{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T14:33:57Z","timestamp":1761921237418,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":112,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T00:00:00Z","timestamp":1699833600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,13]]},"DOI":"10.1145\/3629606.3629644","type":"proceedings-article","created":{"date-parts":[[2024,2,27]],"date-time":"2024-02-27T13:14:26Z","timestamp":1709039666000},"page":"386-403","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["The Veil of Virtuality: Anonymity, Identity curation, and Trust in the Metaverse's New Frontier"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2484-6751","authenticated-orcid":false,"given":"Cheng","family":"Xu","sequence":"first","affiliation":[{"name":"Xi'an Jiaotong Liverpool University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4660-6780","authenticated-orcid":false,"given":"Yanqi","family":"Sun","sequence":"additional","affiliation":[{"name":"Beijing Institute of Petrochemical Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2046-6410","authenticated-orcid":false,"given":"Rui","family":"Zhong","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong Liverpool University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,2,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2012.39"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2012.39"},{"key":"e_1_3_2_1_3_1","unstructured":"Antecedents of trust in global virtual teams.\u00a0Journal of management information systems \u00a014(4) 29-64."},{"key":"e_1_3_2_1_4_1","volume-title":"Protecting nonverbal data tracked in virtual reality.\u00a0JAMA pediatrics,\u00a0172(10), 905-906","author":"Bailenson J.","year":"2018","unstructured":"Bailenson, J. (2018). Protecting nonverbal data tracked in virtual reality.\u00a0JAMA pediatrics,\u00a0172(10), 905-906."},{"key":"e_1_3_2_1_5_1","volume-title":"Nonverbal overload: A theoretical argument for the causes of Zoom fatigue","author":"Bailenson J. N.","year":"2021","unstructured":"Bailenson, J. N. (2021). Nonverbal overload: A theoretical argument for the causes of Zoom fatigue."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1111\/1540-4560.00247"},{"key":"e_1_3_2_1_7_1","volume-title":"Avatar-mediated networking: Increasing social presence and interpersonal trust in net-based collaborations.\u00a0Human communication research,\u00a034(2), 287-318","author":"Bente G.","year":"2008","unstructured":"Bente, G., R\u00fcggenberg, S., Kr\u00e4mer, N. C., & Eschenburg, F. (2008). Avatar-mediated networking: Increasing social presence and interpersonal trust in net-based collaborations.\u00a0Human communication research,\u00a034(2), 287-318."},{"key":"e_1_3_2_1_8_1","volume-title":"Trust, reciprocity, and social history.\u00a0Games and economic behavior,\u00a010(1), 122-142","author":"Berg J.","year":"1995","unstructured":"Berg, J., Dickhaut, J., & McCabe, K. (1995). Trust, reciprocity, and social history.\u00a0Games and economic behavior,\u00a010(1), 122-142."},{"issue":"4","key":"e_1_3_2_1_9_1","first-page":"455","article-title":"An introduction to the design of randomized experiments","volume":"12","author":"Berk R. A.","year":"2016","unstructured":"Berk, R. A. (2016). An introduction to the design of randomized experiments. Journal of Experimental Criminology, 12(4), 455-480.","journal-title":"Journal of Experimental Criminology"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1111\/J.1540-5885.2009.00680.X"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/13527260701535236"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2001.927042"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2001.927042"},{"key":"e_1_3_2_1_14_1","unstructured":"Chen P. K. & Huang X. Enhancing supply chain resilience and realizing green sustainable development through the virtual environment of the metaverse.