{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:45:43Z","timestamp":1765547143930,"version":"3.44.0"},"reference-count":91,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW2","license":[{"start":{"date-parts":[[2023,9,28]],"date-time":"2023-09-28T00:00:00Z","timestamp":1695859200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2023,9,28]]},"abstract":"<jats:p>We present an exploration of cultural norms surrounding online disclosure of information about one's interpersonal relationships (such as information about family members, colleagues, friends, or lovers) on Twitter. The literature identifies the cultural dimension of individualism versus collectivism as being a major determinant of offline communication differences in terms of emotion, topic, and content disclosed. We decided to study whether such differences also occur online in context of Twitter when comparing tweets posted in an individualistic (U.S.) versus a collectivist (India) society. We collected more than 2 million tweets posted in the U.S. and India over a 3 month period which contain interpersonal relationship keywords. A card-sort study was used to develop this culturally-sensitive saturated taxonomy of keywords that represent interpersonal relationships (e.g., ma, mom, mother). Then we developed a high-accuracy interpersonal disclosure detector based on dependency-parsing (F1-score: 86%) to identify when the words refer to a personal relationship of the poster (e.g., \"my mom\" as opposed to \"a mom\"). This allowed us to identify the 400K+ tweets in our data set which actually disclose information about the poster's interpersonal relationships. We used a mixed methods approach to analyze these tweets (e.g., comparing the amount of joy expressed about one's family) and found differences in emotion, topic, and content disclosed between tweets from the U.S. versus India. Our analysis also reveals how a combination of qualitative and quantitative methods are needed to uncover these differences; Using just one or the other can be misleading. This study extends the prior literature on Multi-Party Privacy and provides guidance for researchers and designers of culturally-sensitive systems.<\/jats:p>","DOI":"10.1145\/3610045","type":"journal-article","created":{"date-parts":[[2023,10,4]],"date-time":"2023-10-04T15:54:10Z","timestamp":1696434850000},"page":"1-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Tale of Two Cultures: Comparing Interpersonal Information Disclosure Norms on Twitter"],"prefix":"10.1145","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4317-0184","authenticated-orcid":false,"given":"Mainack","family":"Mondal","sequence":"first","affiliation":[{"name":"IIT Kharagpur, Kharagpur, West Bengal, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7854-8828","authenticated-orcid":false,"given":"Anju","family":"Punuru","sequence":"additional","affiliation":[{"name":"IIT Kharagpur, Kharagpur, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0499-1097","authenticated-orcid":false,"given":"Tyng-Wen Scott","family":"Cheng","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4946-7658","authenticated-orcid":false,"given":"Kenneth","family":"Vargas","sequence":"additional","affiliation":[{"name":"Brigham Young University, provo, UT, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3416-020X","authenticated-orcid":false,"given":"Chaz","family":"Gundry","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-4924-3572","authenticated-orcid":false,"given":"Nathan S.","family":"Driggs","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6328-1039","authenticated-orcid":false,"given":"Noah","family":"Schill","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-0513-7475","authenticated-orcid":false,"given":"Nathaniel","family":"Carlson","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9777-3594","authenticated-orcid":false,"given":"Josh","family":"Bedwell","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0664-5659","authenticated-orcid":false,"given":"Jaden Q.","family":"Lorenc","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-8120-8044","authenticated-orcid":false,"given":"Isha","family":"Ghosh","sequence":"additional","affiliation":[{"name":"University of Utah, Salt Lake City, UT, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5662-0784","authenticated-orcid":false,"given":"Yao","family":"Li","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9391-8301","authenticated-orcid":false,"given":"Nancy","family":"Fulda","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4067-7529","authenticated-orcid":false,"given":"Xinru","family":"Page","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,10,4]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998338"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_3"},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the Workshop on Information Systems and Economics.","author":"Acquisti Alessandro","year":"2009","unstructured":"Alessandro Acquisti, Leslie John, and George Loewenstein. 