{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,20]],"date-time":"2023-08-20T00:53:33Z","timestamp":1692492813881},"reference-count":51,"publisher":"Oxford University Press (OUP)","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Interacting with Computers"],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1016\/j.intcom.2009.10.002","type":"journal-article","created":{"date-parts":[[2009,11,3]],"date-time":"2009-11-03T10:36:40Z","timestamp":1257244600000},"page":"206-217","source":"Crossref","is-referenced-by-count":12,"title":["Enhancing privacy management support in instant messaging"],"prefix":"10.1093","volume":"22","author":[{"given":"Sameer","family":"Patil","sequence":"first","affiliation":[]},{"given":"Alfred","family":"Kobsa","sequence":"additional","affiliation":[]}],"member":"286","reference":[{"key":"10.1016\/j.intcom.2009.10.002_bib1","series-title":"CHI \u201999: CHI \u201999 Extended Abstracts on Human Factors in Computing Systems","first-page":"258","article-title":"Privacy critics: UI components to safeguard users\u2019 privacy","author":"Ackerman","year":"1999"},{"issue":"1","key":"10.1016\/j.intcom.2009.10.002_bib2","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/244754.244756","article-title":"Hanging on the \u2019wire: a field study of an audio-only media space","volume":"4","author":"Ackerman","year":"1997","journal-title":"ACM Transactions on Computer\u2013Human Interaction"},{"key":"10.1016\/j.intcom.2009.10.002_bib3","series-title":"CHI \u201999: CHI \u201999 Extended Abstracts on Human Factors in Computing Systems","first-page":"53","article-title":"Users\u2019 perception of privacy in multimedia communication","author":"Adams","year":"1999"},{"key":"10.1016\/j.intcom.2009.10.002_bib4","unstructured":"Adams, A., Sasse, M.A., 1999. Privacy issues in ubiquitous multimedia environments: wake sleeping dogs, or let them lie? In: Seventh IFIP Conference on Human\u2013Computer Interaction INTERACT \u201999, pp. 214\u2013221."},{"key":"10.1016\/j.intcom.2009.10.002_bib5","series-title":"SOFSEM \u201999: Proceedings of the 26th Conference on Current Trends in Theory and Practice of Informatics on Theory and Practice of Informatics","first-page":"66","article-title":"WWW based collaboration with the BSCW system","author":"Appelt","year":"1999"},{"key":"10.1016\/j.intcom.2009.10.002_bib6","series-title":"CSCW \u201902: Proceedings of the 2002 ACM Conference on Computer Supported Cooperative Work","first-page":"334","article-title":"Work rhythms: analyzing visualizations of awareness histories of distributed groups","author":"Begole","year":"2002"},{"key":"10.1016\/j.intcom.2009.10.002_bib7","series-title":"ECSCW \u201993: Proceedings of the Third European Conference on Computer-Supported Cooperative Work","first-page":"77","article-title":"Design for privacy in ubiquitous computing environments","author":"Bellotti","year":"1993"},{"key":"10.1016\/j.intcom.2009.10.002_bib8","series-title":"WPES \u201904: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society","first-page":"77","article-title":"Off-the-record communication, or, why not to use PGP","author":"Borisov","year":"2004"},{"key":"10.1016\/j.intcom.2009.10.002_bib9","series-title":"CSCW \u201900: Proceedings of the 2000 ACM Conference on Computer Supported Cooperative Work","first-page":"1","article-title":"The effects of filtered video on awareness and privacy","author":"Boyle","year":"2000"},{"key":"10.1016\/j.intcom.2009.10.002_bib10","unstructured":"Business Wire, 2008. Self-Destructing SMS Text Messaging Application for Blackberry Phones Available from BigString Corporation. ."},{"key":"10.1016\/j.intcom.2009.10.002_bib11","unstructured":"Calore, M., 2006. Privacy Fears Shock Facebook. Wired News: ."},{"key":"10.1016\/j.intcom.2009.10.002_bib12","series-title":"Eclipse \u201903: Proceedings of the 2003 OOPSLA Workshop on Eclipse Technology eXchange","first-page":"45","article-title":"Jazzing up eclipse with collaborative tools","author":"Cheng","year":"2003"},{"key":"10.1016\/j.intcom.2009.10.002_bib13","series-title":"CHI \u201905: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","first-page":"81","article-title":"Location disclosure to social relations: why, when, & what people want to share","author":"Consolvo","year":"2005"},{"key":"10.1016\/j.intcom.2009.10.002_bib14","unstructured":"Cranor, L., Dobbs, B., Egelman, S., Hogben, G., Humphrey, J., Langheinrich, M., Marchiori, M., Presler-Marshall, M., Reagle, J., Schunter, M., Stampley, D.A., Wenning, R., 2006. The Platform for Privacy Preferences 1.1 (P3P1.1) Specification. Technical Report, W3C Working Group Note. ."},{"key":"10.1016\/j.intcom.2009.10.002_bib15","series-title":"ECSCW \u201993: Proceedings of the Third European Conference on Computer-Supported Cooperative Work","first-page":"125","article-title":"Culture and control in a media space","author":"Dourish","year":"1993"},{"key":"10.1016\/j.intcom.2009.10.002_bib16","unstructured":"Dourish, P., Anderson, K., 2005. Privacy, security and risk and danger and secrecy and trust and identity and morality and power: understanding collective information practices. Technical Report UCI-ISR-05-1. Institute for Software Research, University of California, Irvine."