\u00a0Sustainable Development."},{"key":"e_1_3_2_1_15_1","volume-title":"Self-disclosure at social networking sites: An exploration through relational capitals.\u00a0Information systems frontiers,\u00a015, 269-278","author":"Chen R.","year":"2013","unstructured":"Chen, R., & Sharma, S. K. (2013). Self-disclosure at social networking sites: An exploration through relational capitals.\u00a0Information systems frontiers,\u00a015, 269-278."},{"key":"e_1_3_2_1_16_1","volume-title":"Towards Zero-trust Security for the Metaverse","author":"Cheng R.","year":"2023","unstructured":"Cheng, R., Chen, S., & Han, B. (2023). Towards Zero-trust Security for the Metaverse. IEEE Communications Magazine."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Cheng X. U. ZHONG R. Chenxi L. \u0130. & Xuyou Y. A. N. From Fiction to Reality: Harnessing the Power of Imaginative Narratives to Shape the Future of the Metaverse. Journal of Metaverse 3(2) 108-120.","DOI":"10.57019\/jmv.1277525"},{"key":"e_1_3_2_1_18_1","volume-title":"A qualitative analysis of cross-cultural new media research: SNS use in Asia and the West.\u00a0Quality & Quantity,\u00a047, 2319-2330","author":"Cho S. E.","year":"2013","unstructured":"Cho, S. E., & Park, H. W. (2013). A qualitative analysis of cross-cultural new media research: SNS use in Asia and the West.\u00a0Quality & Quantity,\u00a047, 2319-2330."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2006.09.001"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2006.09.001"},{"key":"e_1_3_2_1_21_1","volume-title":"\u00a0Foundations of social theory","author":"Coleman J. S.","year":"1990","unstructured":"Coleman, J. S. (1990).\u00a0Foundations of social theory. Harvard university press."},{"key":"e_1_3_2_1_22_1","volume-title":"How to identify trust and reciprocity.\u00a0Games and economic behavior,\u00a046(2), 260-281","author":"Cox J. C.","year":"2004","unstructured":"Cox, J. C. (2004). How to identify trust and reciprocity.\u00a0Games and economic behavior,\u00a046(2), 260-281."},{"key":"e_1_3_2_1_23_1","volume-title":"There is a blind spot in AI research.\u00a0Nature,\u00a0538(7625), 311-313","author":"Crawford K.","year":"2016","unstructured":"Crawford, K., & Calo, R. (2016). There is a blind spot in AI research.\u00a0Nature,\u00a0538(7625), 311-313."},{"key":"e_1_3_2_1_24_1","volume-title":"Facebook and online privacy: Attitudes, behaviors, and unintended consequences.\u00a0Journal of computer-mediated communication,\u00a015(1), 83-108","author":"Debatin B.","year":"2009","unstructured":"Debatin, B., Lovejoy, J. P., Horn, A. K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences.\u00a0Journal of computer-mediated communication,\u00a015(1), 83-108."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/S11205-012-0103-Z"},{"key":"e_1_3_2_1_26_1","volume-title":"The cognitive apprenticeship model in educational practice. In\u00a0Handbook of research on educational communications and technology\u00a0(pp. 425-439)","author":"Dennen V. P.","year":"2008","unstructured":"Dennen, V. P., & Burner, K. J. (2008). The cognitive apprenticeship model in educational practice. In\u00a0Handbook of research on educational communications and technology\u00a0(pp. 425-439). Routledge."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1287\/ISRE.1110.0364"},{"key":"e_1_3_2_1_28_1","volume-title":"Digital inequality: From unequal access to differentiated use.\u00a0Social inequality, 355-400","author":"DiMaggio P.","year":"2004","unstructured":"DiMaggio, P., Hargittai, E., Celeste, C., & Shafer, S. (2004). Digital inequality: From unequal access to differentiated use.\u00a0Social inequality, 355-400."