{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:41:10Z","timestamp":1755801670489,"version":"3.44.0"},"reference-count":96,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T00:00:00Z","timestamp":1746144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"funder":[{"name":"NSF","award":["CNS-2120496"],"award-info":[{"award-number":["CNS-2120496"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2025,5,2]]},"abstract":"<jats:p>\n            Public records laws are standard for state and federal governments across the U.S. Such laws rest on the core notion that transparency, enacted through access to governmental documentation, will ensure accountability and minimize governmental corruption. However, these laws can also be exploited to harass or burden government employees, including researchers at public universities. CSCW researchers have both an acute vulnerability to these requests, e.g., due to increasing politicization of topics core to our research agenda, and a unique opportunity to study challenges around public records requests as they intersect with the design and use of collaboration technologies. In this paper, we explore how a large number of public records requests (PRRs) affected the\n            <jats:italic toggle=\"yes\">collaborative work<\/jats:italic>\n            of a large, multi-site academic research project. We find that \u2014 though participants believed PRRs were a valuable tool for government transparency \u2014 they added a complicated new dimension to distributed \"work\" which blends personal and professional dimensions. We explain how researchers interpreted these requests and adapted their communication techniques in response. We discuss how current technologies for communication and collaboration are unprepared to ensure personal privacy and security within adversarial research environments \u2014 and collaborative work environments more broadly. Finally, we highlight the misalignment between long-standing transparency laws and the current design of collaboration technologies and provide recommendations for updating these laws.\n          <\/jats:p>","DOI":"10.1145\/3711050","type":"journal-article","created":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T01:35:05Z","timestamp":1746236105000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy versus Transparency: Navigating Public Records Requests and Adversarial Dynamics in a Distributed Multi-Stakeholder Collaboration"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8865-2991","authenticated-orcid":false,"given":"Rachel","family":"Moran","sequence":"first","affiliation":[{"name":"Center for an Informed Public, Information School, University of Washington, Seattle, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3888-7693","authenticated-orcid":false,"given":"Sukrit","family":"Venkatagiri","sequence":"additional","affiliation":[{"name":"Swarthmore College, Swarthmore, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6792-3390","authenticated-orcid":false,"given":"Emma S.","family":"Spiro","sequence":"additional","affiliation":[{"name":"Information School and Center for an Informed Public, University of Washington, Seattle, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1661-4608","authenticated-orcid":false,"given":"Kate","family":"Starbird","sequence":"additional","affiliation":[{"name":"Department of Human Centered Design &amp; Engineering and Center for an Informed Public, University of Washington, Seattle, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,5,2]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"2023. Funded Projects in the Fight Against Disinformation. https:\/\/commission.europa.eu\/strategy-and-policy\/coronavirus-response\/fighting-disinformation\/funded-projects-fight-against-disinformation_en"},{"key":"e_1_2_1_2_1","unstructured":"2023. Hines v. Stamos | No. 3:23-cv-00571-TAD-KDM. https:\/\/www.courtlistener.com\/docket\/67310145\/1\/hines-vstamos\/"},{"key":"e_1_2_1_3_1","unstructured":"2023. Murthy v. Missouri (Formerly Missouri v. Biden) | No. 3:22-cv-01213-TAD-KDM. https:\/\/www.brennancenter. org\/sites\/default\/files\/2023-08\/third-amended-complaint-missouri-v-biden.pdf"},{"key":"e_1_2_1_4_1","volume-title":"v. Missouri et al., 23--411","author":"General Surgeon","year":"2024","unstructured":"2024. Murthy, Surgeon General, et al. v. Missouri et al., 23--411 (2024). (2024)."