{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:00:26Z","timestamp":1776106826617,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":84,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T00:00:00Z","timestamp":1620259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-1408730"],"award-info":[{"award-number":["CNS-1408730"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,6]]},"DOI":"10.1145\/3411764.3445258","type":"proceedings-article","created":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T07:19:08Z","timestamp":1673162348000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Your Photo is so Funny that I don\u2019t Mind Violating Your Privacy by Sharing it: Effects of Individual Humor Styles on Online Photo-sharing Behaviors"],"prefix":"10.1145","author":[{"given":"Rakibul","family":"Hasan","sequence":"first","affiliation":[{"name":"Indiana University, Bloomington, IN, USA"}]},{"given":"Bennett I.","family":"Bertenthal","sequence":"additional","affiliation":[{"name":"Indiana University, Bloomington, IN, USA"}]},{"given":"Kurt","family":"Hugenberg","sequence":"additional","affiliation":[{"name":"Indiana University, Bloomington, IN, USA"}]},{"given":"Apu","family":"Kapadia","sequence":"additional","affiliation":[{"name":"Indiana University, Bloomington, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,5,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2016. 10 Internet memes that ruined lives. http:\/\/www.craveonline.com\/mandatory\/1066114-10-internet-memes-that-ruined-lives\/  2016. 10 Internet memes that ruined lives. http:\/\/www.craveonline.com\/mandatory\/1066114-10-internet-memes-that-ruined-lives\/"},{"key":"e_1_3_2_1_2_1","unstructured":"2020. Know Your Meme. https:\/\/knowyourmeme.com\/  2020. Know Your Meme. https:\/\/knowyourmeme.com\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054926"},{"key":"e_1_3_2_1_4_1","volume-title":"Privacy enhancing technologies","author":"Acquisti Alessandro","unstructured":"Alessandro Acquisti and Ralph Gross . 2006. Imagined communities: Awareness, information sharing, and privacy on the Facebook . In Privacy enhancing technologies . Springer , 36\u201358. Alessandro Acquisti and Ralph Gross. 2006. Imagined communities: Awareness, information sharing, and privacy on the Facebook. In Privacy enhancing technologies. Springer, 36\u201358."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2020.00006"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-soc-060116-053643"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3172944.3172982"},{"key":"e_1_3_2_1_8_1","unstructured":"BBC. 2016. \u2019Can\u2019t hide it forever\u2019: The model who became a meme. http:\/\/www.bbc.com\/news\/world-asia-34568674  BBC. 2016. \u2019Can\u2019t hide it forever\u2019: The model who became a meme. http:\/\/www.bbc.com\/news\/world-asia-34568674"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753560"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/23311908.2018.1437012"},{"key":"e_1_3_2_1_11_1","unstructured":"danah boyd. 2008.\n  Taken out of context: American teen sociality in networked publics\n  . Ph.D. Dissertation. \n  University of California Berkeley\n  .  danah boyd. 2008. Taken out of context: American teen sociality in networked publics. Ph.D. Dissertation. University of California Berkeley."},{"key":"e_1_3_2_1_12_1","volume-title":"It\u2019s complicated: The social lives of networked teens","unstructured":"danah boyd. 2014. It\u2019s complicated: The social lives of networked teens . Yale University Press . danah boyd. 2014. It\u2019s complicated: The social lives of networked teens. Yale University Press."},{"key":"e_1_3_2_1_13_1","volume-title":"Gender differences in risk taking: a meta-analysis.Psychological bulletin 125, 3","author":"Byrnes P","year":"1999","unstructured":"James\u00a0 P Byrnes , David\u00a0 C Miller , and William\u00a0 D Schafer . 1999. Gender differences in risk taking: a meta-analysis.Psychological bulletin 125, 3 ( 1999 ), 367. James\u00a0P Byrnes, David\u00a0C Miller, and William\u00a0D Schafer. 1999. Gender differences in risk taking: a meta-analysis.Psychological bulletin 125, 3 (1999), 367."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2011.11.011"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jebo.2011.06.007"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/pra2.59"},{"key":"e_1_3_2_1_17_1","unstructured":"Jacob Cohen. 