{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:45Z","timestamp":1750220565903,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T00:00:00Z","timestamp":1620259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,6]]},"DOI":"10.1145\/3411764.3445625","type":"proceedings-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T03:50:37Z","timestamp":1620445837000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Truth or Dare: Understanding and Predicting How Users Lie and Provide Untruthful Data Online"],"prefix":"10.1145","author":[{"given":"Kopo M.","family":"Ramokapane","sequence":"first","affiliation":[{"name":"Bristol Cyber Security Group, Department of Computer Science University of Bristol, United Kingdom"}]},{"given":"Gaurav","family":"Misra","sequence":"additional","affiliation":[{"name":"Youtility Limited, London, United Kingdom"}]},{"given":"Jose","family":"Such","sequence":"additional","affiliation":[{"name":"King's College London, United Kingdom"}]},{"given":"S\u00f6ren","family":"Preibusch","sequence":"additional","affiliation":[{"name":"soeren-preibusch.de, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,5,7]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2010.07.001"},{"key":"e_1_3_2_2_2_1","volume-title":"Privacy and human behavior in the age of information. Science 347, 6221","author":"Acquisti Alessandro","year":"2015","unstructured":"Alessandro Acquisti , Laura Brandimarte , and George Loewenstein . 2015. Privacy and human behavior in the age of information. Science 347, 6221 ( 2015 ), 509\u2013514. Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2015. Privacy and human behavior in the age of information. Science 347, 6221 (2015), 509\u2013514."},{"key":"e_1_3_2_2_3_1","unstructured":"Moez Ali. 2020. PyCaret: An open source low-code machine learning library in Python. https:\/\/www.pycaret.org PyCaret version 2.1.  Moez Ali. 2020. PyCaret: An open source low-code machine learning library in Python. https:\/\/www.pycaret.org PyCaret version 2.1."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025698"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2019.1667440"},{"key":"e_1_3_2_2_6_1","volume-title":"Thematic analysis. Qualitative psychology: A practical guide to research methods","author":"Clarke Victoria","year":"2015","unstructured":"Victoria Clarke , Virginia Braun , and Nikki Hayfield . 2015. Thematic analysis. Qualitative psychology: A practical guide to research methods ( 2015 ), 222\u2013248. Victoria Clarke, Virginia Braun, and Nikki Hayfield. 2015. Thematic analysis. Qualitative psychology: A practical guide to research methods (2015), 222\u2013248."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1054985"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47874-6_28"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"e_1_3_2_2_10_1","volume-title":"How many subjects does it take to do a regression analysis. Multivariate behavioral research 26, 3","author":"Green B","year":"1991","unstructured":"Samuel\u00a0 B Green . 1991. How many subjects does it take to do a regression analysis. Multivariate behavioral research 26, 3 ( 1991 ), 499\u2013510. Samuel\u00a0B Green. 1991. How many subjects does it take to do a regression analysis. Multivariate behavioral research 26, 3 (1991), 499\u2013510."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985709"},{"volume-title":"The elements of statistical learning: data mining, inference, and prediction","author":"Hastie Trevor","key":"e_1_3_2_2_12_1","unstructured":"Trevor Hastie , Robert Tibshirani , and Jerome Friedman . 2009. The elements of statistical learning: data mining, inference, and prediction . Springer Science & Business Media . Trevor Hastie, Robert Tibshirani, and Jerome Friedman. 2009. The elements of statistical learning: data mining, inference, and prediction. Springer Science & Business Media."