{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T06:48:07Z","timestamp":1768286887682,"version":"3.49.0"},"reference-count":100,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW1","license":[{"start":{"date-parts":[[2023,4,14]],"date-time":"2023-04-14T00:00:00Z","timestamp":1681430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["Grant No. 1940670, Grant No. 1940679, Grant No. 1940713"],"award-info":[{"award-number":["Grant No. 1940670, Grant No. 1940679, Grant No. 1940713"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2023,4,14]]},"abstract":"<jats:p>Americans' trust in news is declining, and authenticity and transparency challenges in digital publishing contexts pose unique challenges to the ability to effectively gratify their information-seeking needs via online media. Cryptographic technologies and web-based provenance indicators have the potential to enhance the trustworthiness and transparency of digital communication, but better understandings of news consumers practices and needs are required to develop practical tools. Through a representative online survey of 400 digital news consumers and 19 follow-up interviews, we investigate how users authenticate and assign trust to news content, and identify specific needs pertaining to news transparency and authentication that could be met by digital news authentication tools. While many users currently rely on political ideology to assess news trustworthiness, we find that users of all political orientations see value in independent provenance and authentication tools for digital news.<\/jats:p>","DOI":"10.1145\/3579534","type":"journal-article","created":{"date-parts":[[2023,4,16]],"date-time":"2023-04-16T17:23:07Z","timestamp":1681665787000},"page":"1-44","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Transparency, Trust, and Security Needs for the Design of Digital News Authentication Tools"],"prefix":"10.1145","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3486-9674","authenticated-orcid":false,"suffix":"II","given":"Errol","family":"Francis","sequence":"first","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4398-1550","authenticated-orcid":false,"given":"Ayana","family":"Monroe","sequence":"additional","affiliation":[{"name":"University of North Carolina at Chapel Hill, Chapel Hill, NC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3372-7778","authenticated-orcid":false,"given":"Emily","family":"Sidnam-Mauch","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7918-0363","authenticated-orcid":false,"given":"Bernat","family":"Ivancsics","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0035-7539","authenticated-orcid":false,"given":"Eve","family":"Washington","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3914-4848","authenticated-orcid":false,"given":"Susan E.","family":"McGregor","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6349-0145","authenticated-orcid":false,"given":"Joseph","family":"Bonneau","sequence":"additional","affiliation":[{"name":"New York University, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3025-4194","authenticated-orcid":false,"given":"Kelly","family":"Caine","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,4,16]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Alice inWarningland: A Large-Scale Field Study of Browser Security Warning Effectiveness. In 22nd USENIX Security Symposium (USENIX Security 13)","author":"Akhawe Devdatta","year":"2013","unstructured":"Devdatta Akhawe and Adrienne Porter Felt. 2013. Alice inWarningland: A Large-Scale Field Study of Browser Security Warning Effectiveness. In 22nd USENIX Security Symposium (USENIX Security 13). USENIX Association, Washington, D.C., 257--272. https:\/\/www.usenix.org\/conference\/usenixsecurity13\/technical-sessions\/presentation\/akhawe"},{"key":"e_1_2_1_2_1","volume-title":"Contour: A Practical System for Binary Transparency. DPM\/CBT@ESORICS 11025","author":"Al-Bassam Mustafa","year":"2018","unstructured":"Mustafa Al-Bassam and Sarah Meiklejohn. 