{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:01:45Z","timestamp":1776099705621,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":121,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-2247381,CNS-1942014,CNS-2112562,CNS-2107060,CNS-22136688,CNS-2312716"],"award-info":[{"award-number":["CNS-2247381,CNS-1942014,CNS-2112562,CNS-2107060,CNS-22136688,CNS-2312716"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"US Department of Commerce","award":["70NANB21H043"],"award-info":[{"award-number":["70NANB21H043"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706598.3713256","type":"proceedings-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T05:30:26Z","timestamp":1745472626000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["``Impressively Scary:' Exploring User Perceptions and Reactions to Unraveling Machine Learning Models in Social Media Applications"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-9146-7442","authenticated-orcid":false,"given":"Jack","family":"West","sequence":"first","affiliation":[{"name":"Department of Computer Sciences, University of Wisconsin-Madison, Madison, Wisconsin, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7024-4957","authenticated-orcid":false,"given":"Bengisu","family":"Cagiltay","sequence":"additional","affiliation":[{"name":"Department of Computer Sciences, University of Wisconsin-Madison, Madison, Wisconsin, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5810-1347","authenticated-orcid":false,"given":"Shirley","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer Sciences, University of Wisconsin-Madison, Madison, Wisconsin, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6611-7496","authenticated-orcid":false,"given":"Jingjie","family":"Li","sequence":"additional","affiliation":[{"name":"School of Informatics, University of Edinburgh, Edinburgh, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4609-7691","authenticated-orcid":false,"given":"Kassem","family":"Fawaz","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, University of Wisconsin-Madison, Madison, Wisconsin, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5548-8862","authenticated-orcid":false,"given":"Suman","family":"Banerjee","sequence":"additional","affiliation":[{"name":"Department of Computer Sciences, University of Wisconsin-Madison, Madison, Wisconsin, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_3_2_2","unstructured":"National\u00a0Security Agency. 2024. Ghidra \u2014 ghidra-sre.org. https:\/\/ghidra-sre.org\/."},{"key":"e_1_3_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376680"},{"key":"e_1_3_3_3_4_2","unstructured":"AppDome. 2023. How to Prevent Dynamic Hooking of Android Apps \u2014 appdome.com. https:\/\/www.appdome.com\/how-to\/mobile-cheat-prevention\/prevent-injection-attacks\/prevent-dynamic-hooking-of-android-apps\/."},{"key":"e_1_3_3_3_5_2","doi-asserted-by":"crossref","unstructured":"Matthew Arnold Rachel\u00a0KE Bellamy Michael Hind Stephanie Houde Sameep Mehta Aleksandra Mojsilovi\u0107 Ravi Nair K\u00a0Natesan Ramamurthy Alexandra Olteanu David Piorkowski et\u00a0al. 2019. FactSheets: Increasing trust in AI services through supplier\u2019s declarations of conformity. IBM Journal of Research and Development 63 4\/5 (2019) 6\u20131.","DOI":"10.1147\/JRD.2019.2942288"},{"key":"e_1_3_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445256"},{"key":"e_1_3_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642180"},{"key":"e_1_3_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501616"},{"key":"e_1_3_3_3_9_2","doi-asserted-by":"crossref","unstructured":"Jack Bandy and Nicholas Diakopoulos. 2021. More accounts fewer links: How algorithmic curation impacts media exposure in Twitter timelines. Proceedings of the ACM on human-computer interaction 5 CSCW1 (2021) 1\u201328.","DOI":"10.1145\/3449152"},{"key":"e_1_3_3_3_10_2","doi-asserted-by":"crossref","unstructured":"Alnoor Bhimani. 2015. Exploring big data\u2019s strategic consequences. Journal of Information Technology 30 1 (2015) 66\u201369.","DOI":"10.1057\/jit.2014.29"},{"key":"e_1_3_3_3_11_2","unstructured":"Molly Bohannon. 