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327051HCI1523_5"},{"key":"e_1_2_1_6_1","volume-title":"Literature review: Examining contextual integrity within human-computer interaction. Available at SSRN 3309331","author":"Badillo-Urquiola Karla","year":"2018","unstructured":"Karla Badillo-Urquiola, Xinru Page, and Pamela Wisniewski. 2018. Literature review: Examining contextual integrity within human-computer interaction. Available at SSRN 3309331 (2018)."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207727"},{"key":"e_1_2_1_8_1","volume-title":"Mail-in voter fraud: Anatomy of a disinformation campaign","author":"Benkler Yochai","year":"2020","unstructured":"Yochai Benkler, Casey Tilton, Bruce Etling, Hal Roberts, Justin Clark, Robert Faris, Jonas Kaiser, and Carolyn Schmitt. 2020. Mail-in voter fraud: Anatomy of a disinformation campaign. Berkman Center Research Publication 2020--6 (2020)."},{"key":"e_1_2_1_9_1","first-page":"867","article-title":"The future of FOIA in an open government agenda for freedom of information policy and implementation","volume":"63","author":"Berliner Daniel","year":"2018","unstructured":"Daniel Berliner, Alex Ingrams, and Suzanne J Piotrowski. 2018. The future of FOIA in an open government agenda for freedom of information policy and implementation. Vill. L. Rev. 63 (2018), 867.","journal-title":"Vill. L. Rev."},{"key":"e_1_2_1_10_1","unstructured":"Andrea Bernstein. 2023. Republican Rep. Jim Jordan Issues Sweeping Information Requests to Universities Researching Disinformation. https:\/\/www.propublica.org\/article\/jim-jordan-disinformation-subpoena-universities"},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 6, CSCW2","author":"Bhandari Aparajita","year":"2022","unstructured":"Aparajita Bhandari, Diana Freed, Tara Pilato, Faten Taki, Gunisha Kaur, Stephen Yale-Loehr, Jane Powers, Tao Long, and Natalya N Bazarova. 2022. Multi-stakeholder Perspectives on Digital Tools for US Asylum Applicants Seeking Healthcare and Legal Information. Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (2022), 1--21."},{"key":"e_1_2_1_12_1","volume-title":"Navigating the Challenges of Multi-Site Research. In Companion of the 2018 ACM Conference on Computer Supported Cooperative Work and Social Computing. 409--415","author":"Bipat Taryn","year":"2018","unstructured":"Taryn Bipat, Susan R Fussell, Brent Hecht, Charles Kiene, David W McDonald, and Mark Zachry. 2018. Navigating the Challenges of Multi-Site Research. In Companion of the 2018 ACM Conference on Computer Supported Cooperative Work and Social Computing. 409--415."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670534"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1080\/15325024.2017.1310504"},{"volume-title":"Other people's money and how the bankers use it. Cosimo","author":"Brandeis Louis D","key":"e_1_2_1_15_1","unstructured":"Louis D Brandeis. 2009. Other people's money and how the bankers use it. Cosimo, Inc."},{"key":"e_1_2_1_16_1","first-page":"565","article-title":"The Government in the Sunshine Act\u2014An Overview","volume":"26","author":"Bullock James F","year":"1977","unstructured":"James F Bullock. 1977. The Government in the Sunshine Act\u2014An Overview. Duke Law Journal 26, 2 (1977), 565--592.","journal-title":"Duke Law Journal"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.adr3820"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1013115.1013149"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311957.3358609"},{"key":"e_1_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Kathy Charmaz Liska Belgrave et al. 2012. Qualitative interviewing and grounded theory analysis. The SAGE handbook of interview research: The complexity of the craft 2 (2012) 347--365.","DOI":"10.4135\/9781452218403.n25"},{"key":"e_1_2_1_21_1","volume-title":"International Review of Administrative Sciences","author":"Chen Can","year":"2021","unstructured":"Can Chen and Sukumar Ganapati. 