{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:14:18Z","timestamp":1776122058013,"version":"3.50.1"},"reference-count":53,"publisher":"Association for Computing Machinery (ACM)","issue":"GROUP","license":[{"start":{"date-parts":[[2020,1,4]],"date-time":"2020-01-04T00:00:00Z","timestamp":1578096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1405634"],"award-info":[{"award-number":["1405634"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2020,1,4]]},"abstract":"<jats:p>Conversational agents are increasingly becoming integrated into everyday technologies and can collect large amounts of data about users. As these agents mimic interpersonal interactions, we draw on communication privacy management theory to explore people's privacy expectations with conversational agents. We conducted a 3x3 factorial experiment in which we manipulated agents' social interactivity and data sharing practices to understand how these factors influence people's judgments about potential privacy violations and their evaluations of agents. Participants perceived agents that shared response data with advertisers more negatively compared to agents that shared such data with only their companies; perceptions of privacy violations did not differ between agents that shared data with their companies and agents that did not share information at all. Participants also perceived the socially interactive agent's sharing practices less negatively than those of the other agents, highlighting a potential privacy vulnerability that users are exposed to in interactions with socially interactive conversational agents.<\/jats:p>","DOI":"10.1145\/3375188","type":"journal-article","created":{"date-parts":[[2020,1,4]],"date-time":"2020-01-04T22:05:18Z","timestamp":1578175518000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["\u201cI just shared your responses\u201d"],"prefix":"10.1145","volume":"4","author":[{"given":"Shruti","family":"Sannon","sequence":"first","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Brett","family":"Stoll","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Dominic","family":"DiFranzo","sequence":"additional","affiliation":[{"name":"Lehigh University, Bethlehem, PA, USA"}]},{"given":"Malte F.","family":"Jung","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Natalya N.","family":"Bazarova","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,1,4]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1177\/0265407598153004"},{"key":"e_1_2_1_2_1","volume-title":"Web interface and consumers buying intention in e-tailing: Results from an online experiment. ACR European Advances","author":"Allagui Anis","year":"2007","unstructured":"Anis Allagui and Jean-Francc ois Lemoine . 2007. Web interface and consumers buying intention in e-tailing: Results from an online experiment. ACR European Advances ( 2007 ). Anis Allagui and Jean-Francc ois Lemoine. 2007. Web interface and consumers buying intention in e-tailing: Results from an online experiment. ACR European Advances (2007)."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1037\/e572172013-064"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2157689.2157807"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2909824.3020208"},{"key":"e_1_2_1_6_1","volume-title":"Unpacking the paradoxes of privacy in CMC relationships: The challenges of blogging and relational communication on the internet. Computer-mediated communication in personal relationships","author":"Child Jeffrey T","year":"2011","unstructured":"Jeffrey T Child and Sandra Petronio . 2011. Unpacking the paradoxes of privacy in CMC relationships: The challenges of blogging and relational communication on the internet. Computer-mediated communication in personal relationships ( 2011 ), 21--40. Jeffrey T Child and Sandra Petronio. 2011. Unpacking the paradoxes of privacy in CMC relationships: The challenges of blogging and relational communication on the internet. Computer-mediated communication in personal relationships (2011), 21--40."},{"key":"e_1_2_1_7_1","volume-title":"Anthropomorphic Framing in Human-Robot Interaction, Integration, and Policy (March 23","author":"Darling Kate","year":"2015","unstructured":"Kate Darling . 