{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T15:25:24Z","timestamp":1726759524142},"reference-count":53,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2012,5,1]],"date-time":"2012-05-01T00:00:00Z","timestamp":1335830400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers in Human Behavior"],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1016\/j.chb.2012.01.005","type":"journal-article","created":{"date-parts":[[2012,2,10]],"date-time":"2012-02-10T06:47:09Z","timestamp":1328856429000},"page":"1028-1035","source":"Crossref","is-referenced-by-count":32,"title":["Distance, ambiguity and appropriation: Structures affording impression management in a collocated organization"],"prefix":"10.1016","volume":"28","author":[{"given":"Jeremy","family":"Birnholtz","sequence":"first","affiliation":[]},{"given":"Graham","family":"Dixon","sequence":"additional","affiliation":[]},{"given":"Jeffrey","family":"Hancock","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.chb.2012.01.005_b0005","series-title":"Managing the flow of technology","author":"Allen","year":"1977"},{"key":"10.1016\/j.chb.2012.01.005_b0010","doi-asserted-by":"crossref","unstructured":"Aoki, P., & Woodruff, A. (2005). Making space for stories: Ambiguity in the design of personal communication systems. In Proceedings of the SIGCHI Conference on Human factors in Computing Systems (pp. 181\u2013190).","DOI":"10.1145\/1054972.1054998"},{"key":"10.1016\/j.chb.2012.01.005_b0015","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/s00779-005-0052-5","article-title":"Social functions of location in mobile telephony","volume":"10","author":"Arminen","year":"2006","journal-title":"Personal and Ubiquitous Computing"},{"key":"10.1016\/j.chb.2012.01.005_b0020","doi-asserted-by":"crossref","unstructured":"Bailey, D. E., Leonardi, P. M., & Barley, S. R. (2011). The lure of the virtual. Organization Science. Available from doi:10.1287\/orsc.1110.0703.","DOI":"10.1287\/orsc.1110.0703"},{"key":"10.1016\/j.chb.2012.01.005_b0270","unstructured":"Barkuus, L., & Dey, A. (2003). Location-Based Services for Mobile Telephony: a Study of Users\u2019 Privacy Concerns. INTERACT: In Proceedings of INTERACT (pp. 709\u2013712)."},{"key":"10.1016\/j.chb.2012.01.005_b0030","doi-asserted-by":"crossref","unstructured":"Bellotti, V., & Bly, S. (1996). Walking away from the desktop computer: Distributed collaboration and mobility in a product design team. In Proceedings of the ACM Conference on computer-supported cooperative work (pp. 209\u2013218).","DOI":"10.1145\/240080.240256"},{"key":"10.1016\/j.chb.2012.01.005_b0035","doi-asserted-by":"crossref","first-page":"2226","DOI":"10.1002\/asi.20684","article-title":"When do researchers collaborate? Toward a model of collaboration propensity in science and engineering","volume":"58","author":"Birnholtz","year":"2007","journal-title":"Journal of the American Society for Information Science"},{"key":"10.1016\/j.chb.2012.01.005_b0040","doi-asserted-by":"crossref","unstructured":"Birnholtz, J., Guillory, J., Hancock, J. T., & Bazarova, N. (2010). \u201con my way\u201d: Deceptive texting and interpersonal awareness narratives. In Proceedings of the ACM Conference on computer-supported cooperative work (pp. 1\u20134).","DOI":"10.1145\/1718918.1718920"},{"key":"10.1016\/j.chb.2012.01.005_b0045","first-page":"51","article-title":"Privacy in the open: How attention mediates awareness and privacy in open-plan offices","volume":"07","author":"Birnholtz","year":"2007","journal-title":"In Proc Group"},{"key":"10.1016\/j.chb.2012.01.005_b0050","doi-asserted-by":"crossref","unstructured":"Boehner, K., & Hancock, J. (2006). Advancing ambiguity. In Proceedings of the SIGCHI Conference on Human factors in computing systems (pp. 103\u2013107).","DOI":"10.1145\/1124772.1124789"},{"key":"10.1016\/j.chb.2012.01.005_b0055","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1145\/1067860.1067868","article-title":"The language of privacy: Learning from video media space analysis and design","volume":"12","author":"Boyle","year":"2005","journal-title":"ACM Transactions on Computer\u2013Human Interaction"},{"key":"10.1016\/j.chb.2012.01.005_b0060","unstructured":"Buchanan, M. (2009). Gizmodo: Palm Pre \u201cOops I\u2019m Late\u201d Feature sounds kind of horrible. Accessed 10.12.11."