1988. Statistical power analysis for the social sciences. (1988).  Jacob Cohen. 1988. Statistical power analysis for the social sciences. (1988)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2012.05.001"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/02500167.2014.938671"},{"key":"e_1_3_2_1_20_1","unstructured":"Maeve Duggan. 2013. Photo and video sharing grow online. (2013).  Maeve Duggan. 2013. Photo and video sharing grow online. (2013)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1177\/2329488415612478"},{"key":"e_1_3_2_1_22_1","unstructured":"Facebook. [n.d.]. Photos Privacy. https:\/\/www.facebook.com\/help\/privacy\/photos  Facebook. [n.d.]. Photos Privacy. https:\/\/www.facebook.com\/help\/privacy\/photos"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2014.03.243"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/10400419.2003.9651420"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2009.12.007"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2411672"},{"key":"e_1_3_2_1_27_1","unstructured":"Robert Gove. 2015. Using the elbow method to determine the optimal number of clusters for k-means clustering. URL: https:\/\/bl. ocks. org\/rpgove\/0060ff3b656618e9136b 17(2015) 19.  Robert Gove. 2015. Using the elbow method to determine the optimal number of clusters for k-means clustering. URL: https:\/\/bl. ocks. org\/rpgove\/0060ff3b656618e9136b 17(2015) 19."},{"key":"e_1_3_2_1_28_1","unstructured":"Isobel\u00a0Asher Hamilton. 2019. Instagram has avoided Facebook\u2019s trust problem beating its parent as app of choice for Generation Z. https:\/\/www.businessinsider.com\/instagram-is-more-popular-among-generation-z-than-facebook-2019-3  Isobel\u00a0Asher Hamilton. 2019. Instagram has avoided Facebook\u2019s trust problem beating its parent as app of choice for Generation Z. https:\/\/www.businessinsider.com\/instagram-is-more-popular-among-generation-z-than-facebook-2019-3"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5964\/ejop.v6i3.207"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00097"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173621"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300597"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.175"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12144-020-00724-1"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1080\/15252019.2010.10722168"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632079"},{"key":"e_1_3_2_1_37_1","article-title":"The Influence of Personality Factors and Motives on Photographic Communication","volume":"3","author":"Hunt Daniel","year":"2014","unstructured":"Daniel Hunt and Eric Langstedt . 2014 . The Influence of Personality Factors and Motives on Photographic Communication . The Journal of Social Media in Society 3 , 2 (2014). https:\/\/www.thejsms.org\/tsmri\/index.php\/TSMRI\/article\/view\/68 Daniel Hunt and Eric Langstedt. 2014. The Influence of Personality Factors and Motives on Photographic Communication. The Journal of Social Media in Society 3, 2 (2014). https:\/\/www.thejsms.org\/tsmri\/index.php\/TSMRI\/article\/view\/68","journal-title":"The Journal of Social Media in Society"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1080\/08838151.2014.906430"},{"key":"e_1_3_2_1_39_1","volume-title":"Public. In 10th Symposium On Usable Privacy and Security (SOUPS 2014","author":"Kang Ruogu","year":"2014","unstructured":"Ruogu Kang , Stephanie Brown , Laura Dabbish , and Sara Kiesler . 2014 . Privacy Attitudes of Mechanical Turk Workers and the U.S . Public. In 10th Symposium On Usable Privacy and Security (SOUPS 2014 ). USENIX Association, Menlo Park, CA, 37\u201349. https:\/\/www.usenix.org\/conference\/soups 2014\/proceedings\/presentation\/kang Ruogu Kang, Stephanie Brown, Laura Dabbish, and Sara Kiesler. 2014. Privacy Attitudes of Mechanical Turk Workers and the U.S. Public. In 10th Symposium On Usable Privacy and Security (SOUPS 2014). USENIX Association, Menlo Park, CA, 37\u201349. https:\/\/www.usenix.org\/conference\/soups2014\/proceedings\/presentation\/kang"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207728"},{"key":"e_1_3_2_1_41_1","unstructured":"Bart\u00a0P Knijnenburg. 2013. Simplifying Privacy Decisions: Towards Interactive and Adaptive Solutions.. In Decisions@ RecSys. 40\u201341.  Bart\u00a0P Knijnenburg. 2013. Simplifying Privacy Decisions: Towards Interactive and Adaptive Solutions.. In Decisions@ RecSys. 