{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T01:39:02Z","timestamp":1768009142206,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,4,19]],"date-time":"2018-04-19T00:00:00Z","timestamp":1524096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,4,19]]},"DOI":"10.1145\/3173574.3173627","type":"proceedings-article","created":{"date-parts":[[2018,4,20]],"date-time":"2018-04-20T12:01:00Z","timestamp":1524225660000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":55,"title":["\"We Are the Product\""],"prefix":"10.1145","author":[{"given":"Casey","family":"Fiesler","sequence":"first","affiliation":[{"name":"University of Colorado Boulder, Boulder, CO, USA"}]},{"given":"Blake","family":"Hallinan","sequence":"additional","affiliation":[{"name":"University of Colorado Boulder, Boulder, CO, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,4,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_3"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the Symposium on Usable Privacy and Security (SOUPS).","author":"Angulo Julio","year":"2015","unstructured":"Julio Angulo. 2015. \"WTH..!?!\" Experiences, reactions, and expectations related to online privacy panic situations. Proceedings of the Symposium on Usable Privacy and Security (SOUPS)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501616"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466446"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1088\/0963-6625\/3\/3\/002"},{"key":"e_1_3_2_1_6_1","volume-title":"Economics of Information Security and Privacy","author":"Bonneau Joseph","unstructured":"Joseph Bonneau and S\u00f6ren Preibusch. 2010. The privacy jungle: on the market for data protection in social networks. In Economics of Information Security and Privacy, Tyler Moore, David Pym and Christos Ioannidis (eds.). Springer International Publishing, London, UK, 121--167."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488406"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/23294515.2016.1226199"},{"key":"e_1_3_2_1_10_1","volume-title":"Economics of Information Security and Privacy","author":"Compa\u00f1\u00f3 Ram\u00f3n","unstructured":"Ram\u00f3n Compa\u00f1\u00f3 and Wainer Lusoli. 2010. The Policy Maker's Anguish: Regulating Personal Data Behavior Between Paradoxes and Dilemmas. In Economics of Information Security and Privacy, Tyler Moore, David Pym and Christos Ioannidis (eds.). Springer International Publishing, London, UK, 169--185."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017434.2017439"},{"key":"e_1_3_2_1_12_1","first-page":"51","article-title":"Facebook, WhatsApp and the commodification of affective labour","volume":"48","author":"Doyle Kim","year":"2015","unstructured":"Kim Doyle. 2015. Facebook, WhatsApp and the commodification of affective labour. Communication Politics & Culture 48, 1, 51--65.","journal-title":"Communication Politics & Culture"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2011.942309"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819931"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12884-015-0549-5"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1111\/cob.12000"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1108\/07363760210433627"},{"key":"e_1_3_2_1_19_1","first-page":"3737","article-title":"What Can I Really Do?\" Explaining the Privacy Paradox with Online Apathy","volume":"10","author":"Hargittai Eszter","year":"2016","unstructured":"Eszter Hargittai and Alice Marwick. 2016. \"What Can I Really Do?\" Explaining the Privacy Paradox with Online Apathy. International Journal of Communication 10, 3737--3757.","journal-title":"International Journal of Communication"},{"key":"e_1_3_2_1_20_1","volume-title":"Retrieved","author":"Hedaya Jojo","year":"2017","unstructured":"Jojo Hedaya. 2017. We Can Do Better. Unroll.me Blog. Retrieved April 23, 2017 from http:\/\/blog.unroll.me\/we-can-do-better\/"},{"key":"e_1_3_2_1_21_1","first-page":"1","article-title":"Web news readers' comments: Towards developing a methodology for using on-line comments in social inquiry","volume":"5","author":"Henrich Natalie","year":"2013","unstructured":"Natalie Henrich and Bev Holmes. 2013. Web news readers' comments: Towards developing a methodology for using on-line comments in social inquiry. Journal of Media and Communication Studies 5, 1, 1--4.","journal-title":"Journal of Media and Communication Studies"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Avery Holton Nayeon Lee and Renita Coleman. 2014. Commenting on Health?: A Framing Analysis of User Comments in Response to Health Articles Online. 825--837.","DOI":"10.1080\/10810730.2013.837554"},{"key":"e_1_3_2_1_23_1","unstructured":"Mike Isaac. 2017. Uber's CEO plays with fire. The New York Times. Retrieved from https:\/\/www.nytimes.com\/2017\/04\/23\/technology\/tr avis-kalanick-pushes-uber-and-himself-to-theprecipice.html"},{"key":"e_1_3_2_1_24_1","volume-title":"The Proceedings of the Symposium on Usable Privacy and Security (SOUPS), 39--52","author":"Kang Ruogu","year":"2015","unstructured":"Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. \"My data just goes everywhere\": user mental models of the internet and implications for privacy and security. The Proceedings of the Symposium on Usable Privacy and Security (SOUPS), 39--52."