2009. What is privacy worth. Proceedings of the Workshop on Information Systems and Economics."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240683"},{"key":"e_1_2_1_5_1","volume-title":"Personal Space, Territory, and Crowding.","author":"Altman Irwin","year":"1975","unstructured":"Irwin Altman. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. (1975). http:\/\/eric.ed.gov\/?id=ED131515"},{"key":"e_1_2_1_6_1","volume-title":"Tenth International AAAI Conference on Web and Social Media.","author":"Diniz Ara\u00fajo Matheus Lima","year":"2016","unstructured":"Matheus Lima Diniz Ara\u00fajo, Jo ao Paulo Diniz, Lucas Bastos, Elias Soares, Manoel J\u00fanior, Miller Ferreira, Filipe Ribeiro, and Fabr'icio Benevenuto. 2016. ifeel 2.0: A multilingual benchmarking system for sentence-level sentiment analysis. In Tenth International AAAI Conference on Web and Social Media."},{"volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.","author":"Avrahami Daniel","key":"e_1_2_1_7_1","unstructured":"Daniel Avrahami and Scott E. Hudson. 2006. Responsiveness in instant messaging: predictive models supporting inter-personal communication. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501608"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753560"},{"key":"e_1_2_1_10_1","doi-asserted-by":"crossref","unstructured":"S. Bhagat G. Cormode B. Krishnamurthy and D. Srivastava. 2010. Privacy in Dynamic Social Networks. In WWW.","DOI":"10.1145\/1772690.1772803"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493510"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/944919.944937"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","unstructured":"Lisa Branz and P. Brockmann. 2018. Sentiment Analysis of Twitter Data: Towards Filtering Analyzing and Interpreting Social Network Data. 238--241. https:\/\/doi.org\/10.1145\/3210284.3219769","DOI":"10.1145\/3210284.3219769"},{"key":"e_1_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Virginia Braun Victoria Clarke Nikki Hayfield and Gareth Terry. 2019. Thematic Analysis. (2019) 843--860.","DOI":"10.1007\/978-981-10-5251-4_103"},{"volume-title":"Proceedings of the Seventh Symposium on Usable Privacy and Security. ACM, 15","author":"Braunstein A.","key":"e_1_2_1_15_1","unstructured":"A. Braunstein, L. Granka, and J. Staddon. 2011. Indirect content privacy surveys: measuring privacy without asking about it. In Proceedings of the Seventh Symposium on Usable Privacy and Security. ACM, 15."},{"key":"e_1_2_1_16_1","volume-title":"9th International Conference","volume":"4717","author":"Brown Barry A. T.","year":"2007","unstructured":"Barry A. T. Brown, Alex S. Taylor, Shahram Izadi, Abigail Sellen, Joseph Kaye, and Rachel Eardley. 2007. Locating Family Values: A Field Trial of the Whereabouts Clock. In UbiComp 2007: Ubiquitous Computing, 9th International Conference, Vol. 4717. 354--371."},{"key":"e_1_2_1_17_1","volume-title":"The Spread of Fake News Publisher Content During the 2016 U. S. Presidential Election. In The World Wide Web Conference.","author":"Budak Ceren","year":"2019","unstructured":"Ceren Budak. 2019. What happened? The Spread of Fake News Publisher Content During the 2016 U. S. Presidential Election. In The World Wide Web Conference."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1177\/0022022195261006"},{"key":"e_1_2_1_19_1","volume-title":"Intercultural Friendship from the Perspectives of East Asian International Students","author":"Chen Yea-Wen","year":"2006","unstructured":"Yea-Wen Chen. 2006. Intercultural Friendship from the Perspectives of East Asian International Students., Vol. 2 (Jan. 2006)."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819996"},{"key":"e_1_2_1_21_1","volume-title":"Collaborative Privacy Management in Social Media: A Cross-cultural Validation. Submitted for journal publication","author":"Cho Hichang","year":"2017","unstructured":"Hichang Cho, Bart P. Knijnenburg, Alfred Kobsa, and Yao Li. 2017. Collaborative Privacy Management in Social Media: A Cross-cultural Validation. Submitted for journal publication (2017)."