Exploring the Utility Versus Intrusiveness of Dynamic Audience Selection on Facebook
暂无分享,去创建一个
Sindhu Kiranmai Ernala | Sauvik Das | Yuxi Wu | Stephanie S. Yang | Rachel Chen | Kristen Wells | S. Ernala | Sauvik Das | Yuxi Wu | Rachel Chen | Kristen Wells
[1] David R. Brake. Who Do They Think They’re Talking To? Framings of the Audience by Social Media Users , 2012 .
[2] Lujo Bauer,et al. Sharing Personal Content Online: Exploring Channel Choice and Multi-Channel Behaviors , 2016, CHI.
[3] Mohamed Shehab,et al. Policy-by-example for online social networks , 2012, SACMAT '12.
[4] H. Blumer. What Is Wrong with Social Theory , 1954 .
[5] Ramnath K. Chellappa,et al. Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma , 2005, Inf. Technol. Manag..
[6] Jacob Kramer-Duffield,et al. Friends only: examining a privacy-enhancing behavior in facebook , 2010, CHI.
[7] Alec Wolman,et al. Lockr: better privacy for social networks , 2009, CoNEXT '09.
[8] Adam D. I. Kramer,et al. Self-Censorship on Facebook , 2013, ICWSM.
[9] Hui Wang,et al. Semantics-Enhanced Privacy Recommendation for Social Networking Sites , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[10] Andrew Howes,et al. The problem of conflicting social spheres: effects of network structure on experienced tension in social network sites , 2009, CHI.
[11] Lorrie Faith Cranor,et al. The post that wasn't: exploring self-censorship on facebook , 2013, CSCW.
[12] Munmun De Choudhury,et al. Linguistic Markers Indicating Therapeutic Outcomes of Social Media Disclosures of Schizophrenia , 2017, Proc. ACM Hum. Comput. Interact..
[13] Yang Wang,et al. A field trial of privacy nudges for facebook , 2014, CHI.
[14] Danah Boyd,et al. I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience , 2011, New Media Soc..
[15] Jose M. Such,et al. PACMAN: Personal Agent for Access Control in Social Media , 2017, IEEE Internet Computing.
[16] Abdurrahman Can Kurtan,et al. Assisting humans in privacy management: an agent-based approach , 2020, Autonomous Agents and Multi-Agent Systems.
[17] M. Six Silberman,et al. When the implication is not to design (technology) , 2011, CHI.
[18] Pamela J. Wisniewski,et al. Fighting for my space: coping mechanisms for sns boundary regulation , 2012, CHI.
[19] Qian Yang,et al. Machine Learning as a UX Design Material: How Can We Imagine Beyond Automation, Recommenders, and Reminders? , 2018, AAAI Spring Symposia.
[20] Jonathan Grudin,et al. When social networks cross boundaries: a case study of workplace use of facebook and linkedin , 2009, GROUP.
[21] Erik Stolterman,et al. Concept-Driven Interaction Design Research , 2010, Hum. Comput. Interact..
[22] E. Litt. Knock, Knock. Who's There? The Imagined Audience , 2012 .
[23] Niloufar Salehi,et al. Random, Messy, Funny, Raw: Finstas as Intimate Reconfigurations of Social Media , 2020, CHI.
[24] James Fogarty,et al. Regroup: interactive machine learning for on-demand group creation in social networks , 2012, CHI.
[25] B. Wellman,et al. Imagining Twitter as an Imagined Community , 2011 .
[26] Dietram A. Scheufele,et al. Nonparticipation as Self-Censorship: Publicly Observable Political Activity in a Polarized Opinion Climate , 2006 .
[27] Meredith Ringel Morris,et al. Is anyone out there?: unpacking Q&A hashtags on twitter , 2014, CHI.
[28] Stephanie M. Reich,et al. Online and Offline Social Networks: Use of Social Networking Sites by Emerging Adults , 2008 .