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753561"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466466"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1108\/IJCCSM-09-2013-0109"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1880071.1880142"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501611"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162084"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"e_1_3_2_1_32_1","first-page":"1","article-title":"Reader comments to online opinion journalism: a space of public deliberation","volume":"10","author":"Manosevitch Edith","year":"2009","unstructured":"Edith Manosevitch and D Walker. 2009. Reader comments to online opinion journalism: a space of public deliberation. The Proceedings of the Symposium on Online Journalism 10, 1--30.","journal-title":"The Proceedings of the Symposium on Online Journalism"},{"key":"e_1_3_2_1_33_1","first-page":"1","article-title":"Scared or naive? An exploratory study of users' perceptions of online privacy disclosures","volume":"13","author":"Marreiros Helia","year":"2015","unstructured":"Helia Marreiros, Richard Gomer, Michael Vlassopoulos, and Mirco Tonin. 2015. Scared or naive? An exploratory study of users' perceptions of online privacy disclosures. IADIS International Journal of WWW\/Internet 13, 2, 1--16.","journal-title":"IADIS International Journal of WWW\/Internet"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1086\/267990"},{"key":"e_1_3_2_1_35_1","first-page":"543","article-title":"The cost of reading privacy policies","volume":"4","author":"Mcdonald Aleecia M.","year":"2008","unstructured":"Aleecia M. Mcdonald and Lorrie Faith Cranor. 2008. The cost of reading privacy policies. I\/S: A Journal of Law and Policy for the Information Society 4, 543--565.","journal-title":"I\/S: A Journal of Law and Policy for the Information Society"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1316624.1316668"},{"key":"e_1_3_2_1_37_1","first-page":"101","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum. 2004. Privacy as contextual integrity. Washington Law Review 79, 101--139.","journal-title":"Washington Law Review"},{"key":"e_1_3_2_1_38_1","volume-title":"Huy Hao Dao, et al","author":"Pereira Jennifer A","year":"2013","unstructured":"Jennifer A Pereira, Susan Quach, Huy Hao Dao, et al. 2013. Contagious Comments?: What Was the Online Buzz About the 2011 Quebec Measles Outbreak? PLoS One 8(5)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858381"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.19.1.27.16941"},{"key":"e_1_3_2_1_41_1","volume-title":"Coming and Going on Facebook","author":"Rainie Lee","year":"2013","unstructured":"Lee Rainie, Aaron Smith, and Maeve Duggan. 2013. Coming and Going on Facebook. Pew Internet Center Research. Retrieved from http:\/\/pewinternet.org\/Reports\/2013\/Coming-andgoing-on-facebook.aspx"},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the 21st Americas Conference on Information Systems, 1--11","author":"Schreiner Michel","year":"2015","unstructured":"Michel Schreiner and Thomas Hess. 2015. Examining the role of privacy in virtual migration: the case of WhatsApp and Threema. Proceedings of the 21st Americas Conference on Information Systems, 1--11."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702404"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557421"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557421"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.3390\/isis-summit-vienna-2015-T3.3005"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2012.0323"},{"issue":"2","key":"e_1_3_2_1_48_1","first-page":"32","article-title":"What do users have to say about online news comments? Readers ' accounts and expectations of public debate and online moderation?: a case study","volume":"12","author":"Torres Marisa","year":"2015","unstructured":"Marisa Torres. 2015. What do users have to say about online news comments? Readers ' accounts and expectations of public debate and online moderation?: a case study. Journal of Audience and Reception Studies 12(2), 32--44.","journal-title":"Journal of Audience and Reception Studies"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466247"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820078"},{"key":"e_1_3_2_1_51_1","article-title":"News Content About Mass Shootings and Attitudes Toward Mental Illness","author":"Wilson Laura C.","year":"2015","unstructured":"Laura C. Wilson, Alesha D. Ballman, and Theresa J. Buczek. 2015. News Content About Mass Shootings and Attitudes Toward Mental Illness. Journalism & Mass Communication Quarterly, 1-- 15.","journal-title":"Journalism & Mass Communication Quarterly, 1-- 15."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23299"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675256"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00281"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2014.882066"}],"event":{"name":"CHI '18: CHI Conference on Human Factors in Computing Systems","location":"Montreal QC Canada","acronym":"CHI '18","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3173574.3173627","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3173574.3173627","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:20Z","timestamp":1750213580000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3173574.3173627"}},"subtitle":["Public Reactions to Online Data Sharing and Privacy Controversies in the Media"],"short-title":[],"issued":{"date-parts":[[2018,4,19]]},"references-count":55,"alternative-id":["10.1145\/3173574.3173627","10.1145\/3173574"],"URL":"https:\/\/doi.org\/10.1145\/3173574.3173627","relation":{},"subject":[],"published":{"date-parts":[[2018,4,19]]},"assertion":[{"value":"2018-04-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}