2021. Do transparency mechanisms reduce government corruption? A meta-analysis. International Review of Administrative Sciences (2021), 00208523211033236."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpubeco.2014.03.010"},{"key":"e_1_2_1_23_1","first-page":"53","article-title":"A Trend You Can't Ignore: Social Media as Government Records and Its Impact on the Interpretation of the Law","volume":"31","author":"de Perio Wittman Jessica","year":"2021","unstructured":"Jessica de Perio Wittman. 2021. A Trend You Can't Ignore: Social Media as Government Records and Its Impact on the Interpretation of the Law. Alb. LJ Sci. & Tech. 31 (2021), 53.","journal-title":"Alb. LJ Sci. & Tech."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3476082"},{"key":"e_1_2_1_25_1","first-page":"18","article-title":"Hiding space: NASA's tips for avoiding scrutiny","volume":"31","author":"Doyle Kate","year":"1992","unstructured":"Kate Doyle. 1992. Hiding space: NASA's tips for avoiding scrutiny. Columbia Journalism Review 31, 2 (1992), 18--20.","journal-title":"Columbia Journalism Review"},{"key":"e_1_2_1_26_1","first-page":"2117","article-title":"Giving Away the Playbook: How North Carolina's Public Records Law Can Be Used to Harass, Intimidate, and Spy","volume":"91","author":"Fairchild Ryan C","year":"2012","unstructured":"Ryan C Fairchild. 2012. Giving Away the Playbook: How North Carolina's Public Records Law Can Be Used to Harass, Intimidate, and Spy. NCL Rev. 91 (2012), 2117.","journal-title":"NCL Rev."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42001-020-00094-5"},{"key":"e_1_2_1_28_1","unstructured":"Brennan Center for Justice. 2024. Brennan Center for Justice Amicus Brief in Murthy v. Missouri (Formerly Missouri v. Biden). https:\/\/www.brennancenter.org\/our-work\/court-cases\/murthy-v-missouri-formerly-missouri-v-biden"},{"key":"e_1_2_1_29_1","unstructured":"Knight Foundation. 2022. Nine universities and nonprofits awarded more than $1.2 million from Knight Foundation; to combat disinformation on communities of color. https:\/\/knightfoundation.org\/press\/releases\/nine-universities-andnonprofits-awarded-more-than-1--2-million-from-knight-foundation-to-combat-disinformation-on-communitiesof-color\/"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210604.3210629"},{"key":"e_1_2_1_31_1","volume-title":"Claudine Gay: What Just Happened at Harvard Is Bigger Than Me. The New York Times (Jan","author":"Gay Claudine","year":"2024","unstructured":"Claudine Gay. 2024. Claudine Gay: What Just Happened at Harvard Is Bigger Than Me. The New York Times (Jan 2024). https:\/\/www.nytimes.com\/2024\/01\/03\/opinion\/claudine-gay-harvard-president.html"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392862"},{"key":"e_1_2_1_33_1","first-page":"145","article-title":"The Chilling Effect of Sunlight: Preserving Academic Freedom in the Face of Abusive Open Records Requests","volume":"29","author":"Greenberg Zach","year":"2018","unstructured":"Zach Greenberg. 2018. The Chilling Effect of Sunlight: Preserving Academic Freedom in the Face of Abusive Open Records Requests. Geo. Mason UCRLJ 29 (2018), 145.","journal-title":"Geo. Mason UCRLJ"},{"key":"e_1_2_1_34_1","volume-title":"Journalism Source Protection Bill Gets a Last-Minute Senate Push. The Intercept (Dec","author":"Grim Ryan","year":"2022","unstructured":"Ryan Grim. 2022. Journalism Source Protection Bill Gets a Last-Minute Senate Push. The Intercept (Dec 2022). https:\/\/theintercept.com\/2022\/12\/15\/journalist-source-protection-press-act\/"},{"key":"e_1_2_1_35_1","unstructured":"Michael Halpern. 2015. Freedom to bully - union of concerned scientists. https:\/\/www.ucsusa.org\/sites\/default\/files\/ attach\/2015\/09\/freedom-to-bully-ucs-2015-final.pdf"},{"key":"e_1_2_1_36_1","volume-title":"QAnon and the information dark age. First Monday","author":"Hannah Matthew","year":"2021","unstructured":"Matthew Hannah. 