2023. Lawyer Used ChatGPT In Court\u2014And Cited Fake Cases. A Judge Is Considering Sanctions \u2014 forbes.com. https:\/\/www.forbes.com\/sites\/mollybohannon\/2023\/06\/08\/lawyer-used-chatgpt-in-court-and-cited-fake-cases-a-judge-is-considering-sanctions\/."},{"key":"e_1_3_3_3_12_2","doi-asserted-by":"crossref","unstructured":"Virginia Braun and Victoria Clarke. 2019. Reflecting on reflexive thematic analysis. Qualitative research in sport exercise and health 11 4 (2019) 589\u2013597.","DOI":"10.1080\/2159676X.2019.1628806"},{"key":"e_1_3_3_3_13_2","doi-asserted-by":"crossref","unstructured":"Virginia Braun and Victoria Clarke. 2021. One size fits all? What counts as quality practice in (reflexive) thematic analysis? Qualitative research in psychology 18 3 (2021) 328\u2013352.","DOI":"10.1080\/14780887.2020.1769238"},{"key":"e_1_3_3_3_14_2","doi-asserted-by":"publisher","unstructured":"Hongchen Cao Shuai Li Yuming Zhou Ming Fan Xuejiao Zhao and Yutian Tang. 2024. Cheating your apps: Black-box adversarial attacks on deep learning apps. Journal of Software: Evolution and Process 36 4 (2024) e2528. 10.1002\/smr.2528 arXiv:https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/smr.2528","DOI":"10.1002\/smr.2528"},{"key":"e_1_3_3_3_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3382839"},{"key":"e_1_3_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519615"},{"key":"e_1_3_3_3_17_2","doi-asserted-by":"crossref","unstructured":"Sijing Chen Lu Xiao and Akit Kumar. 2023. Spread of misinformation on social media: What contributes to it and how to combat it. Computers in Human Behavior 141 (2023) 107643.","DOI":"10.1016\/j.chb.2022.107643"},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642288"},{"key":"e_1_3_3_3_19_2","unstructured":"chiteroman. 2024. GitHub - chiteroman\/PlayIntegrityFix: Fix Play Integrity (and SafetyNet) verdicts. \u2014 github.com. https:\/\/github.com\/chiteroman\/PlayIntegrityFix."},{"key":"e_1_3_3_3_20_2","doi-asserted-by":"crossref","unstructured":"Kelley Cotter. 2019. Playing the visibility game: How digital influencers and algorithms negotiate influence on Instagram. New media & society 21 4 (2019) 895\u2013913.","DOI":"10.1177\/1461444818815684"},{"key":"e_1_3_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/SoutheastCon44009.2020.9249652"},{"key":"e_1_3_3_3_22_2","doi-asserted-by":"crossref","unstructured":"Daniel Delmonaco Samuel Mayworm Hibby Thach Josh Guberman Aurelia Augusta and Oliver\u00a0L Haimson. 2024. \" What are you doing TikTok?\": How Marginalized Social Media Users Perceive Theorize and\" Prove\" Shadowbanning. Proceedings of the ACM on Human-Computer Interaction 8 CSCW1 (2024) 1\u201339.","DOI":"10.1145\/3637431"},{"key":"e_1_3_3_3_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559388"},{"key":"e_1_3_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173694"},{"key":"e_1_3_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025659"},{"key":"e_1_3_3_3_26_2","doi-asserted-by":"publisher","unstructured":"Berkeley\u00a0J. Dietvorst Berkeley\u00a0J. Dietvorst Joseph\u00a0P. Simmons Joseph\u00a0P. Simmons Cade Massey and Cade Massey. 2015. Algorithm aversion: people erroneously avoid algorithms after seeing them err. Journal of Experimental Psychology: General 144 (2015). 10.1037\/xge0000033","DOI":"10.1037\/xge0000033"},{"key":"e_1_3_3_3_27_2","unstructured":"K. Dr\u00f6ge. 2024. noScribe. AI-powered Audio Transcription (Version 0.5)[Computer Software]. https:\/\/github.com\/kaixxx\/noScribe."},{"key":"e_1_3_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445188"},{"key":"e_1_3_3_3_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642474"},{"key":"e_1_3_3_3_30_2","doi-asserted-by":"crossref","unstructured":"Upol Ehsan Koustuv Saha Munmun De\u00a0Choudhury and Mark\u00a0O Riedl. 