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1177\/0018726714548080"},{"key":"e_1_3_2_1_30_1","volume-title":"JCMC611.","author":"Eastin M. S.","year":"2000","unstructured":"Eastin, M. S., & LaRose, R. (2000). Internet self-efficacy and the psychology of the digital divide.\u00a0Journal of computer-mediated communication,\u00a06(1), JCMC611."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11412-013-9187-y"},{"key":"e_1_3_2_1_32_1","volume-title":"Distinguishing technologies for social interaction: The perceived social affordances of communication channels scale.\u00a0Communication Monographs,\u00a084(3), 298-318","author":"Fox J.","year":"2017","unstructured":"Fox, J., & McEwan, B. (2017). Distinguishing technologies for social interaction: The perceived social affordances of communication channels scale.\u00a0Communication Monographs,\u00a084(3), 298-318."},{"key":"e_1_3_2_1_33_1","volume-title":"Quantifying the power and consequences of social media protest.\u00a0new media & society,\u00a020(3), 990-1011","author":"Freelon D.","year":"2018","unstructured":"Freelon, D., McIlwain, C., & Clark, M. (2018). Quantifying the power and consequences of social media protest.\u00a0new media & society,\u00a020(3), 990-1011."},{"key":"e_1_3_2_1_34_1","volume-title":"\u00a0Trust: The social virtues and the creation of prosperity","author":"Fukuyama F.","year":"1996","unstructured":"Fukuyama, F. (1996).\u00a0Trust: The social virtues and the creation of prosperity. Simon and Schuster."},{"key":"e_1_3_2_1_35_1","volume-title":"Trust: Making and breaking cooperative relations","author":"Gambetta D.","year":"1988","unstructured":"Gambetta, D. (1988). Trust: Making and breaking cooperative relations."},{"key":"e_1_3_2_1_36_1","volume-title":"Field experiments: Design, analysis, and interpretation","author":"Gerber A. S.","year":"2012","unstructured":"Gerber, A. S., & Green, D. P. (2012). Field experiments: Design, analysis, and interpretation. W.W. Norton & Company"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Ghirmai S. Mebrahtom D. Aloqaily M. Guizani M. & Debbah M. (2022 December). Self-sovereign identity for trust and interoperability in the metaverse. In 2022 IEEE Smartworld Ubiquitous Intelligence & Computing Scalable Computing & Communications Digital Twin Privacy Computing Metaverse Autonomous & Trusted Vehicles (SmartWorld\/UIC\/ScalCom\/DigitalTwin\/PriComp\/Meta) (pp. 2468-2475). IEEE.","DOI":"10.1109\/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00345"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/VR46266.2020.1581313729558"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.JBUSRES.2016.10.004"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1108\/14601061311292832"},{"key":"e_1_3_2_1_41_1","volume-title":"Bullying, cyberbullying, and suicide.\u00a0Archives of suicide research,\u00a014(3), 206-221","author":"Hinduja S.","year":"2010","unstructured":"Hinduja, S., & Patchin, J. W. (2010). Bullying, cyberbullying, and suicide.\u00a0Archives of suicide research,\u00a014(3), 206-221."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781315658308"},{"key":"e_1_3_2_1_43_1","volume-title":"Strategic aspect of the use of virtual brands in the conditions of the experience economy","author":"Iastremska O.","year":"2023","unstructured":"Iastremska, O. (2023). Strategic aspect of the use of virtual brands in the conditions of the experience economy."},{"key":"e_1_3_2_1_44_1","volume-title":"Is anybody out there?","author":"Jarvenpaa S. L.","year":"1998","unstructured":"Jarvenpaa, S. L., Knoll, K., & Leidner, D. E. (1998). Is anybody out there?"},{"key":"e_1_3_2_1_45_1","volume-title":"In\u00a0Proceedings of the 50th Hawaii International Conference on System Sciences\u00a0(pp. 5812-5816)","author":"Jarvenpaa S.","year":"2017","unstructured":"Jarvenpaa, S., & Teigland, R. (2017, January). Trust in digital environments: From the sharing economy to decentralized autonomous organizations. In\u00a0Proceedings of the 50th Hawaii International Conference on System Sciences\u00a0(pp. 5812-5816)."