},{"key":"10.1016\/j.chb.2012.01.005_b0065","series-title":"Always on: How the iPhone unlocked the anything\u2013anytime\u2013anywhere future- and locked us in","author":"Chen","year":"2011"},{"key":"10.1016\/j.chb.2012.01.005_b0070","series-title":"Perspectives on socially shared cognition","first-page":"127","article-title":"Grounding in Communication","author":"Clark","year":"1991"},{"key":"10.1016\/j.chb.2012.01.005_b0075","series-title":"Handbook of language and social psychology","first-page":"227","article-title":"Interpersonal accounting","author":"Cody","year":"1990"},{"key":"10.1016\/j.chb.2012.01.005_b0080","doi-asserted-by":"crossref","unstructured":"Consolvo, S., Smith, I., Matthews, T., LaMarca, A., Tabert, J., & Powledge, P. (2005). Location disclosure to social relations. Proceedings of the SIGCHI conference on human factors in computing systems (pp. 81\u201390).","DOI":"10.1145\/1054972.1054985"},{"key":"10.1016\/j.chb.2012.01.005_b0085","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.respol.2007.09.001","article-title":"Coordination costs and project outcomes in multi-university collaborations","volume":"36","author":"Cummings","year":"2007","journal-title":"Research Policy"},{"key":"10.1016\/j.chb.2012.01.005_b0090","unstructured":"Czerwinski, M., Horvitz, E., & Wilhite, S. (2004). A diary study of task switching and interruptions. In CHI \u201804: Proceedings of the SIGCHI conference on Human factors in, computing systems (pp. 175\u2013182)."},{"key":"10.1016\/j.chb.2012.01.005_b0095","article-title":"Communication processes for virtual organizations","volume":"3","author":"DeSanctis","year":"1998","journal-title":"Journal of Computer Mediated Communication"},{"key":"10.1016\/j.chb.2012.01.005_b0100","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1287\/orsc.5.2.121","article-title":"Capturing the complexity in advanced technology use: Adaptive structuration theory","volume":"5","author":"DeSanctis","year":"1994","journal-title":"Organization Science"},{"issue":"3","key":"10.1016\/j.chb.2012.01.005_b0105","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1111\/1468-005X.00120","article-title":"Controlling teleworkers: Supervision and flexibility revisited","volume":"18","author":"Dimitrova","year":"2003","journal-title":"New Technology, Work and Employment"},{"key":"10.1016\/j.chb.2012.01.005_b0110","unstructured":"Ellison, N. B., Hancock, J. T., & Toma, C. (in press). Profile as promise: A framework for conceptualizing veracity in online dating self-presentations. New Media and Society. Availabel from: http:\/\/nms.sagepub.com\/content\/early\/2011\/06\/24\/1461444811410395 (accessed January 25, 2012)."},{"key":"10.1016\/j.chb.2012.01.005_b0115","doi-asserted-by":"crossref","unstructured":"Gonzalez, V. & Mark, G. (2004). \u201cConstant, constant, multi-tasking craziness\u201d: Managing multiple working spheres. In Proc. Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI 04) (pp. 113\u2013120).","DOI":"10.1145\/985692.985707"},{"key":"10.1016\/j.chb.2012.01.005_b0120","first-page":"245","article-title":"Why groupware applications fail: Problems in design and evaluation","volume":"4","author":"Grudin","year":"1989","journal-title":"Office: Technology & People"},{"key":"10.1016\/j.chb.2012.01.005_b0125","unstructured":"Hancock, J. T., Birnholtz, J., Bazarova, N., Guillory, J., Perlin, J., & Amos, B. (2009). Butler lies: Awareness, deception and design. In: Proc. ACM CHI (pp. 517\u2013526)."},{"key":"10.1016\/j.chb.2012.01.005_b0130","unstructured":"Handel, M. & Herbsleb, J. (2002). What is chat doing in the workplace? In Proceedings of the ACM conference on computer-supported cooperative work (pp. 1\u201310)."