{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T17:13:33Z","timestamp":1762622013823,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,13]]},"DOI":"10.1145\/3308560.3316456","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"799-806","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Global Reactions to the Cambridge Analytica Scandal: A Cross-Language Social Media Study"],"prefix":"10.1145","author":[{"given":"Felipe","family":"Gonz\u00e1lez","sequence":"first","affiliation":[{"name":"UTFSM Santiago, Chile"}]},{"given":"Yihan","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Washington Seattle, United States"}]},{"given":"Andrea","family":"Figueroa","sequence":"additional","affiliation":[{"name":"UTFSM Valparaiso, Chile"}]},{"given":"Claudia","family":"L\u00f3pez","sequence":"additional","affiliation":[{"name":"UTFSM Valparaiso, Chile"}]},{"given":"Cecilia","family":"Aragon","sequence":"additional","affiliation":[{"name":"University of Washington Seattle, United States"}]}],"member":"320","published-online":{"date-parts":[[2019,5,13]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.7903\/ijecs.989"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.5964\/jspp.v5i2.590"},{"key":"e_1_3_2_1_3_1","volume-title":"Privacy in the digital age: a review of information privacy research in information systems. MIS quarterly 35, 4","author":"B\u00e9langer France","year":"2011","unstructured":"France B\u00e9langer and Robert\u00a0 E Crossler . 2011. Privacy in the digital age: a review of information privacy research in information systems. MIS quarterly 35, 4 ( 2011 ), 1017\u20131042. France B\u00e9langer and Robert\u00a0E Crossler. 2011. Privacy in the digital age: a review of information privacy research in information systems. MIS quarterly 35, 4 (2011), 1017\u20131042."},{"key":"e_1_3_2_1_4_1","volume-title":"MEH: Meaning Extraction Helper (Version 1.0. 6){Software}.","author":"Boyd RL","year":"2014","unstructured":"RL Boyd . 2014 . MEH: Meaning Extraction Helper (Version 1.0. 6){Software}. RL Boyd. 2014. MEH: Meaning Extraction Helper (Version 1.0. 6){Software}."},{"volume-title":"Data analytics in digital humanities","author":"Boyd L","unstructured":"Ryan\u00a0 L Boyd . 2017. Psychological text analysis in the digital humanities . In Data analytics in digital humanities . Springer , 161\u2013189. Ryan\u00a0L Boyd. 2017. Psychological text analysis in the digital humanities. In Data analytics in digital humanities. Springer, 161\u2013189.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","volume-title":"Did Shakespeare write Double Falsehood? Identifying individuals by creating psychological signatures with text analysis. Psychological science 26, 5","author":"Boyd L","year":"2015","unstructured":"Ryan\u00a0 L Boyd and James\u00a0 W Pennebaker . 2015. Did Shakespeare write Double Falsehood? Identifying individuals by creating psychological signatures with text analysis. Psychological science 26, 5 ( 2015 ), 570\u2013582. Ryan\u00a0L Boyd and James\u00a0W Pennebaker. 2015. Did Shakespeare write Double Falsehood? Identifying individuals by creating psychological signatures with text analysis. Psychological science 26, 5 (2015), 570\u2013582."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1016\/j.chb.2016.08.043"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1016\/j.jrp.2007.04.006"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/2872518.2889302"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1057\/palgrave.ejis.3000590"},{"key":"e_1_3_2_1_11_1","volume-title":"Beyond the tip of the iceberg: Exploring the potential of the meaning extraction method and aftercare e-mail themes. Psychotherapy research 20, 1","author":"Fitzpatrick R","year":"2010","unstructured":"Marilyn\u00a0 R Fitzpatrick and Calli\u00a0Renee Armstrong . 2010. Beyond the tip of the iceberg: Exploring the potential of the meaning extraction method and aftercare e-mail themes. Psychotherapy research 20, 1 ( 2010 ), 86\u201389. Marilyn\u00a0R Fitzpatrick and Calli\u00a0Renee Armstrong. 2010. Beyond the tip of the iceberg: Exploring the potential of the meaning extraction method and aftercare e-mail themes. Psychotherapy research 20, 1 (2010), 86\u201389."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1080\/1550428X.2017.1393362"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1111\/1468-2389.00246"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/1753326.1753370"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1080\/00208825.1983.11656358"},{"volume-title":"Culture\u2019s consequences: Comparing values, behaviors, institutions and organizations across nations","author":"Hofstede Geert","unstructured":"Geert Hofstede . 2001. Culture\u2019s consequences: Comparing values, behaviors, institutions and organizations across nations . Sage publications. Geert Hofstede. 2001. Culture\u2019s consequences: Comparing values, behaviors, institutions and organizations across nations. Sage publications.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media. 518\u2013521","author":"Hong Lichan","year":"2011","unstructured":"Lichan Hong , Gregorio Convertino , and Ed\u00a0 H Chi . 2011 . Language Matters In Twitter: A Large Scale Study . In Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media. 518\u2013521 . Lichan Hong, Gregorio Convertino, and Ed\u00a0H Chi. 2011. Language Matters In Twitter: A Large Scale Study. In Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media. 518\u2013521."},{"key":"e_1_3_2_1_18_1","first-page":"642","article-title":"The Sapir-Whorf Hypothesis Today","volume":"2","author":"Al-Sheikh Hussein Basel","year":"2012","unstructured":"Basel Al-Sheikh Hussein . 2012 . The Sapir-Whorf Hypothesis Today . Theory and Practice in Language Studies 2 , 3 (2012), 642 \u2013 646 . Basel Al-Sheikh Hussein. 