2021. QAnon and the information dark age. First Monday (2021)."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675202"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3024969.3025041"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531674"},{"key":"e_1_2_1_40_1","unstructured":"Sue Curry Jansen and Brian Martin. 2015. The Streisand effect and censorship backfire. (2015)."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274351"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-012-9184-0"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.lisr.2022.101173"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555574"},{"key":"e_1_2_1_45_1","volume-title":"When faculty are bullied: the unacceptable costs of doing our job and what universities can and should do. FEBS letters","author":"Keashly Loraleigh","year":"2023","unstructured":"Loraleigh Keashly. 2023. When faculty are bullied: the unacceptable costs of doing our job and what universities can and should do. FEBS letters (2023)."},{"key":"e_1_2_1_46_1","unstructured":"Shea Kinser. 2020. . https:\/\/www.ucsusa.org\/sites\/default\/files\/2020-09\/science-in-an-age-of-scrutiny-2020.pdf"},{"key":"e_1_2_1_47_1","unstructured":"Puneet Kollipara. 2005. Open records laws becoming vehicle for harassing academic researchers report warns. https:\/\/www.science.org\/content\/article\/open-records-laws-becoming-vehicle-harassing-academicresearchers-report-warns"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3653710"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1080\/09585190903466855"},{"key":"e_1_2_1_50_1","unstructured":"North Carolina State Laws. 1995. Provisions for Copies of Public Records in North Carolina. https:\/\/www.ncleg.net\/ EnactedLegislation\/Statutes\/HTML\/BySection\/Chapter_132\/GS_132--6.2.html"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180875.1180950"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180875.1180950"},{"key":"e_1_2_1_53_1","first-page":"20","article-title":"Growing Demands for Public Records: How Should Boards Respond?","volume":"20","author":"Levinson-Waldman Rachel","year":"2012","unstructured":"Rachel Levinson-Waldman and Robert O'Neil. 2012. Growing Demands for Public Records: How Should Boards Respond?. Trusteeship 20, 1 (2012), 20--24.","journal-title":"Trusteeship"},{"key":"e_1_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Jiahang Li Christine Greenhow and Emilia Askari. 2017. Scholars in the Digital Age: Social Scholarship and Practices. In Research 2.0 and the Impact of Digital Technologies on Scholarly Inquiry. IGI Global 1--16.","DOI":"10.4018\/978-1-5225-0830-4.ch001"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2141512.2141523"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1177\/20563051211021378"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305118768302"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2021.082"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415204"},{"key":"e_1_2_1_60_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 1, CSCW","author":"McGregor Susan E","year":"2017","unstructured":"Susan E McGregor, Elizabeth Anne Watkins, and Kelly Caine. 2017. Would you Slack that? The impact of security and privacy on cooperative newsroom work. Proceedings of the ACM on Human-Computer Interaction 1, CSCW (2017), 1--22."},{"key":"e_1_2_1_61_1","first-page":"67","article-title":"Why","volume":"15","author":"Mclendon Michael K","year":"2004","unstructured":"Michael K Mclendon. 2004. Why\" Sunshine\" laws Matter: Emerging Issues for University Governance, leadership, and Policy. Metropolitan Universities 15, 1 (2004), 67--83.","journal-title":"Metropolitan Universities"},{"key":"e_1_2_1_62_1","volume-title":"Misinformation or activism?: analyzing networked moral panic through an exploration of# SaveTheChildren. Information","author":"Moran Rachel E","year":"2022","unstructured":"Rachel E Moran and Stephen Prochaska. 2022. Misinformation or activism?: analyzing networked moral panic through an exploration of# SaveTheChildren. Information, Communication & Society (2022), 1--21."