},{"key":"10.1016\/j.chb.2012.01.005_b0135","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1145\/358916.359003","article-title":"Distance, dependencies and delay in a global collaboration","volume":"2000","author":"Herbsleb","year":"2000","journal-title":"In Proceedings of the ACM conference on computer-supported cooperative work"},{"issue":"6","key":"10.1016\/j.chb.2012.01.005_b0140","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1287\/orsc.14.6.615.24872","article-title":"Out of sight, out of sync: Understanding conflict in distributed teams","volume":"14","author":"Hinds","year":"2003","journal-title":"Organization Science"},{"key":"10.1016\/j.chb.2012.01.005_b0145","unstructured":"Huberman, A. M., & Miles, M. B. (1994). Data management and analysis methods. In Lincoln & Denzin (Eds.), Handbook of Qualitative Research. Thousand Oaks, CA: Sage."},{"key":"10.1016\/j.chb.2012.01.005_b0150","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1017\/S0047404500014780","article-title":"Ostensible invitations","volume":"19","author":"Isaacs","year":"1990","journal-title":"Language in Society"},{"issue":"1","key":"10.1016\/j.chb.2012.01.005_b0275","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1006\/ijhc.2001.0517","article-title":"Virtual team awareness and groupware support: An evaluation of the teamSCOPE system","volume":"56","author":"Jang","year":"2002","journal-title":"International Journal of Human-Computer Studies"},{"key":"10.1016\/j.chb.2012.01.005_b0160","unstructured":"Kraut, R., Egido, C., & Galegher, J. (1990). Patterns of contact and communication in scientific research collaborations. In R. Galegher Kraut, & Egido, C., J (Ed.), Intellectual Teamwork. Hillsdale, NJ: Lawrence Erlbaum Associates."},{"issue":"1","key":"10.1016\/j.chb.2012.01.005_b0165","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1080\/00909880903483599","article-title":"The connectivity paradox: Using technology to both decrease and increase perceptions of distance in distributed work arrangements","volume":"38","author":"Leonardi","year":"2010","journal-title":"Journal of Applied Communication Research"},{"key":"10.1016\/j.chb.2012.01.005_b0170","doi-asserted-by":"crossref","unstructured":"Lindqvist, J., Cranshaw, J., Wiese, J., Hong, J., & Zimmerman, J. (2011). I\u2019m the mayor of my house: Examining why people use foursquare \u2013 A social-driven location sharing application. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 2409\u20132418).","DOI":"10.1145\/1978942.1979295"},{"key":"10.1016\/j.chb.2012.01.005_b0175","doi-asserted-by":"crossref","unstructured":"Mynatt, E. D., & Tullio, J. (2001). Inferring calendar event attendance. In Proc. International conference on intelligent user, interfaces (pp. 121\u2013128).","DOI":"10.1145\/359784.360310"},{"key":"10.1016\/j.chb.2012.01.005_b0180","series-title":"Cyberscience: Research in the age of the internet","author":"Nentwich","year":"2003"},{"key":"10.1016\/j.chb.2012.01.005_b0185","series-title":"Privacy in context technology, policy, and the integrity of social life","author":"Nissenbaum","year":"2010"},{"key":"10.1016\/j.chb.2012.01.005_b0190","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1207\/S15327051HCI1523_4","article-title":"Distance matters","volume":"15","author":"Olson","year":"2001","journal-title":"Human\u2013Computer Interaction"},{"key":"10.1016\/j.chb.2012.01.005_b0195","series-title":"Scientific collaboration on the internet","author":"Olson","year":"2008"},{"issue":"4","key":"10.1016\/j.chb.2012.01.005_b0200","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1287\/orsc.11.4.404.14600","article-title":"Using technology and constituting structures: A practice lens for studying technology in organizations","volume":"11","author":"Orlikowski","year":"2000","journal-title":"Organization Science"},{"key":"10.1016\/j.chb.2012.01.005_b0205","unstructured":"Palen, L., & Grudin, J. (2002). Discretionary adoption of group support software: Lessons from calendar applications. In B. E. Munkvold (Ed.), Organizational implementation of collaboration technology (pp. 159\u2013180)."