},{"key":"e_1_3_2_1_46_1","volume-title":"Blockchain and AI Meet in the Metaverse. Advances in the Convergence of Blockchain and Artificial Intelligence, 73(10","author":"Jeon H. J.","year":"2022","unstructured":"Jeon, H. J., Youn, H. C., Ko, S. M., & Kim, T. H. (2022). Blockchain and AI Meet in the Metaverse. Advances in the Convergence of Blockchain and Artificial Intelligence, 73(10.5772)."},{"key":"e_1_3_2_1_47_1","volume-title":"Self\u2010disclosure in computer\u2010mediated communication: The role of self\u2010awareness and visual anonymity.\u00a0European journal of social psychology,\u00a031(2), 177-192","author":"Joinson A. N.","year":"2001","unstructured":"Joinson, A. N. (2001). Self\u2010disclosure in computer\u2010mediated communication: The role of self\u2010awareness and visual anonymity.\u00a0European journal of social psychology,\u00a031(2), 177-192."},{"key":"e_1_3_2_1_48_1","volume-title":"Explanations for the perpetration of and reactions to deception in a virtual community.\u00a0Social Science Computer Review,\u00a020(3), 275-289","author":"Joinson A. N.","year":"2002","unstructured":"Joinson, A. N., & Dietz-Uhler, B. (2002). Explanations for the perpetration of and reactions to deception in a virtual community.\u00a0Social Science Computer Review,\u00a020(3), 275-289."},{"key":"e_1_3_2_1_49_1","first-page":"37","volume-title":"Public. In\u00a010th Symposium On Usable Privacy and Security (SOUPS 2014)","author":"Kang R.","year":"2014","unstructured":"Kang, R., Brown, S., Dabbish, L., & Kiesler, S. (2014). Privacy Attitudes of Mechanical Turk Workers and the {US}. Public. In\u00a010th Symposium On Usable Privacy and Security (SOUPS 2014)\u00a0(pp. 37-49)"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2017.08.003"},{"key":"e_1_3_2_1_51_1","volume-title":"Digital object attachment.\u00a0Current Opinion in Psychology,\u00a039, 60-65","author":"Koles B.","year":"2021","unstructured":"Koles, B., & Nagy, P. (2021). Digital object attachment.\u00a0Current Opinion in Psychology,\u00a039, 60-65."},{"key":"e_1_3_2_1_52_1","volume-title":"Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition.\u00a0Computers in human behavior,\u00a028(2), 434-443","author":"Lapidot-Lefler N.","year":"2012","unstructured":"Lapidot-Lefler, N., & Barak, A. (2012). Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition.\u00a0Computers in human behavior,\u00a028(2), 434-443."},{"key":"e_1_3_2_1_53_1","volume-title":"Models of interpersonal trust development: Theoretical approaches, empirical evidence, and future directions.\u00a0Journal of management,\u00a032(6), 991-1022","author":"Lewicki R. J.","year":"2006","unstructured":"Lewicki, R. J., Tomlinson, E. C., & Gillespie, N. (2006). Models of interpersonal trust development: Theoretical approaches, empirical evidence, and future directions.\u00a0Journal of management,\u00a032(6), 991-1022."},{"key":"e_1_3_2_1_54_1","volume-title":"The taste for privacy: An analysis of college student privacy settings in an online social network.\u00a0Journal of computer-mediated communication,\u00a014(1), 79-100","author":"Lewis K.","year":"2008","unstructured":"Lewis, K., Kaufman, J., & Christakis, N. (2008). The taste for privacy: An analysis of college student privacy settings in an online social network.\u00a0Journal of computer-mediated communication,\u00a014(1), 79-100."},{"key":"e_1_3_2_1_55_1","volume-title":"Open source and journalism: Toward new frameworks for imagining news innovation.\u00a0Media, culture & society,\u00a035(5), 602-619","author":"Lewis S. C.","year":"2013","unstructured":"Lewis, S. C., & Usher, N. (2013). Open source and journalism: Toward new frameworks for imagining news innovation.\u00a0Media, culture & society,\u00a035(5), 602-619."