{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:14:31Z","timestamp":1730315671711,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,3,29]]},"DOI":"10.1145\/2184512.2184520","type":"proceedings-article","created":{"date-parts":[[2012,4,17]],"date-time":"2012-04-17T08:53:22Z","timestamp":1334652802000},"page":"30-35","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Is older, wiser?"],"prefix":"10.1145","author":[{"given":"Swapna","family":"Kolimi","sequence":"first","affiliation":[{"name":"The University of Alabama in Huntsville, Huntsville, Alabama"}]},{"given":"Feng","family":"Zhu","sequence":"additional","affiliation":[{"name":"The University of Alabama in Huntsville, Huntsville, Alabama"}]},{"given":"Sandra","family":"Carpenter","sequence":"additional","affiliation":[{"name":"The University of Alabama in Huntsville, Huntsville, Alabama"}]}],"member":"320","published-online":{"date-parts":[[2012,3,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.163"},{"key":"e_1_3_2_1_2_1","volume-title":"S., Foresti, S.","author":"Ciriani V.","year":"2007","unstructured":"Ciriani , V. , De Capitani di Vimercati , S., Foresti, S. , and Samarati, P. 2007 . k-Anonymity. In Secure Data Management in Decentralized Systems, T. Yu and S. Jajodia, Ed. Springer , 323--353. Ciriani, V., De Capitani di Vimercati, S., Foresti, S., and Samarati, P. 2007. k-Anonymity. In Secure Data Management in Decentralized Systems, T. Yu and S. Jajodia, Ed. Springer, 323--353."},{"key":"e_1_3_2_1_3_1","unstructured":"Clark-Flory T. 2007 30 Reasons Girls Should Call It a Night. http:\/\/www.salon.com\/2007\/11\/05\/facebook\/ Clark-Flory T. 2007 30 Reasons Girls Should Call It a Night . http:\/\/www.salon.com\/2007\/11\/05\/facebook\/"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179601.1179615"},{"key":"e_1_3_2_1_5_1","volume-title":"The New York Times. (May 6","author":"Hall S. S.","year":"2007","unstructured":"Hall , S. S. 2007. The Older-and-Wiser Hypothesis . In The New York Times. (May 6 , 2007 ). Hall, S. S. 2007. The Older-and-Wiser Hypothesis. In The New York Times. (May 6, 2007)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.2005.00404.x"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1093\/geronj\/47.3.P180"},{"key":"e_1_3_2_1_8_1","first-page":"4","article-title":"Do older adults underestimate their actual computer knowledge","volume":"21","author":"Marqui\u00e9a J. C.","year":"2002","unstructured":"Marqui\u00e9a , J. C. , Jourdan-Boddaerta , L. , and Hueta , N. 2002 . Do older adults underestimate their actual computer knowledge ? Behaviour & Information Technology. 21 , 4 (July 2002), 273--280. DOI= 10.1080\/0144929021000020998. Marqui\u00e9a, J. C., Jourdan-Boddaerta, L., and Hueta, N. 2002. Do older adults underestimate their actual computer knowledge? Behaviour & Information Technology. 21, 4 (July 2002), 273--280. DOI= 10.1080\/0144929021000020998.","journal-title":"Behaviour & Information Technology."},{"volume-title":"Documenting Individual Identity: The Development of State Practices in the Modern World","author":"Marx G.","key":"e_1_3_2_1_9_1","unstructured":"Marx , G. 2001. Identity and Anonymity: Some Conceptual Distinctions and Issues for Research . In Documenting Individual Identity: The Development of State Practices in the Modern World , J. Caplan and J. C. Torpey, Ed. Princeton University Press , 311--327. Marx, G. 2001. Identity and Anonymity: Some Conceptual Distinctions and Issues for Research. In Documenting Individual Identity: The Development of State Practices in the Modern World, J. Caplan and J. C. Torpey, Ed. Princeton University Press, 311--327."},{"key":"e_1_3_2_1_10_1","first-page":"4","article-title":"Getting older, getting better? Personal strivings and psychological maturity across the life span","volume":"37","author":"Sheldon K. M.","year":"2001","unstructured":"Sheldon , K. M. , and Kasser , T. 2001 Getting older, getting better? Personal strivings and psychological maturity across the life span . American Psychological Association. 37 , 4 (July 2001), 491--501. Sheldon, K. M., and Kasser, T. 2001 Getting older, getting better? Personal strivings and psychological maturity across the life span. American Psychological Association. 37, 4 (July 2001), 491--501.","journal-title":"American Psychological Association."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2011.06.007"}],"event":{"name":"ACM SE '12: ACM Southeast Regional Conference","sponsor":["ACM Association for Computing Machinery"],"location":"Tuscaloosa Alabama","acronym":"ACM SE '12"},"container-title":["Proceedings of the 50th Annual Southeast Regional Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2184512.2184520","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T04:48:40Z","timestamp":1673412520000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2184512.2184520"}},"subtitle":["an age-specific study of exposure of private information"],"short-title":[],"issued":{"date-parts":[[2012,3,29]]},"references-count":11,"alternative-id":["10.1145\/2184512.2184520","10.1145\/2184512"],"URL":"https:\/\/doi.org\/10.1145\/2184512.2184520","relation":{},"subject":[],"published":{"date-parts":[[2012,3,29]]},"assertion":[{"value":"2012-03-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}