{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:24:47Z","timestamp":1776115487477,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,21]],"date-time":"2020-04-21T00:00:00Z","timestamp":1587427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,21]]},"DOI":"10.1145\/3313831.3376240","type":"proceedings-article","created":{"date-parts":[[2020,5,27]],"date-time":"2020-05-27T13:14:48Z","timestamp":1590585288000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["User Experiences with Online Status Indicators"],"prefix":"10.1145","author":[{"given":"Camille","family":"Cobb","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Lucy","family":"Simko","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Tadayoshi","family":"Kohno","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Alexis","family":"Hiniker","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,4,23]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Hudson","author":"Avrahami Daniel","year":"2006","unstructured":"Daniel Avrahami and Scott E. Hudson. 2006. Responsiveness in Instant Messaging: Predictive Models Supporting Inter-personal Communication. In CHI."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work (CSCW '04)","author":"Begole James","unstructured":"James \"Bo\" Begole, Nicholas E. Matsakis, and John C. Tang. 2004. Lilsys: Sensing Unavailability. In Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work (CSCW '04)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/587078.587125"},{"key":"e_1_3_2_1_4_1","volume-title":"Norman Sadeh, and Lorrie Faith Cranor.","author":"Benisch Michael","year":"2011","unstructured":"Michael Benisch, Patrick Gage Kelley, Norman Sadeh, and Lorrie Faith Cranor. 2011. Capturing Location-privacy Preferences: Quantifying Accuracy and User-burden Tradeoffs. Personal Ubiquitous Comput. (2011)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470658"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Igor Bilogrevic K\u00e9vin Huguenin Berker Agir Murtuza Jadliwala and Jean-Pierre Hubaux. 2013. Adaptive Information-sharing for Privacy-aware Mobile Social Networks. In UbiComp.","DOI":"10.1145\/2493432.2493510"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/151233.151235"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Matthias B\u00f6hmer Brent Hecht Johannes Sch\u00f6ning Antonio Kr\u00fcger and Gernot Bauer. 2011. Falling Asleep with Angry Birds Facebook and Kindle: A Large Scale Study on Mobile Application Usage. In MobileHCI.","DOI":"10.1145\/2037373.2037383"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Andreas Buchenscheit Bastian K\u00f6nings Andreas Neubert Florian Schaub Matthias Schneider and Frank Kargl. 2014. Privacy Implications of Presence Sharing in Mobile Messaging Applications. In MUM.","DOI":"10.1145\/2677972.2677980"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173824"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Camille Cobb and Tadayoshi Kohno. 2017. How Public Is My Private Life?: Privacy in Online Dating. In WWW.","DOI":"10.1145\/3038912.3052592"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Sunny Consolvo Ian E. Smith Tara Matthews Anthony LaMarca Jason Tabert and Pauline Powledge. 2005. Location Disclosure to Social Relations: Why when & What People Want to Share. In CHI.","DOI":"10.1145\/1054972.1054985"},{"key":"e_1_3_2_1_14_1","volume-title":"Austin Park, and Anind K. Dey","author":"De Guzman Edward S.","year":"2004","unstructured":"Edward S. De Guzman, Margaret Yau, Anthony Gagliano, Austin Park, and Anind K. Dey. 2004. Exploring the Design and Use of Peripheral Displays of Awareness Information. In CHI EA."},{"key":"e_1_3_2_1_15_1","unstructured":"Trinh Minh Tri Do Jan Blom and Daniel Gatica-Perez. 2011. Smartphone Usage in the Wild: A Large-scale Analysis of Applications and Context. In ICMI."},{"key":"e_1_3_2_1_16_1","volume-title":"The app generation: How today's youth navigate identity, intimacy, and imagination in a digital world","author":"Gardner Howard","unstructured":"Howard Gardner and Katie Davis. 2013. The app generation: How today's youth navigate identity, intimacy, and imagination in a digital world. Yale University Press."},{"key":"e_1_3_2_1_17_1","volume-title":"The presentation of self in everyday life. Amer. J. Sociology","author":"Goffman Erving","year":"1949","unstructured":"Erving Goffman. 1949. The presentation of self in everyday life. Amer. J. Sociology (1949)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/257089.257283"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Tamy Guberek Allison McDonald Sylvia Simioni Abraham H. Mhaidli Kentaro Toyama and Florian Schaub. 2018. Keeping a Low Profile?: Technology Risk and Privacy Among Undocumented Immigrants. In CHI.","DOI":"10.1145\/3173574.3173688"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493209"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518782"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45756-9_14"},{"key":"e_1_3_2_1_23_1","volume-title":"Carl Myers Kadie, and Andy Jacobs","author":"Horvitz Eric","year":"2013","unstructured":"Eric Horvitz, Paul Koch, Carl Myers Kadie, and Andy Jacobs. 