2015. ' Who's Johnny?' Anthropomorphic Framing in Human-Robot Interaction , Integration, and Policy. Anthropomorphic Framing in Human-Robot Interaction, Integration, and Policy (March 23 , 2015 ). ROBOT ETHICS , Vol . 2 (2015). Kate Darling. 2015. 'Who's Johnny?'Anthropomorphic Framing in Human-Robot Interaction, Integration, and Policy. Anthropomorphic Framing in Human-Robot Interaction, Integration, and Policy (March 23, 2015). ROBOT ETHICS , Vol. 2 (2015)."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1037\/xap0000092"},{"key":"e_1_2_1_9_1","unstructured":"Eun Go. 2015. Does message interactivity help or hinder the effects of anthropomorphic online chat agents? Compensation vs. expectation effects in organizational websites. (2015). Eun Go. 2015. Does message interactivity help or hinder the effects of anthropomorphic online chat agents? Compensation vs. expectation effects in organizational websites. (2015)."},{"key":"e_1_2_1_10_1","unstructured":"D. Gowda K. Cook-Shultz and E. Mierzwinski. 2018. Trouble In Toyland. https:\/\/uspirgedfund.org\/sites\/pirg\/files\/cpn\/USN-112117-A1-REPORT\/trouble-in-toyland-32.html D. Gowda K. Cook-Shultz and E. Mierzwinski. 2018. Trouble In Toyland. https:\/\/uspirgedfund.org\/sites\/pirg\/files\/cpn\/USN-112117-A1-REPORT\/trouble-in-toyland-32.html"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1093\/joc\/jqy026"},{"key":"e_1_2_1_12_1","volume-title":"Effects of online health sources on credibility and behavioral intentions. Communication research","author":"Hu Yifeng","year":"2010","unstructured":"Yifeng Hu and S Shyam Sundar . 2010. Effects of online health sources on credibility and behavioral intentions. Communication research , Vol. 37 , 1 ( 2010 ), 105--132. Yifeng Hu and S Shyam Sundar. 2010. Effects of online health sources on credibility and behavioral intentions. Communication research , Vol. 37, 1 (2010), 105--132."},{"key":"e_1_2_1_13_1","volume-title":"Designing website attributes to induce experiential encounters. computers in Human Behavior","author":"Huang Ming-Hui","year":"2003","unstructured":"Ming-Hui Huang . 2003. Designing website attributes to induce experiential encounters. computers in Human Behavior , Vol. 19 , 4 ( 2003 ), 425--442. Ming-Hui Huang. 2003. Designing website attributes to induce experiential encounters. computers in Human Behavior , Vol. 19, 4 (2003), 425--442."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327566IJCE0401_04"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1177\/0093650211405313"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441954"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2157689.2157696"},{"key":"e_1_2_1_18_1","volume-title":"10th Symposium On Usable Privacy and Security ($$SOUPS$$","author":"Kang Ruogu","year":"2014","unstructured":"Ruogu Kang , Stephanie Brown , Laura Dabbish , and Sara Kiesler . 2014 . Privacy attitudes of mechanical turk workers and the us public . In 10th Symposium On Usable Privacy and Security ($$SOUPS$$ 2014). 37--49. Ruogu Kang, Stephanie Brown, Laura Dabbish, and Sara Kiesler. 2014. Privacy attitudes of mechanical turk workers and the us public. In 10th Symposium On Usable Privacy and Security ($$SOUPS$$ 2014). 37--49."},{"key":"e_1_2_1_19_1","volume-title":"Ruth Aylett, Carsten Zoll, Sibylle Enz, and Patr'icia Am\u00e2ncio Vargas.","author":"Keysermann Matthias U","year":"2012","unstructured":"Matthias U Keysermann , Henriette SM Cramer , Ruth Aylett, Carsten Zoll, Sibylle Enz, and Patr'icia Am\u00e2ncio Vargas. 2012 . Can I trust you?: sharing information with artificial companions.. In AAMAS . 1197--1198. Matthias U Keysermann, Henriette SM Cramer, Ruth Aylett, Carsten Zoll, Sibylle Enz, and Patr'icia Am\u00e2ncio Vargas. 2012. Can I trust you?: sharing information with artificial companions.. In AAMAS . 1197--1198."