40\u201341."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2013.00863"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10902-012-9342-6"},{"key":"e_1_3_2_1_44_1","unstructured":"Amanda Lenhart Kristen Purcell Aaron Smith and Kathryn Zickuhr. 2010. Social Media & Mobile Internet Use among Teens and Young Adults. Pew internet & American life project(2010).  Amanda Lenhart Kristen Purcell Aaron Smith and Kathryn Zickuhr. 2010. Social Media & Mobile Internet Use among Teens and Young Adults. Pew internet & American life project(2010)."},{"key":"e_1_3_2_1_45_1","volume-title":"Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016","author":"Liu Bin","year":"2016","unstructured":"Bin Liu , Mads\u00a0Schaarup Andersen , Florian Schaub , Hazim Almuhimedi , Shikun\u00a0(Aerin) Zhang, Norman Sadeh , Yuvraj Agarwal , and Alessandro Acquisti . 2016 . Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016 ). USENIX Association, Denver, CO, 27\u201341. https:\/\/www.usenix.org\/conference\/soups 2016\/technical-sessions\/presentation\/liu Bin Liu, Mads\u00a0Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun\u00a0(Aerin) Zhang, Norman Sadeh, Yuvraj Agarwal, and Alessandro Acquisti. 2016. Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). USENIX Association, Denver, CO, 27\u201341. https:\/\/www.usenix.org\/conference\/soups2016\/technical-sessions\/presentation\/liu"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1002\/meet.14504901100"},{"key":"e_1_3_2_1_47_1","unstructured":"Natasha Lomas. 2017. Teens favoring Snapchat and Instagram over Facebook -says e-marketer.  Natasha Lomas. 2017. Teens favoring Snapchat and Instagram over Facebook -says e-marketer."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2011.10.010"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0092-6566(02)00534-2"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2017.06.037"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1108\/AJIM-04-2017-0098"},{"key":"e_1_3_2_1_52_1","unstructured":"Ian Miller and Gerald Cupchik. 2014. Meme creation and sharing processes: individuals shaping the masses. (2014). arXiv:1406.7579  Ian Miller and Gerald Cupchik. 2014. Meme creation and sharing processes: individuals shaping the masses. (2014). arXiv:1406.7579"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1024\/0044-3514.37.1.9"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.4180831"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.09.009"},{"key":"e_1_3_2_1_56_1","unstructured":"Carol Moser. 2020. Impulse Buying: Designing for Self-Control with E-commerce. Ph.D. Dissertation.  Carol Moser. 2020. Impulse Buying: Designing for Self-Control with E-commerce. Ph.D. Dissertation."},{"key":"e_1_3_2_1_57_1","volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"Nissenbaum Helen","unstructured":"Helen Nissenbaum . 2009. Privacy in context: Technology, policy, and the integrity of social life . Stanford University Press . Helen Nissenbaum. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1080\/08838151.2016.1234478"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2010.09.022"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_61_1","volume-title":"Proceedings of the International Conference on Information Systems (ICIS 2015)","author":"Pu Yu","year":"2015","unstructured":"Yu Pu and Jens Grossklags . 2015 . Using conjoint analysis to investigate the value of interdependent privacy in social app adoption scenarios . Proceedings of the International Conference on Information Systems (ICIS 2015) (2015). Yu Pu and Jens Grossklags. 2015. Using conjoint analysis to investigate the value of interdependent privacy in social app adoption scenarios. Proceedings of the International Conference on Information Systems (ICIS 2015) (2015)."},{"key":"e_1_3_2_1_62_1","volume-title":"happiness, and style of humor among perpetrators: is there a relationship?Humanities & Social Sciences Reviews 7, 3","author":"Qodir Abdul","year":"2019","unstructured":"Abdul Qodir , Ahmad\u00a0Muhammad Diponegoro , and Triantoro Safaria . 2019. Cyberbullying , happiness, and style of humor among perpetrators: is there a relationship?Humanities & Social Sciences Reviews 7, 3 ( 2019 ), 200\u2013206. Abdul Qodir, Ahmad\u00a0Muhammad Diponegoro, and Triantoro Safaria. 2019. Cyberbullying, happiness, and style of humor among perpetrators: is there a relationship?Humanities & Social Sciences Reviews 7, 3 (2019), 200\u2013206."