{"id":"https://openalex.org/W3004007841","doi":"https://doi.org/10.1093/cybsec/tyz016","title":"Exploring user perceptions of deletion in mobile instant messaging applications","display_name":"Exploring user perceptions of deletion in mobile instant messaging applications","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3004007841","doi":"https://doi.org/10.1093/cybsec/tyz016","mag":"3004007841"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyz016","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyz016","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/6/1/tyz016/32293165/tyz016.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://academic.oup.com/cybersecurity/article-pdf/6/1/tyz016/32293165/tyz016.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046481897","display_name":"Theodor Schnitzler","orcid":"https://orcid.org/0000-0001-7575-1229"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Theodor Schnitzler","raw_affiliation_strings":["Department of Electrical Engineering and Information Technology, Ruhr-Universit\u00e4t Bochum, Universit\u00e4tsstra\u00dfe 150, 44801 Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Information Technology, Ruhr-Universit\u00e4t Bochum, Universit\u00e4tsstra\u00dfe 150, 44801 Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025891820","display_name":"Christine Utz","orcid":"https://orcid.org/0000-0003-4346-6911"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Christine Utz","raw_affiliation_strings":["Department of Electrical Engineering and Information Technology, Ruhr-Universit\u00e4t Bochum, Universit\u00e4tsstra\u00dfe 150, 44801 Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Information Technology, Ruhr-Universit\u00e4t Bochum, Universit\u00e4tsstra\u00dfe 150, 44801 Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007785428","display_name":"Florian M. Farke","orcid":"https://orcid.org/0000-0001-7138-4978"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Florian M Farke","raw_affiliation_strings":["Department of Electrical Engineering and Information Technology, Ruhr-Universit\u00e4t Bochum, Universit\u00e4tsstra\u00dfe 150, 44801 Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Information Technology, Ruhr-Universit\u00e4t Bochum, Universit\u00e4tsstra\u00dfe 150, 44801 Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113870699","display_name":"Christina P\u00f6pper","orcid":null},"institutions":[{"id":"https://openalex.org/I120250893","display_name":"New York University Abu Dhabi","ror":"https://ror.org/00e5k0821","country_code":"AE","type":"education","lineage":["https://openalex.org/I120250893","https://openalex.org/I57206974"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Christina P\u00f6pper","raw_affiliation_strings":["Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, PO Box 129188, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, PO Box 129188, United Arab Emirates","institution_ids":["https://openalex.org/I120250893"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110236021","display_name":"Markus D\u00fcrmuth","orcid":null},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Markus D\u00fcrmuth","raw_affiliation_strings":["Department of Electrical Engineering and Information Technology, Ruhr-Universit\u00e4t Bochum, Universit\u00e4tsstra\u00dfe 150, 44801 Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Information Technology, Ruhr-Universit\u00e4t Bochum, Universit\u00e4tsstra\u00dfe 150, 44801 Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5046481897"],"corresponding_institution_ids":["https://openalex.org/I904495901"],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1130,"currency":"EUR","value_usd":1218},"fwci":1.4568,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.873629,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"6","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10355","display_name":"Impact of Technology on Adolescents","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12607","display_name":"Personal Information Management and User Behavior","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.8426285982131958},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7589826583862305},{"id":"https://openalex.org/keywords/instant-messaging","display_name":"Instant messaging","score":0.6534181237220764},{"id":"https://openalex.org/keywords/text-messaging","display_name":"Text messaging","score":0.526370108127594},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5251866579055786},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.5026204586029053},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.446156769990921},{"id":"https://openalex.org/keywords/short-message-service","display_name":"Short Message Service","score":0.4407351016998291},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.4246981143951416},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.42417576909065247},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3814040720462799},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.36518076062202454},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.22688248753547668},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.0988926887512207}],"concepts":[{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.8426285982131958},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7589826583862305},{"id":"https://openalex.org/C2985487447","wikidata":"https://www.wikidata.org/wiki/Q58199","display_name":"Instant messaging","level":2,"score":0.6534181237220764},{"id":"https://openalex.org/C3018949938","wikidata":"https://www.wikidata.org/wiki/Q17166101","display_name":"Text