2023. Charting the sociotechnical gap in explainable ai: A framework to address the gap in xai. Proceedings of the ACM on human-computer interaction 7 CSCW1 (2023) 1\u201332.","DOI":"10.1145\/3579467"},{"key":"e_1_3_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3650750"},{"key":"e_1_3_3_3_32_2","unstructured":"Ziv Epstein and Hause Lin. 2022. Yourfeed: Towards open science and interoperable systems for social media. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2207.07478 (2022)."},{"key":"e_1_3_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858494"},{"key":"e_1_3_3_3_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702556"},{"key":"e_1_3_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300724"},{"key":"e_1_3_3_3_36_2","doi-asserted-by":"crossref","unstructured":"Heike Felzmann Eduard\u00a0Fosch Villaronga Christoph Lutz and Aurelia Tam\u00f2-Larrieux. 2019. Transparency you can trust: Transparency requirements for artificial intelligence between legal norms and contextual concerns. Big Data & Society 6 1 (2019) 2053951719860542.","DOI":"10.1177\/2053951719860542"},{"key":"e_1_3_3_3_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642120"},{"key":"e_1_3_3_3_38_2","doi-asserted-by":"crossref","unstructured":"Richard Fletcher and Rasmus\u00a0Kleis Nielsen. 2019. Generalised scepticism: How people navigate news on social media. Information communication & society 22 12 (2019) 1751\u20131769.","DOI":"10.1080\/1369118X.2018.1450887"},{"key":"e_1_3_3_3_39_2","unstructured":"Frida. 2024. Frida \u2022 A world-class dynamic instrumentation toolkit \u2014 frida.re. https:\/\/frida.re\/."},{"key":"e_1_3_3_3_40_2","unstructured":"Google. 2025. Play Integrity API | Google Play | Android Developers \u2014 developer.android.com. https:\/\/developer.android.com\/google\/play\/integrity."},{"key":"e_1_3_3_3_41_2","unstructured":"Google Play Store. 2024. TikTok - Apps on Google Play. https:\/\/play.google.com\/store\/apps\/details?id=com.zhiliaoapp.musically&hl=en_US&gl=US."},{"key":"e_1_3_3_3_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3641891"},{"key":"e_1_3_3_3_43_2","unstructured":"Homeboy76. 2022. [Guide] [November 6 2023]Root Pixel 6 Unlock Bootloader + Pass SafetyNet + Both Slots Bootable + More \u2014 xdaforums.com. https:\/\/xdaforums.com\/t\/guide-root-pixel-6-with-magisk-unlock-bootloader-pass-safetynet-more.4388733\/."},{"key":"e_1_3_3_3_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376428"},{"key":"e_1_3_3_3_45_2","doi-asserted-by":"crossref","unstructured":"Yupeng Hu Wenxin Kuang Zheng Qin Kenli Li Jiliang Zhang Yansong Gao Wenjia Li and Keqin Li. 2021. Artificial intelligence security: Threats and countermeasures. ACM Computing Surveys (CSUR) 55 1 (2021) 1\u201336.","DOI":"10.1145\/3487890"},{"key":"e_1_3_3_3_46_2","doi-asserted-by":"publisher","unstructured":"Yujin Huang and Chunyang Chen. 2022. Smart App Attack: Hacking Deep Learning Models in Android Apps. Trans. Info. For. Sec. 17 (jan 2022) 1827\u20131840. 10.1109\/TIFS.2022.3172213","DOI":"10.1109\/TIFS.2022.3172213"},{"key":"e_1_3_3_3_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP52600.2021.00019"},{"key":"e_1_3_3_3_48_2","doi-asserted-by":"crossref","unstructured":"Duha Ibdah Nada Lachtar Satya\u00a0Meenakshi Raparthi and Anys Bacha. 2021. \u201cWhy Should I Read the Privacy Policy I Just Need the Service\u201d: A Study on Attitudes and Perceptions Toward Privacy Policies. IEEE access 9 (2021) 166465\u2013166487.","DOI":"10.1109\/ACCESS.2021.3130086"},{"key":"e_1_3_3_3_49_2","unstructured":"Instagram. 2025. Privacy Policy. https:\/\/privacycenter.instagram.com\/policy\/."},{"key":"e_1_3_3_3_50_2","unstructured":"Instagram Help Center. 2024. How Posts Are Chosen for Explore on Instagram. https:\/\/help.instagram.com\/487224561296752?helpref=faq_content."},{"key":"e_1_3_3_3_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581219"},{"key":"e_1_3_3_3_52_2","doi-asserted-by":"crossref","unstructured":"Bronwyn Jones Rhianne Jones and Ewa Luger. 