{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:59:23Z","timestamp":1776110363715,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":110,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100019827","name":"Meta","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100019827","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706598.3713213","type":"proceedings-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T04:40:09Z","timestamp":1745469609000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Self-Disclosure in Social Virtual Reality: The Influence of Information Management Dynamics, Social Presence, and Privacy Concerns"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6239-2634","authenticated-orcid":false,"given":"James J.","family":"Cummings","sequence":"first","affiliation":[{"name":"Boston University, Boston, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8085-2355","authenticated-orcid":false,"given":"Alexis Shore","family":"Ingber","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0511-8406","authenticated-orcid":false,"given":"Yihan Danny","family":"Jia","sequence":"additional","affiliation":[{"name":"Boston University, Boston, Massachusetts, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_3_2_2","doi-asserted-by":"crossref","unstructured":"SB Abhinaya Abhishri Agrawal Yaxing Yao Yixin Zou and Anupam Das. 2025. \" What are they gonna do with my data?\": Privacy Expectations Concerns and Behaviors in Virtual Reality. Proceedings on Privacy Enhancing Technologies (2025).","DOI":"10.56553\/popets-2025-0005"},{"key":"e_1_3_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3584931.3606968"},{"key":"e_1_3_3_3_4_2","unstructured":"Thomas Alsop. 2023. Virtual Reality Market Size Worldwide 2020-2027. https:\/\/www.statista.com\/statistics\/1221522\/virtual-reality-market-size-worldwide\/ Accessed: 2024-11-14."},{"key":"e_1_3_3_3_5_2","doi-asserted-by":"crossref","unstructured":"Arthur Aron Edward Melinat Elaine\u00a0N Aron Robert\u00a0Darrin Vallone and Renee\u00a0J Bator. 1997. The experimental generation of interpersonal closeness: A procedure and some preliminary findings. Pers. Soc. Psychol. Bull. 23 4 (April 1997) 363\u2013377.","DOI":"10.1177\/0146167297234003"},{"key":"e_1_3_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376722"},{"key":"e_1_3_3_3_7_2","doi-asserted-by":"crossref","unstructured":"Jeremy Bailenson. 2018. Protecting nonverbal data tracked in virtual reality. JAMA Pediatr. 172 10 (Oct. 2018) 905\u2013906.","DOI":"10.1001\/jamapediatrics.2018.1909"},{"key":"e_1_3_3_3_8_2","doi-asserted-by":"crossref","unstructured":"Jeremy\u00a0N Bailenson Jim Blascovich Andrew\u00a0C Beall and Jack\u00a0M Loomis. 2001. Equilibrium theory revisited: Mutual gaze and personal space in virtual environments. Presence (Camb.) 10 6 (Dec. 2001) 583\u2013598.","DOI":"10.1162\/105474601753272844"},{"key":"e_1_3_3_3_9_2","doi-asserted-by":"crossref","unstructured":"D\u00a0A Baker Devin\u00a0M Burns and Clair Reynolds\u00a0Kueny. 2020. Just sit back and watch: Large disparities between video and face-to-face interview observers in applicant ratings. Int. J. Hum. Comput. Interact. 36 20 (Dec. 2020) 1968\u20131979.","DOI":"10.1080\/10447318.2020.1805874"},{"key":"e_1_3_3_3_10_2","doi-asserted-by":"crossref","unstructured":"Lemi Baruh Ekin Secinti and Zeynep Cemalcilar. 2017. Online privacy concerns and privacy management: A meta-analytical review. Journal of Communication 67 1 (2017) 26\u201353.","DOI":"10.1111\/jcom.12276"},{"key":"e_1_3_3_3_11_2","doi-asserted-by":"crossref","unstructured":"Joseph\u00a0B Bayer Nicole\u00a0B Ellison Sarita\u00a0Y Schoenebeck and Emily\u00a0B Falk. 2016. Sharing the small moments: ephemeral social interaction on Snapchat. Inf. Commun. Soc. 19 7 (July 2016) 956\u2013977.","DOI":"10.1080\/1369118X.2015.1084349"},{"key":"e_1_3_3_3_12_2","doi-asserted-by":"crossref","unstructured":"Natalya\u00a0N Bazarova and Philipp\u00a0K Masur. 