{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:14:54Z","timestamp":1776122094029,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T00:00:00Z","timestamp":1742774400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EPSRC","award":["EP\/R033889\/1, EP\/R033889\/2, EP\/R033897\/1, EP\/R033854\/1 and EP\/R033870\/1"],"award-info":[{"award-number":["EP\/R033889\/1, EP\/R033889\/2, EP\/R033897\/1, EP\/R033854\/1 and EP\/R033870\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,24]]},"DOI":"10.1145\/3698204.3716447","type":"proceedings-article","created":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T06:41:20Z","timestamp":1745995280000},"page":"71-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Assessing Risks in Online Information Sharing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6900-0557","authenticated-orcid":false,"given":"Leif","family":"Azzopardi","sequence":"first","affiliation":[{"name":"University of Strathclyde, Glasgow, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1729-1345","authenticated-orcid":false,"given":"Emma","family":"Nicol","sequence":"additional","affiliation":[{"name":"University of Strathclyde, Glasgow, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4041-1918","authenticated-orcid":false,"given":"Jo","family":"Briggs","sequence":"additional","affiliation":[{"name":"Manchester Metropolitan University, Manchester, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1485-4723","authenticated-orcid":false,"given":"Wendy","family":"Moncur","sequence":"additional","affiliation":[{"name":"University of Strathclyde, Glasgow, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6025-4593","authenticated-orcid":false,"given":"Burkhard","family":"Schafer","sequence":"additional","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8778-8472","authenticated-orcid":false,"given":"Callum","family":"Nash","sequence":"additional","affiliation":[{"name":"Manchester Metropolitan University, Manchester, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2603-0396","authenticated-orcid":false,"given":"Melissa","family":"Duheric","sequence":"additional","affiliation":[{"name":"Northumbria University, Northumbria, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2025,4,29]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"crossref","unstructured":"2023. What the Dickens: Post-mortem privacy and intergenerational trust. Computer Law & Security Review 49 (2023) 105800.","DOI":"10.1016\/j.clsr.2023.105800"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"crossref","unstructured":"Alessandro Acquisti and Ralph Gross. 2009. Predicting social security numbers from public data. Proceedings of the National academy of sciences 106 27 (2009) 10975\u201310980.","DOI":"10.1073\/pnas.0904891106"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"crossref","unstructured":"Alessandro Acquisti and Jens Grossklags. 2005. Privacy and rationality in individual decision making. IEEE security & privacy 3 1 (2005) 26\u201333.","DOI":"10.1109\/MSP.2005.22"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3137616.3137617"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","unstructured":"Andrea Armstrong Jo Briggs Wendy Moncur Daniel\u00a0Paul Carey Emma Nicol and Burkhard Schafer. 2023. Everyday digital traces. Big Data & Society 10 2 (2023). 10.1177\/20539517231213827","DOI":"10.1177\/20539517231213827"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","unstructured":"Leif Azzopardi Jo Briggs Melissa Duheric Callum Nash Emma Nicol Moncur Wendy and Burkhard Schafer. 2022. Are Taylor\u2019s Posts Risky? Evaluating Cumulative Revelations in Online Personal Data A persona-based tool for evaluating awareness of online risks and harms. 10.1145\/\/3477495.3531659","DOI":"10.1145\/\/3477495.3531659"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","unstructured":"Pia Borlund. 2016. A study of the use of simulated work task situations in interactive information retrieval evaluations: A meta-evaluation. Journal of Documentation 72 (05 2016) 394\u2013413. 10.1108\/JD-06-2015-0068","DOI":"10.1108\/JD-06-2015-0068"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"Xiongfei Cao Ali\u00a0Nawaz Khan Ahsan Ali and Naseer\u00a0Abbas Khan. 2020. Consequences of cyberbullying and social overload while using SNSs: A study of users\u2019 discontinuous usage behavior in SNSs. Information Systems Frontiers 22 6 (2020) 1343\u20131356.","DOI":"10.1007\/s10796-019-09936-8"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Hongliang Chen Christopher\u00a0E. Beaudoin and Traci Hong. 2016. Protecting oneself online: The effects of negative privacy experiences on privacy protective behaviors. Journalism and Mass Communication Quarterly 93 2 (2016) 409\u2013429.","DOI":"10.1177\/1077699016640224"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2015.7357484"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","unstructured":"David Dunning. 