2018. Contour: A Practical System for Binary Transparency. DPM\/CBT@ESORICS 11025 (2018), 94--110."},{"key":"e_1_2_1_3_1","volume-title":"10th Symposium On Usable Privacy and Security (SOUPS 2014","author":"Almuhimedi Hazim","year":"2014","unstructured":"Hazim Almuhimedi, Adrienne Porter Felt, RobertW. Reeder, and Sunny Consolvo. 2014. Your Reputation Precedes You: History, Reputation, and the Chrome Malware Warning. In 10th Symposium On Usable Privacy and Security (SOUPS 2014). USENIX Association, Menlo Park, CA, 113--128. https:\/\/www.usenix.org\/conference\/soups2014\/proceedings\/ presentation\/almuhimedi"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/03637751.2018.1521984"},{"key":"e_1_2_1_5_1","volume-title":"Communications Research 1948--1949, Paul F","author":"Berelson Bernard","unstructured":"Bernard Berelson. 1949. What 'missing the newspaper' means. In Communications Research 1948--1949, Paul F. Lazerfield and Frank N. Stanton (Eds.). Harper and Brother, New York, NY, Chapter 1, 111--129."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479539"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--981--10--2779--6_103--1"},{"key":"e_1_2_1_8_1","unstructured":"Carrie Brown-Smith. 2017. Transparency Finally Takes Off. https:\/\/www.niemanlab.org\/2017\/12\/transparencyfinally- takes-off\/"},{"key":"e_1_2_1_9_1","volume-title":"Population by Race in the United States","author":"U.S. Census Bureau","year":"2019","unstructured":"U.S. Census Bureau. 2021. Population by Race in the United States, 2019 American Community Survey 1-Year Estimates. https:\/\/data.census.gov\/cedsci\/vizwidget?g=0100000US&infoSection=Race&type=chart&chartType=bar"},{"key":"e_1_2_1_10_1","unstructured":"Pew Research Center. 2016. The Modern News Consumer. https:\/\/www.journalism.org\/2016\/07\/07\/the-modernnews- consumer\/"},{"key":"e_1_2_1_11_1","unstructured":"Pew Research Center. 2020. Americans See Skepticism of News Media as Healthy Say Public Trust in the Institution Can Improve. https:\/\/www.journalism.org\/2020\/08\/31\/americans-see-skepticism-of-news-media-as-healthy-saypublic- trust-in-the-institution-can-improve\/"},{"key":"e_1_2_1_12_1","unstructured":"Pew Research Center. 2020. Measuring News Consumption in a Digital Era. https:\/\/www.journalism.org\/2020\/12\/08\/ measuring-news-consumption-in-a-digital-era\/"},{"key":"e_1_2_1_13_1","unstructured":"Nick Charalambides. 2021. We recently went viral on TikTok - here's what we learned. https:\/\/blog.prolific.co\/werecently- went-viral-on-tiktok-heres-what-we-learned\/"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978404"},{"key":"e_1_2_1_15_1","first-page":"1522","article-title":"Reducing Participation Costs via Incremental Verification for Ledger Systems","volume":"2020","author":"Chen Weikeng","year":"2020","unstructured":"Weikeng Chen, Alessandro Chiesa, Emma Dauterman, and Nicholas P. Ward. 2020. Reducing Participation Costs via Incremental Verification for Ledger Systems. IACR Cryptol. ePrint Arch. 2020 (2020), 1522.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15506878jobem5002_2"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMAP49528.2020.9248453"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","unstructured":"Serge Egelman Lorrie Cranor and Jason Hong. 2008. You've been warned: an empirical study of the effectiveness of web browser phishing warnings. 1065--1074 pages. https:\/\/doi.org\/10.1145\/1357054.1357219","DOI":"10.1145\/1357054.1357219"},{"key":"e_1_2_1_19_1","volume-title":"Journalism managers are burned out. Is it time for a work redesign? American Press Institute","author":"Elizabeth Jane","year":"2021","unstructured":"Jane Elizabeth. 2021. Journalism managers are burned out. Is it time for a work redesign? American Press Institute (2021). https:\/\/www.americanpressinstitute.org\/publications\/articles\/journalism-managers-are-burned-out-is-ittime- for-a-work-redesign\/single-page\/"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660311"},{"key":"e_1_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Adrienne Felt Alex Ainslie Robert Reeder Sunny Consolvo Somas Thyagaraja Alan Bettes Helen Harris and Jeff Grimes. 