2020. Towards an integration of individualistic networked and institutional approaches to online disclosure and privacy in a networked ecology. Curr. Opin. Psychol. 36 (Dec. 2020) 118\u2013123.","DOI":"10.1016\/j.copsyc.2020.05.004"},{"key":"e_1_3_3_3_13_2","doi-asserted-by":"crossref","unstructured":"Lindsay Blackwell Nicole Ellison Natasha Elliott-Deflo and Raz Schwartz. 2019. Harassment in social virtual reality: Challenges for platform governance. Proceedings of the ACM on Human-Computer Interaction 3 CSCW (2019) 1\u201325.","DOI":"10.1145\/3359202"},{"key":"e_1_3_3_3_14_2","doi-asserted-by":"crossref","unstructured":"Nadine Bol and Marjolijn\u00a0L Antheunis. 2022. Skype or skip? Causes and consequences of intimate self-disclosure in computer-mediated doctor-patient communication. Media Psychol. 25 5 (Sept. 2022) 706\u2013723.","DOI":"10.1080\/15213269.2022.2035769"},{"key":"e_1_3_3_3_15_2","doi-asserted-by":"publisher","unstructured":"Vanessa Bracamonte Sebastian Pape and Sascha Loebner. 2022. \u201cAll apps do this\u201d: Comparing Privacy Concerns Towards Privacy Tools and Non-Privacy Tools for Social Media Content. Proceedings on Privacy Enhancing Technologies 2022 3 (July 2022) 57\u201378. 10.56553\/popets-2022-0062","DOI":"10.56553\/popets-2022-0062"},{"key":"e_1_3_3_3_16_2","doi-asserted-by":"crossref","unstructured":"Amanda Bradbury Sara Schertz and Eric Wiebe. 2022. How does virtual reality compare? The effects of avatar appearance and medium on self-disclosure. Proc. Hum. Factors Ergon. Soc. Annu. Meet. 66 1 (Sept. 2022) 2036\u20132040.","DOI":"10.1177\/1071181322661123"},{"key":"e_1_3_3_3_17_2","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems","author":"Chen Qijia","year":"2024","unstructured":"Qijia Chen, Andrea Bellucci, and Giulio Jacucci. 2024. \u201cI\u2019d rather drink in VRChat\u201d: Understanding Drinking in Social Virtual Reality. In Proceedings of the CHI Conference on Human Factors in Computing Systems (Honolulu HI USA). ACM, New York, NY, USA."},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"crossref","unstructured":"Y\u00a0Anthony Chen and Catalina\u00a0L Toma. 2024. To text or talk in person? Social anxiety media affordances and preferences for texting over face-to-face communication in dating relationships. Media Psychology 27 3 (2024) 428\u2013454.","DOI":"10.1080\/15213269.2023.2246895"},{"key":"e_1_3_3_3_19_2","doi-asserted-by":"crossref","unstructured":"Jeffrey\u00a0T Child and Shawn\u00a0C Starcher. 2016. Fuzzy Facebook privacy boundaries: Exploring mediated lurking vague-booking and Facebook privacy management. Computers in Human Behavior 54 (2016) 483\u2013490.","DOI":"10.1016\/j.chb.2015.08.035"},{"key":"e_1_3_3_3_20_2","volume-title":"AMCIS 2009 Proceedings","author":"Choi Chris\u00a0SeoYun","year":"2009","unstructured":"Chris\u00a0SeoYun Choi, Haejung Yun, and Kyung\u00a0Kyu Kim. 2009. The Impact of Avatar Appearance and Offline Identity Disclosure on Trust in Virtual Worlds. In AMCIS 2009 Proceedings."},{"key":"e_1_3_3_3_21_2","doi-asserted-by":"crossref","unstructured":"Sujeong Choi. 2016. The flipside of ubiquitous connectivity enabled by smartphone-based social networking service: Social presence and privacy concern. Computers in Human Behavior 65 (2016) 325\u2013333.","DOI":"10.1016\/j.chb.2016.08.039"},{"key":"e_1_3_3_3_22_2","doi-asserted-by":"crossref","unstructured":"Kathryn\u00a0D Coduto. 