{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T13:45:50Z","timestamp":1726407950620},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030278120"},{"type":"electronic","value":"9783030278137"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-27813-7_10","type":"book-chapter","created":{"date-parts":[[2019,8,18]],"date-time":"2019-08-18T19:02:41Z","timestamp":1566154961000},"page":"145-160","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Gender Inference for Facebook Picture Owners"],"prefix":"10.1007","author":[{"given":"Bizhan","family":"Alipour","sequence":"first","affiliation":[]},{"given":"Abdessamad","family":"Imine","sequence":"additional","affiliation":[]},{"given":"Micha\u00ebl","family":"Rusinowitch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,2]]},"reference":[{"issue":"1","key":"10_CR1","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1111\/1540-4560.00247","volume":"58","author":"JA Bargh","year":"2002","unstructured":"Bargh, J.A., McKenna, K.Y., Fitzsimons, G.M.: Can you see the real me? Activation and expression of the \u201ctrue self\u201d on the internet. J. Soc. Issues 58(1), 33\u201348 (2002)","journal-title":"J. Soc. Issues"},{"key":"10_CR2","unstructured":"Chaabane, A., Acs, G., Kaafar, M.A., et al.: You are what you like! information leakage through users\u2019 interests. In: Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS) (2012)"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Chen, Y.-Y., Chen, T., Hsu, W.H., Liao, H.-Y.M., Chang, S.-F.: Predicting viewer affective comments based on image content in social media. In: Proceedings of International Conference on Multimedia Retrieval, p. 233. ACM (2014)","DOI":"10.1145\/2578726.2578756"},{"issue":"1","key":"10_CR4","first-page":"22","volume":"16","author":"KW Church","year":"1990","unstructured":"Church, K.W., Hanks, P.: Word association norms, mutual information, and lexicography. Comput. Linguist. 16(1), 22\u201329 (1990)","journal-title":"Comput. Linguist."},{"issue":"1","key":"10_CR5","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1515\/popets-2015-0007","volume":"2015","author":"A Datta","year":"2015","unstructured":"Datta, A., Tschantz, M.C., Datta, A.: Automated experiments on ad privacy settings. Proc. Privacy Enhancing Technol. 2015(1), 92\u2013112 (2015)","journal-title":"Proc. Privacy Enhancing Technol."},{"key":"10_CR6","unstructured":"Fkih, F., Omri, M.N.: Learning the size of the sliding window for the collocations extraction: a ROC-based approach. In: Proceedings of the 2012 International Conference on Artificial Intelligence (ICAI 2012), pp. 1071\u20131077 (2012)"},{"issue":"1","key":"10_CR7","first-page":"3","volume":"21","author":"NZ Gong","year":"2018","unstructured":"Gong, N.Z., Liu, B.: Attribute inference attacks in online social networks. ACM Trans. Privacy Secur. (TOPS) 21(1), 3 (2018)","journal-title":"ACM Trans. Privacy Secur. (TOPS)"},{"issue":"2","key":"10_CR8","first-page":"27","volume":"5","author":"NZ Gong","year":"2014","unstructured":"Gong, N.Z., et al.: Joint link prediction and attribute inference using a social-attribute network. ACM Trans. Intell. Syst. Technol. (TIST) 5(2), 27 (2014)","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/11760146_14","volume-title":"Intelligence and Security Informatics","author":"J He","year":"2006","unstructured":"He, J., Chu, W.W., Liu, Z.V.: Inferring privacy information from social networks. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol. 3975, pp. 154\u2013165. Springer, Heidelberg (2006). \n https:\/\/doi.org\/10.1007\/11760146_14"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Kang, R., Brown, S., Kiesler, S.: Why do people seek anonymity on the internet? Informing policy and design. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2657\u20132666. ACM (2013)","DOI":"10.1145\/2470654.2481368"},{"key":"10_CR11","unstructured":"Lee, K.: Combining multiple feature selection methods. In: Mid-Atlantic Student Workshop on Programming Languages and Systems (MASPLAS 2002), p. 12. Citeseer (2002)"},{"key":"10_CR12","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1007\/978-3-319-31232-3_97","volume-title":"New Advances in Information Systems and Technologies","author":"JABL Filho","year":"2016","unstructured":"Filho, J.A.B.L., Pasti, R., de Castro, L.N.: Gender classification of twitter data based on textual meta-attributes extraction. New Advances in Information Systems and Technologies. AISC, vol. 444, pp. 1025\u20131034. Springer, Cham (2016). \n https:\/\/doi.org\/10.1007\/978-3-319-31232-3_97"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Merler, M., Cao, L., Smith, J.R.: You are what you tweet... pic! gender prediction based on semantic analysis of social media images. In: 2015 IEEE International Conference on Multimedia and Expo (ICME), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/ICME.2015.7177499"},{"key":"10_CR14","unstructured":"Mihaljevi\u0107, H., Santamar\u00eda, L.: Telling the gender from a name (2018)"},{"issue":"04","key":"10_CR15","doi-asserted-by":"publisher","first-page":"143","DOI":"10.4236\/ijis.2012.224019","volume":"2","author":"Z Miller","year":"2012","unstructured":"Miller, Z., Dickinson, B., Hu, W.: Gender prediction on Twitter using stream algorithms with n-gram character features. Int. J. Intell. Sci. 2(04), 143 (2012)","journal-title":"Int. J. Intell. Sci."},{"key":"10_CR16","unstructured":"Stavrianou, A., Brun, C., Silander, T., Roux, C.: NLP-based feature extraction for automated tweet classification. Interact. Data Mining Nat. Lang. Process. 145 (2014)"},{"key":"10_CR17","unstructured":"Tobin, A., Merrill, J.B.: Facebook is letting job advertisers target only men (2018)"},{"issue":"1","key":"10_CR18","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1016\/j.dss.2010.08.028","volume":"50","author":"C-F Tsai","year":"2010","unstructured":"Tsai, C.-F., Hsiao, Y.-C.: Combining multiple feature selection methods for stock prediction: union, intersection, and multi-intersection approaches. Decis. Support Syst. 50(1), 258\u2013269 (2010)","journal-title":"Decis. Support Syst."},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Weinsberg, U., Bhagat, S., Ioannidis, S., Taft, N.: BlurMe: inferring and obfuscating user gender based on ratings. In: Proceedings of the sixth ACM Conference on Recommender Systems, pp. 195\u2013202. ACM (2012)","DOI":"10.1145\/2365952.2365989"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Wu, S., Wieland, J., Farivar, O., Schiller, J.: Automatic alt-text: computer-generated image descriptions for blind users on a social network service. In: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, pp. 1180\u20131192. ACM (2017)","DOI":"10.1145\/2998181.2998364"},{"key":"10_CR21","unstructured":"Xu, W., Zhou, X., Li, L.: Inferring privacy information via social relations. In: 2008 IEEE 24th International Conference on Data Engineering Workshop, pp. 525\u2013530. IEEE (2008)"},{"issue":"8","key":"10_CR22","doi-asserted-by":"publisher","first-page":"735","DOI":"10.2224\/sbp.2005.33.8.735","volume":"33","author":"J Yurchisin","year":"2005","unstructured":"Yurchisin, J., Watchravesringkan, K., McCabe, D.B.: An exploration of identity re-creation in the context of Internet dating. Soc. Beh. Pers.: Int. J. 33(8), 735\u2013750 (2005)","journal-title":"Soc. Beh. Pers.: Int. J."}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-27813-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,18]],"date-time":"2019-08-18T19:14:44Z","timestamp":1566155684000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-27813-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030278120","9783030278137"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-27813-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"2 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"TrustBus","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Trust and Privacy in Digital Business","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Linz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"trustbus2019a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dexa.org\/trustbus2019","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mixed (single-blind and double-blind)","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"ConfDriver","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2-3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}