{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T00:41:57Z","timestamp":1728175317541},"reference-count":48,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2012,7,1]],"date-time":"2012-07-01T00:00:00Z","timestamp":1341100800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers in Human Behavior"],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1016\/j.chb.2012.03.010","type":"journal-article","created":{"date-parts":[[2012,4,12]],"date-time":"2012-04-12T13:14:36Z","timestamp":1334236476000},"page":"1471-1477","source":"Crossref","is-referenced-by-count":56,"title":["Is online trust and trust in social institutions associated with online disclosure of identifiable information online?"],"prefix":"10.1016","volume":"28","author":[{"given":"Gustavo S.","family":"Mesch","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.chb.2012.03.010_b0005","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1111\/j.1540-4560.1977.tb01883.x","article-title":"Privacy regulation: Culturally universal or culturally specific?","volume":"33","author":"Altman","year":"1977","journal-title":"Journal of Social Issues"},{"key":"10.1016\/j.chb.2012.03.010_b0010","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1111\/1540-4560.00247","article-title":"Can you see the real me? Activation and expression of the \u201ctrue self\u201d on the Internet","volume":"58","author":"Bargh","year":"2002","journal-title":"Journal of Social Issues"},{"key":"10.1016\/j.chb.2012.03.010_b0020","first-page":"135","article-title":"Effects of four computer-mediated communications channels on trust development","volume":"4","author":"Bos","year":"2002","journal-title":"ACM Conference on Human Factors and Computing Systems, CHI Letters"},{"key":"10.1016\/j.chb.2012.03.010_b0025","series-title":"Disclosure processes in children and adolescents","first-page":"10","article-title":"Patterns and functions of self-disclosure during childhood and adolescence","author":"Buhrmester","year":"1995"},{"key":"10.1016\/j.chb.2012.03.010_b0030","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/BF01539442","article-title":"Gender-specific pathways to intimacy in early adolescence","volume":"19","author":"Camarena","year":"1990","journal-title":"Journal of Youth and Adolescence"},{"key":"10.1016\/j.chb.2012.03.010_b0035","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1089\/cpb.2006.9946","article-title":"Effects of motivations and gender on adolescents\u2019 self-disclosure in online chatting","volume":"10","author":"Cho","year":"2007","journal-title":"CyberPsychology & Behavior"},{"key":"10.1016\/j.chb.2012.03.010_b0040","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1177\/1461444808101618","article-title":"Multinational study on online privacy: Global concerns and local responses","volume":"11","author":"Cho","year":"2009","journal-title":"New Media & Society"},{"key":"10.1016\/j.chb.2012.03.010_b0045","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1037\/0033-2909.112.1.106","article-title":"Sex differences in self-disclosure: A meta-analysis","volume":"112","author":"Dindia","year":"1992","journal-title":"Psychological Bulletin"},{"key":"10.1016\/j.chb.2012.03.010_b0050","doi-asserted-by":"crossref","first-page":"737","DOI":"10.1016\/S1071-5819(03)00041-7","article-title":"On line trust: Concepts, evolving themes a model","volume":"58","author":"Corritore","year":"2003","journal-title":"International Journal of Human Computer Studies"},{"key":"10.1016\/j.chb.2012.03.010_b0060","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1348\/014466602321149849","article-title":"Conflicts among human values and trust in institutions","volume":"41","author":"Devosk","year":"2002","journal-title":"British Journal of Social Psychology"},{"key":"10.1016\/j.chb.2012.03.010_b0065","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1060.0080","article-title":"An extended privacy calculus model for e-commerce transactions","volume":"17","author":"Dinev","year":"2006","journal-title":"Information Systems Research"},{"key":"10.1016\/j.chb.2012.03.010_b0070","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1016\/j.jsis.2007.09.002","article-title":"Internet privacy concerns and beliefs about government surveillance-an empirical investigation","volume":"17","author":"Dinev","year":"2008","journal-title":"Journal of Strategic and Information Systems."