},{"key":"10.1016\/j.chb.2012.01.005_b0210","doi-asserted-by":"crossref","unstructured":"Reynolds, L., Gillette, S., Marder, J., Miles, Z., Vodenski, P., Weintraub, A., et al. (2011). Contact stratification and deception. In Proceedings of the ACM conference on computer-supported cooperative work (pp. 221\u2013224).","DOI":"10.1145\/1958824.1958857"},{"key":"10.1016\/j.chb.2012.01.005_b0215","doi-asserted-by":"crossref","first-page":"46","DOI":"10.2307\/2092239","article-title":"Accounts","volume":"33","author":"Scott","year":"1968","journal-title":"American Sociological Review"},{"key":"10.1016\/j.chb.2012.01.005_b0220","series-title":"Americans and their cell phones","author":"Smith","year":"2011"},{"key":"10.1016\/j.chb.2012.01.005_b0225","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1229855.1229860","article-title":"Approaching and leave-taking: Negotiating contact in computer-mediated communication","volume":"14","author":"Tang","year":"2007","journal-title":"ACM Transactions on Computer-Human Interaction"},{"issue":"7","key":"10.1016\/j.chb.2012.01.005_b0230","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1109\/TSE.2002.1019481","article-title":"Rapid software development through team collocation","volume":"28","author":"Teasley","year":"2002","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.chb.2012.01.005_b0235","doi-asserted-by":"crossref","first-page":"1023","DOI":"10.1177\/0146167208318067","article-title":"Separating fact from fiction: An examination of deceptive self-presentation in online dating profiles","volume":"34","author":"Toma","year":"2008","journal-title":"Personality and Social Psychology Bulletin"},{"key":"10.1016\/j.chb.2012.01.005_b0240","series-title":"Life on the screen: Identity in the age of the Internet","author":"Turkle","year":"1995"},{"key":"10.1016\/j.chb.2012.01.005_b0245","series-title":"Alone together: Why we expect more from technology and less from each other","author":"Turkle","year":"2011"},{"key":"10.1016\/j.chb.2012.01.005_b0250","doi-asserted-by":"crossref","unstructured":"Tyler, J. R., & Tang, J. C. (2003). When can i expect an Email response? A study of rhythms in email usage. In Proceedings of the European Conference on Computer-Supported Cooperative Work (pp. 14\u201318).","DOI":"10.1007\/978-94-010-0068-0_13"},{"key":"10.1016\/j.chb.2012.01.005_b0255","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1207\/s15327051hci2001&2_3","article-title":"Supporting collaborative task management with email","volume":"20","author":"Whittaker","year":"2005","journal-title":"Human\u2013Computer Interaction"},{"key":"10.1016\/j.chb.2012.01.005_b0265","doi-asserted-by":"crossref","unstructured":"Whittaker, S., & Sidner, C. (1996). Email overload: Exploring personal information management. In Proceedings of the SIGCHI Conference of Human factors in computing systems (pp. 276\u2013283).","DOI":"10.1145\/238386.238530"},{"key":"10.1016\/j.chb.2012.01.005_b0260","unstructured":"Whittaker, S., Frohlich, D., & Daly-Jones, O. (1994). Informal workplace communication: What is it like and how might we support it? In Proc. ACM CHI (pp. 131\u2013137)."}],"container-title":["Computers in Human Behavior"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563212000076?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563212000076?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,6,23]],"date-time":"2019-06-23T12:39:44Z","timestamp":1561293584000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0747563212000076"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":53,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,5]]}},"alternative-id":["S0747563212000076"],"URL":"https:\/\/doi.org\/10.1016\/j.chb.2012.01.005","relation":{},"ISSN":["0747-5632"],"issn-type":[{"value":"0747-5632","type":"print"}],"subject":[],"published":{"date-parts":[[2012,5]]}}}