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11135-011--9658-z"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1054985"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/23808985.1983.11678555"},{"key":"e_1_2_1_25_1","volume-title":"Cahn","author":"Cushman Donald P.","year":"1985","unstructured":"Donald P. Cushman and Dudley D. Cahn. 1985. Communication in Interpersonal Relationships. SUNY Press. Google-Books-ID: LMByilXRW80C."},{"key":"e_1_2_1_26_1","volume-title":"Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)."},{"key":"e_1_2_1_27_1","volume-title":"Deanne N Den Hartog, and Jacqueline K Mitchelson","author":"Dickson Marcus W","year":"2003","unstructured":"Marcus W Dickson, Deanne N Den Hartog, and Jacqueline K Mitchelson. 2003. Research on leadership in a cross-cultural context: Making progress, and raising new questions. The leadership quarterly, Vol. 14, 6 (2003), 729--768."},{"key":"e_1_2_1_28_1","volume-title":"Proceedings of the International AAAI Conference on Web and Social Media","volume":"9","author":"Dong Cailing","year":"2015","unstructured":"Cailing Dong, Hongxia Jin, and Bart Knijnenburg. 2015. Predicting privacy behavior on online social networks. In Proceedings of the International AAAI Conference on Web and Social Media, Vol. 9. 91--100."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.1991.tb00545.x"},{"key":"e_1_2_1_30_1","volume-title":"Ethical issues in qualitative research on internet communities. BMJ (Clinical research ed.)","author":"Eysenbach G.","year":"2001","unstructured":"G. Eysenbach and J E Till. 2001. Ethical issues in qualitative research on internet communities. BMJ (Clinical research ed.), Vol. 323, 7321 (2001), 1103--1105."},{"key":"e_1_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Lujun Fang and Kristen LeFevre. 2010. Privacy Wizards for Social Networking Sites. In WWW.","DOI":"10.1145\/1772690.1772727"},{"volume-title":"Structures of social life: The four elementary forms of human relations: Communal sharing, authority ranking, equality matching, market pricing","author":"Fiske Alan Page","key":"e_1_2_1_32_1","unstructured":"Alan Page Fiske. 1991. Structures of social life: The four elementary forms of human relations: Communal sharing, authority ranking, equality matching, market pricing. Free Press."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038920"},{"key":"e_1_2_1_34_1","volume-title":"TOCHI","volume":"24","author":"Fogues Ricard L.","year":"2017","unstructured":"Ricard L. Fogues, Pradeep K. Murukannaiah, Jose M. Such, and Munindar P. Singh. 2017b. Sharing Policies in Multiuser Privacy Scenarios: Incorporating Context, Preferences, and Arguments in Decision Making. TOCHI, Vol. 24, 1 (2017)."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-839X.00002"},{"volume-title":"Individualism and collectivism: Theory, method, and applications","author":"Yau-Fai Ho David","key":"e_1_2_1_36_1","unstructured":"David Yau-Fai Ho and Chi-Yue Chiu. 1994. Component ideas of individualism, collectivism, and social organization: An application in the study of Chinese culture. In Individualism and collectivism: Theory, method, and applications. Sage Publications, Inc, Thousand Oaks, CA, US, 137--156."},{"key":"e_1_2_1_37_1","volume-title":"Gert Jan Hofstede, and Michael Minkov","author":"Hofstede Geert","year":"2005","unstructured":"Geert Hofstede, Gert Jan Hofstede, and Michael Minkov. 2005. Cultures and organizations: Software of the mind. Vol. 2. Mcgraw-hill New York."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D15-1162"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1080\/01463370701497831"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076747"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/0092--6566(88)90022-0"},{"key":"e_1_2_1_42_1","first-page":"149","article-title":"An analysis of individualism-collectivism across Northern India","volume":"37","author":"Jha Shalini Duggal","year":"2011","unstructured":"Shalini Duggal Jha and kamalesh Singh. 