},{"key":"e_1_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Jong-Eun Roselyn Lee and Clifford I Nass. 2010. Trust in computers: The computers-are-social-actors (CASA) paradigm and trustworthiness perception in human-computer communication. In Trust and technology in a ubiquitous modern environment: Theoretical and methodological perspectives . IGI Global 1--15. Jong-Eun Roselyn Lee and Clifford I Nass. 2010. Trust in computers: The computers-are-social-actors (CASA) paradigm and trustworthiness perception in human-computer communication. In Trust and technology in a ubiquitous modern environment: Theoretical and methodological perspectives . IGI Global 1--15.","DOI":"10.4018\/978-1-61520-901-9.ch001"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/HRI.2019.8673023"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2017.02.005"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5898\/JHRI.2.3.Levin"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1349822.1349831"},{"key":"e_1_2_1_25_1","volume-title":"Why do survey respondents disclose more when computers ask the questions? Public opinion quarterly","author":"Lind Laura H","year":"2013","unstructured":"Laura H Lind , Michael F Schober , Frederick G Conrad , and Heidi Reichert . 2013. Why do survey respondents disclose more when computers ask the questions? Public opinion quarterly , Vol. 77 , 4 ( 2013 ), 888--935. Laura H Lind, Michael F Schober, Frederick G Conrad, and Heidi Reichert. 2013. Why do survey respondents disclose more when computers ask the questions? Public opinion quarterly , Vol. 77, 4 (2013), 888--935."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2018.0110"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1002\/acp.1117"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.04.043"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786451.2786465"},{"key":"e_1_2_1_30_1","first-page":"543","article-title":"The cost of reading privacy policies","volume":"4","author":"McDonald Aleecia M","year":"2008","unstructured":"Aleecia M McDonald and Lorrie Faith Cranor . 2008 . The cost of reading privacy policies . ISJLP , Vol. 4 (2008), 543 . Aleecia M McDonald and Lorrie Faith Cranor. 2008. The cost of reading privacy policies. ISJLP , Vol. 4 (2008), 543.","journal-title":"ISJLP"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24842-2_28"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/259964.260137"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/191666.191703"},{"key":"e_1_2_1_34_1","volume-title":"Advances in Management Information Systems","author":"Nass Clifford","year":"2006","unstructured":"Clifford Nass , Leila Takayama , and Scott Brave . 2006. Advances in Management Information Systems , chapter Socializing Consistency: From Technical Homogeneity to Human Epitome. ( 2006 ). Clifford Nass, Leila Takayama, and Scott Brave. 2006. Advances in Management Information Systems, chapter Socializing Consistency: From Technical Homogeneity to Human Epitome. (2006)."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15892-6_25"},{"key":"e_1_2_1_36_1","doi-asserted-by":"crossref","DOI":"10.1353\/book4588","volume-title":"Boundaries of Privacy: Dialectics of Disclosure","author":"Petronio S","year":"2002","unstructured":"S Petronio . 2002. Boundaries of Privacy: Dialectics of Disclosure ( State University of New York Press , Albany, NY ). ( 2002 ). S Petronio. 2002. Boundaries of Privacy: Dialectics of Disclosure (State University of New York Press, Albany, NY). (2002)."},{"key":"e_1_2_1_37_1","volume-title":"Interactivity: From new media to communication. Advancing communication science: Sage annual review of communication research","author":"Rafaeli Sheizaf","year":"1988","unstructured":"Sheizaf Rafaeli . 1988 . Interactivity: From new media to communication. Advancing communication science: Sage annual review of communication research , Vol. 16 (1988), 110--134. Sheizaf Rafaeli. 1988. Interactivity: From new media to communication. Advancing communication science: Sage annual review of communication research , Vol. 16 (1988), 110--134."},{"key":"e_1_2_1_38_1","unstructured":"L Raine. 2016. The state of privacy in post- Snowden America. http:\/\/www.pewresearch.org\/ L Raine. 2016. The state of privacy in post- Snowden America. http:\/\/www.pewresearch.org\/"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/2906831.2906851"},{"key":"e_1_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Oscar J Romero Ran Zhao and Justine Cassell. 