2012. The Sapir-Whorf Hypothesis Today. Theory and Practice in Language Studies 2, 3 (2012), 642\u2013646.","journal-title":"Theory and Practice in Language Studies"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.24251\/HICSS.2017.270"},{"key":"e_1_3_2_1_20_1","volume-title":"What is the Sapir-Whorf hypothesis?American anthropologist 86, 1","author":"Kay Paul","year":"1984","unstructured":"Paul Kay and Willett Kempton . 1984. What is the Sapir-Whorf hypothesis?American anthropologist 86, 1 ( 1984 ), 65\u201379. Paul Kay and Willett Kempton. 1984. What is the Sapir-Whorf hypothesis?American anthropologist 86, 1 (1984), 65\u201379."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1016\/S0272-4944(02)00087-7"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.18226\/19844921.v10.n20.06"},{"unstructured":"Kalev Leetaru. 2019. Is Twitter\u2019s Spritzer Stream Really A Nearly Perfect 1% Sample Of Its Firehose?  Kalev Leetaru. 2019. Is Twitter\u2019s Spritzer Stream Really A Nearly Perfect 1% Sample Of Its Firehose?","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","volume-title":"A review of culture in information systems research: Toward a theory of information technology culture conflict. MIS quarterly 30, 2","author":"Leidner E","year":"2006","unstructured":"Dorothy\u00a0 E Leidner and Timothy Kayworth . 2006. A review of culture in information systems research: Toward a theory of information technology culture conflict. MIS quarterly 30, 2 ( 2006 ), 357\u2013399. Dorothy\u00a0E Leidner and Timothy Kayworth. 2006. A review of culture in information systems research: Toward a theory of information technology culture conflict. MIS quarterly 30, 2 (2006), 357\u2013399."},{"unstructured":"Maya Mirchandani. 2018. To delete or not to# Delete Facebook that is the question.  Maya Mirchandani. 2018. To delete or not to# Delete Facebook that is the question.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 2nd International Conference on Weblogs and Social Media.","author":"Ramirez-Esparza Nairan","year":"2008","unstructured":"Nairan Ramirez-Esparza , Cindy\u00a0 K Chung , Ewa Kacewicz , and James\u00a0 W Pennebaker . 2008 . The Psychology of Word Use in Depression Forums in English and in Spanish: Texting Two Text Analytic Approaches . In Proceedings of the 2nd International Conference on Weblogs and Social Media. Nairan Ramirez-Esparza, Cindy\u00a0K Chung, Ewa Kacewicz, and James\u00a0W Pennebaker. 2008. The Psychology of Word Use in Depression Forums in English and in Spanish: Texting Two Text Analytic Approaches. In Proceedings of the 2nd International Conference on Weblogs and Social Media."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1353\/sais.2018.0002"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.2307\/41166073"},{"key":"e_1_3_2_1_29_1","volume-title":"Information privacy research: an interdisciplinary review. MIS quarterly 35, 4","author":"Smith H\u00a0Jeff","year":"2011","unstructured":"H\u00a0Jeff Smith , Tamara Dinev , and Heng Xu. 2011. Information privacy research: an interdisciplinary review. MIS quarterly 35, 4 ( 2011 ), 989\u20131016. H\u00a0Jeff Smith, Tamara Dinev, and Heng Xu. 2011. Information privacy research: an interdisciplinary review. MIS quarterly 35, 4 (2011), 989\u20131016."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.2307\/249477"},{"volume-title":"International advertising and communication","author":"Terlutter Ralf","unstructured":"Ralf Terlutter , Sandra Diehl , and Barbara Mueller . 2006. The GLOBE study\u2014applicability of a new typology of cultural dimensions for cross-cultural marketing and advertising research . In International advertising and communication . Springer , 419\u2013438. Ralf Terlutter, Sandra Diehl, and Barbara Mueller. 2006. The GLOBE study\u2014applicability of a new typology of cultural dimensions for cross-cultural marketing and advertising research. In International advertising and communication. Springer, 419\u2013438.","key":"e_1_3_2_1_31_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1057\/jibs.2010.41"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1145\/2487788.2488037"},{"unstructured":"Onur Varol Emilio Ferrara Clayton\u00a0A Davis Filippo Menczer and Alessandro Flammini. 2017. Online human-bot interactions: Detection estimation and characterization. arXiv preprint arXiv:1703.03107(2017).  Onur Varol Emilio Ferrara Clayton\u00a0A Davis Filippo Menczer and Alessandro Flammini. 2017. Online human-bot interactions: Detection estimation and characterization. arXiv preprint arXiv:1703.03107(2017).","key":"e_1_3_2_1_34_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.32614\/RJ-2011-015"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1145\/3078714.3078749"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.18653\/v1\/W16-5619"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.1080\/10503300903179799"}],"event":{"sponsor":["IW3C2 International World Wide Web Conference Committee"],"acronym":"WWW '19","name":"WWW '19: The Web Conference","location":"San Francisco USA"},"container-title":["Companion Proceedings of The 2019 World Wide Web Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308560.3316456","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3308560.3316456","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:23Z","timestamp":1750204403000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308560.3316456"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,13]]},"references-count":38,"alternative-id":["10.1145\/3308560.3316456","10.1145\/3308560"],"URL":"https:\/\/doi.org\/10.1145\/3308560.3316456","relation":{},"subject":[],"published":{"date-parts":[[2019,5,13]]},"assertion":[{"value":"2019-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}