2011. The dunning-kruger effect. On being ignorant of one\u2019s own ignorance. Advances in Experimental Social Psychology 44 (2011) 247\u2013296. 10.1016\/B978-0-12-385522-0.00005-6","DOI":"10.1016\/B978-0-12-385522-0.00005-6"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858136"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401398"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"crossref","unstructured":"Danesh Irani Steve Webb Kang Li and Calton Pu. 2011. Modeling unintended personal-information leakage from multiple online social networks. IEEE Internet Computing 15 3 (2011) 13\u201319.","DOI":"10.1109\/MIC.2011.25"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","unstructured":"Puneet Kaur Amandeep Dhir Anushree Tandon Ebtesam\u00a0A. Alzeiby and Abeer\u00a0Ahmed Abohassan. 2021. A systematic literature review on cyberstalking. An analysis of past achievements and future promises. Technological Forecasting and Social Change 163 (2021) 120426. 10.1016\/j.techfore.2020.120426","DOI":"10.1016\/j.techfore.2020.120426"},{"key":"e_1_3_3_2_17_2","unstructured":"Johannes Kiesel Arjen\u00a0P de Vries Matthias Hagen Benno Stein and Martin Potthast. 2018. WASP: web archiving and search personalized. (2018)."},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"crossref","unstructured":"Hanna Krasnova Sarah Spiekermann Ksenia Koroleva and Thomas Hildebrand. 2010. Online social networks: Why we disclose. Journal of Information Technology 25 2 (jun 2010) 109\u2013125.","DOI":"10.1057\/jit.2010.6"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3406522.3446011"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","unstructured":"Philipp\u00a0K. Masur Natalya\u00a0N. Bazarova and Dominic DiFranzo. 2023. The Impact of What Others Do Approve Of and Expect You to Do: An In-Depth Analysis of Social Norms and Self-Disclosure on Social Media. Social Media + Society 9 1 (2023) 20563051231156401. 10.1177\/20563051231156401 arXiv:10.1177\/20563051231156401","DOI":"10.1177\/20563051231156401"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"crossref","unstructured":"Emma Nicol Jo Briggs Wendy Moncur Amal Htait Daniel Carey Leif Azzopardi and Burkhard Schafer. 2022. Revealing Cumulative Risks in Online Personal Information: A Data Narrative Study. PACM HCI (2022).","DOI":"10.1145\/3555214"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","unstructured":"Emma Nicol Amal Htait Leif Azzopardi and Wendy Moncur. 2021. Towards identifying understanding and controlling cumulative revelations in social media. Proceedings of the Association for Information Science and Technology 58 1 (13 Oct. 2021) 798\u2013800. 10.1002\/pra2.56684th Annual Meeting of the Association for Information Science and Technology (ASIST) ; Conference date: 29-10-2021 Through 03-11-2021.","DOI":"10.1002\/pra2.566"},{"key":"e_1_3_3_2_23_2","volume-title":"Ofcom Adults\u2019 Media use and attitudes report","year":"2019","unstructured":"OfCom. 2019. Ofcom Adults\u2019 Media use and attitudes report. Technical Report. https:\/\/www.ofcom.org.uk\/__data\/assets\/pdf_file\/0021\/149124\/adults-media-use-and-attitudes-report.pdf"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"crossref","unstructured":"Felix Stalder. 2009. Privacy is not the Antidote to Surveillance. surveillance and society 1 (2009) 120\u2013124. https:\/\/api.semanticscholar.org\/CorpusID:166916450","DOI":"10.24908\/ss.v1i1.3397"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/2362724.2362768"},{"key":"e_1_3_3_2_26_2","volume-title":"Mosaic: Quantifying Privacy Leakage in Mobile Networks","author":"Xia Ning","year":"2013","unstructured":"Ning Xia, Han\u00a0Hee Song, Yong Liao, Marios Iliofotou, Antonio Nucci, Zhi-Li Zhang, and Aleksandar Kuzmanovic. 2013. Mosaic: Quantifying Privacy Leakage in Mobile Networks. 564 pages."},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/2795403.2795405"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3343413.3377958"}],"event":{"name":"CHIIR '25: 2025 ACM SIGIR Conference on Human Information Interaction and Retrieval","location":"Melbourne Australia","acronym":"CHIIR '25","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 2025 ACM SIGIR Conference on Human Information Interaction and Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3698204.3716447","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3698204.3716447","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:18Z","timestamp":1750295838000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3698204.3716447"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,24]]},"references-count":27,"alternative-id":["10.1145\/3698204.3716447","10.1145\/3698204"],"URL":"https:\/\/doi.org\/10.1145\/3698204.3716447","relation":{},"subject":[],"published":{"date-parts":[[2025,3,24]]},"assertion":[{"value":"2025-04-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}