},{"key":"e_1_3_2_1_56_1","volume-title":"Virtual worlds\u2014past, present, and future: New directions in social computing.\u00a0Decision support systems,\u00a047(3), 204-228","author":"Messinger P. R.","year":"2009","unstructured":"Messinger, P. R., Stroulia, E., Lyons, K., Bone, M., Niu, R. H., Smirnov, K., & Perelgut, S. (2009). Virtual worlds\u2014past, present, and future: New directions in social computing.\u00a0Decision support systems,\u00a047(3), 204-228."},{"key":"e_1_3_2_1_57_1","volume-title":"Adolescent peer relationships and behavior problems predict young adults","author":"Mikami A. Y.","year":"2010","unstructured":"Mikami, A. Y., Szwedo, D. E., Allen, J. P., Evans, M. A., & Hare, A. L. (2010). Adolescent peer relationships and behavior problems predict young adults\u2019 communication on social networking websites.\u00a0Developmental psychology,\u00a046(1), 46."},{"key":"e_1_3_2_1_58_1","volume-title":"The ethics of algorithms: Mapping the debate.\u00a0Big Data & Society,\u00a03(2)","author":"Mittelstadt B. D.","year":"2016","unstructured":"Mittelstadt, B. D., Allo, P., Taddeo, M., Wachter, S., & Floridi, L. (2016). The ethics of algorithms: Mapping the debate.\u00a0Big Data & Society,\u00a03(2), 2053951716679679."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1080\/00140139.2012.663002"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107587991"},{"key":"e_1_3_2_1_61_1","first-page":"686","volume-title":"In\u00a0presence 2001 conference","author":"Nowak K.","year":"2001","unstructured":"Nowak, K. (2001, May). Defining and differentiating copresence, social presence and presence as transportation. In\u00a0presence 2001 conference, Philadelphia, PA\u00a0(Vol. 2, pp. 686-710)."},{"key":"e_1_3_2_1_62_1","volume-title":"Avatars and computer-mediated communication: a review of the definitions, uses, and effects of digital representations.\u00a0Review of Communication Research,\u00a06, 30-53","author":"Nowak K. L.","year":"2018","unstructured":"Nowak, K. L., & Fox, J. (2018). Avatars and computer-mediated communication: a review of the definitions, uses, and effects of digital representations.\u00a0Review of Communication Research,\u00a06, 30-53."},{"key":"e_1_3_2_1_63_1","volume-title":"Opening Universities in a Digital Era.\u00a0New England Journal of Higher Education,\u00a023(1), 22-24","author":"Palfrey J.","year":"2008","unstructured":"Palfrey, J., & Gasser, U. (2008). Opening Universities in a Digital Era.\u00a0New England Journal of Higher Education,\u00a023(1), 22-24."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0189078"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0189078"},{"key":"e_1_3_2_1_66_1","volume-title":"Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model.\u00a0International journal of electronic commerce,\u00a07(3), 101-134","author":"Pavlou P. A.","year":"2003","unstructured":"Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model.\u00a0International journal of electronic commerce,\u00a07(3), 101-134."},{"key":"e_1_3_2_1_67_1","volume-title":"A single\u2010item measure of social identification: Reliability, validity, and utility.\u00a0British journal of social psychology,\u00a052(4), 597-617","author":"Postmes T.","year":"2013","unstructured":"Postmes, T., Haslam, S. A., & Jans, L. (2013). A single\u2010item measure of social identification: Reliability, validity, and utility.\u00a0British journal of social psychology,\u00a052(4), 597-617."},{"key":"e_1_3_2_1_68_1","volume-title":"\u00a0Bowling alone: The collapse and revival of American community. Simon and schuster","author":"Putnam R. D.","year":"2000","unstructured":"Putnam, R. D. (2000).\u00a0Bowling alone: The collapse and revival of American community. Simon and schuster."