},{"key":"10.1016\/j.chb.2012.03.010_b0075","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1080\/13691180600858606","article-title":"Trust in the Internet as an experience of technology","volume":"9","author":"Dutton","year":"2006","journal-title":"Information, Communication and Society"},{"key":"10.1016\/j.chb.2012.03.010_b0080","series-title":"Childhood and society","author":"Erikson","year":"1964"},{"key":"10.1016\/j.chb.2012.03.010_b0085","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1145\/355112.355120","article-title":"Trust online","volume":"43","author":"Friedman","year":"2000","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.chb.2012.03.010_b0095","first-page":"1085","article-title":"Exploring identity and identification in cyberspace","volume":"14","author":"Gandy","year":"2000","journal-title":"Journal of Law, Ethics and Public Policy"},{"key":"10.1016\/j.chb.2012.03.010_b0100","series-title":"The consequences of modernity","author":"Giddens","year":"1990"},{"key":"10.1016\/j.chb.2012.03.010_b0105","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1080\/01972240290108195","article-title":"Strong, weak, and latent ties and the impact of new media","volume":"18","author":"Haythornthwaite","year":"2002","journal-title":"Information Society"},{"key":"10.1016\/j.chb.2012.03.010_b0110","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1080\/01972240591007553","article-title":"Internet research and the sociology of cyber social scientific knowledge","volume":"21","author":"Hine","year":"2005","journal-title":"The Information Society"},{"key":"10.1016\/j.chb.2012.03.010_b0115","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1002\/j.1556-6676.1993.tb02666.x","article-title":"Willingness to seek help as a function of self-disclosure and problem severity","volume":"71","author":"Hinson","year":"1993","journal-title":"Journal of Counseling & Development"},{"key":"10.1016\/j.chb.2012.03.010_b0120","doi-asserted-by":"crossref","unstructured":"Hoofnagle, C.J., King, J., Li, S. & Turow, J. (2010). How different are young adults from older adults when it comes to information privacy attitudes and policies? 17.07.10.","DOI":"10.2139\/ssrn.1589864"},{"key":"10.1016\/j.chb.2012.03.010_b0125","series-title":"Close relationships","first-page":"187","article-title":"Trust in close relationships","author":"Holmes","year":"1989"},{"key":"10.1016\/j.chb.2012.03.010_b0130","series-title":"The Oxford handbook of Internet psychology","first-page":"237","article-title":"Self-disclosure, privacy and the Internet","author":"Joinson","year":"2007"},{"issue":"1","key":"10.1016\/j.chb.2012.03.010_b0135","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1080\/07370020903586662","article-title":"Privacy, trust and self disclosure online","volume":"25","author":"Joinson","year":"2010","journal-title":"Human Computer Interaction"},{"key":"10.1016\/j.chb.2012.03.010_b0140","series-title":"Social consequences of Internet use","author":"Katz","year":"2002"},{"key":"10.1016\/j.chb.2012.03.010_b0150","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1057\/jit.2010.6","article-title":"Online social networks: Why we disclose","volume":"25","author":"Krasnova","year":"2010","journal-title":"Journal of Information Technology"},{"issue":"2","key":"10.1016\/j.chb.2012.03.010_b0155","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1080\/019722499128565","article-title":"What\u2019s in a name? Some reflections on the sociology of anonymity","volume":"15","author":"Marx","year":"1999","journal-title":"The Information Society"},{"key":"10.1016\/j.chb.2012.03.010_b0160","doi-asserted-by":"crossref","first-page":"603","DOI":"10.1111\/j.1468-2958.2010.01389.x","article-title":"Are norms of disclosure of online and offline personal information associated with the disclosure of personal information online?","volume":"36","author":"Mesch","year":"2010","journal-title":"Human Communication Research"},{"key":"10.1016\/j.chb.2012.03.010_b0165","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1111\/j.1475-6811.1995.tb00086.x","article-title":"Gender differences in power and self-disclosure in dating and married couples","volume":"2","author":"Murstein","year":"1995","journal-title":"Personal Relationships"},{"key":"10.1016\/j.chb.2012.03.010_b0170","first-page":"406","article-title":"All about me in online social networking profiles: The case of facebook","volume":"26","author":"Nosko","year":"2009","journal-title":"Computers in Human Interaction"},{"key":"10.1016\/j.chb.2012.03.010_b0175","doi-asserted-by":"crossref","first-page":"526","DOI":"10.1016\/j.ijhcs.2006.12.001","article-title":"Internet user\u2019s perceptions of privacy concerns\u2019 and privacy actions","volume":"28","author":"Paine","year":"2007","journal-title":"International Journal of Human Computer Studies"},{"key":"10.1016\/j.chb.2012.03.010_b0180","doi-asserted-by":"crossref","first-page":"1228","DOI":"10.1111\/j.1083-6101.2007.00380.x","article-title":"Anonymity and self-disclosure on weblogs","volume":"12","author":"Qian","year":"2007","journal-title":"Journal of Computer Mediated Communication"},{"key":"10.1016\/j.chb.2012.03.010_b0270","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1037\/0003-066X.35.1.1","article-title":"Interpersonal trust, trustworthiness, and gullibility","volume":"35","author":"Rotter","year":"1980","journal-title":"American Psychologist"},{"key":"10.1016\/j.chb.2012.03.010_b0185","unstructured":"Scott, C. R. (2004). Benefits and drawbacks of anonymous online communication: Legal challenges and communicative recommendations. In S. Drucker (Ed.). Free Speech Yearbook (Vol. 41) (pp. 127\u2013141), Washington, DC: National Communication Association."