2022. AI \"Everywhere and Nowhere\": addressing the AI intelligibility problem in public service journalism. Digital Journalism 10 10 (2022) 1731\u20131755.","DOI":"10.1080\/21670811.2022.2145328"},{"key":"e_1_3_3_3_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517533"},{"key":"e_1_3_3_3_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572538"},{"key":"e_1_3_3_3_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581001"},{"key":"e_1_3_3_3_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690283"},{"key":"e_1_3_3_3_57_2","unstructured":"Panagiota Koukouvinou and Jonny Holmstr\u00f6m. 2024. AI Management Beyond Myth and Hype: A Systematic Review and Synthesis of the Literature. Journal of Academic Research and Trends in Educational Sciences17 (2024)."},{"key":"e_1_3_3_3_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642815"},{"key":"e_1_3_3_3_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642116"},{"key":"e_1_3_3_3_60_2","doi-asserted-by":"crossref","unstructured":"Min\u00a0Kyung Lee. 2018. Understanding perception of algorithmic decisions: Fairness trust and emotion in response to algorithmic management. Big Data & Society 5 1 (2018) 2053951718756684.","DOI":"10.1177\/2053951718756684"},{"key":"e_1_3_3_3_61_2","doi-asserted-by":"crossref","unstructured":"Jingqi\u00a0Celeste Li Morteza Namvar Ghiyoung\u00a0P Im Saeed Akhlaghpour et\u00a0al. 2024. Machine Learning Based Decision-Making: A Sensemaking Perspective. Australasian Journal of Information Systems 28 (2024) 315\u2013\u2013341.","DOI":"10.3127\/ajis.v28.4781"},{"key":"e_1_3_3_3_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519739"},{"key":"e_1_3_3_3_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445415"},{"key":"e_1_3_3_3_64_2","unstructured":"Jyoti Mann. 2024. Meta uses your Instagram and Facebook photos to train its AI models \u2014 businessinsider.com. https:\/\/www.businessinsider.com\/meta-instagram-facebook-photos-used-in-ai-models-training-2024-5?amp."},{"key":"e_1_3_3_3_65_2","unstructured":"MarketAndMarkets. 2024. AI in Social Media Market Size Share and Global Market Forecast to 2023 | MarketsandMarkets \u2014 marketsandmarkets.com. https:\/\/www.marketsandmarkets.com\/Market-Reports\/ai-in-social-media-market-92119289.html."},{"key":"e_1_3_3_3_66_2","doi-asserted-by":"crossref","unstructured":"Nora McDonald Sarita Schoenebeck and Andrea Forte. 2019. Reliability and inter-rater reliability in qualitative research: Norms and guidelines for CSCW and HCI practice. Proceedings of the ACM on human-computer interaction 3 CSCW (2019) 1\u201323.","DOI":"10.1145\/3359174"},{"key":"e_1_3_3_3_67_2","unstructured":"Stacey McLachlan. 2024. Instagram Demographics: Top User Stats for Your Strategy. https:\/\/blog.hootsuite.com\/instagram-demographics\/."},{"key":"e_1_3_3_3_68_2","unstructured":"Meta. 2023. DINOv2: State-of-the-art computer vision models with self-supervised learning \u2014 ai.meta.com. https:\/\/ai.meta.com\/blog\/dino-v2-computer-vision-self-supervised-learning\/."},{"key":"e_1_3_3_3_69_2","unstructured":"Meta. 2024. Instagram Feed \u2014 transparency.meta.com. https:\/\/transparency.meta.com\/features\/explaining-ranking\/ig-feed\/."},{"key":"e_1_3_3_3_70_2","unstructured":"Meta. 2024. Introducing Meta Llama 3: The most capable openly available LLM to date \u2014 ai.meta.com. https:\/\/ai.meta.com\/blog\/meta-llama-3\/."},{"key":"e_1_3_3_3_71_2","unstructured":"Meta. 2024. Meta Privacy Policy - How Meta collects and uses user data \u2014 privacycenter.instagram.com. https:\/\/privacycenter.instagram.com\/policy\/?section_id=1-WhatInformationDoWe."},{"key":"e_1_3_3_3_72_2","unstructured":"Meta. 2024. Publications - Meta Research \u2014 research.facebook.com. https:\/\/research.facebook.com\/publications\/."},{"key":"e_1_3_3_3_73_2","unstructured":"MordorIntelligence. 2024. AI in Social Media Market - Forecast Growth & Industry Trends \u2014 mordorintelligence.com. https:\/\/www.mordorintelligence.com\/industry-reports\/ai-market-in-social-media."},{"key":"e_1_3_3_3_74_2","doi-asserted-by":"crossref","unstructured":"Sarah Myers\u00a0West. 2018. Censored suspended shadowbanned: User interpretations of content moderation on social media platforms. New Media & Society 20 11 (2018) 4366\u20134383.","DOI":"10.1177\/1461444818773059"},{"key":"e_1_3_3_3_75_2","unstructured":"OpenAI. 