2015. Improving SSL Warnings: Comprehension and Adherence. 2893--2902 pages. https:\/\/doi.org\/10.1145\/ 2702123.2702442","DOI":"10.1145\/2702123.2702442"},{"key":"e_1_2_1_23_1","volume-title":"Rethinking Connection Security Indicators. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016","author":"Felt Adrienne Porter","year":"2016","unstructured":"Adrienne Porter Felt, RobertW. Reeder, Alex Ainslie, Helen Harris, MaxWalker, Christopher Thompson, Mustafa Embre Acer, Elisabeth Morant, and Sunny Consolvo. 2016. Rethinking Connection Security Indicators. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). USENIX Association, Denver, CO, 1--14. https:\/\/www. usenix.org\/conference\/soups2016\/technical-sessions\/presentation\/porter-felt"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1177\/0739532918796228"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","unstructured":"B. Fogg. 2003. Prominence-interpretation theory: explaining how people assess credibility online. 722--723 pages. https:\/\/doi.org\/10.1145\/765891.765951","DOI":"10.1145\/765891.765951"},{"key":"e_1_2_1_26_1","unstructured":"Knight Foundation and Gallup. 2020. American Views 2020: Trust Media and Democracy. https:\/\/knightfoundation. org\/reports\/american-views-2020-trust-media-and-democracy\/"},{"key":"e_1_2_1_27_1","unstructured":"The Knight Foundation. 2018. Indicators of News Media Trust. https:\/\/knightfoundation.org\/reports\/indicators-ofnews- media-trust\/"},{"key":"e_1_2_1_28_1","unstructured":"Conor Gaffey. 2017. Fake news stories about the Las Vegas shooting debunked. http:\/\/www.newsweek.com\/lasvegas- shooting-fake-news-stephen-paddock-675468"},{"key":"e_1_2_1_29_1","volume-title":"Conservatism Down Since Start of","author":"GALLUP.","year":"2020","unstructured":"GALLUP. 2020. U.S. Conservatism Down Since Start of 2020. https:\/\/news.gallup.com\/poll\/316094\/conservatismdown- start-2020.aspx"},{"key":"e_1_2_1_30_1","volume-title":"Americans' Political Ideology Held Steady","author":"GALLUP.","year":"2020","unstructured":"GALLUP. 2021. Americans' Political Ideology Held Steady in 2020. https:\/\/news.gallup.com\/poll\/328367\/americanspolitical- ideology-held-steady-2020.aspx"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1177\/1931243111420405"},{"key":"e_1_2_1_33_1","unstructured":"Philippe Grosjean and Frederic Ibanez. 2018. pastecs: Package for Analysis of Space-Time Ecological Series. Philippe Grosjean. https:\/\/CRAN.R-project.org\/package=pastecs R package version 1.3.21."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.3998\/3336451.0011.305"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1080\/1461670X.2012.664430"},{"key":"e_1_2_1_36_1","volume-title":"An Automated Approach to Fact Checking User-Generated Content for Journalists. Master's thesis","author":"Holmwood Lindsay","unstructured":"Lindsay Holmwood. 2011. An Automated Approach to Fact Checking User-Generated Content for Journalists. Master's thesis. S\u00f6dert\u00f6rn University, School of Communication, Media and it."},{"key":"e_1_2_1_37_1","volume-title":"Attitudes to fake news verification: Youth orientations to ?right click'authenticate","author":"Ibrahim Yasmin","year":"2021","unstructured":"Yasmin Ibrahim, Fadi Safieddine, and Pardis Pourghomi. 2021. Attitudes to fake news verification: Youth orientations to ?right click'authenticate. Journal of Applied Journalism & Media Studies (In Press) (2021)."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1080\/13691180701307495"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1080\/16522354.2019.1640534"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441868"},{"key":"e_1_2_1_41_1","volume-title":"Utilization of mass communication by the individual. The uses of mass communications: Current perspectives on gratifications research 3","author":"Katz Elihu","year":"1974","unstructured":"Elihu Katz. 1974. Utilization of mass communication by the individual. The uses of mass communications: Current perspectives on gratifications research 3 (1974), 19--32."