},{"key":"e_1_3_2_1_63_1","volume-title":"Manage Privacy in the Era of Pervasive Photography. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018","author":"Rashidi Yasmeen","year":"2018","unstructured":"Yasmeen Rashidi , Tousif Ahmed , Felicia Patel , Emily Fath , Apu Kapadia , Christena Nippert-Eng , and Norman\u00a0Makoto Su . 2018 . \u201d You don\u2019t want to be the next meme\u201d: College Students\u2019 Workarounds to Manage Privacy in the Era of Pervasive Photography. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018 ). USENIX Association, Baltimore, MD, 143\u2013157. https:\/\/www.usenix.org\/conference\/soups 2018\/presentation\/rashidi Yasmeen Rashidi, Tousif Ahmed, Felicia Patel, Emily Fath, Apu Kapadia, Christena Nippert-Eng, and Norman\u00a0Makoto Su. 2018. \u201dYou don\u2019t want to be the next meme\u201d: College Students\u2019 Workarounds to Manage Privacy in the Era of Pervasive Photography. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). USENIX Association, Baltimore, MD, 143\u2013157. https:\/\/www.usenix.org\/conference\/soups2018\/presentation\/rashidi"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392827"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00014"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12144-017-9770-x"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1520-6653(199923)13:4<24::AID-DIR3>3.0.CO;2-O"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240252818207"},{"key":"e_1_3_2_1_69_1","unstructured":"Kit Smith. 2019. 53 Incredible Facebook Statistics and Facts. https:\/\/www.brandwatch.com\/blog\/facebook-statistics\/  Kit Smith. 2019. 53 Incredible Facebook Statistics and Facts. https:\/\/www.brandwatch.com\/blog\/facebook-statistics\/"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526780"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2539165"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025668"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2016.03.032"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.11.046"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655188.1655190"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2010.01.017"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.02.004"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2015.07.007"},{"key":"e_1_3_2_1_79_1","unstructured":"Wikipedia. 2020. List of memory biases. https:\/\/en.wikipedia.org\/wiki\/List_of_memory_biases  Wikipedia. 2020. List of memory biases. https:\/\/en.wikipedia.org\/wiki\/List_of_memory_biases"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2016.09.006"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jrp.2005.08.005"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2011.02.006"},{"key":"e_1_3_2_1_83_1","volume-title":"Human Aspects of IT for the Aged Population","author":"Zeissig Eva-Maria","unstructured":"Eva-Maria Zeissig , Chantal Lidynia , Luisa Vervier , Andera Gadeib , and Martina Ziefle . 2017. Online Privacy Perceptions of Older Adults . In Human Aspects of IT for the Aged Population . Applications, Services and Contexts, Jia Zhou and Gavriel Salvendy (Eds.). Springer International Publishing , Cham , 181\u2013200. Eva-Maria Zeissig, Chantal Lidynia, Luisa Vervier, Andera Gadeib, and Martina Ziefle. 2017. Online Privacy Perceptions of Older Adults. In Human Aspects of IT for the Aged Population. Applications, Services and Contexts, Jia Zhou and Gavriel Salvendy (Eds.). Springer International Publishing, Cham, 181\u2013200."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/1292491.1292514"}],"event":{"name":"CHI '21: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '21","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445258","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411764.3445258","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411764.3445258","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:43Z","timestamp":1750195723000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445258"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,6]]},"references-count":84,"alternative-id":["10.1145\/3411764.3445258","10.1145\/3411764"],"URL":"https:\/\/doi.org\/10.1145\/3411764.3445258","relation":{},"subject":[],"published":{"date-parts":[[2021,5,6]]},"assertion":[{"value":"2021-05-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}