},{"key":"e_1_3_2_2_13_1","volume-title":"Attentive Turkers: MTurk participants perform better on online attention checks than do subject pool participants. Behavior research methods 48, 1","author":"Hauser J","year":"2016","unstructured":"David\u00a0 J Hauser and Norbert Schwarz . 2016 . Attentive Turkers: MTurk participants perform better on online attention checks than do subject pool participants. Behavior research methods 48, 1 (2016), 400\u2013407. David\u00a0J Hauser and Norbert Schwarz. 2016. Attentive Turkers: MTurk participants perform better on online attention checks than do subject pool participants. Behavior research methods 48, 1 (2016), 400\u2013407."},{"key":"e_1_3_2_2_14_1","volume-title":"Feb 1, 1","author":"Jentzsch Nicola","year":"2012","unstructured":"Nicola Jentzsch , S\u00f6ren Preibusch , and Andreas Harasser . 2012. Study on monetising privacy: An economic model for pricing personal information. ENISA , Feb 1, 1 ( 2012 ). Nicola Jentzsch, S\u00f6ren Preibusch, and Andreas Harasser. 2012. Study on monetising privacy: An economic model for pricing personal information. ENISA, Feb 1, 1 (2012)."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1086\/656423"},{"key":"e_1_3_2_2_16_1","volume-title":"The Big Five trait taxonomy: History, measurement, and theoretical perspectives. Handbook of personality: Theory and research 2","author":"John P","year":"1999","unstructured":"Oliver\u00a0 P John and Sanjay Srivastava . 1999. The Big Five trait taxonomy: History, measurement, and theoretical perspectives. Handbook of personality: Theory and research 2 , 1999 (1999), 102\u2013138. Oliver\u00a0P John and Sanjay Srivastava. 1999. The Big Five trait taxonomy: History, measurement, and theoretical perspectives. Handbook of personality: Theory and research 2, 1999(1999), 102\u2013138."},{"volume-title":"Discourse analysis","author":"Johnstone Barbara","key":"e_1_3_2_2_17_1","unstructured":"Barbara Johnstone . 2017. Discourse analysis . John Wiley & Sons . Barbara Johnstone. 2017. Discourse analysis. John Wiley & Sons."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2007.10.005"},{"key":"e_1_3_2_2_19_1","volume-title":"trust, and self-disclosure online. Human\u2013Computer Interaction 25, 1","author":"Joinson N","year":"2010","unstructured":"Adam\u00a0 N Joinson , Ulf-Dietrich Reips , Tom Buchanan , and Carina B\u00a0Paine Schofield . 2010. Privacy , trust, and self-disclosure online. Human\u2013Computer Interaction 25, 1 ( 2010 ), 1\u201324. Adam\u00a0N Joinson, Ulf-Dietrich Reips, Tom Buchanan, and Carina B\u00a0Paine Schofield. 2010. Privacy, trust, and self-disclosure online. Human\u2013Computer Interaction 25, 1 (2010), 1\u201324."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2004.10.012"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1177\/0894439317752406"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.06.003"},{"key":"e_1_3_2_2_23_1","unstructured":"JWKJW Kotrlik and CCHCC Higgins. 2001. Organizational research: Determining appropriate sample size in survey research appropriate sample size in survey research. Information technology learning and performance journal 19 1(2001) 43.  JWKJW Kotrlik and CCHCC Higgins. 2001. Organizational research: Determining appropriate sample size in survey research appropriate sample size in survey research. Information technology learning and performance journal 19 1(2001) 43."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.09.005"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"crossref","unstructured":"Scott Lederer Jennifer Mankoff and Anind\u00a0K Dey. 2003. Who wants to know what when? privacy preference determinants in ubiquitous computing. In CHI\u201903 extended abstracts on Human factors in computing systems. 724\u2013725.  Scott Lederer Jennifer Mankoff and Anind\u00a0K Dey. 2003. Who wants to know what when? privacy preference determinants in ubiquitous computing. In CHI\u201903 extended abstracts on Human factors in computing systems. 