2013. Coordinates: Probabilistic Forecasting of Presence and Availability. CoRR abs\/1301.0573 (2013)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Roberto Hoyle Srijita Das Apu Kapadia Adam J. Lee and Kami Vaniea. 2017. Was My Message Read?: Privacy and Signaling on Facebook Messenger. In CHI.","DOI":"10.1145\/3025453.3025925"},{"key":"e_1_3_2_1_25_1","volume-title":"Strangers on a plane: Context-dependent willingness to divulge sensitive information. Journal of consumer research","author":"John Leslie K","year":"2011","unstructured":"Leslie K John, Alessandro Acquisti, and George Loewenstein. 2011. Strangers on a plane: Context-dependent willingness to divulge sensitive information. Journal of consumer research (2011)."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS '12)","author":"Johnson Maritza","unstructured":"Maritza Johnson, Serge Egelman, and Steven M. Bellovin. 2012. Facebook and Privacy: It's Complicated. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS '12)."},{"key":"e_1_3_2_1_27_1","volume-title":"Dey","author":"Lederer Scott","year":"2003","unstructured":"Scott Lederer, Jennifer Mankoff, and Anind K. Dey. 2003. Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing. In CHI EA."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1387649.1387651"},{"key":"e_1_3_2_1_29_1","unstructured":"Yabing Liu Krishna P. Gummadi Balachander Krishnamurthy and Alan Mislove. 2011. Analyzing Facebook Privacy Settings: User Expectations vs. Reality. In IMC."},{"key":"e_1_3_2_1_30_1","volume-title":"2012 IEEE International Conference on Pervasive Computing and Communications Workshops.","author":"Madejski M.","unstructured":"M. Madejski, M. Johnson, and S. M. Bellovin. 2012. A study of privacy settings errors in an online social network. In 2012 IEEE International Conference on Pervasive Computing and Communications Workshops."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v9i4.4342"},{"key":"e_1_3_2_1_32_1","volume-title":"Marwick and danah boyd","author":"Alice","year":"2011","unstructured":"Alice E. Marwick and danah boyd. 2011. I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media & Society (2011)."},{"key":"e_1_3_2_1_33_1","volume-title":"Networked privacy: How teenagers negotiate context in social media","author":"Marwick Alice E","year":"2014","unstructured":"Alice E Marwick and danah boyd. 2014. Networked privacy: How teenagers negotiate context in social media. New Media & Society (2014)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Bonnie A Nardi Steve Whittaker and Erin Bradner. 2000. Interaction and outeraction: instant messaging in action. In CSCW.","DOI":"10.1145\/358916.358975"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW '16)","author":"Schoenebeck Sarita","unstructured":"Sarita Schoenebeck, Nicole B. Ellison, Lindsay Blackwell, Joseph B. Bayer, and Emily B. Falk. 2016. Playful Backstalking and Serious Impression Management: How Young Adults Reflect on Their Past Identities on Facebook. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (CSCW '16)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/HCI2008.11"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Eran Toch and Inbal Levi. 2013. Locality and Privacy in People-nearby Applications. In Ubicomp.","DOI":"10.1145\/2493432.2493485"},{"key":"e_1_3_2_1_38_1","volume-title":"International Journal of Communication 9 (05","author":"Vitak Jessica","year":"2015","unstructured":"Jessica Vitak, Stacy Blasiola, Eden Litt, and Sameer Patil. 2015. Balancing Audience and Privacy Tensions on Social Network Sites: Strategies of Highly Engaged Users. International Journal of Communication 9 (05 2015)."},{"key":"e_1_3_2_1_39_1","volume-title":"Ellison","author":"Vitak Jessica","year":"2012","unstructured":"Jessica Vitak, Cliff Lampe, Rebecca Gray, and Nicole B. Ellison. 2012. \"Why Won't You Be My Facebook Friend?\": Strategies for Managing Context Collapse in the Workplace. In iConference."},{"key":"e_1_3_2_1_40_1","volume-title":"The right not to be identified: privacy and anonymity in the interactive media environment","author":"Woo Jusik","year":"2006","unstructured":"Jusik Woo. 2006. The right not to be identified: privacy and anonymity in the interactive media environment. New Media & Society (2006)."}],"event":{"name":"CHI '20: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '20","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3313831.3376240","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3313831.3376240","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:32:55Z","timestamp":1750199575000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3313831.3376240"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,21]]},"references-count":39,"alternative-id":["10.1145\/3313831.3376240","10.1145\/3313831"],"URL":"https:\/\/doi.org\/10.1145\/3313831.3376240","relation":{},"subject":[],"published":{"date-parts":[[2020,4,21]]},"assertion":[{"value":"2020-04-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}