},{"key":"10.1016\/j.intcom.2009.10.002_bib17","series-title":"CSCW \u201996: Proceedings of the 1996 ACM Conference on Computer Supported Cooperative Work","first-page":"11","article-title":"Policies and roles in collaborative applications","author":"Edwards","year":"1996"},{"key":"10.1016\/j.intcom.2009.10.002_bib18","series-title":"CHI \u201992: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","first-page":"27","article-title":"Realizing a video environment: EuroPARC\u2019s RAVE system","author":"Gaver","year":"1992"},{"key":"10.1016\/j.intcom.2009.10.002_bib19","series-title":"CSCW \u201902: Proceedings of the 2002 ACM Conference on Computer Supported Cooperative Work","first-page":"21","article-title":"Instant messaging in teen life","author":"Grinter","year":"2002"},{"key":"10.1016\/j.intcom.2009.10.002_bib20","series-title":"CHI \u201903: CHI \u201903 Extended Abstracts on Human Factors in Computing Systems","first-page":"784","article-title":"AwarenessMaps: visualizing awareness in shared workspaces","author":"Gross","year":"2003"},{"key":"10.1016\/j.intcom.2009.10.002_bib21","series-title":"CHI \u201902: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","first-page":"171","article-title":"Introducing instant messaging and chat in the workplace","author":"Herbsleb","year":"2002"},{"key":"10.1016\/j.intcom.2009.10.002_bib22","series-title":"DIS \u201904: Proceedings of the 2004 Conference on Designing Interactive Systems","first-page":"91","article-title":"Privacy risk models for designing privacy-sensitive ubiquitous computing systems","author":"Hong","year":"2004"},{"issue":"5","key":"10.1016\/j.intcom.2009.10.002_bib23","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MSP.2005.137","article-title":"Valuating Privacy","volume":"3","author":"Huberman","year":"2005","journal-title":"IEEE Security and Privacy"},{"key":"10.1016\/j.intcom.2009.10.002_bib24","series-title":"CSCW \u201996: Proceedings of the 1996 ACM Conference on Computer Supported Cooperative Work","first-page":"248","article-title":"Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems","author":"Hudson","year":"1996"},{"key":"10.1016\/j.intcom.2009.10.002_bib25","series-title":"CHI \u201905: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","first-page":"91","article-title":"Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing","author":"Iachello","year":"2005"},{"issue":"9","key":"10.1016\/j.intcom.2009.10.002_bib26","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1145\/567498.567501","article-title":"Mobile instant messaging through Hubbub","volume":"45","author":"Isaacs","year":"2002","journal-title":"Communications of the ACM"},{"issue":"10","key":"10.1016\/j.intcom.2009.10.002_bib27","first-page":"38","article-title":"Academic sojourners, culture shock and intercultural adaptation: a trend analysis","author":"Khan","year":"2007","journal-title":"Studies About Languages"},{"key":"10.1016\/j.intcom.2009.10.002_bib28","unstructured":"Kobsa, A., Patil, S., Meyer, B., 2010. Privacy in instant messaging: an impression management model, under review."},{"key":"10.1016\/j.intcom.2009.10.002_bib29","series-title":"Privacy Enhancing Technologies: Fourth International Workshop, PET 2004","first-page":"329","article-title":"Contextualized communication of privacy practices and personalization benefits: impacts on users\u2019 data sharing and purchase behavior","author":"Kobsa","year":"2005"},{"key":"10.1016\/j.intcom.2009.10.002_bib30","series-title":"CSCW \u201988: Proceedings of the 1988 ACM Conference on Computer-Supported Cooperative Work","first-page":"1","article-title":"Patterns of contact and communication in scientific research collaboration","author":"Kraut","year":"1988"},{"key":"10.1016\/j.intcom.2009.10.002_bib31","unstructured":"Landesberg, M.K., Levin, T.M., Curtin, C.G., Lev, O., 1998. Privacy Online: A Report to Congress. Technical Report, Federal Trade Commission. ."},{"key":"10.1016\/j.intcom.2009.10.002_bib32","series-title":"UbiComp \u201901: Proceedings of the 3rd International Conference on Ubiquitous Computing","first-page":"273","article-title":"Privacy by design \u2013 principles of privacy-aware ubiquitous systems","author":"Langheinrich","year":"2001"},{"issue":"10","key":"10.1016\/j.intcom.2009.10.002_bib33","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1145\/317665.317680","article-title":"Privacy interfaces for information management","volume":"42","author":"Lau","year":"1999","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.intcom.2009.10.002_bib34","series-title":"Self-Presentation: Impression Management and Interpersonal Behavior","author":"Leary","year":"1996"},{"key":"10.1016\/j.intcom.2009.10.002_bib35","series-title":"CHI \u201903: CHI \u201903 Extended Abstracts on Human Factors in Computing Systems","first-page":"724","article-title":"Who wants to know what when? privacy preference determinants in ubiquitous computing","author":"Lederer","year":"2003"},{"key":"10.1016\/j.intcom.2009.10.002_bib36","unstructured":"Lederer, S., Mankoff, J., Dey, A.K., Beckmann, C., 2003b. Managing Personal Information Disclosure in Ubiquitous Computing Environments. Technical Report, Computer Science Division, University of California, Berkeley, UCB-CSD-03-1257."