2024. GPT-4o mini: advancing cost-efficient intelligence. https:\/\/openai.com\/index\/gpt-4o-mini-advancing-cost-efficient-intelligence\/."},{"key":"e_1_3_3_3_76_2","doi-asserted-by":"crossref","unstructured":"Leila Ouchchy Allen Coin and Veljko Dubljevic. 2020. AI in the headlines: the portrayal of the ethical issues of artificial intelligence in the media. AI and SOCIETY 35 (2020) 927\u2013936.","DOI":"10.1007\/s00146-020-00965-5"},{"key":"e_1_3_3_3_77_2","unstructured":"European Parliament. 2024. Key Issue 5: Transparency Obligations - EU AI Act \u2014 euaiact.com. https:\/\/www.euaiact.com\/key-issue\/5."},{"key":"e_1_3_3_3_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445315"},{"key":"e_1_3_3_3_79_2","unstructured":"Pytorch. 2024. PyTorch \u2014 pytorch.org. https:\/\/pytorch.org\/mobile\/home\/."},{"key":"e_1_3_3_3_80_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173677"},{"key":"e_1_3_3_3_81_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642076"},{"key":"e_1_3_3_3_82_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581257"},{"key":"e_1_3_3_3_83_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445465"},{"key":"e_1_3_3_3_84_2","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3623325"},{"key":"e_1_3_3_3_85_2","doi-asserted-by":"crossref","unstructured":"Kat Roemmich and Nazanin Andalibi. 2021. Data subjects\u2019 conceptualizations of and attitudes toward automatic emotion recognition-enabled wellbeing interventions on social media. Proceedings of the ACM on Human-Computer Interaction 5 CSCW2 (2021) 1\u201334.","DOI":"10.1145\/3476049"},{"key":"e_1_3_3_3_86_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445394"},{"key":"e_1_3_3_3_87_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580848"},{"key":"e_1_3_3_3_88_2","doi-asserted-by":"publisher","DOI":"10.1145\/3565698.3565774"},{"key":"e_1_3_3_3_89_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581498"},{"key":"e_1_3_3_3_90_2","doi-asserted-by":"crossref","unstructured":"Donghee Shin Kerk\u00a0F Kee and Emily\u00a0Y Shin. 2022. Algorithm awareness: Why user awareness is critical for personal privacy in the adoption of algorithmic platforms? International Journal of Information Management 65 (2022) 102494.","DOI":"10.1016\/j.ijinfomgt.2022.102494"},{"key":"e_1_3_3_3_91_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3650801"},{"key":"e_1_3_3_3_92_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642855"},{"key":"e_1_3_3_3_93_2","unstructured":"Skylot. 2024. GitHub - skylot\/jadx: Dex to Java decompiler \u2014 github.com. https:\/\/github.com\/skylot\/jadx."},{"key":"e_1_3_3_3_94_2","unstructured":"Statista. 2023. U.S. social network users 2023 by education | Statista. https:\/\/www.statista.com\/statistics\/1337578\/us-distribution-leading-social-media-platforms-by-education\/."},{"key":"e_1_3_3_3_95_2","doi-asserted-by":"crossref","unstructured":"Nili Steinfeld. 2016. \u201cI agree to the terms and conditions\u201d:(How) do users read privacy policies online? An eye-tracking experiment. Computers in human behavior 55 (2016) 992\u20131000.","DOI":"10.1016\/j.chb.2015.09.038"},{"key":"e_1_3_3_3_96_2","unstructured":"Ellie Stevens. 2024. What happens when we train our AI on social media? https:\/\/www.fastcompany.com\/91109348\/hed-what-happens-when-we-train-our-ai-on-social-media."},{"key":"e_1_3_3_3_97_2","unstructured":"Google\u00a0Play Store. 2024. Instagram - Apps on Google Play \u2014 play.google.com. https:\/\/play.google.com\/store\/apps\/details?id=com.instagram.android&hl=en_US&gl=US."},{"key":"e_1_3_3_3_98_2","doi-asserted-by":"crossref","unstructured":"Franti\u0161ek Sudzina. 2017. Do gender and personality traits (BFI-10) influence self-perceived tech savviness. IT for Practice 2015 (2017) 195\u2013199.","DOI":"10.5817\/CEJM2016-1-5"},{"key":"e_1_3_3_3_99_2","first-page":"1955","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Sun Zhichuang","year":"2021","unstructured":"Zhichuang Sun, Ruimin Sun, Long Lu, and Alan Mislove. 