . Social Research Methods . Oxford University Press , New York , forth edition, 2012 . A. Bryman. Social Research Methods. Oxford University Press, New York, forth edition, 2012."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1177\/1745691610393980"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753613"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897053.2897063"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2011.247109"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819996"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2016.6"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.07.013"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557352"},{"key":"e_1_3_2_1_17_1","volume-title":"The handbook of conflict resolution: Theory and practice","author":"Deutsch M.","year":"2011","unstructured":"M. Deutsch , P. T. Coleman , and E. C. Marcus . The handbook of conflict resolution: Theory and practice . John Wiley & Sons , 2011 . M. Deutsch, P. T. Coleman, and E. C. Marcus. The handbook of conflict resolution: Theory and practice. John Wiley & Sons, 2011."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0061470"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038920"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702443"},{"issue":"7","key":"e_1_3_2_1_21_1","first-page":"1614","article-title":"Multiparty access control for online social networks: model and mechanisms. Knowledge and Data Engineering","volume":"25","author":"Hu H.","year":"2013","unstructured":"H. Hu , G.-J. Ahn , and J. Jorgensen . Multiparty access control for online social networks: model and mechanisms. Knowledge and Data Engineering , IEEE Transactions on , 25 ( 7 ): 1614 -- 1627 , 2013 . H. Hu, G.-J. Ahn, and J. Jorgensen. Multiparty access control for online social networks: model and mechanisms. Knowledge and Data Engineering, IEEE Transactions on, 25(7):1614--1627, 2013.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2613087.2613097"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813603"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858415"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357213"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208552"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970030.2970035"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858417"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2010.6"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1952.10483441"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979420"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1387649.1387651"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1177\/1525822X980100020301"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.02.097"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-011-0124-6"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335374"},{"key":"e_1_3_2_1_37_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum H.","year":"2004","unstructured":"H. Nissenbaum . Privacy as contextual integrity . Wash. L. Rev. , 79 : 119 , 2004 . H. Nissenbaum. Privacy as contextual integrity. Wash. L. Rev., 79:119, 2004.","journal-title":"Wash. L. Rev."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"key":"e_1_3_2_1_39_1","first-page":"1","volume-title":"Reputation as a sufficient condition for data quality on amazon mechanical turk. Behav Res methods","author":"Peer E.","year":"2013","unstructured":"E. Peer , J. Vosgerau , and A. Acquisti . Reputation as a sufficient condition for data quality on amazon mechanical turk. Behav Res methods , pages 1 -- 9 , 2013 . E. Peer, J. Vosgerau, and A. Acquisti. Reputation as a sufficient condition for data quality on amazon mechanical turk. Behav Res methods, pages 1--9, 2013."},{"key":"e_1_3_2_1_40_1","volume-title":"Boundaries of privacy: Dialectics of disclosure","author":"Petronio S.","year":"2012","unstructured":"S. Petronio . Boundaries of privacy: Dialectics of disclosure . Suny Press , 2012 . S. Petronio. Boundaries of privacy: Dialectics of disclosure. Suny Press, 2012."},{"key":"e_1_3_2_1_41_1","first-page":"50","volume-title":"Workshop on Data Mining for User Modelling at UM","author":"Preibusch S.","year":"2007","unstructured":"S. Preibusch , B. Hoser , S. G\u00fcrses , and B. Berendt . Ubiquitous social networks - opportunities and challenges for privacy-aware user modelling . In Workshop on Data Mining for User Modelling at UM , pages 50 -- 62 , 2007 . S. Preibusch, B. Hoser, S. G\u00fcrses, and B. Berendt. Ubiquitous social networks - opportunities and challenges for privacy-aware user modelling. In Workshop on Data Mining for User Modelling at UM, pages 50--62, 2007."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335364"},{"key":"e_1_3_2_1_43_1","volume-title":"Sage","author":"Salda\u00f1a J.","year":"2015","unstructured":"J. Salda\u00f1a . The coding manual for qualitative researchers . Sage , 2015 . J. Salda\u00f1a. The coding manual for qualitative researchers. Sage, 2015."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2015.5"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441865"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526780"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2539165"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2821512"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_14"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1002\/job.4030130307"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858303"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2685553.2685554"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557413"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488038"},{"issue":"1","key":"e_1_3_2_1_55_1","first-page":"10","article-title":"Framing and measuring multi-dimensional interpersonal privacy preferences of social networking site users","volume":"38","author":"Wisniewski P.","year":"2016","unstructured":"P. Wisniewski , A. Islam , H. Richter Lipford , and D. C. Wilson . Framing and measuring multi-dimensional interpersonal privacy preferences of social networking site users . Communications of the Association for Information Systems , 38 ( 1 ): 10 , 2016 . P. Wisniewski, A. Islam, H. Richter Lipford, and D. C. Wilson. Framing and measuring multi-dimensional interpersonal privacy preferences of social networking site users. Communications of the Association for Information Systems, 38(1):10, 2016.","journal-title":"Communications of the Association for Information Systems"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207761"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23299"},{"key":"e_1_3_2_1_58_1","first-page":"1077","article-title":"in online social network","volume":"14","author":"H. Xu.","year":"2011","unstructured":"H. Xu. Reframing privacy 2.0 in online social network . U. Pa. J. Const. L. , 14 : 1077 , 2011 . H. Xu. Reframing privacy 2.0 in online social network. U. Pa. J. Const. L., 14:1077, 2011.","journal-title":"U. Pa. J. Const. L."}],"event":{"name":"CHI '17: CHI Conference on Human Factors in Computing Systems","location":"Denver Colorado USA","acronym":"CHI '17","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025668","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3025453.3025668","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:34Z","timestamp":1750215814000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025668"}},"subtitle":["A Large-scale Empirical Study"],"short-title":[],"issued":{"date-parts":[[2017,5,2]]},"references-count":58,"alternative-id":["10.1145\/3025453.3025668","10.1145\/3025453"],"URL":"https:\/\/doi.org\/10.1145\/3025453.3025668","relation":{},"subject":[],"published":{"date-parts":[[2017,5,2]]},"assertion":[{"value":"2017-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}