2024. Channel affordances for sexting: Social presence relates to improved self-esteem sexual gratification and sexting certainty. Sexuality & Culture 28 1 (2024) 228\u2013242.","DOI":"10.1007\/s12119-023-10112-z"},{"key":"e_1_3_3_3_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3581791.3596830"},{"key":"e_1_3_3_3_24_2","doi-asserted-by":"crossref","unstructured":"S Courtney\u00a0Walton and Ronald\u00a0E Rice. 2013. Mediated disclosure on Twitter: The roles of gender and identity in boundary impermeability valence disclosure and stage. Comput. Human Behav. 29 4 (July 2013) 1465\u20131474.","DOI":"10.1016\/j.chb.2013.01.033"},{"key":"e_1_3_3_3_25_2","doi-asserted-by":"crossref","unstructured":"Aaron Crowson Zachary\u00a0H Pugh Michael Wilkinson and Christopher\u00a0B Mayhorn. 2020. Who is in the room? Notification for intrusions while in virtual reality. Proc. Hum. Factors Ergon. Soc. Annu. Meet. 64 1 (Dec. 2020) 521\u2013525.","DOI":"10.1177\/1071181320641118"},{"key":"e_1_3_3_3_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642567"},{"key":"e_1_3_3_3_27_2","volume-title":"Proceedings of the 2022 CHI Workshop on Novel Challenges of Safety, Security and Privacy in Extended Reality","author":"Cummings James","year":"2022","unstructured":"James Cummings and Alexis Shore. 2022. All Too Real: A Typology of User Vulnerabilities in Extended Reality. In Proceedings of the 2022 CHI Workshop on Novel Challenges of Safety, Security and Privacy in Extended Reality. New Orleans, LA, USA."},{"key":"e_1_3_3_3_28_2","doi-asserted-by":"crossref","unstructured":"James\u00a0J Cummings and Alexis\u00a0Shore Ingber. 2024. Distinguishing Social Virtual Reality: Comparing Communication Channels Across Perceived Social Affordances Privacy and Trust. Computers in Human Behavior (2024) 108427.","DOI":"10.1016\/j.chb.2024.108427"},{"key":"e_1_3_3_3_29_2","doi-asserted-by":"crossref","unstructured":"James\u00a0J Cummings and Erin\u00a0E Wertz. 2023. Capturing social presence: concept explication through an empirical analysis of social presence measures. Journal of Computer-Mediated Communication 28 1 (2023) zmac027.","DOI":"10.1093\/jcmc\/zmac027"},{"key":"e_1_3_3_3_30_2","doi-asserted-by":"crossref","unstructured":"Gerardine DeSanctis and Marshall\u00a0Scott Poole. 1994. Capturing the complexity in advanced technology use: Adaptive structuration theory. Organ. Sci. 5 2 (May 1994) 121\u2013147.","DOI":"10.1287\/orsc.5.2.121"},{"key":"e_1_3_3_3_31_2","doi-asserted-by":"crossref","unstructured":"Ersin Dincelli and Alper Yayla. 2022. Immersive virtual reality in the age of the Metaverse: A hybrid-narrative review based on the technology affordance perspective. J. Strat. Inf. Syst. 31 2 (June 2022) 101717.","DOI":"10.1016\/j.jsis.2022.101717"},{"key":"e_1_3_3_3_32_2","doi-asserted-by":"crossref","unstructured":"Nora\u00a0A Draper and Joseph Turow. 2019. The corporate cultivation of digital resignation. New media & society 21 8 (2019) 1824\u20131839.","DOI":"10.1177\/1461444819833331"},{"key":"e_1_3_3_3_33_2","doi-asserted-by":"crossref","unstructured":"Patricia\u00a0M Duronto Tsukasa Nishida and Shin-Ichi Nakayama. 2005. Uncertainty anxiety and avoidance in communication with strangers. Int. J. Intercult. Relat. 29 5 (Sept. 2005) 549\u2013560.","DOI":"10.1016\/j.ijintrel.2005.08.003"},{"key":"e_1_3_3_3_34_2","doi-asserted-by":"publisher","DOI":"10.1002\/9781118426456.ch9"},{"key":"e_1_3_3_3_35_2","doi-asserted-by":"crossref","unstructured":"Sandra\u00a0K Evans Katy\u00a0E Pearce Jessica Vitak and Jeffrey\u00a0W Treem. 2017. Explicating affordances: A conceptual framework for understanding affordances in communication research. J. Comput. Mediat. Commun. 22 1 (Jan. 2017) 35\u201352.","DOI":"10.1111\/jcc4.12180"},{"key":"e_1_3_3_3_36_2","doi-asserted-by":"crossref","unstructured":"Mohamed Ez-Zaouia and Rubiela Carrillo. 