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.01.028"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.06.035"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2659897"},{"key":"e_1_2_1_47_1","first-page":"1","article-title":"Certificate Transparency","volume":"6962","author":"Laurie Ben","year":"2013","unstructured":"Ben Laurie, Adam Langley, and Emilia K\u00e4sper. 2013. Certificate Transparency. RFC 6962 (2013), 1--27.","journal-title":"RFC"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aao2998"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1080\/08838151.2013.816712"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.10.002"},{"key":"e_1_2_1_51_1","volume-title":"Brace and Howe","author":"Lippmann Walter","year":"1920","unstructured":"Walter Lippmann. 1920. Liberty and the news. Harcourt, Brace and Howe, 1920, New York (State)."},{"key":"e_1_2_1_52_1","volume-title":"Public opinion","author":"Lippmann Walter","unstructured":"Walter Lippmann. 1922. Public opinion. Free Press, New York."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998076.1998103"},{"key":"e_1_2_1_54_1","volume-title":"Think Global","author":"Meiklejohn Sarah","year":"2011","unstructured":"Sarah Meiklejohn, Pavel Kalinnikov, Cindy S. Lin, Martin Hutchinson, Gary Belvin, Mariana Raykova, and Al Cutter. 2020. Think Global, Act Local: Gossip and Client Audits in Verifiable Data Structures. CoRR abs\/2011.04551 (2020), 20 pages."},{"key":"e_1_2_1_55_1","volume-title":"Freedman","author":"Melara Marcela S.","year":"2015","unstructured":"Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, and Michael J. Freedman. 2015. CONIKS: Bringing Key Transparency to End Users. In USENIX Security Symposium. USENIX Association, Washington, D.C., 383--398."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444809350193"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1080\/17512786.2017.1376593"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1080\/17512786.2020.1778507"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1177\/1940161214556710"},{"key":"e_1_2_1_61_1","volume-title":"Nudge Effect of Fact-Check Alerts: Source Influence and Media Skepticism on Sharing of News Misinformation in Social Media. Social media society 6, 1","author":"Nekmat Elmie","year":"2020","unstructured":"Elmie Nekmat. 2020. Nudge Effect of Fact-Check Alerts: Source Influence and Media Skepticism on Sharing of News Misinformation in Social Media. Social media society 6, 1 (2020), 205630511989732. https:\/\/doi.org\/10.1177\/ 2056305119897322"},{"key":"e_1_2_1_62_1","volume-title":"Digital News Report","author":"Newman Nic","year":"2021","unstructured":"Nic Newman, Richard Fletcher, Simge And? Anne Schulz, Craig T. Robertson, and Rasmus Kleis Nielsen. 2021. Digital News Report. Reuters Institute 10 (2021), 163 pages. https:\/\/reutersinstitute.politics.ox.ac.uk\/digital-news-report\/2021"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1177\/0093650218793739"},{"key":"e_1_2_1_64_1","volume-title":"USENIX Security Symposium. USENIX Association","author":"Nikitin Kirill","year":"2017","unstructured":"Kirill Nikitin, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Justin Cappos, and Bryan Ford. 2017. CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds. In USENIX Security Symposium. USENIX Association, Vancouver, BC, 1271--1287."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1177\/1609406917733847"},{"key":"e_1_2_1_66_1","unstructured":"U.S. Department of Commerce. 2019. United States Census Bureau. https:\/\/www.census.gov\/quickfacts\/fact\/table\/US\/PST045219"},{"key":"e_1_2_1_67_1","volume-title":"How far-right trolls named the wrong man as the Las Vegas shooter. The Washington Post Online (October","author":"Ohlheiser Abby","year":"2017","unstructured":"Abby Ohlheiser. 