[29] K. Karahalios,et al. "I always assumed that I wasn't really that close to [her]": Reasoning about Invisible Algorithms in News Feeds , 2015, CHI.
[30] Eszter Hargittai,et al. The Imagined Audience on Social Network Sites , 2016 .
[31] J. Fereday,et al. Demonstrating Rigor Using Thematic Analysis: A Hybrid Approach of Inductive and Deductive Coding and Theme Development , 2006 .
[32] Sameer Patil,et al. Balancing Audience and Privacy Tensions on Social Network Sites: Strategies of Highly Engaged Users , 2015 .
[33] Danah Boyd,et al. Networked privacy: How teenagers negotiate context in social media , 2014, New Media Soc..
[34] Lorrie Faith Cranor,et al. An Investigation into Facebook Friend Grouping , 2011, INTERACT.
[35] Jessica Vitak. The Impact of Context Collapse and Privacy on Social Network Site Disclosures , 2012 .
[36] Ed H. Chi,et al. Talking in circles: selective sharing in google+ , 2012, CHI.
[37] Glenn A. Bowen. Grounded Theory and Sensitizing Concepts , 2006 .
[38] E. Goffman. The Presentation of Self in Everyday Life , 1959 .
[39] Frederic Stutzman,et al. Boundary regulation in social media , 2012, CSCW.
[40] Cornelia Caragea,et al. Uncovering Scene Context for Predicting Privacy of Online Shared Images , 2018, AAAI.
[41] Harmanpreet Kaur,et al. Using affordances to improve AI support of social media posting decisions , 2020, IUI.
[42] Barbara Carminati,et al. Privacy Settings Recommender for Online Social Network , 2016, 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC).
[43] Eric Gilbert,et al. Designing social translucence over social networks , 2012, CHI.
[44] Cornelia Caragea,et al. A Group-Based Personalized Model for Image Privacy Classification and Labeling , 2017, IJCAI.
[45] E. Bucher,et al. The stress potential of social media in the workplace , 2013 .
[46] Jorge Gonçalves,et al. Sharing Ephemeral Information in Online Social Networks: Privacy Perceptions and Behaviours , 2011, INTERACT.
[47] Alessandro Acquisti,et al. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.
[48] Lee Humphreys,et al. Pinning Design: The Curatorial Labor of Creative Professionals , 2016 .
[49] B. Hogan. The Presentation of Self in the Age of Social Media: Distinguishing Performances and Exhibitions Online , 2010 .
[50] Michael S. Bernstein,et al. Quantifying the invisible audience in social networks , 2013, CHI.
[51] Cliff Lampe,et al. Calling All Facebook Friends: Exploring Requests for Help on Facebook , 2013, ICWSM.
[52] Naresh K. Malhotra,et al. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..
[53] M. Roblyer,et al. Findings on Facebook in higher education: A comparison of college faculty and student uses and perceptions of social networking sites , 2010, Internet High. Educ..
[54] Shriram Krishnamurthi,et al. Oops, I did it again: mitigating repeated access control errors on facebook , 2011, CHI.
[55] Mary Beth Rosson,et al. The personalization privacy paradox: An exploratory study of decision making process for location-aware marketing , 2011, Decis. Support Syst..
[56] Xuan Zhao,et al. The Social Media Ecology: User Perceptions, Strategies and Challenges , 2016, CHI.
[57] Yang Wang,et al. Smart, useful, scary, creepy: perceptions of online behavioral advertising , 2012, SOUPS.
[58] Robert E. Kraut,et al. Growing closer on facebook: changes in tie strength through social network site use , 2014, CHI.
[59] Heather Richter Lipford,et al. Configuring audience-oriented privacy policies , 2009, SafeConfig '09.
[60] Zeynep Tufekci. Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites , 2008 .
[61] Qian Yang,et al. Re-examining Whether, Why, and How Human-AI Interaction Is Uniquely Difficult to Design , 2020, CHI.
[62] Jules Polonetsky,et al. A Theory of Creepy: Technology, Privacy and Shifting Social Norms , 2013 .