2021. Mind your weight (s): A large-scale study on insufficient machine learning model protection in mobile apps. In 30th USENIX Security Symposium (USENIX Security 21). 1955\u20131972."},{"key":"e_1_3_3_3_100_2","doi-asserted-by":"crossref","unstructured":"Samuel\u00a0Hardman Taylor and Mina Choi. 2022. An initial conceptualization of algorithm responsiveness: Comparing perceptions of algorithms across social media platforms. Social Media+ Society 8 4 (2022) 20563051221144322.","DOI":"10.1177\/20563051221144322"},{"key":"e_1_3_3_3_101_2","unstructured":"Backlinko Team. 2024. Social Network Usage & Growth Statistics (2024) \u2014 backlinko.com. https:\/\/backlinko.com\/social-media-users."},{"key":"e_1_3_3_3_102_2","unstructured":"Jane Thier. 2024. AI is moving too fast to keep pace for 4 in 5 workers \u2014 finance.yahoo.com. https:\/\/finance.yahoo.com\/news\/ai-moving-too-fast-keep-190958680.html."},{"key":"e_1_3_3_3_103_2","unstructured":"TikTok. 2020. How TikTok recommends videos ForYou \u2014 newsroom.tiktok.com. https:\/\/newsroom.tiktok.com\/en-us\/how-tiktok-recommends-videos-for-you."},{"key":"e_1_3_3_3_104_2","unstructured":"TikTok. 2024. TikTok\u2019s Privacy Innovation 2024 Roadmap | TikTok for Developers \u2014 developers.tiktok.com. https:\/\/developers.tiktok.com\/blog\/2024-privacy-innovation-roadmap."},{"key":"e_1_3_3_3_105_2","unstructured":"TikTok. 2025. Privacy Policy. https:\/\/www.tiktok.com\/legal\/page\/us\/privacy-policy\/en."},{"key":"e_1_3_3_3_106_2","doi-asserted-by":"publisher","DOI":"10.3386\/w31815"},{"key":"e_1_3_3_3_107_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173967"},{"key":"e_1_3_3_3_108_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642018"},{"key":"e_1_3_3_3_109_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73354-6_88"},{"key":"e_1_3_3_3_110_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00139"},{"key":"e_1_3_3_3_111_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642466"},{"key":"e_1_3_3_3_112_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00203"},{"key":"e_1_3_3_3_113_2","doi-asserted-by":"crossref","unstructured":"Martin Wiener Carol Saunders and Marco Marabelli. 2020. Big-data business models: A critical literature review and multiperspective research framework. Journal of Information Technology 35 1 (2020) 66\u201391.","DOI":"10.1177\/0268396219896811"},{"key":"e_1_3_3_3_114_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581040"},{"key":"e_1_3_3_3_115_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581167"},{"key":"e_1_3_3_3_116_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445109"},{"key":"e_1_3_3_3_117_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3641896"},{"key":"e_1_3_3_3_118_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300509"},{"key":"e_1_3_3_3_119_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580945"},{"key":"e_1_3_3_3_120_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445195"},{"key":"e_1_3_3_3_121_2","doi-asserted-by":"crossref","unstructured":"Shikun Zhang Yuanyuan Feng Lujo Bauer Lorrie\u00a0Faith Cranor Anupam Das and Norman Sadeh. 2021. \u201cDid you know this camera tracks your mood?\u201d: Understanding Privacy Expectations and Preferences in the Age of Video Analytics. Proceedings on Privacy Enhancing Technologies 2021 2 (2021) 282\u2013\u2013304.","DOI":"10.2478\/popets-2021-0028"},{"key":"e_1_3_3_3_122_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858333"}],"event":{"name":"CHI 2025: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713256","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706598.3713256","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706598.3713256","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:46:42Z","timestamp":1751608002000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713256"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":121,"alternative-id":["10.1145\/3706598.3713256","10.1145\/3706598"],"URL":"https:\/\/doi.org\/10.1145\/3706598.3713256","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}