{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:48:04Z","timestamp":1776102484011,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":75,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,4,19]],"date-time":"2018-04-19T00:00:00Z","timestamp":1524096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1405634"],"award-info":[{"award-number":["1405634"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,4,19]]},"DOI":"10.1145\/3173574.3173626","type":"proceedings-article","created":{"date-parts":[[2018,4,20]],"date-time":"2018-04-20T12:01:00Z","timestamp":1524225660000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":43,"title":["Privacy Lies"],"prefix":"10.1145","author":[{"given":"Shruti","family":"Sannon","sequence":"first","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Natalya N.","family":"Bazarova","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Dan","family":"Cosley","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,4,19]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Privacy Law and Society (2nd. ed.)","author":"Allen Anita","unstructured":"Anita Allen. 2011. Privacy Law and Society (2nd. ed.). West Academic Publishing."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723667"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12106"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/bdm.621"},{"key":"e_1_3_2_2_5_1","first-page":"8","article-title":"Facebook privacy settings: Who cares","volume":"15","author":"Hargittai Eszter","year":"2010","unstructured":"danah boyd and Eszter Hargittai. 2010. Facebook privacy settings: Who cares? First Monday 15, 8.","journal-title":"First Monday"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1177\/1948550612455931"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078847"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2016.1229001"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025698"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858346"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.05.009"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1111\/hcre.12053"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053168015622072"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","unstructured":"Mary J. Culnan. 1993. \"How did they get my name?\": An exploratory investigation of consumer attitudes toward secondary information use. MIS Quart: 341-- 363. 10.2307\/249775","DOI":"10.2307\/249775"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2009.01494.x"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0080"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381943"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-009-9212-z"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1177\/074391569101000111"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1080\/15252019.2010.10722168"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2804281"},{"key":"e_1_3_2_2_23_1","first-page":"28","article-title":"Facilitating global e-commerce: A comparison of consumers' willingness to disclose personal information online in the US and India","volume":"11","author":"Gupta Babita","year":"2010","unstructured":"Babita Gupta, Lakshmi S. Iyer, and Robert S. Weisskirch. 2010. Facilitating global e-commerce: A comparison of consumers' willingness to disclose personal information online in the US and India. J Electron Commer Res 11, 1: 28--45.","journal-title":"J Electron Commer Res"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518782"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1978976"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/299157.299175"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1108\/07363760710737094"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025925"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053168015604648"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1120.0441"},{"key":"e_1_3_2_2_31_1","volume-title":"Proceedings of the 2007 Association for Survey Computing Conference (ASC '07)","author":"Joinson Adam N.","year":"2007","unstructured":"Adam N. Joinson, Carina B. Paine, Tom Buchanan, and Ulf-Dietrich Reips. 2007. Privacy, trust and selfdisclosure to web-based surveys. In Proceedings of the 2007 Association for Survey Computing Conference (ASC '07), 133--144."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/07370020903586662"},{"key":"e_1_3_2_2_33_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS '14)","author":"Kang Ruogu","year":"2014","unstructured":"Ruogu Kang, Stephanie Brown, Laura Dabbish, and Sara Kiesler. 2014. Privacy attitudes of Mechanical Turk workers and the US public. In Symposium on Usable Privacy and Security (SOUPS '14), 37--49."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12062"},{"key":"e_1_3_2_2_35_1","volume-title":"Proceedings of the 15th Americas Conference on Information Systems (AMCIS","author":"Krasnova Hanna","year":"2009","unstructured":"Hanna Krasnova, Elena Kolesnikova, and Oliver Guenther. 2009. \"It won't happen to me!\": Selfdisclosure in online social networks. In Proceedings of the 15th Americas Conference on Information Systems (AMCIS 2009), 1--10."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460563.1460675"},{"key":"e_1_3_2_2_37_1","volume-title":"DC","author":"Lenhart Amanda","year":"2007","unstructured":"Amanda Lenhart and Mary Madden. 2007. Teens, privacy & online social networks: How teens manage their online identities and personal information in the age of MySpace (p. ii). Pew Internet & American Life Project: Washington, DC, 18 April 2007."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1093\/poq\/nft038"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-006-0003-3"},{"key":"e_1_3_2_2_40_1","volume-title":"Americans' attitudes about privacy, security and surveillance","author":"Madden Mary","unstructured":"Mary Madden and Lee Rainie. 2015. Americans' attitudes about privacy, security and surveillance. Pew Research Center. Retrieved from http:\/\/www.pewinternet.org\/"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-1031(83)90023-9"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1080\/03637759209376245"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2004.tb00292.x"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2004.tb00865.x"},{"key":"e_1_3_2_2_46_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash Law Rev 79: 119.","journal-title":"Wash Law Rev"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2006.00070.x"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1056808.1057073"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441808"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1125451.1125674"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"key":"e_1_3_2_2_52_1","volume-title":"Communication privacy management","author":"Petronio Sandra","unstructured":"Sandra Petronio. 2008. Communication privacy management. John Wiley & Sons, Inc."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.27.16941"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2009.01147.x"},{"key":"e_1_3_2_2_55_1","volume-title":"The state of privacy in postSnowden America","author":"Rainie Lee","unstructured":"Lee Rainie, 2016. The state of privacy in postSnowden America. Pew Research Center. Retrieved from http:\/\/www.pewresearch.org\/"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2005.00018.x"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.2009.01366.x"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1520-6653(199923)13:4<24::AID-DIR3>3.0.CO;2-O"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240252818207"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1080\/00913367.1999.10673588"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557421"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.2307\/249477"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017388.2017392"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146167208318067"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444807072219"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025901"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1177\/0894439304271534"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557413"},{"key":"e_1_3_2_2_69_1","volume-title":"Privacy and freedom","author":"Westin Alan","unstructured":"Alan Westin. 1967. Privacy and freedom. Atheneum, New York."},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2007.03.004"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1089\/109493101753235223"},{"key":"e_1_3_2_2_72_1","volume-title":"Proceedings of the International Conference on Information Systems (ICIS '07)","author":"Xu Heng","year":"2007","unstructured":"Heng Xu. 2007. The effects of self-construal and perceived control on privacy concerns. In Proceedings of the International Conference on Information Systems (ICIS '07), 1--14."},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2007.0240"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2013.777757"},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2009.12.003"}],"event":{"name":"CHI '18: CHI Conference on Human Factors in Computing Systems","location":"Montreal QC Canada","acronym":"CHI '18","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3173574.3173626","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3173574.3173626","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3173574.3173626","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:20Z","timestamp":1750213580000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3173574.3173626"}},"subtitle":["Understanding How, When, and Why People Lie to Protect Their Privacy in Multiple Online Contexts"],"short-title":[],"issued":{"date-parts":[[2018,4,19]]},"references-count":75,"alternative-id":["10.1145\/3173574.3173626","10.1145\/3173574"],"URL":"https:\/\/doi.org\/10.1145\/3173574.3173626","relation":{},"subject":[],"published":{"date-parts":[[2018,4,19]]},"assertion":[{"value":"2018-04-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}