{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T07:50:57Z","timestamp":1648885857434},"reference-count":18,"publisher":"Mary Ann Liebert Inc","issue":"2","license":[{"start":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T00:00:00Z","timestamp":1643673600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.liebertpub.com\/nv\/resources-tools\/text-and-data-mining-policy\/121\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cyberpsychology, Behavior, and Social Networking"],"published-print":{"date-parts":[[2022,2,1]]},"DOI":"10.1089\/cyber.2021.0076","type":"journal-article","created":{"date-parts":[[2021,12,9]],"date-time":"2021-12-09T22:08:16Z","timestamp":1639087696000},"page":"118-123","source":"Crossref","is-referenced-by-count":0,"title":["Artificial Intelligence Is Safer for My Privacy: Interplay Between Types of Personal Information and Agents on Perceived Privacy Risk and Concerns"],"prefix":"10.1089","volume":"25","author":[{"given":"Jungwon","family":"Kim","sequence":"first","affiliation":[{"name":"School of Psychology, Korea University, Seoul, Korea."}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5714-1651","authenticated-orcid":false,"given":"Yongjun","family":"Sung","sequence":"additional","affiliation":[{"name":"School of Psychology, Korea University, Seoul, Korea."}]}],"member":"278","reference":[{"key":"B4","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.11.022"},{"key":"B5","doi-asserted-by":"publisher","DOI":"10.1177\/1833358319851684"},{"key":"B6","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2015.07.002"},{"key":"B7","doi-asserted-by":"publisher","DOI":"10.1111\/joca.12111"},{"key":"B8","doi-asserted-by":"publisher","DOI":"10.1016\/j.intmar.2018.01.004"},{"key":"B9","first-page":"1","volume":"22","author":"Kim J","year":"2021","journal-title":"The Korean Journal of Consumer and Advertising Psychology"},{"key":"B10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2006.02.006"},{"key":"B11","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2020.0350"},{"key":"B12","doi-asserted-by":"crossref","unstructured":"12. Sundar SS, Kim J. Machine heuristic: when we trust computers more than humans with our personal information. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019, pp. 1\u20139.","DOI":"10.1145\/3290605.3300768"},{"key":"B13","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.106197"},{"key":"B14","unstructured":"14. Gratch J, Lucas GM, King AA, et al. It's only a computer: the impact of human-agent interaction in clinical interviews. In Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems, 2014, pp. 85\u201392."},{"key":"B15","doi-asserted-by":"publisher","DOI":"10.1016\/S1071-5819(03)00111-3"},{"key":"B16","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"B17","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1060.0080"},{"key":"B18","doi-asserted-by":"publisher","DOI":"10.1080\/01449290410001715723"},{"key":"B20","doi-asserted-by":"publisher","DOI":"10.1080\/14639220500337708"},{"key":"B21","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-019-00931-w"},{"key":"B22","doi-asserted-by":"publisher","DOI":"10.1109\/MRA.2012.2192811"}],"container-title":["Cyberpsychology, Behavior, and Social Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.liebertpub.com\/doi\/full-xml\/10.1089\/cyber.2021.0076","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.liebertpub.com\/doi\/pdf\/10.1089\/cyber.2021.0076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,10]],"date-time":"2022-02-10T21:43:20Z","timestamp":1644529400000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.liebertpub.com\/doi\/10.1089\/cyber.2021.0076"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,1]]},"references-count":18,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,2,1]]}},"alternative-id":["10.1089\/cyber.2021.0076"],"URL":"https:\/\/doi.org\/10.1089\/cyber.2021.0076","relation":{},"ISSN":["2152-2715","2152-2723"],"issn-type":[{"value":"2152-2715","type":"print"},{"value":"2152-2723","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,1]]}}}