2024. The group folding effect: The role of collaborative process structuring and social interaction in group work. ACM Transactions on Computer-Human Interaction 31 2 (2024) 1\u201344.","DOI":"10.1145\/3622783"},{"key":"e_1_3_3_3_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642144"},{"key":"e_1_3_3_3_38_2","doi-asserted-by":"crossref","unstructured":"Jesse Fox and Bree McEwan. 2017. Distinguishing technologies for social interaction: The perceived social affordances of communication channels scale. Commun. Monogr. 84 3 (July 2017) 298\u2013318.","DOI":"10.1080\/03637751.2017.1332418"},{"key":"e_1_3_3_3_39_2","doi-asserted-by":"crossref","unstructured":"Guo Freeman Samaneh Zamanifard Divine Maloney and Dane Acena. 2022. Disturbing the peace: Experiencing and mitigating emerging harassment in social virtual reality. Proceedings of the ACM on Human-Computer Interaction 6 CSCW1 (2022) 1\u201330.","DOI":"10.1145\/3512932"},{"key":"e_1_3_3_3_40_2","doi-asserted-by":"crossref","unstructured":"Brian Friedberg Gabrielle Lim and Joan Donovan. 2020. Space invaders: The networked terrain of zoom bombing. Technology and Social Change Research Project (2020).","DOI":"10.37016\/TASC-2020-02"},{"key":"e_1_3_3_3_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445596"},{"key":"e_1_3_3_3_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3383652.3423879"},{"key":"e_1_3_3_3_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639082"},{"key":"e_1_3_3_3_44_2","doi-asserted-by":"crossref","unstructured":"Hilda Hadan Lydia Choong Leah Zhang-Kennedy and Lennart\u00a0E Nacke. 2024. Deceived by immersion: A systematic analysis of deceptive design in extended reality. ACM Comput. Surv. 56 10 (Oct. 2024) 1\u201325.","DOI":"10.1145\/3659945"},{"key":"e_1_3_3_3_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642104"},{"key":"e_1_3_3_3_46_2","doi-asserted-by":"crossref","unstructured":"Eugy Han Cyan DeVeaux Mark\u00a0Roman Miller Gabriella\u00a0M Harari Jeffrey\u00a0T Hancock Nilam Ram and Jeremy\u00a0N Bailenson. 2024. Alone together together alone: The effects of social context on nonverbal behavior in virtual reality. PRESENCE: Virtual and Augmented Reality 33 (2024) 425\u2013451.","DOI":"10.1162\/pres_a_00432"},{"key":"e_1_3_3_3_47_2","volume-title":"Introduction to mediation, moderation, and conditional process analysis (second edition): A regression-based approach","author":"Hayes Andrew\u00a0F.","year":"2018","unstructured":"Andrew\u00a0F. Hayes. 2018. Introduction to mediation, moderation, and conditional process analysis (second edition): A regression-based approach. Guilford Press."},{"key":"e_1_3_3_3_48_2","doi-asserted-by":"crossref","unstructured":"Christian\u00a0Pieter Hoffmann Christoph Lutz and Giulia Ranzini. 2016. Privacy cynicism: A new approach to the privacy paradox. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 10 4 (2016).","DOI":"10.5817\/CP2016-4-7"},{"key":"e_1_3_3_3_49_2","doi-asserted-by":"crossref","unstructured":"Junko Ichino Masahiro Ide Hitomi Yokoyama Hirotoshi Asano Hideo Miyachi and Daisuke Okabe. 2022. \" I\u2019ve talked without intending to\": Self-disclosure and Reciprocity via Embodied Avatar. Proceedings of the ACM on Human-Computer Interaction 6 CSCW2 (2022) 1\u201323.","DOI":"10.1145\/3555583"},{"key":"e_1_3_3_3_50_2","doi-asserted-by":"crossref","unstructured":"Alexis\u00a0Shore Ingber. 