},{"key":"e_1_3_2_1_69_1","volume-title":"Trust among strangers in Internet transactions: Empirical analysis of eBay's reputation system. In\u00a0The Economics of the Internet and E-commerce\u00a0(pp. 127-157)","author":"Resnick P.","year":"2002","unstructured":"Resnick, P., & Zeckhauser, R. (2002). Trust among strangers in Internet transactions: Empirical analysis of eBay's reputation system. In\u00a0The Economics of the Internet and E-commerce\u00a0(pp. 127-157). Emerald Group Publishing Limited."},{"key":"e_1_3_2_1_70_1","volume-title":"Transforming experience: the potential of augmented reality and virtual reality for enhancing personal and clinical change.\u00a0Frontiers in psychiatry,\u00a07, 164","author":"Riva G.","year":"2016","unstructured":"Riva, G., Ba\u00f1os, R. M., Botella, C., Mantovani, F., & Gaggioli, A. (2016). Transforming experience: the potential of augmented reality and virtual reality for enhancing personal and clinical change.\u00a0Frontiers in psychiatry,\u00a07, 164."},{"key":"e_1_3_2_1_71_1","volume-title":"The Effects of Leader Self-Sacrifice in Virtual Teams on Prosocial Behavior: The Mediational Role of Team Identification and Self-Efficacy.\u00a0Sustainability,\u00a015(7), 6098","author":"Ruggieri S.","year":"2023","unstructured":"Ruggieri, S., Gagliano, M., Servidio, R., Pace, U., & Passanisi, A. (2023). The Effects of Leader Self-Sacrifice in Virtual Teams on Prosocial Behavior: The Mediational Role of Team Identification and Self-Efficacy.\u00a0Sustainability,\u00a015(7), 6098."},{"key":"e_1_3_2_1_72_1","volume-title":"Negligent entrustment liability for outsourced data.\u00a0Journal of Internet Law,\u00a010(10), 3","author":"Rustad M. L.","year":"2007","unstructured":"Rustad, M. L., & Koenig, T. H. (2007). Negligent entrustment liability for outsourced data.\u00a0Journal of Internet Law,\u00a010(10), 3."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970930.2970947"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogsys.2020.08.005"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.02.051"},{"key":"e_1_3_2_1_76_1","volume-title":"Men are from Mars and women are from Venus: dyadic collaboration in the metaverse. Internet Research","author":"Schiller S.","year":"2023","unstructured":"Schiller, S., Nah, F. F. H., Luse, A., & Siau, K. (2023). Men are from Mars and women are from Venus: dyadic collaboration in the metaverse. Internet Research."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1080\/23808985.2011.11679120"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1080\/23808985.2011.11679120"},{"key":"e_1_3_2_1_79_1","volume-title":"Experimental and quasi-experimental designs for generalized causal inference. Wadsworth Cengage Learning","author":"Shadish W. R.","year":"2002","unstructured":"Shadish, W. R., Cook, T. D., & Campbell, D. T. (2002). Experimental and quasi-experimental designs for generalized causal inference. Wadsworth Cengage Learning."},{"volume-title":"D. SecSoft Workshop.","author":"Siracusa","key":"e_1_3_2_1_80_1","unstructured":"Siracusa, D. SecSoft Workshop."},{"key":"e_1_3_2_1_81_1","volume-title":"Review of virtual environment studies on social and group phenomena.\u00a0Small Group Research,\u00a042(4), 405-457","author":"Sivunen A.","year":"2011","unstructured":"Sivunen, A., & Hakonen, M. (2011). Review of virtual environment studies on social and group phenomena.\u00a0Small Group Research,\u00a042(4), 405-457."},{"key":"e_1_3_2_1_82_1","volume-title":"The online disinhibition effect.\u00a0Cyberpsychology & behavior,\u00a07(3), 321-326","author":"Smahel D.","year":"2004","unstructured":"Smahel, D., Machackova, H., Mascheroni, G., Dedkova, L., Staksrud, E., \u00d3lafsson, K., ... & Suler, J. (2004). The online disinhibition effect.\u00a0Cyberpsychology & behavior,\u00a07(3), 321-326."