messaging","level":2,"score":0.526370108127594},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5251866579055786},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.5026204586029053},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.446156769990921},{"id":"https://openalex.org/C74558129","wikidata":"https://www.wikidata.org/wiki/Q43024","display_name":"Short Message Service","level":2,"score":0.4407351016998291},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.4246981143951416},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.42417576909065247},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3814040720462799},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.36518076062202454},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.22688248753547668},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0988926887512207},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1093/cybsec/tyz016","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyz016","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/6/1/tyz016/32293165/tyz016.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:hss-opus.ub.ruhr-uni-bochum.de:7792","is_oa":true,"landing_page_url":"https://nbn-resolving.org/urn:nbn:de:hbz:294-77921","pdf_url":null,"source":{"id":"https://openalex.org/S4306400167","display_name":"Dokumentenrepositorium der RUB (Ruhr University Bochum)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I904495901","host_organization_name":"Ruhr University Bochum","host_organization_lineage":["https://openalex.org/I904495901"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"doc-type:article"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyz016","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyz016","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/6/1/tyz016/32293165/tyz016.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3004007841.pdf","grobid_xml":"https://content.openalex.org/works/W3004007841.grobid-xml"},"referenced_works_count":15,"referenced_works":["https://openalex.org/W193022356","https://openalex.org/W1866063761","https://openalex.org/W1974007298","https://openalex.org/W2037202491","https://openalex.org/W2125475233","https://openalex.org/W2128402656","https://openalex.org/W2166323020","https://openalex.org/W2207884471","https://openalex.org/W2545457694","https://openalex.org/W2560501984","https://openalex.org/W2595077599","https://openalex.org/W2601790522","https://openalex.org/W2780241680","https://openalex.org/W4245702878","https://openalex.org/W6736191223"],"related_works":["https://openalex.org/W2072902463","https://openalex.org/W2920937864","https://openalex.org/W2093029345","https://openalex.org/W3047379713","https://openalex.org/W3119772354","https://openalex.org/W2053878197","https://openalex.org/W1995415200","https://openalex.org/W2974768159","https://openalex.org/W2530414944","https://openalex.org/W2238925615"],"abstract_inverted_index":{"Abstract":[0],"Contemporary":[1],"mobile":[2,56,125],"messaging":[3,92,140],"provides":[4],"rich":[5],"text":[6],"and":[7,35,77,127,162],"multimedia":[8],"functionality":[9,135],"leaving":[10],"detailed":[11],"trails":[12],"of":[13,22,47,54,89,95,150,166,177,234],"sensitive":[14],"user":[15,61,247],"information":[16],"that":[17,203,213],"can":[18,39,228],"span":[19],"long":[20],"periods":[21],"time.":[23],"Allowing":[24],"users":[25,214,227],"to":[26,41,67,181,218],"manage":[27],"the":[28,33,36,45,55,59,75,78,86,101,169,175,185,232,245],"privacy":[29],"implications":[30],"both":[31,73],"on":[32,108],"sender":[34],"receiver":[37],"side":[38],"help":[40],"increase":[42],"confidence":[43],"in":[44,115,138,147,168,184,220,244],"use":[46,219],"communication":[48],"applications.":[49,93,141],"In":[50,81,188],"October":[51],"2017,":[52],"one":[53],"messengers":[57],"with":[58,111],"largest":[60],"base,":[62],"WhatsApp,":[63,159],"introduced":[64],"a":[65,109,116,209,235],"feature":[66,212],"delete":[68],"past":[69],"messages":[70],"from":[71,74,197],"communication,":[72],"sender\u2019s":[76],"recipient\u2019s":[79],"devices.":[80],"this":[82,134],"article,":[83],"we":[84,103,128,190],"compare":[85],"deletion":[87,152,205,236],"features":[88,97],"17":[90],"popular":[91,139],"Implementations":[94],"these":[96],"widely":[98],"differ":[99],"across":[100],"applications":[102],"examined.":[104],"We":[105,119,142],"further":[106],"report":[107],"study":[110],"125":[112],"participants":[113,167],"conducted":[114],"between-subjects":[117],"design.":[118],"explore":[120],"users\u2019":[121,148],"preferences":[122],"for":[123],"deleting":[124,178],"messages,":[126,179],"investigate":[129],"how":[130],"well":[131],"they":[132],"comprehend":[133],"as":[136,208],"implemented":[137],"found":[143],"statistically":[144],"significant":[145],"differences":[146],"understanding":[149],"message":[151,204],"between":[153],"our":[154,198],"three":[155],"test":[156],"conditions,":[157],"comprising":[158],"Facebook":[160],"Messenger,":[161],"Skype.":[163],"Eighty":[164],"percent":[165],"WhatsApp":[170],"condition":[171],"could":[172],"correctly":[173],"assess":[174],"effects":[176,240],"compared":[180],"only":[182],"49%":[183],"Skype":[186],"condition.":[187],"addition,":[189],"provide":[191],"insights":[192],"into":[193],"qualitative":[194],"feedback":[195],"received":[196],"participants.":[199],"Our":[200],"findings":[201],"indicate":[202],"is":[206],"seen":[207],"potentially":[210],"useful":[211],"may":[215],"be":[216],"able":[217],"different":[221],"ways,":[222],"including":[223],"editing":[224],"messages.":[225],"Furthermore,":[226],"more":[229],"precisely":[230],"estimate":[231],"capabilities":[233],"function":[237],"when":[238],"its":[239],"are":[241],"transparently":[242],"explained":[243],"application\u2019s":[246],"interface.":[248]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