2025. Understanding screenshot collection and sharing on messaging platforms: a privacy perspective. Journal of Computer-Mediated Communication 30 1 (2025).","DOI":"10.1093\/jcmc\/zmae023"},{"key":"e_1_3_3_3_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642510"},{"key":"e_1_3_3_3_52_2","doi-asserted-by":"crossref","unstructured":"Mohsen Jozani Emmanuel Ayaburi Myung Ko and Kim-Kwang\u00a0Raymond Choo. 2020. Privacy concerns and benefits of engagement with social media-enabled apps: A privacy calculus perspective. Computers in Human Behavior 107 (2020) 106260.","DOI":"10.1016\/j.chb.2020.106260"},{"key":"e_1_3_3_3_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/CW.2014.21"},{"key":"e_1_3_3_3_54_2","doi-asserted-by":"crossref","unstructured":"Hyunjin Kang and Jeeyun Oh. 2023. Communication privacy management for smart speaker use: Integrating the role of privacy self-efficacy and the multidimensional view. New Media Soc. 25 5 (May 2023) 1153\u20131175.","DOI":"10.1177\/14614448211026611"},{"key":"e_1_3_3_3_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820081"},{"key":"e_1_3_3_3_56_2","doi-asserted-by":"crossref","unstructured":"Jihyun Kim and Hayeon Song. 2016. Celebrity\u2019s self-disclosure on Twitter and parasocial relationships: A mediating role of social presence. Computers in Human Behavior 62 (2016) 570\u2013577.","DOI":"10.1016\/j.chb.2016.03.083"},{"key":"e_1_3_3_3_57_2","unstructured":"Yeji Kim. 2022. Virtual Reality Data and Its Privacy Regulatory Challenges: A Call to Move Beyond Text-Based Informed Consent. Cal. L. Rev. 110 (2022) 225."},{"key":"e_1_3_3_3_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580707"},{"key":"e_1_3_3_3_59_2","doi-asserted-by":"crossref","unstructured":"Simon Kimmel Eric Landwehr and Wilko Heuten. 2024. Kinetic Connections: Exploring the Impact of Realistic Body Movements on Social Presence in Collaborative Virtual Reality. Proceedings of the ACM on Human-Computer Interaction 8 CSCW2 (2024) 1\u201330.","DOI":"10.1145\/3686910"},{"key":"e_1_3_3_3_60_2","doi-asserted-by":"crossref","unstructured":"Hanna Krasnova Sarah Spiekermann Ksenia Koroleva and Thomas Hildebrand. 2010. Online social networks: Why we disclose. J. Inf. Technol. 25 2 (June 2010) 109\u2013125.","DOI":"10.1057\/jit.2010.6"},{"key":"e_1_3_3_3_61_2","doi-asserted-by":"crossref","unstructured":"Jacob\u00a0Leon Kr\u00f6ger Otto Hans-Martin Lutz and Stefan Ullrich. 2021. The myth of individual control: Mapping the limitations of privacy self-management. Available at SSRN 3881776 (2021).","DOI":"10.2139\/ssrn.3881776"},{"key":"e_1_3_3_3_62_2","doi-asserted-by":"crossref","unstructured":"Sanne Kruikemeier Sophie\u00a0C Boerman and Nadine Bol. 2020. Breaching the contract? Using social contract theory to explain individuals\u2019 online behavior to safeguard privacy. Media Psychol. 23 2 (March 2020) 269\u2013292.","DOI":"10.1080\/15213269.2019.1598434"},{"key":"e_1_3_3_3_63_2","doi-asserted-by":"crossref","unstructured":"Mira Lee and Ronald\u00a0J Faber. 2007. Effects of product placement in on-line games on brand memory: A perspective of the limited-capacity model of attention. Journal of advertising 36 4 (2007) 75\u201390.","DOI":"10.2753\/JOA0091-3367360406"},{"key":"e_1_3_3_3_64_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376175"},{"key":"e_1_3_3_3_65_2","unstructured":"JihHsuan\u00a0Tammy Lin Dai-Yun Wu and Ji-Wei Yang. 2024. Let us sweat it out in virtual reality: The effects of virtual reality exercise contexts on physical activity outcomes through social presence and audience responses. Psychology of Popular Media (2024)."},{"key":"e_1_3_3_3_66_2","first-page":"1","volume-title":"Proceedings of the 12th annual international workshop on presence","author":"Lombard Matthew","year":"2009","unstructured":"Matthew Lombard, Theresa\u00a0B Ditton, and Lisa Weinstein. 2009. Measuring presence: the temple presence inventory. In Proceedings of the 12th annual international workshop on presence. International Society for Presence Research Los Angeles, CA, 1\u201315."