{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:54:47Z","timestamp":1730318087240,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,7]],"date-time":"2016-05-07T00:00:00Z","timestamp":1462579200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/J017728\/1"],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,7]]},"DOI":"10.1145\/2858036.2858060","type":"proceedings-article","created":{"date-parts":[[2016,5,5]],"date-time":"2016-05-05T14:08:22Z","timestamp":1462457302000},"page":"552-563","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Computationally Mediated Pro-Social Deception"],"prefix":"10.1145","author":[{"given":"Max","family":"Van Kleek","sequence":"first","affiliation":[{"name":"University of Oxford, Oxford, Oxfordshire, United Kingdom"}]},{"given":"Dave","family":"Murray-Rust","sequence":"additional","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]},{"given":"Amy","family":"Guy","sequence":"additional","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]},{"given":"Kieron","family":"O'Hara","sequence":"additional","affiliation":[{"name":"University of Southampton, Southampton, Hampshire, United Kingdom"}]},{"given":"Nigel","family":"Shadbolt","sequence":"additional","affiliation":[{"name":"University of Oxford, Oxford, Oxfordshire, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2016,5,7]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466246"},{"volume-title":"Shiller","year":"2015","author":"Akerlof George A.","key":"e_1_3_2_2_2_1","unstructured":"George A. Akerlof and Robert J . Shiller . 2015 . Privacy in context: Technology, policy, and the integrity of social life. Princeton University Press . George A. Akerlof and Robert J. Shiller. 2015. Privacy in context: Technology, policy, and the integrity of social life. Princeton University Press."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-014-9146-y"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v13i3.2142"},{"volume-title":"Deceptive Miscommunication Theory ( DeMiT ): A New Model for the Analysis of Deceptive Communication. Say not to say New perspectives on miscommunication FEBRUARY","year":"2001","author":"Anolli Luigi","key":"e_1_3_2_2_6_1","unstructured":"Luigi Anolli , Michela Balconi , and Rita Ciceri . 2001. Deceptive Miscommunication Theory ( DeMiT ): A New Model for the Analysis of Deceptive Communication. Say not to say New perspectives on miscommunication FEBRUARY ( 2001 ), 73--100. http:\/\/books.google.com\/books?hl=en&lr=&id=PsiLjRHr1JQC&oi=fnd&pg=PA73&dq=Deceptive+Miscommunication+Theory+(+DeMiT+):+A+new+model+for+the+analysis+of+deceptive+communication&ots=GkJjOpQJfZ&sig=DfUVh93xYcd2WThfB5_w3vU7nfo Luigi Anolli, Michela Balconi, and Rita Ciceri. 2001. Deceptive Miscommunication Theory ( DeMiT ): A New Model for the Analysis of Deceptive Communication. Say not to say New perspectives on miscommunication FEBRUARY (2001), 73--100. http:\/\/books.google.com\/books?hl=en&lr=&id=PsiLjRHr1JQC&oi=fnd&pg=PA73&dq=Deceptive+Miscommunication+Theory+(+DeMiT+):+A+new+model+for+the+analysis+of+deceptive+communication&ots=GkJjOpQJfZ&sig=DfUVh93xYcd2WThfB5_w3vU7nfo"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1054998"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/14626268.2013.767276"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557137"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.01.005"},{"volume-title":"Lying: Moral choice in public life.","year":"1978","author":"Bok Sissela","key":"e_1_3_2_2_11_1","unstructured":"Sissela Bok . 1978 . Lying: Moral choice in public life. NY : Pantheon ( 1978). Sissela Bok. 1978. Lying: Moral choice in public life. NY: Pantheon (1978)."},{"key":"e_1_3_2_2_12_1","unstructured":"danah boyd. 2002.\n Faceted id\/entity: Managing representation in a digital world\n . Ph.D. Dissertation. \n Massachusetts Institute of Technology\n . danah boyd. 2002. Faceted id\/entity: Managing representation in a digital world. Ph.D. Dissertation. Massachusetts Institute of Technology."},{"volume-title":"It's Complicated: the Social Lives of Networked Teens","key":"e_1_3_2_2_13_1","unstructured":"danah boyd. 2014. It's Complicated: the Social Lives of Networked Teens . Yale University Press . danah boyd. 2014. It's Complicated: the Social Lives of Networked Teens. Yale University Press."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2838885"},{"volume-title":"Interpersonal deception theory. Communication theory 6, 3","year":"1996","author":"Buller David B","key":"e_1_3_2_2_15_1","unstructured":"David B Buller and Judee K Burgoon . 1996. Interpersonal deception theory. Communication theory 6, 3 ( 1996 ), 203--242. David B Buller and Judee K Burgoon. 1996. Interpersonal deception theory. Communication theory 6, 3 (1996), 203--242."