2017. Cognitive-Inspired Conversational-Strategy Reasoner for Socially-Aware Agents.. In IJCAI . 3807--3813. Oscar J Romero Ran Zhao and Justine Cassell. 2017. Cognitive-Inspired Conversational-Strategy Reasoner for Socially-Aware Agents.. In IJCAI . 3807--3813.","DOI":"10.24963\/ijcai.2017\/532"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300512"},{"key":"e_1_2_1_42_1","volume-title":"The MAIN model: A heuristic approach to understanding technology effects on credibility. Digital media, youth, and credibility","author":"Sundar S Shyam","year":"2008","unstructured":"S Shyam Sundar . 2008. The MAIN model: A heuristic approach to understanding technology effects on credibility. Digital media, youth, and credibility , Vol. 73100 ( 2008 ). S Shyam Sundar. 2008. The MAIN model: A heuristic approach to understanding technology effects on credibility. Digital media, youth, and credibility , Vol. 73100 (2008)."},{"key":"e_1_2_1_43_1","volume-title":"Proc. Workshop Human Implications of Human-Robot Interaction, Association for the Advancement of Artificial Intelligence (AAAI'07)","author":"Syrdal Dag Sverre","year":"2007","unstructured":"Dag Sverre Syrdal , Michael L Walters , Nuno Otero , Kheng Lee Koay , and Kerstin Dautenhahn . 2007 . He knows when you are sleeping-privacy and the personal robot companion . In Proc. Workshop Human Implications of Human-Robot Interaction, Association for the Advancement of Artificial Intelligence (AAAI'07) . 28--33. Dag Sverre Syrdal, Michael L Walters, Nuno Otero, Kheng Lee Koay, and Kerstin Dautenhahn. 2007. He knows when you are sleeping-privacy and the personal robot companion. In Proc. Workshop Human Implications of Human-Robot Interaction, Association for the Advancement of Artificial Intelligence (AAAI'07). 28--33."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-5632(02)00032-8"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-9443-0_10"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.06.012"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1509\/jmkg.71.3.143"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557413"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2011.01559.x"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/238386.238387"},{"key":"e_1_2_1_51_1","volume-title":"ICIS 2005 proceedings","author":"Xu Heng","year":"2005","unstructured":"Heng Xu , Hock-Hai Teo , and Bernard Tan . 2005 . Predicting the adoption of location-based services: the role of trust and perceived privacy risk . ICIS 2005 proceedings (2005), 71. Heng Xu, Hock-Hai Teo, and Bernard Tan. 2005. Predicting the adoption of location-based services: the role of trust and perceived privacy risk. ICIS 2005 proceedings (2005), 71."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-09767-1_62"},{"key":"e_1_2_1_53_1","unstructured":"Youyou Zhou. 2018. An Oregon family's encounter with Amazon Alexa exposes the privacy problem of smart home devices. https:\/\/qz.com\/1288743\/amazon-alexa-echo-spying-on-users-raises-a-data-privacy-problem\/ Youyou Zhou. 2018. An Oregon family's encounter with Amazon Alexa exposes the privacy problem of smart home devices. https:\/\/qz.com\/1288743\/amazon-alexa-echo-spying-on-users-raises-a-data-privacy-problem\/"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3375188","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3375188","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3375188","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:32:48Z","timestamp":1750199568000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3375188"}},"subtitle":["Extending Communication Privacy Management Theory to Interactions with Conversational Agents"],"short-title":[],"issued":{"date-parts":[[2020,1,4]]},"references-count":53,"journal-issue":{"issue":"GROUP","published-print":{"date-parts":[[2020,1,4]]}},"alternative-id":["10.1145\/3375188"],"URL":"https:\/\/doi.org\/10.1145\/3375188","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,4]]},"assertion":[{"value":"2020-01-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}