},{"key":"e_1_3_3_3_67_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858414"},{"key":"e_1_3_3_3_68_2","unstructured":"Yash Mahajan Zhen Guo Jin-Hee Cho and Ing-Ray Chen. 2023. Privacy-Preserving and Diversity-Aware Trust-based Team Formation in Online Social Networks. ACM Transactions on Intelligent Systems and Technology (2023)."},{"key":"e_1_3_3_3_69_2","doi-asserted-by":"publisher","DOI":"10.1145\/3410404.3414266"},{"key":"e_1_3_3_3_70_2","doi-asserted-by":"publisher","DOI":"10.1145\/3410404.3414268"},{"key":"e_1_3_3_3_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/3385956.3418967"},{"key":"e_1_3_3_3_72_2","doi-asserted-by":"crossref","unstructured":"Ameera Mansour and Helena Francke. 2021. Collective Privacy Management Practices: A study of privacy strategies and risks in a private Facebook group. Proceedings of the ACM on Human-Computer Interaction 5 CSCW2 (2021) 1\u201327.","DOI":"10.1145\/3479504"},{"key":"e_1_3_3_3_73_2","volume-title":"The private is political: Networked Privacy and social media","author":"Marwick Alice\u00a0Emily","year":"2023","unstructured":"Alice\u00a0Emily Marwick. 2023. The private is political: Networked Privacy and social media. Yale University Press."},{"key":"e_1_3_3_3_74_2","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2011.379"},{"key":"e_1_3_3_3_75_2","doi-asserted-by":"crossref","unstructured":"Miriam\u00a0J Metzger. 2007. Communication privacy management in electronic commerce. J. Comput. Mediat. Commun. 12 2 (Jan. 2007) 335\u2013361.","DOI":"10.1111\/j.1083-6101.2007.00328.x"},{"key":"e_1_3_3_3_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/3616712.3616788"},{"key":"e_1_3_3_3_77_2","unstructured":"Vivek Nair Wenbo Guo Justus Mattern Rui Wang James\u00a0F O\u2019Brien Louis Rosenberg and Dawn Song. 2023. Unique identification of 50 000+ virtual reality users from head & hand motion data. (2023)."},{"key":"e_1_3_3_3_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/1460563.1460614"},{"key":"e_1_3_3_3_79_2","doi-asserted-by":"crossref","unstructured":"Nasser Nassiri Norman Powell and David Moore. 2010. Human interactions and personal space in collaborative virtual environments. Virtual Real. 14 4 (Dec. 2010) 229\u2013240.","DOI":"10.1007\/s10055-010-0169-3"},{"key":"e_1_3_3_3_80_2","doi-asserted-by":"crossref","unstructured":"Melanie Nguyen Yu\u00a0Sun Bin and Andrew Campbell. 2012. Comparing online and offline self-disclosure: A systematic review. Cyberpsychology Behavior and Social Networking 15 2 (2012) 103\u2013111.","DOI":"10.1089\/cyber.2011.0277"},{"key":"e_1_3_3_3_81_2","doi-asserted-by":"crossref","unstructured":"Kristine L. Nowak and Frank Biocca. 2003. The Effect of the Agency and Anthropomorphism on users\u2019 Sense of Telepresence Copresence and Social Presence in Virtual Environments. Presence: Teleoperators and Virtual Environments 12 5 (2003) 481\u2013494.","DOI":"10.1162\/105474603322761289"},{"key":"e_1_3_3_3_82_2","doi-asserted-by":"crossref","unstructured":"Maggie Oates Kyle Crichton Lorrie Cranor Storm Budwig Erica J\u00a0L Weston Brigette\u00a0M Bernagozzi and Julie Pagaduan. 2022. Audio video chat email or survey: How much does online interview mode matter? PLoS One 17 2 (Feb. 2022) e0263876.","DOI":"10.1371\/journal.pone.0263876"},{"key":"e_1_3_3_3_83_2","doi-asserted-by":"crossref","unstructured":"Lucas Paulsen Susanne Dau and Jacob Davidsen. 2024. Designing for collaborative learning in immersive virtual reality: a systematic literature review. Virtual Real. 28 1 (March 2024).","DOI":"10.1007\/s10055-024-00975-4"},{"key":"e_1_3_3_3_84_2","doi-asserted-by":"publisher","DOI":"10.1353\/book4588"},{"key":"e_1_3_3_3_85_2","doi-asserted-by":"crossref","unstructured":"Matthew\u00a0D Pickard Catherine\u00a0A Roster and Yixing Chen. 2016. Revealing sensitive information in personal interviews: Is self-disclosure easier with humans or avatars and under what conditions? Computers in Human Behavior 65 (2016) 23\u201330.","DOI":"10.1016\/j.chb.2016.08.004"},{"key":"e_1_3_3_3_86_2","volume-title":"R: A Language and Environment for Statistical Computing","author":"Team R Core","year":"2021","unstructured":"R Core Team. 2021. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria. https:\/\/www.R-project.org\/"},{"key":"e_1_3_3_3_87_2","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208723"},{"key":"e_1_3_3_3_88_2","doi-asserted-by":"publisher","DOI":"10.1109\/HRI.2013.6483495"},{"key":"e_1_3_3_3_89_2","doi-asserted-by":"publisher","DOI":"10.1145\/2970930.2970947"},{"key":"e_1_3_3_3_90_2","doi-asserted-by":"crossref","unstructured":"Shruti Sannon Brett Stoll Dominic DiFranzo Malte\u00a0F Jung and Natalya\u00a0N Bazarova. 2020. \u201cI just shared your responses\u201d extending communication privacy management theory to interactions with conversational agents. Proceedings of the ACM on Human-Computer Interaction 4 GROUP (2020) 1\u201318.","DOI":"10.1145\/3375188"},{"key":"e_1_3_3_3_91_2","doi-asserted-by":"crossref","unstructured":"Rebecca Scharlach and Blake Hallinan. 2023. The value affordances of social media engagement features. J. Comput. Mediat. Commun. 28 6 (Sept. 2023).","DOI":"10.1093\/jcmc\/zmad040"},{"key":"e_1_3_3_3_92_2","doi-asserted-by":"crossref","unstructured":"Evan Selinger Ely Altman and Shaun Foster. 2023. Eye-tracking in virtual reality. Privacy Studies Journal 2 (March 2023) 1\u201334.","DOI":"10.7146\/psj.v2i.134656"},{"key":"e_1_3_3_3_93_2","doi-asserted-by":"crossref","unstructured":"Alexis Shore and James\u00a0J Cummings. 2022. An Exploratory Analysis of Interface Features Influencing Mobile Location Data Disclosure. International Journal of Human\u2013Computer Interaction 39 19 (2022) 3758\u20133773.","DOI":"10.1080\/10447318.2022.2104428"},{"key":"e_1_3_3_3_94_2","doi-asserted-by":"crossref","unstructured":"Alexis Shore and Kelsey Prena. 2023. Platform rules as privacy tools: The influence of screenshot accountability and trust on privacy management. New Media Soc. (July 2023).","DOI":"10.1177\/14614448231188929"},{"key":"e_1_3_3_3_95_2","doi-asserted-by":"publisher","DOI":"10.1145\/3552483.3556457"},{"key":"e_1_3_3_3_96_2","doi-asserted-by":"crossref","unstructured":"Kata Szita Wyatt Moss-Wellington Xiaolin Sun and Eugene Ch\u2019ng. 2024. Going to the movies in VR: Virtual reality cinemas as alternatives to in-person co-viewing. Int. J. Hum. Comput. Stud. 181 103150 (Jan. 2024) 103150.","DOI":"10.1016\/j.ijhcs.2023.103150"},{"key":"e_1_3_3_3_97_2","doi-asserted-by":"crossref","unstructured":"Sabine Trepte Michael Scharkow and Tobias Dienlin. 2020. The privacy calculus contextualized: The influence of affordances. Computers in Human Behavior 104 (2020) 106115.","DOI":"10.1016\/j.chb.2019.08.022"},{"key":"e_1_3_3_3_98_2","doi-asserted-by":"crossref","unstructured":"Maria\u00a0K Venetis Kathryn Greene Kate Magsamen-Conrad Smita\u00a0C Banerjee Maria\u00a0G Checton and Zhanna Bagdasarov. 2012. \u201cYou can\u2019t tell anyone but \u2026\u201d: Exploring the Use of Privacy Rules and Revealing Behaviors. Commun. Monogr. 79 3 (Sept. 2012) 344\u2013365.","DOI":"10.1080\/03637751.2012.697628"},{"key":"e_1_3_3_3_99_2","doi-asserted-by":"crossref","unstructured":"Viswanath Venkatesh Susan\u00a0A Brown and Hillol Bala. 2013. Bridging the qualitative-quantitative divide: Guidelines for conducting mixed methods research in information systems. MIS quarterly (2013) 21\u201354.","DOI":"10.25300\/MISQ\/2013\/37.1.02"},{"key":"e_1_3_3_3_100_2","doi-asserted-by":"crossref","unstructured":"D Villani C Repetto P Cipresso and G Riva. 2012. May I experience more presence in doing the same thing in virtual reality than in reality? An answer from a simulated job interview. Interact. Comput. 