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1177\/026540758900600201"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/10570318409374167"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357335"},{"key":"e_1_3_2_2_20_1","unstructured":"Judith Wagner DeCew. 1997. In pursuit of privacy: Law ethics and the rise of technology. Cornell University Press. Judith Wagner DeCew. 1997. In pursuit of privacy: Law ethics and the rise of technology. Cornell University Press."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.70.5.979"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"volume-title":"Mobile Messaging and Social Media","year":"2015","author":"Duggan Maeve","key":"e_1_3_2_2_23_1","unstructured":"Maeve Duggan . 2015. Mobile Messaging and Social Media 2015 . Pew Research Center ( 2015). http:\/\/www.pewinternet.org\/2015\/08\/19\/mobile-messagingand-social-media-2015\/ Maeve Duggan. 2015. Mobile Messaging and Social Media 2015. Pew Research Center (2015). http:\/\/www.pewinternet.org\/2015\/08\/19\/mobile-messagingand-social-media-2015\/"},{"volume-title":"Speculative everything: design, fiction, and social dreaming","author":"Dunne Anthony","key":"e_1_3_2_2_24_1","unstructured":"Anthony Dunne and Fiona Raby . 2013. Speculative everything: design, fiction, and social dreaming . MIT Press . Anthony Dunne and Fiona Raby. 2013. Speculative everything: design, fiction, and social dreaming. MIT Press."},{"volume-title":"Privacy Enhancing Technologies","author":"Eckersley Peter","key":"e_1_3_2_2_25_1","unstructured":"Peter Eckersley . 2010. How unique is your web browser? . In Privacy Enhancing Technologies . Springer , 1--18. Peter Eckersley. 2010. How unique is your web browser?. In Privacy Enhancing Technologies. Springer, 1--18."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1108\/08876041011040622"},{"key":"e_1_3_2_2_27_1","first-page":"7","article-title":"The privacy calculus: Mobile apps and user perceptions of privacy and security","volume":"5","author":"Fife Elizabeth","year":"2012","unstructured":"Elizabeth Fife and Juan Orjuela . 2012 . The privacy calculus: Mobile apps and user perceptions of privacy and security . International Journal of Engineering Business Management 5 , 6 (2012), 7 . Elizabeth Fife and Juan Orjuela. 2012. The privacy calculus: Mobile apps and user perceptions of privacy and security. International Journal of Engineering Business Management 5, 6 (2012), 7.","journal-title":"International Journal of Engineering Business Management"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/332040.332433"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642653"},{"volume-title":"Digital Parrhesia as a Counterweight to Astroturfing. Online Credibility and Digital Ethos: Evaluating Computer-Mediated Communication: Evaluating Computer-Mediated Communication","year":"2012","author":"Gilewicz Nicholas","key":"e_1_3_2_2_30_1","unstructured":"Nicholas Gilewicz and Francois Allard-Huver . 2012. Digital Parrhesia as a Counterweight to Astroturfing. Online Credibility and Digital Ethos: Evaluating Computer-Mediated Communication: Evaluating Computer-Mediated Communication ( 2012 ), 215. Nicholas Gilewicz and Francois Allard-Huver. 2012. Digital Parrhesia as a Counterweight to Astroturfing. Online Credibility and Digital Ethos: Evaluating Computer-Mediated Communication: Evaluating Computer-Mediated Communication (2012), 215."},{"key":"e_1_3_2_2_31_1","unstructured":"Herbert P Grice. 1970. Logic and conversation. na. Herbert P Grice. 1970. Logic and conversation. na."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/525423.830456"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518782"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2745940"},{"key":"e_1_3_2_2_35_1","first-page":"38","article-title":"Consumer law: Web of lies-legal implications of astroturfing","volume":"64","author":"Kolivos Eugenia","year":"2012","unstructured":"Eugenia Kolivos and Anna Kuperman . 2012 . Consumer law: Web of lies-legal implications of astroturfing . Keeping Good Companies 64 , 1 (2012), 38 . Eugenia Kolivos and Anna Kuperman. 2012. Consumer law: Web of lies-legal implications of astroturfing. Keeping Good Companies 64, 1 (2012), 38.","journal-title":"Keeping Good Companies"},{"volume-title":"Laura Light, and Diana Gravitch","year":"2002","author":"Krane David","key":"e_1_3_2_2_36_1","unstructured":"David Krane , Laura Light, and Diana Gravitch . 2002 . Privacy on and off the Internet : What consumers want. Harris Interactive ( 2002). David Krane, Laura Light, and Diana Gravitch. 2002. Privacy on and off the Internet: What consumers want. Harris Interactive (2002)."},{"key":"e_1_3_2_2_37_1","unstructured":"Ponnurangam Kumaraguru and Lorrie Faith Cranor. 2005. Privacy indexes: a survey of Westin's studies. (2005). Ponnurangam Kumaraguru and Lorrie Faith Cranor. 