},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531643"},{"key":"e_1_2_1_64_1","volume-title":"Studying mis-and disinformation in Asian diasporic communities: The need for critical transnational research beyond Anglocentrism. Harvard Kennedy School Misinformation Review","author":"Nguyn Sarah","year":"2022","unstructured":"Sarah Nguyn, Rachel Kuo, Madhavi Reddi, Lan Li, and Rachel E Moran. 2022. Studying mis-and disinformation in Asian diasporic communities: The need for critical transnational research beyond Anglocentrism. Harvard Kennedy School Misinformation Review (2022)."},{"key":"e_1_2_1_65_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev. 79 (2004), 119.","journal-title":"Wash. L. Rev."},{"key":"e_1_2_1_66_1","volume-title":"These academics studied falsehoods spread by Trump. Now the GOP wants answers. Washington Post (June","author":"Nix Naomi","year":"2023","unstructured":"Naomi Nix and Joseph Menn. 2023. These academics studied falsehoods spread by Trump. Now the GOP wants answers. Washington Post (June 2023). https:\/\/www.washingtonpost.com\/technology\/2023\/06\/06\/disinformationresearchers-congress-jim-jordan\/"},{"key":"e_1_2_1_67_1","unstructured":"Naomi Nix Cat Zakrzewski and Joseph Menn. 2023. Misinformation research is buckling under GOP legal attacks. https:\/\/www.washingtonpost.com\/technology\/2023\/09\/23\/online-misinformation-jim-jordan\/ Section: Technology."},{"key":"e_1_2_1_68_1","volume-title":"Distance matters. Human--computer interaction 15, 2--3","author":"Olson Gary M","year":"2000","unstructured":"Gary M Olson and Judith S Olson. 2000. Distance matters. Human--computer interaction 15, 2--3 (2000), 139--178."},{"key":"e_1_2_1_69_1","unstructured":"Committee on the Judiciary and the Select Subcommittee on the Weaponization of the Federal Government. 2023. The Weaponization of 'Disinformation' Pseudo-experts and Bureaucrats: How the Federal Government Partnered with Universities to Censor Americans' Political Speech. https:\/\/judiciary.house.gov\/sites\/evo-subsites\/republicansjudiciary. house.gov\/files\/evo-media-document\/EIP_Jira_Ticket_Staff_Report_11--6--23_Clean.pdf"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441955.2442032"},{"key":"e_1_2_1_71_1","unstructured":"Election Integrity Partnership. 2021. The Long Fuse: Misinformation and the 2020 Election. (2021)."},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1080\/07418825.2022.2086482"},{"key":"e_1_2_1_73_1","first-page":"208","article-title":"Open Records, Shuttered Labs: Ending Political Harassment of Public University Researchers","volume":"66","author":"Polsky Claudia","year":"2019","unstructured":"Claudia Polsky. 2019. Open Records, Shuttered Labs: Ending Political Harassment of Public University Researchers. UCLA L. Rev. 66 (2019), 208.","journal-title":"UCLA L. Rev."},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-010-9120-0"},{"key":"e_1_2_1_75_1","first-page":"425","article-title":"Sunburned: How Misuse of the Public Records Law Creates an Overburdened, More Expensive, and Less Transparent Government","volume":"44","year":"2014","unstructured":"KeithWRizzardi. 2014. Sunburned: How Misuse of the Public Records Law Creates an Overburdened, More Expensive, and Less Transparent Government. Stetson L. Rev. 44 (2014), 425.","journal-title":"Stetson L. Rev."},{"key":"e_1_2_1_76_1","volume-title":"The use of humor in the workplace","author":"Romero Eric J","year":"2006","unstructured":"Eric J Romero and Kevin W Cruthirds. 2006. The use of humor in the workplace. Academy of management perspectives 20, 2 (2006), 58--69."},{"key":"e_1_2_1_77_1","unstructured":"Rebecca Rutchick. 2013. On humor and healing: A qualitative analysis of expressions of humor in therapy with clients who have experienced trauma. Ph.D. Dissertation. Pepperdine University."},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00752449"},{"key":"e_1_2_1_79_1","volume-title":"Missouri attorney general seeks journalism school records","author":"Stafford Margaret","year":"2022","unstructured":"Margaret Stafford. 