724\u2013725.","DOI":"10.1145\/765891.765952"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38908-5_19"},{"key":"e_1_3_2_2_27_1","volume-title":"Internet users","author":"Malhotra K","year":"2004","unstructured":"Naresh\u00a0 K Malhotra , Sung\u00a0 S Kim , and James Agarwal . 2004. Internet users \u2019 information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research 15, 4 ( 2004 ), 336\u2013355. Naresh\u00a0K Malhotra, Sung\u00a0S Kim, and James Agarwal. 2004. Internet users\u2019 information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research 15, 4 (2004), 336\u2013355."},{"key":"e_1_3_2_2_28_1","volume-title":"Conducting behavioral research on Amazon\u2019s Mechanical Turk. Behavior research methods 44, 1","author":"Mason Winter","year":"2012","unstructured":"Winter Mason and Siddharth Suri . 2012. Conducting behavioral research on Amazon\u2019s Mechanical Turk. Behavior research methods 44, 1 ( 2012 ), 1\u201323. Winter Mason and Siddharth Suri. 2012. Conducting behavioral research on Amazon\u2019s Mechanical Turk. Behavior research methods 44, 1 (2012), 1\u201323."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/0047-2727(74)90003-6"},{"key":"e_1_3_2_2_30_1","volume-title":"Interrater reliability: the kappa statistic. Biochemia medica: Biochemia medica 22, 3","author":"McHugh L","year":"2012","unstructured":"Mary\u00a0 L McHugh . 2012. Interrater reliability: the kappa statistic. Biochemia medica: Biochemia medica 22, 3 ( 2012 ), 276\u2013282. Mary\u00a0L McHugh. 2012. Interrater reliability: the kappa statistic. Biochemia medica: Biochemia medica 22, 3 (2012), 276\u2013282."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2001.990455"},{"key":"e_1_3_2_2_32_1","volume-title":"Falsifying and withholding: exploring individuals","author":"Miltgen Caroline\u00a0Lancelot","year":"2019","unstructured":"Caroline\u00a0Lancelot Miltgen and H\u00a0Jeff Smith . 2019. Falsifying and withholding: exploring individuals \u2019 contextual privacy-related decision-making. Information & management 56, 5 ( 2019 ), 696\u2013717. Caroline\u00a0Lancelot Miltgen and H\u00a0Jeff Smith. 2019. Falsifying and withholding: exploring individuals\u2019 contextual privacy-related decision-making. Information & management 56, 5 (2019), 696\u2013717."},{"key":"e_1_3_2_2_33_1","unstructured":"Jack Murtagh Kathryn Taylor George Kellaris and Salil Vadhan. 2018. Usable differential privacy: A case study with psi. arXiv preprint arXiv:1809.04103(2018).  Jack Murtagh Kathryn Taylor George Kellaris and Salil Vadhan. 2018. Usable differential privacy: A case study with psi. arXiv preprint arXiv:1809.04103(2018)."},{"volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"Nissenbaum Helen","key":"e_1_3_2_2_34_1","unstructured":"Helen Nissenbaum . 2009. Privacy in context: Technology, policy, and the integrity of social life . Stanford University Press . Helen Nissenbaum. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2006.00070.x"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11002-018-9448-7"},{"key":"e_1_3_2_2_37_1","unstructured":"Fabian Pedregosa-Izquierdo. 2015. Feature extraction and supervised learning on fMRI : from practice to theory. Theses. Universit\u00e9 Pierre et Marie Curie - Paris VI. https:\/\/tel.archives-ouvertes.fr\/tel-01100921  Fabian Pedregosa-Izquierdo. 2015. Feature extraction and supervised learning on fMRI : from practice to theory. Theses. Universit\u00e9 Pierre et Marie Curie - Paris VI. https:\/\/tel.archives-ouvertes.fr\/tel-01100921"},{"key":"e_1_3_2_2_38_1","volume-title":"Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods 46, 4","author":"Peer Eyal","year":"2014","unstructured":"Eyal Peer , Joachim Vosgerau , and Alessandro Acquisti . 2014. Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods 46, 4 ( 2014 ), 1023\u20131031. Eyal Peer, Joachim Vosgerau, and Alessandro Acquisti. 2014. Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods 46, 4 (2014), 1023\u20131031."