{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T17:51:09Z","timestamp":1726249869288},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031535024"},{"type":"electronic","value":"9783031535031"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-53503-1_23","type":"book-chapter","created":{"date-parts":[[2024,2,28]],"date-time":"2024-02-28T19:02:44Z","timestamp":1709146964000},"page":"277-290","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Unveiling the\u00a0Privacy Risk: A Trade-Off Between User Behavior and\u00a0Information Propagation in\u00a0Social Media"],"prefix":"10.1007","author":[{"given":"Giovanni","family":"Livraga","sequence":"first","affiliation":[]},{"given":"Artjoms","family":"Olzojevs","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Viviani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,29]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Abrams, M., Weiss, H., Giusti, S., Litner, J.: 47 terms that describe sexual attraction, behavior, and orientation (2023). https:\/\/www.healthline.com\/health\/different-types-of-sexuality. Accessed 1 April 2023","DOI":"10.1007\/978-3-031-08956-5_2152-1"},{"key":"23_CR2","doi-asserted-by":"publisher","first-page":"13118","DOI":"10.1109\/ACCESS.2017.2720187","volume":"5","author":"E Aghasian","year":"2017","unstructured":"Aghasian, E., Garg, S., Gao, L., Yu, S., Montgomery, J.: Scoring users\u2019 privacy disclosure across multiple online social networks. IEEE Access 5, 13118\u201313130 (2017)","journal-title":"IEEE Access"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Akcora, C., Carminati, B., Ferrari, E.: Privacy in social networks: how risky is your social graph?. In: Proceedings of ICDE, vol. 2012, pp. 9\u201319 (2012)","DOI":"10.1109\/ICDE.2012.99"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Caliskan Islam, A., Walsh, J., Greenstadt, R.: Privacy detective: detecting private information and collective privacy behavior in a large social network. In: Proceedings of WPES 2014, pp. 35\u201346 (2014)","DOI":"10.1145\/2665943.2665958"},{"key":"23_CR5","doi-asserted-by":"publisher","unstructured":"Carminati, B., Ferrari, E., Viviani, M.: Online social networks and security issues. In: Security and Trust in Online Social Networks. Synthesis Lectures on Information Security, Privacy, and Trust, pp. 1\u201318. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-031-02339-2_1","DOI":"10.1007\/978-3-031-02339-2_1"},{"key":"23_CR6","unstructured":"Centers for Disease Control and Prevention. List of all diseases (2022). https:\/\/www.cdc.gov\/health-topics.html. Accessed 2 March 2022"},{"key":"23_CR7","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. JAIR 16, 321\u2013357 (2002)","journal-title":"JAIR"},{"issue":"6","key":"23_CR8","first-page":"793","volume":"20","author":"S De Capitani di Vimercati","year":"2012","unstructured":"De Capitani di Vimercati, S., Foresti, S., Livraga, G., Samarati, P.: Data privacy: definitions and techniques. IJUFKBS 20(6), 793\u2013817 (2012)","journal-title":"IJUFKBS"},{"issue":"1","key":"23_CR9","first-page":"25","volume":"16","author":"S De Capitani di Vimercati","year":"2023","unstructured":"De Capitani di Vimercati, S., Foresti, S., Livraga, G., Samarati, P.: $$k$$-Anonymity: from theory to applications. Trans. Data Priv. 16(1), 25\u201349 (2023)","journal-title":"Trans. Data Priv."},{"key":"23_CR10","unstructured":"Eurostat: Explained. Glossary: marital status (2019). https:\/\/ec.europa.eu\/eurostat\/statistics-explained\/index.php?title=Glossary:Marital_status. Accessed 2 Mar 2022"},{"key":"23_CR11","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1007\/978-1-4614-8806-4_70","volume-title":"Handbook of Human Computation","author":"E Ferrari","year":"2013","unstructured":"Ferrari, E., Viviani, M.: Privacy in social collaboration. In: Michelucci, P. (ed.) Handbook of Human Computation, pp. 857\u2013878. Springer, New York (2013). https:\/\/doi.org\/10.1007\/978-1-4614-8806-4_70"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Foreman, Z., Bekman, T., Augustine, T., Jafarian, H.: PAVSS: privacy assessment vulnerability scoring system. In: Proceedings of CSCI, vol. 2019, pp. 160\u2013165 (2019)","DOI":"10.1109\/CSCI49370.2019.00034"},{"key":"23_CR13","unstructured":"Geonames - All cities with a population $$>$$ 1000 (2023). https:\/\/public.opendatasoft.com\/explore\/dataset\/geonames-all-cities-with-a-population-1000. Accessed 1 Apr 2023"},{"issue":"2","key":"23_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5121\/ijdkp.2015.5201","volume":"5","author":"M Hossin","year":"2015","unstructured":"Hossin, M., Sulaiman, M.N.: A review on evaluation metrics for data classification evaluations. IJDKP 5(2), 1 (2015)","journal-title":"IJDKP"},{"issue":"4","key":"23_CR15","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/582415.582418","volume":"20","author":"K J\u00e4rvelin","year":"2002","unstructured":"J\u00e4rvelin, K., Kek\u00e4l\u00e4inen, J.: Cumulated gain-based evaluation of IR techniques. ACM TOIS 20(4), 422\u2013446 (2002)","journal-title":"ACM