2022. Missouri attorney general seeks journalism school records. Associated Press (Sep 2022). https:\/\/apnews.com\/article\/journalism-missouri-government-and-politics-b1b0375433b5c817598c29bd29f208cc"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/192844.193021"},{"key":"e_1_2_1_81_1","unstructured":"Kate Starbird. 2023. Addressing falsehoods and the manipulated narrative of House Judiciary Committee Majority document: \"The Weaponization of CISA: How a 'Cybersecurity' Agency Colluded With Big Tech and 'Disinformation' Partners to Censor Americans\". https:\/\/www.cip.uw.edu\/2023\/08\/23\/starbird-house-judiciary-committee-report\/"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359229"},{"key":"e_1_2_1_83_1","volume-title":"Work and the division of labor. Sociological quarterly 26, 1","author":"Strauss Anselm","year":"1985","unstructured":"Anselm Strauss. 1985. Work and the division of labor. Sociological quarterly 26, 1 (1985), 1--19."},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145275"},{"key":"e_1_2_1_85_1","volume-title":"A few tiny steps towards transparency: how the Sunshine Act shone light on industry's influence in medicine. bmj 370","author":"Thacker Paul D","year":"2020","unstructured":"Paul D Thacker. 2020. A few tiny steps towards transparency: how the Sunshine Act shone light on industry's influence in medicine. bmj 370 (2020)."},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3462204.3483281"},{"volume-title":"The January 6th Report: The Report of the Select Committee to Investigate the January 6th Attack on the United States Capitol","author":"United States House Select Committee to Investigate the January 6th Attack on the US Capitol. 2022.","key":"e_1_2_1_87_1","unstructured":"United States House Select Committee to Investigate the January 6th Attack on the US Capitol. 2022. The January 6th Report: The Report of the Select Committee to Investigate the January 6th Attack on the United States Capitol. Simon and Schuster."},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449192"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1177\/0162243913516012"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/2685553.2685554"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556420.2556495"},{"key":"e_1_2_1_92_1","first-page":"88","article-title":"Misinformation has created a new world disorder","volume":"321","author":"Wardle Claire","year":"2019","unstructured":"Claire Wardle. 2019. Misinformation has created a new world disorder. Scientific American 321, 3 (2019), 88--93.","journal-title":"Scientific American"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/192426.192428"},{"key":"e_1_2_1_94_1","volume-title":"Sixteenth Symposium on Usable Privacy and Security (SOUPS","author":"Wermke Dominik","year":"2020","unstructured":"Dominik Wermke, Nicolas Huaman, Christian Stransky, Niklas Busch, Yasemin Acar, and Sascha Fahl. 2020. Cloudy with a chance of misconceptions: exploring users' perceptions and expectations of security and privacy in cloud office suites. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). 359--377."},{"key":"e_1_2_1_95_1","unstructured":"Roger D Wimmer and Joseph R Dominick. 2013. Mass Media Research. Cengage Learning."},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/3406865.3418594"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711050","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711050","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T00:48:15Z","timestamp":1755737295000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711050"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,2]]},"references-count":96,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,5,2]]}},"alternative-id":["10.1145\/3711050"],"URL":"https:\/\/doi.org\/10.1145\/3711050","relation":{},"ISSN":["2573-0142"],"issn-type":[{"type":"electronic","value":"2573-0142"}],"subject":[],"published":{"date-parts":[[2025,5,2]]},"assertion":[{"value":"2025-05-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}