{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:31:11Z","timestamp":1769905871808,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T00:00:00Z","timestamp":1563494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,19]]},"DOI":"10.1145\/3328529.3328553","type":"proceedings-article","created":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T19:23:35Z","timestamp":1562009015000},"page":"126-135","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["How Communication Style Shapes Relationship Boundary Regulation and Social Media Adoption"],"prefix":"10.1145","author":[{"given":"Xinru","family":"Page","sequence":"first","affiliation":[{"name":"Computer Information Systems Bentley University, MA, USA"}]},{"given":"Reza Ghaiumy","family":"Anaraky","sequence":"additional","affiliation":[{"name":"School of Computing Clemson University, SC, USA"}]},{"given":"Bart P.","family":"Knijnenburg","sequence":"additional","affiliation":[{"name":"School of Computing Clemson University, SC, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,7,19]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Irwin Altman. 1975. The Environment and Social Behavior. Brooks\/Cole Publishing Co. Monterey CA.  Irwin Altman. 1975. The Environment and Social Behavior. Brooks\/Cole Publishing Co. Monterey CA."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.03.018"},{"key":"e_1_3_2_1_3_1","unstructured":"Monica Anderson and Jingjing Jiang. 2018. Teens Social Media & Technology 2018. Pew Research Center.  Monica Anderson and Jingjing Jiang. 2018. Teens Social Media & Technology 2018. Pew Research Center."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1093\/jcmc\/zmx003"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12276"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1177\/0049124187016001004"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1190275.1190279"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1177\/026540758900600201"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979023"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.09.003"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.12.011"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/ejsp.2049"},{"key":"e_1_3_2_1_13_1","unstructured":"Maeve Duggan Nicole B. Ellison Cliff Lampe Amanda Lenhart and Mary Madden. 2015. Social Media Update 2014. Pew Research Center.  Maeve Duggan Nicole B. Ellison Cliff Lampe Amanda Lenhart and Mary Madden. 2015. Social Media Update 2014. Pew Research Center."},{"key":"e_1_3_2_1_14_1","volume-title":"Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web","author":"Ellison Nicole B."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.04.002"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/10705519909540118"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858415"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.12.048"},{"key":"e_1_3_2_1_19_1","unstructured":"R.B. Kline. 2004. Principles and Practice of Structural Equation Modeling. New York NY USA: The Guilford Press.  R.B. Kline. 2004. Principles and Practice of Structural Equation Modeling. New York NY USA: The Guilford Press."},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. ICIS","author":"Koroleva Ksenia","year":"2011"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2015.04.001"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979420"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01880.x"},{"key":"e_1_3_2_1_24_1","volume-title":"Self-presentation: Impression Management and Interpersonal Behavior","author":"Leary Mark","year":"1996"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.02.037"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1068\/d323t"},{"key":"e_1_3_2_1_27_1","unstructured":"Mary Madden Amanda Lenhart Sandra Cortesi Urs Gasser Maeve Duggan and Aaron Smith. 2013. Teens Social Media and Privacy. Pew Research Center.  Mary Madden Amanda Lenhart Sandra Cortesi Urs Gasser Maeve Duggan and Aaron Smith. 2013. Teens Social Media and Privacy. Pew Research Center."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1177\/1354856510394539"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/0191-8869(85)90008-X"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1080\/01463379209369817"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2011.11.007"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Helen Nissenbaum. 2009. Privacy in context: Technology policy and the integrity of social life. Stanford University Press Stanford CA.   Helen Nissenbaum. 2009. Privacy in context: Technology policy and the integrity of social life. Stanford University Press Stanford CA.","DOI":"10.1515\/9780804772891"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493487"},{"key":"e_1_3_2_1_35_1","volume-title":"Proc. ICWSM","author":"Page Xinru","year":"2012"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441955.2442032"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.1991.tb00023.x"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1756-2589.2010.00052.x"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.1982.tb00663.x"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1531674.1531689"},{"key":"e_1_3_2_1_42_1","volume-title":"Proc. AMCIS 2008","author":"Sledgianowski Deb","year":"2008"},{"key":"e_1_3_2_1_43_1","unstructured":"Aaron Smith and Monica Anderson. 2018. Social Media Use in 2018. Pew Research Center.  Aaron Smith and Monica Anderson. 2018. Social Media Use in 2018. Pew Research Center."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.2307\/249477"},{"key":"e_1_3_2_1_45_1","unstructured":"Daniel J Solove. 2008. Understanding Privacy. Harvard University Press Cambridge MA.  Daniel J Solove. 2008. Understanding Privacy. Harvard University Press Cambridge MA."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145320"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.2307\/1130296"},{"key":"e_1_3_2_1_48_1","first-page":"119","article-title":"Location-sharing technologies: Privacy risks and controls","volume":"6","author":"Tsai Janice Y.","year":"2010","journal-title":"I\/S: A Journal of Law and Policy for the Information Society"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1080\/08838151.2012.732140"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531672"},{"key":"e_1_3_2_1_51_1","unstructured":"Alan Westin. 1991. Harris-Equifax Consumer Privacy Survey. Equifax Inc Atlanta GA.  Alan Westin. 1991. Harris-Equifax Consumer Privacy Survey. Equifax Inc Atlanta GA."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.03810"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675256"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2016.09.006"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2013.777757"},{"key":"e_1_3_2_1_56_1","volume-title":"Proc. ICIS 2011","author":"Zhang Nan","year":"2011"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.10.050"}],"event":{"name":"SMSociety '19: International Conference on Social Media and Society","location":"Toronto ON Canada","acronym":"SMSociety '19","sponsor":["Ryerson Univeristy Ryerson Univeristy"]},"container-title":["Proceedings of the 10th International Conference on Social Media and Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3328529.3328553","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3328529.3328553","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:01Z","timestamp":1750204441000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3328529.3328553"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,19]]},"references-count":57,"alternative-id":["10.1145\/3328529.3328553","10.1145\/3328529"],"URL":"https:\/\/doi.org\/10.1145\/3328529.3328553","relation":{},"subject":[],"published":{"date-parts":[[2019,7,19]]},"assertion":[{"value":"2019-07-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}