2017. How far-right trolls named the wrong man as the Las Vegas shooter. The Washington Post Online (October 2017). https:\/\/www.washingtonpost.com\/news\/the-intersect\/wp\/2017\/10\/02\/how-far-right-trollsnamed-the-wrong-man-as-the-las-vegas-shooter\/"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbef.2017.12.004"},{"key":"e_1_2_1_69_1","unstructured":"Michael Palanski and Andrea Hickerson. 2019. Journalism needs to practice transparency in a different way to rebuild credibility. https:\/\/theconversation.com\/journalism-needs-to-practice-transparency-in-a-different-way-to-rebuildcredibility- 111474"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2017.01.006"},{"key":"e_1_2_1_71_1","unstructured":"The Gateway Pundent. 2017. Las Vegas Shooter Reportedly a Democrat Who Liked Rachel Maddow MoveOn.org and Associated with Anti-Trump Army. http:\/\/www.thegatewaypundit.com\/2017\/10\/las-vegas-shooter-reportedlydemocrat- liked-rachel-maddow-moveon-org-associated-anti-trump-army\/"},{"key":"e_1_2_1_72_1","first-page":"269","article-title":"The Uses and Gratifications (U&G) Approach as a Lens for Studying Social Media Practice. John Wiley & Sons, Ltd, Hoboken, New Jersey","volume":"15","author":"Alyson","year":"2014","unstructured":"Quan-Haase, Anabel, Young, and Alyson L. 2014. The Uses and Gratifications (U&G) Approach as a Lens for Studying Social Media Practice. John Wiley & Sons, Ltd, Hoboken, New Jersey, Chapter 15, 269--286. https:\/\/doi.org\/10.1002\/ 9781118591178.ch15 arXiv:https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/9781118591178.ch15","journal-title":"Chapter"},{"key":"e_1_2_1_73_1","volume-title":"R: A Language and Environment for Statistical Computing","author":"Team R Core","year":"2013","unstructured":"R Core Team. 2013. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria. http:\/\/www.R-project.org\/"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174086"},{"key":"e_1_2_1_75_1","volume-title":"psych: Procedures for Psychological, Psychometric, and Personality Research","author":"Revelle William","unstructured":"William Revelle. 2021. psych: Procedures for Psychological, Psychometric, and Personality Research. Northwestern University, Evanston, Illinois. https:\/\/CRAN.R-project.org\/package=psych R package version 2.1.6."},{"key":"e_1_2_1_76_1","volume-title":"Americans' Trust in Media Remains at Historical Low. Gallup 2015","author":"Riffkin Rebecca","year":"2015","unstructured":"Rebecca Riffkin. 2015. Americans' Trust in Media Remains at Historical Low. Gallup 2015 (2015). https:\/\/news.gallup.com\/poll\/185927\/americans-trust-media-remains-historical-low.aspx?g_source=Politics&g_ medium=newsfeed&g_campaign=tiles"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327825MCS0301_02"},{"key":"e_1_2_1_78_1","volume-title":"Enhanced Certificate Transparency and End-to-End Encrypted Mail","author":"Ryan Mark Dermot","unstructured":"Mark Dermot Ryan. 2014. Enhanced Certificate Transparency and End-to-End Encrypted Mail. In NDSS. The Internet Society, San Diego, CA, 14 pages."},{"key":"e_1_2_1_79_1","volume-title":"International Multi-Conference on Society","author":"Safieddine Fadi","year":"2021","unstructured":"Fadi Safieddine, Seifedine Kadry, and Wassim Masri. 2021. Misinformation on Social Media: The Development of User Behavior Survey. International Multi-Conference on Society, Cybernetics and Informatics 13 (2021), 8 pages."},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","unstructured":"S. E. Schechter R. Dhamija A. Ozment and I. Fischer. 2007. The Emperor's New Security Indicators. 51--65 pages. https:\/\/doi.org\/10.1109\/SP.2007.35","DOI":"10.1109\/SP.2007.35"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2014"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1177\/0149206314525202"},{"key":"e_1_2_1_83_1","unstructured":"Scott Shane and Ronen Bergman. 2019. New Report Shows How a Pro-Iran Group Spread Fake News Online."