2011. An analysis of individualism-collectivism across Northern India. Journal of the Indian Academy of Applied Psychology, Vol. 37, 1 (2011), 149--156.","journal-title":"Journal of the Indian Academy of Applied Psychology"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858415"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1080\/08961530.2011.602953"},{"key":"e_1_2_1_45_1","volume-title":"Cultural difference in motivations for using social network sites: A comparative study of American and Korean college students. Computers in human behavior","author":"Kim Yoojung","year":"2011","unstructured":"Yoojung Kim, Dongyoung Sohn, and Sejung Marina Choi. 2011. Cultural difference in motivations for using social network sites: A comparative study of American and Korean college students. Computers in human behavior, Vol. 27, 1 (2011), 365--372."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/026999300379003"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022--3514.91.5.890"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.3200\/SOCP.145.2.127--140"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979420"},{"key":"e_1_2_1_50_1","unstructured":"Hazel Rose Markus and Shinobu Kitayama. [n.d.]. Culture and the Self: Implications for Cognition Emotion and Motivation. ( [n. d.]) 30."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1177\/0022022107311854"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23046"},{"key":"e_1_2_1_53_1","volume-title":"Proc. SOUPS.","author":"Mondal Mainack","year":"2014","unstructured":"Mainack Mondal, Yabing Liu, Bimal Viswanath, Krishna P. Gummadi, and Alan Mislove. 2014b. Understanding and Specifying Social Access Control Lists. In Proc. SOUPS."},{"key":"e_1_2_1_54_1","volume-title":"Proc. SOUPS.","author":"Mondal Mainack","year":"2016","unstructured":"Mainack Mondal, Johnnatan Messias, Saptarshi Ghosh, Krishna P. Gummadi, and Aniket Kate. 2016. Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data. In Proc. SOUPS."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.76"},{"volume-title":"Privacy in Context: Technology, Policy, and the Integrity of Social Life","author":"Nissenbaum Helen","key":"e_1_2_1_56_1","unstructured":"Helen Nissenbaum. 2010. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press."},{"key":"e_1_2_1_57_1","volume-title":"Rethinking individualism and collectivism: evaluation of theoretical assumptions and meta-analyses. Psychological bulletin","author":"Oyserman Daphna","year":"2002","unstructured":"Daphna Oyserman, Heather M. Coon, and Markus Kemmelmeier. 2002. Rethinking individualism and collectivism: evaluation of theoretical assumptions and meta-analyses. Psychological bulletin, Vol. 128, 1 (2002), 3. http:\/\/psycnet.apa.org\/journals\/bul\/128\/1\/3\/ Number: 1."},{"key":"e_1_2_1_58_1","volume-title":"Proceedings of the International AAAI Conference on Web and Social Media","volume":"6","author":"Page Xinru","year":"2012","unstructured":"Xinru Page, Alfred Kobsa, and Bart Knijnenburg. 2012. Don't Disturb My Circles! Boundary Preservation Is at the Center of Location-Sharing Concerns. Proceedings of the International AAAI Conference on Web and Social Media, Vol. 6, 1 (August 2012), 266--273."},{"key":"e_1_2_1_59_1","article-title":"Mediatized Populisms| Innuendo as Outreach: @narendramodi and the Use of Political Irony on Twitter","volume":"11","author":"Pal Joyojeet","year":"2017","unstructured":"Joyojeet Pal, Priyank Chandra, Padma Chirumamilla, Vaishnav Kameswaran, Andre Gonawela, Udit Thawani, and Pritika Dasgupta. 2017. Mediatized Populisms| Innuendo as Outreach: @narendramodi and the Use of Political Irony on Twitter. International Journal of Communication, Vol. 11, 0 (2017).","journal-title":"International Journal of Communication"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cobeha.2017.09.009"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.02.065"},{"volume-title":"Boundaries of Privacy: Dialectics of Disclosure","author":"Petronio Sandra","key":"e_1_2_1_62_1","unstructured":"Sandra Petronio. 2002. Boundaries of Privacy: Dialectics of Disclosure. State University of New York Press, Albany, NY."},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v16i1.19334"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2010.15"},{"key":"e_1_2_1_65_1","unstructured":"Yu Pu and Jens Grossklags. 2017. Valuating Friends' Privacy: Does Anonymity of Sharing Personal Data Matter? 339--355. https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/pu"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intman.2006.11.002"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1006\/jrpe.1997.2170"},{"key":"e_1_2_1_68_1","unstructured":"\u00a0Petr Rehurek \u00a0Radim\u00a0and\u00a0Sojka. 