},{"key":"10.1016\/j.chb.2012.03.010_b0190","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1080\/15213260701375686","article-title":"Precursors and underlying processes of adolescents\u2019 online self disclosure","volume":"10","author":"Schouten","year":"2007","journal-title":"Media Psychology"},{"key":"10.1016\/j.chb.2012.03.010_b0200","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1146\/annurev.soc.012809.102526","article-title":"Race and trust","volume":"36","author":"Smith","year":"2010","journal-title":"Annual Review of Sociology"},{"key":"10.1016\/j.chb.2012.03.010_b0205","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1348\/026151008X345979","article-title":"In their words: Connecting on-line weblogs to developmental processes","volume":"27","author":"Subrahmanyam","year":"2009","journal-title":"British Journal of Developmental Psychology"},{"key":"10.1016\/j.chb.2012.03.010_b0210","doi-asserted-by":"crossref","first-page":"857","DOI":"10.1521\/jscp.23.6.857.54803","article-title":"Self-disclosure in intimate relationships: Associations with individual and relationship characteristics over time","volume":"23","author":"Sprecher","year":"2004","journal-title":"Journal of Social & Clinical Psychology"},{"key":"10.1016\/j.chb.2012.03.010_b0220","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1089\/1094931041291295","article-title":"The online disinhibition effect","volume":"7","author":"Suler","year":"2004","journal-title":"Cyberpsychology & Behavior"},{"key":"10.1016\/j.chb.2012.03.010_b0225","first-page":"959","article-title":"Early adolescent age and gender differences in patterns of emotional self-disclosure to parents and friends","volume":"25","author":"Papini","year":"1990","journal-title":"Adolescence"},{"key":"10.1016\/j.chb.2012.03.010_b0230","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1111\/j.1468-2958.2002.tb00811.x","article-title":"Computer-mediated communication effects on disclosure, impressions, and interpersonal evaluations: Getting to know one another a bit at a time","volume":"28","author":"Tidwell","year":"2002","journal-title":"Human Communication Research"},{"key":"10.1016\/j.chb.2012.03.010_b0235","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1177\/0270467607311484","article-title":"Can you see me now? Audience and disclosure regulation in online social network sites","volume":"28","author":"Tufecki","year":"2008","journal-title":"Bulletin of Science, Technology and Society"},{"key":"10.1016\/j.chb.2012.03.010_b0240","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1177\/1461444807072219","article-title":"Internet privacy and institutional: Insights from a national survey","volume":"9","author":"Turow","year":"2007","journal-title":"New Media and Society"},{"key":"10.1016\/j.chb.2012.03.010_b0275","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1145\/355112.355125","article-title":"Social capital and the net","volume":"43","author":"Uslander","year":"2000","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.chb.2012.03.010_b0245","series-title":"The moral foundations of trust","author":"Uslander","year":"2002"},{"key":"10.1016\/j.chb.2012.03.010_b0250","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1177\/009365096023001001","article-title":"Computer mediated communication: Impersonal, interpersonal and hyperpersonal interaction","volume":"23","author":"Walther","year":"1996","journal-title":"Communication Research"},{"key":"10.1016\/j.chb.2012.03.010_b0255","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/j.chb.2003.11.008","article-title":"An overview of online trust: Concepts, elements and implications","volume":"21","author":"Wang","year":"2005","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2012.03.010_b0260","series-title":"Proceedings of the ACM CHI 96 human factors in computing systems conference","first-page":"3","article-title":"Self-disclosure on computer forms: Meta-analysis and implications","author":"Weisband","year":"1996"}],"container-title":["Computers in Human Behavior"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563212000763?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563212000763?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,6,27]],"date-time":"2019-06-27T05:18:02Z","timestamp":1561612682000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0747563212000763"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":48,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,7]]}},"alternative-id":["S0747563212000763"],"URL":"https:\/\/doi.org\/10.1016\/j.chb.2012.03.010","relation":{},"ISSN":["0747-5632"],"issn-type":[{"value":"0747-5632","type":"print"}],"subject":[],"published":{"date-parts":[[2012,7]]}}}