},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2019.1623702"},{"key":"e_1_3_2_1_84_1","volume-title":"W. G.","author":"Tajfel H.","year":"1979","unstructured":"Tajfel, H., Turner, J. C., Austin, W. G., & Worchel, S. (1979). An integrative theory of intergroup conflict.\u00a0Organizational identity: A reader,\u00a056(65), 9780203505984-16."},{"key":"e_1_3_2_1_85_1","volume-title":"Effects of Self-avatar Similarity on User Trusting Behavior in Virtual Reality Environment. In\u00a0International Conference on Human-Computer Interaction\u00a0(pp. 313-316)","author":"Tang L.","year":"2023","unstructured":"Tang, L., & Bashir, M. (2023, July). Effects of Self-avatar Similarity on User Trusting Behavior in Virtual Reality Environment. In\u00a0International Conference on Human-Computer Interaction\u00a0(pp. 313-316). Cham: Springer Nature Switzerland."},{"key":"e_1_3_2_1_86_1","volume-title":"The acceptance and use of computer based assessment.\u00a0Computers & Education,\u00a056(4), 1032-1044","author":"Terzis V.","year":"2011","unstructured":"Terzis, V., & Economides, A. A. (2011). The acceptance and use of computer based assessment.\u00a0Computers & Education,\u00a056(4), 1032-1044."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1017\/s1930297500004605"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1017\/s1930297500004605"},{"key":"e_1_3_2_1_89_1","volume-title":"Computer\u2010mediated communication effects on disclosure, impressions, and interpersonal evaluations: Getting to know one another a bit at a time.\u00a0Human communication research,\u00a028(3), 317-348","author":"Tidwell L. C.","year":"2002","unstructured":"Tidwell, L. C., & Walther, J. B. (2002). Computer\u2010mediated communication effects on disclosure, impressions, and interpersonal evaluations: Getting to know one another a bit at a time.\u00a0Human communication research,\u00a028(3), 317-348."},{"key":"e_1_3_2_1_90_1","volume-title":"Ghosts in the machine.\u00a0The sciences,\u00a035(6), 36-39","author":"Turkle S.","year":"1995","unstructured":"Turkle, S. (1995). Ghosts in the machine.\u00a0The sciences,\u00a035(6), 36-39."},{"key":"e_1_3_2_1_91_1","volume-title":"Social comparison and group interest in ingroup favouritism.\u00a0European journal of social psychology,\u00a09(2), 187-204","author":"Turner J. C.","year":"1979","unstructured":"Turner, J. C., Brown, R. J., & Tajfel, H. (1979). Social comparison and group interest in ingroup favouritism.\u00a0European journal of social psychology,\u00a09(2), 187-204."},{"key":"e_1_3_2_1_92_1","volume-title":"The relationship between use of social network sites, online social support, and well-being.\u00a0Journal of media psychology","author":"Utz S.","year":"2017","unstructured":"Utz, S., & Breuer, J. (2017). The relationship between use of social network sites, online social support, and well-being.\u00a0Journal of media psychology."},{"key":"e_1_3_2_1_93_1","volume-title":"Preadolescents' and adolescents' online communication and their closeness to friends.\u00a0Developmental psychology,\u00a043(2), 267","author":"Valkenburg P. M.","year":"2007","unstructured":"Valkenburg, P. M., & Peter, J. (2007). Preadolescents' and adolescents' online communication and their closeness to friends.\u00a0Developmental psychology,\u00a043(2), 267."},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1057\/sj.2015.22"},{"key":"e_1_3_2_1_95_1","first-page":"719","volume-title":"Facebook.\u00a0International journal of human-computer studies,\u00a068(10)","author":"Vasalou A.","year":"2010","unstructured":"Vasalou, A., Joinson, A. N., & Courvoisier, D. (2010). Cultural differences, experience with social networks and the nature of \u201ctrue commitment\u201d in Facebook.\u00a0International journal of human-computer studies,\u00a068(10), 719-728."},{"key":"e_1_3_2_1_96_1","volume-title":"Avatars in social media: Balancing accuracy, playfulness and embodied messages.