},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305120981039"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00027"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2019.1623702"},{"key":"e_1_2_1_87_1","volume-title":"Americans' Trust in Mass Media Sinks to New Low. Gallup 2016","author":"Swift Art","year":"2016","unstructured":"Art Swift. 2016. Americans' Trust in Mass Media Sinks to New Low. Gallup 2016 (2016). https:\/\/news.gallup.com\/ poll\/195542\/americans-trust-mass-media-sinks-new-low.aspx"},{"key":"e_1_2_1_88_1","first-page":"237","article-title":"Determining Sample Size; How to Calculate Survey Sample Size","volume":"2","author":"Taherdoost Hamed","year":"2017","unstructured":"Hamed Taherdoost. 2017. Determining Sample Size; How to Calculate Survey Sample Size. International Journal of Economics and Management System 2 (2017), 237--239.","journal-title":"International Journal of Economics and Management System"},{"key":"e_1_2_1_89_1","doi-asserted-by":"crossref","unstructured":"Harsh Taneja and Katie Yaeger. 2019. Do People Consume the News they Trust? 10 pages. https:\/\/doi.org\/10.1145\/ 3290605.3300770","DOI":"10.1145\/3290605.3300770"},{"key":"e_1_2_1_90_1","volume-title":"Richard Fletcher, and Rasmus Kleis Nielsen.","author":"Toff Benjamin","year":"2020","unstructured":"Benjamin Toff, Sumitra Badrinathan, Camila Mont'Alverne, Amy Ross Arguedas, Richard Fletcher, and Rasmus Kleis Nielsen. 2020. What we think we know and what we want to know: perspectives on trust in news in a changing world. Technical Report. Reuters Institute. https:\/\/reutersinstitute.politics.ox.ac.uk\/what-we-think-we-know-and-whatwe- want-know-perspectives-trust-news-changing-world"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1207\/S1532785XMEP0703_2"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305120978377"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1080\/08838159709364414"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMEW46912.2020.9106003"},{"key":"e_1_2_1_96_1","volume-title":"A dynamic longitudinal examination of social media use, needs, and gratifications among college students. Computers in human behavior 28, 5","author":"Wang Zheng","year":"2012","unstructured":"Zheng Wang, John M Tchernev, and Tyler Solloway. 2012. A dynamic longitudinal examination of social media use, needs, and gratifications among college students. Computers in human behavior 28, 5 (2012), 1829--1839."},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1080\/17512786.2020.1759126"},{"key":"e_1_2_1_98_1","volume-title":"ggplot2: Elegant Graphics for Data Analysis","author":"Wickham Hadley","unstructured":"Hadley Wickham. 2016. ggplot2: Elegant Graphics for Data Analysis. Springer-Verlag, New York, NY. https: \/\/ggplot2.tidyverse.org"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2969706"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376213"},{"key":"e_1_2_1_101_1","first-page":"486","article-title":"How to detect unauthorised usage of a key","volume":"2015","author":"Yu Jiangshan","year":"2015","unstructured":"Jiangshan Yu, Mark Ryan, and Cas Cremers. 2015. How to detect unauthorised usage of a key. IACR Cryptol. ePrint Arch. 2015 (2015), 486.","journal-title":"IACR Cryptol. ePrint Arch."}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579534","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3579534","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3579534","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:25Z","timestamp":1750182685000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579534"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,14]]},"references-count":100,"journal-issue":{"issue":"CSCW1","published-print":{"date-parts":[[2023,4,14]]}},"alternative-id":["10.1145\/3579534"],"URL":"https:\/\/doi.org\/10.1145\/3579534","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,14]]},"assertion":[{"value":"2023-04-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}