24 4 (July 2012) 265\u2013272.","DOI":"10.1016\/j.intcom.2012.04.008"},{"key":"e_1_3_3_3_101_2","doi-asserted-by":"crossref","unstructured":"Thomas Waltemate Dominik Gall Daniel Roth Mario Botsch and Marc\u00a0Erich Latoschik. 2018. The impact of avatar personalization and immersion on virtual body ownership presence and emotional response. IEEE transactions on visualization and computer graphics 24 4 (2018) 1643\u20131652.","DOI":"10.1109\/TVCG.2018.2794629"},{"key":"e_1_3_3_3_102_2","doi-asserted-by":"crossref","unstructured":"Cheng\u00a0Yao Wang Sandhya Sriram and Andrea\u00a0Stevenson Won. 2021. Shared realities: Avatar identification and privacy concerns in reconstructed experiences. Proceedings of the ACM on Human-Computer Interaction 5 CSCW2 (2021) 1\u201325.","DOI":"10.1145\/3476078"},{"key":"e_1_3_3_3_103_2","doi-asserted-by":"crossref","unstructured":"Yuntao Wang Zhou Su Ning Zhang Rui Xing Dongxiao Liu Tom\u00a0H Luan and Xuemin Shen. 2022. A survey on metaverse: Fundamentals security and privacy. IEEE Communications Surveys & Tutorials 25 1 (2022) 319\u2013352.","DOI":"10.1109\/COMST.2022.3202047"},{"key":"e_1_3_3_3_104_2","doi-asserted-by":"crossref","unstructured":"Susan Waters and James Ackerman. 2011. Exploring privacy management on Facebook: Motivations and perceived consequences of voluntary disclosure. J. Comput. Mediat. Commun. 17 1 (Oct. 2011) 101\u2013115.","DOI":"10.1111\/j.1083-6101.2011.01559.x"},{"key":"e_1_3_3_3_105_2","doi-asserted-by":"crossref","unstructured":"Jaime Windeler Andrew Harrison and Rui Sundrup. 2024. Under the Radar or Into the Spotlight: How Does Social Presence Affect Minorities in Virtual Groups? ACM SIGMIS Database: the DATABASE for Advances in Information Systems 55 2 (2024) 98\u2013119.","DOI":"10.1145\/3663682.3663688"},{"key":"e_1_3_3_3_106_2","doi-asserted-by":"publisher","DOI":"10.1109\/VRW52623.2021.00256"},{"key":"e_1_3_3_3_107_2","doi-asserted-by":"crossref","unstructured":"Yueyang Yao Samuel\u00a0Hardman Taylor and Sarah Leiser\u00a0Ransom. 2024. Who\u2019s Viewing My Post? Extending the Imagined Audience Process Model Toward Affordances and Self-Disclosure Goals on Social Media. Social Media+ Society 10 1 (2024) 20563051231224271.","DOI":"10.1177\/20563051231224271"},{"key":"e_1_3_3_3_108_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544549.3585888"},{"key":"e_1_3_3_3_109_2","doi-asserted-by":"crossref","unstructured":"Renwen Zhang and Jiawei\u00a0Sophia Fu. 2020. Privacy management and self-disclosure on social network sites: The moderating effects of stress and gender. J. Comput. Mediat. Commun. 25 3 (May 2020) 236\u2013251.","DOI":"10.1093\/jcmc\/zmaa004"},{"key":"e_1_3_3_3_110_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445134"},{"key":"e_1_3_3_3_111_2","doi-asserted-by":"crossref","unstructured":"Qingxiao Zheng Shengyang Xu Lingqing Wang Yiliu Tang Rohan\u00a0C Salvi Guo Freeman and Yun Huang. 2023. Understanding safety risks and safety design in social VR environments. Proceedings of the ACM on Human-Computer Interaction 7 CSCW1 (2023) 1\u201337.","DOI":"10.1145\/3579630"}],"event":{"name":"CHI 2025: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713213","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706598.3713213","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:46:18Z","timestamp":1751607978000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713213"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":110,"alternative-id":["10.1145\/3706598.3713213","10.1145\/3706598"],"URL":"https:\/\/doi.org\/10.1145\/3706598.3713213","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}