\u00a0International Journal of Human-Computer Studies,\u00a066(11), 801-811","author":"Vasalou A.","year":"2008","unstructured":"Vasalou, A., Joinson, A., B\u00e4nziger, T., Goldie, P., & Pitt, J. (2008). Avatars in social media: Balancing accuracy, playfulness and embodied messages.\u00a0International Journal of Human-Computer Studies,\u00a066(11), 801-811."},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.JBUSRES.2009.03.022"},{"key":"e_1_3_2_1_98_1","volume-title":"Computer-mediated communication: Impersonal, interpersonal, and hyperpersonal interaction.\u00a0Communication research,\u00a023(1), 3-43","author":"Walther J. B.","year":"1996","unstructured":"Walther, J. B. (1996). Computer-mediated communication: Impersonal, interpersonal, and hyperpersonal interaction.\u00a0Communication research,\u00a023(1), 3-43."},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2013.824407"},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1007\/S10551-018-3779-4"},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1007\/S10551-018-3779-4"},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1007\/S10551-018-3779-4"},{"key":"e_1_3_2_1_103_1","volume-title":"Managers as initiators of trust: An exchange relationship framework for understanding managerial trustworthy behavior.\u00a0Academy of management review,\u00a023(3), 513-530","author":"Whitener E. M.","year":"1998","unstructured":"Whitener, E. M., Brodt, S. E., Korsgaard, M. A., & Werner, J. M. (1998). Managers as initiators of trust: An exchange relationship framework for understanding managerial trustworthy behavior.\u00a0Academy of management review,\u00a023(3), 513-530."},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1007\/S10660-018-9305-Z"},{"key":"e_1_3_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.JBUSRES.2016.04.061"},{"key":"e_1_3_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.JBUSRES.2009.03.022"},{"key":"e_1_3_2_1_107_1","volume-title":"Effects of urbanization on trust: Evidence from an experiment in the field.\u00a0Journal of Economic Psychology,\u00a087, 102450","author":"Xu C.","year":"2021","unstructured":"Xu, C. (2021). Effects of urbanization on trust: Evidence from an experiment in the field.\u00a0Journal of Economic Psychology,\u00a087, 102450."},{"key":"e_1_3_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2023.2238367"},{"key":"e_1_3_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3009876"},{"key":"e_1_3_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240626"},{"key":"e_1_3_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2023.2184594"},{"key":"e_1_3_2_1_112_1","volume-title":"Identity construction on Facebook: Digital empowerment in anchored relationships.\u00a0Computers in human behavior,\u00a024(5)","author":"Zhao S.","year":"2008","unstructured":"Zhao, S., Grasmuck, S., & Martin, J. (2008). Identity construction on Facebook: Digital empowerment in anchored relationships.\u00a0Computers in human behavior,\u00a024(5), 1816-1836."}],"event":{"name":"CHCHI 2023: Chinese CHI 2023","acronym":"CHCHI 2023","location":"Denpasar, Bali Indonesia"},"container-title":["Proceedings of the Eleventh International Symposium of Chinese CHI"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3629606.3629644","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3629606.3629644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T14:55:58Z","timestamp":1755874558000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3629606.3629644"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,13]]},"references-count":112,"alternative-id":["10.1145\/3629606.3629644","10.1145\/3629606"],"URL":"https:\/\/doi.org\/10.1145\/3629606.3629644","relation":{},"subject":[],"published":{"date-parts":[[2023,11,13]]},"assertion":[{"value":"2024-02-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}