2005. Privacy indexes: a survey of Westin's studies. (2005)."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1080\/00224545.1983.9712018"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197512"},{"key":"e_1_3_2_2_40_1","first-page":"1","article-title":"I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience","volume":"13","author":"Marwick E.","year":"2010","unstructured":"a. E. Marwick and d. boyd. 2010 . I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience . New Media & Society 13 , 1 (July 2010), 114--133. DOI: http:\/\/dx.doi.org\/10.1177\/1461444810365313 10.1177\/1461444810365313 a. E. Marwick and d. boyd. 2010. I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media & Society 13, 1 (July 2010), 114--133. DOI: http:\/\/dx.doi.org\/10.1177\/1461444810365313","journal-title":"New Media & Society"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1080\/03637759209376245"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2004.tb00292.x"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0018627"},{"volume-title":"Privacy as contextual integrity. Washington law review 79, 1","year":"2004","author":"Nissenbaum Helen","key":"e_1_3_2_2_44_1","unstructured":"Helen Nissenbaum . 2004. Privacy as contextual integrity. Washington law review 79, 1 ( 2004 ). Helen Nissenbaum. 2004. Privacy as contextual integrity. Washington law review 79, 1 (2004)."},{"volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"Nissenbaum Helen","key":"e_1_3_2_2_45_1","unstructured":"Helen Nissenbaum . 2009. Privacy in context: Technology, policy, and the integrity of social life . Stanford University Press . Helen Nissenbaum. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press."},{"volume-title":"creeping, and wall cleaning: Understanding privacy in the age of Facebook. First Monday 15, 1","year":"2010","author":"Raynes-Goldie Kate","key":"e_1_3_2_2_46_1","unstructured":"Kate Raynes-Goldie . 2010. Aliases , creeping, and wall cleaning: Understanding privacy in the age of Facebook. First Monday 15, 1 ( 2010 ). Kate Raynes-Goldie. 2010. Aliases, creeping, and wall cleaning: Understanding privacy in the age of Facebook. First Monday 15, 1 (2010)."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/876907.881583"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12394-010-0055-x"},{"key":"e_1_3_2_2_49_1","first-page":"281","article-title":"To Track or Do Not Track: Advancing Transparency and Individual Control in Online Behavioral Advertising","volume":"13","author":"Tene Omer","year":"2012","unstructured":"Omer Tene and Jules Polenetsky . 2012 . To Track or Do Not Track: Advancing Transparency and Individual Control in Online Behavioral Advertising . Minn. JL Sci. & Tech. 13 (2012), 281 . Omer Tene and Jules Polenetsky. 2012. To Track or Do Not Track: Advancing Transparency and Individual Control in Online Behavioral Advertising. Minn. JL Sci. & Tech. 13 (2012), 281.","journal-title":"Minn. JL Sci. & Tech."},{"volume-title":"Information control in conversations: Honesty is not always the best policy. Kansas Journal of Sociology","year":"1975","author":"Turner Ronny E","key":"e_1_3_2_2_50_1","unstructured":"Ronny E Turner , Charles Edgley , and Glen Olmstead . 1975. Information control in conversations: Honesty is not always the best policy. Kansas Journal of Sociology ( 1975 ), 69--89. Ronny E Turner, Charles Edgley, and Glen Olmstead. 1975. Information control in conversations: Honesty is not always the best policy. Kansas Journal of Sociology (1975), 69--89."},{"volume-title":"The Free Encyclopedia. (2015). https:\/\/en.wikipedia.org\/wiki\/Disinformation {Online","year":"2015","author":"Wikipedia Disinformation","key":"e_1_3_2_2_51_1","unstructured":"Wikipedia. 2015. Disinformation -- Wikipedia , The Free Encyclopedia. (2015). https:\/\/en.wikipedia.org\/wiki\/Disinformation {Online ; accessed 15- Sept- 2015 }. Wikipedia. 2015. Disinformation -- Wikipedia, The Free Encyclopedia. (2015). https:\/\/en.wikipedia.org\/wiki\/Disinformation {Online; accessed 15-Sept-2015}."}],"event":{"name":"CHI'16: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"San Jose California USA","acronym":"CHI'16"},"container-title":["Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2858036.2858060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T04:23:08Z","timestamp":1673324588000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2858036.2858060"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,7]]},"references-count":49,"alternative-id":["10.1145\/2858036.2858060","10.1145\/2858036"],"URL":"https:\/\/doi.org\/10.1145\/2858036.2858060","relation":{},"subject":[],"published":{"date-parts":[[2016,5,7]]},"assertion":[{"value":"2016-05-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}