20011. Gensim--python\u00a0framework\u00a0for\u00a0vector\u00a0space\u00a0modeling. NLP\u00a0Centre \u00a0Faculty\u00a0of\u00a0Informatics \u00a0Masaryk\u00a0University \u00a0Brno \u00a0Czech\u00a0Republic Vol. 3 2 (20011). https:\/\/radimrehurek.com\/gensim\/models\/ldamodel.html"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.07.022"},{"key":"e_1_2_1_70_1","volume-title":"Jain","author":"Samovar Larry A.","year":"1981","unstructured":"Larry A. Samovar, Richard E. Porter, and Nemi C. Jain. 1981. Understanding Intercultural Communication. Wadsworth Publishing Company."},{"key":"e_1_2_1_71_1","unstructured":"Sam Schechner and Mark Secada. 2019. You Give Apps Sensitive Personal Information. Then They Tell Facebook. https:\/\/www.wsj.com\/articles\/you-give-apps-sensitive-personal-information-then-they-tell-facebook-11550851636."},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1177\/0956797610382786"},{"key":"e_1_2_1_73_1","unstructured":"Shalom H Schwartz. 1994. Beyond individualism\/collectivism: New cultural dimensions of values. (1994)."},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1080\/00224545.1995.9713979"},{"key":"e_1_2_1_75_1","unstructured":"Daniel J. Solove. 2008. Understanding Privacy. Harvard University Press."},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781412958479.n80"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3208039"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025668"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1080\/01650250143000418"},{"volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '06)","author":"Tang Karen P.","key":"e_1_2_1_80_1","unstructured":"Karen P. Tang, Pedram Keyani, James Fogarty, and Jason I. Hong. 2006. Putting People in Their Place: An Anonymous and Privacy-Sensitive Approach to Collecting Sensed Data in Location-Based Applications. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '06). 93--102."},{"key":"e_1_2_1_81_1","volume-title":"TWINT - Twitter Intelligence Tool. https:\/\/github.com\/twintproject\/twint. (Accessed on","author":"OSINT","year":"2021","unstructured":"OSINT team. [n.d.]. TWINT - Twitter Intelligence Tool. https:\/\/github.com\/twintproject\/twint. (Accessed on July 2021)."},{"key":"e_1_2_1_82_1","first-page":"383","article-title":"The analysis of subjective culture. Wiley-Interscience, Oxford","author":"Triandis Harry C.","year":"1972","unstructured":"Harry C. Triandis. 1972. The analysis of subjective culture. Wiley-Interscience, Oxford, England. Pages: xii, 383.","journal-title":"England. Pages"},{"key":"e_1_2_1_83_1","unstructured":"Harry Charalambos Triandis. 1995. Individualism & collectivism. New directions in social psychology. Vol. xv. Westview Press Boulder CO US."},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.54.2.323"},{"key":"e_1_2_1_85_1","first-page":"119","article-title":"Location-sharing technologies: Privacy risks and controls","volume":"6","author":"Tsai Janice Y","year":"2010","unstructured":"Janice Y Tsai, Patrick Gage Kelley, Lorrie Faith Cranor, and Norman Sadeh. 2010. Location-sharing technologies: Privacy risks and controls. ISJLP, Vol. 6 (2010), 119--317.","journal-title":"ISJLP"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/PASSAT\/SocialCom.2011.71"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3406865.3418567"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1002\/job.1984"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1177\/009365092019001003"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083--6101.2006.tb00307.x"},{"key":"e_1_2_1_91_1","volume-title":"Junbo Jake Zhao, and Yann LeCun","author":"Zhang Xiang","year":"2015","unstructured":"Xiang Zhang, Junbo Jake Zhao, and Yann LeCun. 2015. Character-level Convolutional Networks for Text Classification. In NIPS."}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3610045","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3610045","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T04:21:28Z","timestamp":1755750088000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3610045"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,28]]},"references-count":91,"journal-issue":{"issue":"CSCW2","published-print":{"date-parts":[[2023,9,28]]}},"alternative-id":["10.1145\/3610045"],"URL":"https:\/\/doi.org\/10.1145\/3610045","relation":{},"ISSN":["2573-0142"],"issn-type":[{"type":"electronic","value":"2573-0142"}],"subject":[],"published":{"date-parts":[[2023,9,28]]},"assertion":[{"value":"2023-10-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}