TOIS"},{"key":"23_CR16","unstructured":"joblist.com: List of all jobs (2022). https:\/\/www.joblist.com\/b\/all-jobs. Accessed 2 Mar 2022"},{"key":"23_CR17","first-page":"525","volume":"18","author":"K Kircaburun","year":"2020","unstructured":"Kircaburun, K., Alhabash, S., Tosunta\u015f, \u015e, Griffiths, M.D.: Uses and gratifications of problematic social media use among university students: a simultaneous examination of the big five of personality traits, social media platforms, and social media use motives. IJMHA 18, 525\u2013547 (2020)","journal-title":"IJMHA"},{"issue":"10","key":"23_CR18","first-page":"2724","volume":"28","author":"N K\u00f6kciyan","year":"2016","unstructured":"K\u00f6kciyan, N., Yolum, P.: PriGuard: a semantic approach to detect privacy violations in online social networks. IEEE TKDE 28(10), 2724\u20132737 (2016)","journal-title":"IEEE TKDE"},{"issue":"1","key":"23_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1870096.1870102","volume":"5","author":"K Liu","year":"2010","unstructured":"Liu, K., Terzi, E.: A framework for computing the privacy scores of users in online social networks. ACM TKDD 5(1), 1\u201330 (2010)","journal-title":"ACM TKDD"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Livraga, G., Motta, A., Viviani. M.: Assessing user privacy on social media: the Twitter case study. In: Proceedings of OASIS 2022, Barcelona, Spain, June (2022)","DOI":"10.1145\/3524010.3539502"},{"issue":"3","key":"23_CR21","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1093\/cdj\/bsv040","volume":"51","author":"P Matthews","year":"2016","unstructured":"Matthews, P.: Social media, community development and social capital. CDJ 51(3), 419\u2013435 (2016)","journal-title":"CDJ"},{"key":"23_CR22","first-page":"543","volume":"4","author":"AM McDonald","year":"2008","unstructured":"McDonald, A.M., Cranor, L.F.: The cost of reading privacy policies. ISJLP 4, 543 (2008)","journal-title":"ISJLP"},{"issue":"5","key":"23_CR23","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0126894","volume":"10","author":"S Pei","year":"2015","unstructured":"Pei, S., Muchnik, L., Tang, S., Zheng, Z., Makse, H.A.: Exploring the complex pattern of information spreading in online blog communities. PLoS ONE 10(5), e0126894 (2015)","journal-title":"PLoS ONE"},{"key":"23_CR24","first-page":"103","volume":"44","author":"J Shibchurn","year":"2015","unstructured":"Shibchurn, J., Yan, X.: Information disclosure on social networking sites: an intrinsic-extrinsic motivation perspective. CHB 44, 103\u2013117 (2015)","journal-title":"CHB"},{"issue":"6","key":"23_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2811257","volume":"22","author":"J Watson","year":"2015","unstructured":"Watson, J., Lipford, H.R., Besmer, A.: Mapping user preference to privacy default settings. ACM TOCHI 22(6), 1\u201320 (2015)","journal-title":"ACM TOCHI"},{"key":"23_CR26","unstructured":"Wikipedia contributors: List of contemporary ethnic groups \u2013 Wikipedia, the free encyclopedia (2022). https:\/\/en.wikipedia.org\/wiki\/List_of_contemporary_ethnic_groups. Accessed 2 Mar 2022"},{"key":"23_CR27","unstructured":"Wikipedia contributors: List of generic names of political parties \u2013 Wikipedia, the free encyclopedia (2022). https:\/\/en.wikipedia.org\/wiki\/List_of_generic_names_of_political_parties. Accessed 2 Mar 2022"},{"key":"23_CR28","unstructured":"Wikipedia contributors: List of religions and spiritual traditions \u2013 Wikipedia, the free encyclopedia (2022). https:\/\/en.wikipedia.org\/wiki\/List_of_religions_and_spiritual_traditions. Accessed 2 Mar 2022"},{"issue":"8","key":"23_CR29","first-page":"1586","volume":"32","author":"T-T Wong","year":"2019","unstructured":"Wong, T.-T., Yeh, P.-Y.: Reliable accuracy estimates from k-fold cross validation. IEEE TKDE 32(8), 1586\u20131594 (2019)","journal-title":"IEEE TKDE"},{"key":"23_CR30","doi-asserted-by":"crossref","unstructured":"Yang, J., Rahardja, S., Fr\u00e4nti, P.: Outlier detection: how to threshold outlier scores?. In: Proceedings of AIIPCC, vol. 2019, pp. 1\u20136 (2019)","DOI":"10.1145\/3371425.3371427"}],"container-title":["Studies in Computational Intelligence","Complex Networks & Their Applications XII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-53503-1_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,28]],"date-time":"2024-02-28T19:08:34Z","timestamp":1709147314000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-53503-1_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031535024","9783031535031"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-53503-1_23","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"29 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"COMPLEX NETWORKS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Complex Networks and Their Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Menton","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwcna2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.complexnetworks.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}