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2009.01147.x"},{"volume-title":"The Economics of Information Security and Privacy","author":"Preibusch S\u00f6ren","key":"e_1_3_2_2_40_1","unstructured":"S\u00f6ren Preibusch , Kat Krol , and Alastair\u00a0 R Beresford . 2013. The privacy economics of voluntary over-disclosure in Web forms . In The Economics of Information Security and Privacy . Springer , 183\u2013209. S\u00f6ren Preibusch, Kat Krol, and Alastair\u00a0R Beresford. 2013. The privacy economics of voluntary over-disclosure in Web forms. In The Economics of Information Security and Privacy. Springer, 183\u2013209."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-013-9130-3"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2012.03.035"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173626"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.25080\/Majora-92bf1922-011"},{"key":"e_1_3_2_2_45_1","unstructured":"Jasper Snoek Hugo Larochelle and Ryan\u00a0P Adams. 2012. Practical bayesian optimization of machine learning algorithms. In Advances in neural information processing systems. 2951\u20132959.  Jasper Snoek Hugo Larochelle and Ryan\u00a0P Adams. 2012. Practical bayesian optimization of machine learning algorithms. In Advances in neural information processing systems. 2951\u20132959."},{"key":"e_1_3_2_2_46_1","volume-title":"Internet users","author":"Son Jai-Yeol","year":"2008","unstructured":"Jai-Yeol Son and Sung\u00a0 S Kim . 2008. Internet users \u2019 information privacy-protective responses: A taxonomy and a nomological model. MIS quarterly ( 2008 ), 503\u2013529. Jai-Yeol Son and Sung\u00a0S Kim. 2008. Internet users\u2019 information privacy-protective responses: A taxonomy and a nomological model. MIS quarterly (2008), 503\u2013529."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376854"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_2_49_1","volume-title":"SOEP 2010 - Methodenbericht zum Befragungsjahr 2010 (Welle 27)","author":"Infratest Sozialforschung TNS","year":"2012","unstructured":"TNS Infratest Sozialforschung . 2012 . SOEP 2010 - Methodenbericht zum Befragungsjahr 2010 (Welle 27) des Sozio-oekonomischen Panels. SOEP Survey Papers 75: Series B. Berlin : DIW\/SOEP. TNS Infratest Sozialforschung. 2012. SOEP 2010 - Methodenbericht zum Befragungsjahr 2010 (Welle 27) des Sozio-oekonomischen Panels. SOEP Survey Papers 75: Series B. Berlin: DIW\/SOEP."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864349.1864364"},{"key":"e_1_3_2_2_51_1","volume-title":"Sensitive Disclosures. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1\u201313","author":"Warner Mark","year":"2020","unstructured":"Mark Warner , Agnieszka Kitkowska , Jo Gibbs , Juan\u00a0 F Maestre , and Ann Blandford . 2020 . Evaluating\u2019Prefer not to say\u2019Around Sensitive Disclosures. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1\u201313 . Mark Warner, Agnieszka Kitkowska, Jo Gibbs, Juan\u00a0F Maestre, and Ann Blandford. 2020. Evaluating\u2019Prefer not to say\u2019Around Sensitive Disclosures. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1\u201313."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2007.03.004"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1080\/01449290600961910"}],"event":{"name":"CHI '21: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Yokohama Japan","acronym":"CHI '21"},"container-title":["Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445625","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411764.3445625","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:38Z","timestamp":1750195718000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445625"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,6]]},"references-count":53,"alternative-id":["10.1145\/3411764.3445625","10.1145\/3411764"],"URL":"https:\/\/doi.org\/10.1145\/3411764.3445625","relation":{},"subject":[],"published":{"date-parts":[[2021,5,6]]},"assertion":[{"value":"2021-05-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}