},{"issue":"6","key":"10.1016\/j.intcom.2009.10.002_bib37","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1007\/s00779-004-0304-9","article-title":"Personal privacy through understanding and action: five pitfalls for designers","volume":"8","author":"Lederer","year":"2004","journal-title":"Personal Ubiquitous Computing"},{"key":"10.1016\/j.intcom.2009.10.002_bib38","series-title":"GROUP \u201997: Proceedings of the International ACM SIGGROUP Conference on Supporting Group Work","first-page":"385","article-title":"NYNEX portholes: initial user reactions and redesign implications","author":"Lee","year":"1997"},{"issue":"2","key":"10.1016\/j.intcom.2009.10.002_bib39","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/1314215.1340917","article-title":"The myths and truths of wireless security","volume":"51","author":"Loo","year":"2008","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.intcom.2009.10.002_bib40","series-title":"CHI \u201991: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","first-page":"203","article-title":"Experiences in the use of a media space","author":"Mantei","year":"1991"},{"key":"10.1016\/j.intcom.2009.10.002_bib41","series-title":"CSCW \u201900: Proceedings of the 2000 ACM Conference on Computer Supported Cooperative Work","first-page":"79","article-title":"Interaction and outeraction: instant messaging in action","author":"Nardi","year":"2000"},{"key":"10.1016\/j.intcom.2009.10.002_bib42","series-title":"CSCW \u201996: Proceedings of the 1996 ACM Conference on Computer Supported Cooperative Work","first-page":"419","article-title":"Groupware in the wild: lessons learned from a year of virtual collocation","author":"Olson","year":"1996"},{"key":"10.1016\/j.intcom.2009.10.002_bib43","series-title":"CHI \u201905: CHI \u201905 Extended Abstracts on Human Factors in Computing Systems","first-page":"1985","article-title":"Study of preferences for sharing and privacy","author":"Olson","year":"2005"},{"key":"10.1016\/j.intcom.2009.10.002_bib44","series-title":"CHI \u201999: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","first-page":"17","article-title":"Social, individual and technological issues for groupware calendar systems","author":"Palen","year":"1999"},{"key":"10.1016\/j.intcom.2009.10.002_bib45","series-title":"CHI \u201903: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","first-page":"129","article-title":"Unpacking \u201cprivacy\u201d for a networked world","author":"Palen","year":"2003"},{"key":"10.1016\/j.intcom.2009.10.002_bib46","unstructured":"Patil, S., Kobsa, A., 2004. Instant messaging and privacy. In: Proceedings of HCI 2004, pp. 85\u201388. ."},{"key":"10.1016\/j.intcom.2009.10.002_bib47","unstructured":"Patil, S., Kobsa, A., 2005a. Privacy in collaboration: managing impression. In: The First International Conference on Online Communities and Social Computing. ."},{"key":"10.1016\/j.intcom.2009.10.002_bib48","series-title":"GROUP \u201905: Proceedings of the 2005 International ACM SIGGROUP Conference on Supporting Group Work","first-page":"109","article-title":"Uncovering privacy attitudes and practices in instant messaging","author":"Patil","year":"2005"},{"key":"10.1016\/j.intcom.2009.10.002_bib49","series-title":"CHI \u201905: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","first-page":"101","article-title":"Who gets to know what when: configuring privacy permissions in an awareness application","author":"Patil","year":"2005"},{"issue":"2","key":"10.1016\/j.intcom.2009.10.002_bib50","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/249477","article-title":"Information privacy: measuring individuals\u2019 concerns about organizational practices","volume":"20","author":"Smith","year":"1996","journal-title":"MIS Quarterly"},{"key":"10.1016\/j.intcom.2009.10.002_bib51","series-title":"MULTIMEDIA \u201904: Proceedings of the 12th Annual ACM International Conference on Multimedia","first-page":"48","article-title":"Privacy protecting data collection in media spaces","author":"Wickramasuriya","year":"2004"}],"container-title":["Interacting with Computers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/iwc\/article-pdf\/22\/3\/206\/2044171\/iwc22-0206.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T09:38:14Z","timestamp":1503481094000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/iwc\/article-lookup\/doi\/10.1016\/j.intcom.2009.10.002"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5]]},"references-count":51,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2010,5]]}},"alternative-id":["S0953543809000861"],"URL":"https:\/\/doi.org\/10.1016\/j.intcom.2009.10.002","relation":{},"ISSN":["0953-5438"],"issn-type":[{"value":"0953-5438","type":"print"}],"subject":[],"published":{"date-parts":[[2010,5]]}}}