{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:49:21Z","timestamp":1740098961538,"version":"3.37.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319711164"},{"type":"electronic","value":"9783319711171"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71117-1_5","type":"book-chapter","created":{"date-parts":[[2017,11,16]],"date-time":"2017-11-16T14:03:57Z","timestamp":1510841037000},"page":"64-78","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Default OSN Privacy Settings: Privacy Risks"],"prefix":"10.1007","author":[{"given":"Alexandra","family":"Michota","sequence":"first","affiliation":[]},{"given":"Sokratis","family":"Katsikas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,17]]},"reference":[{"issue":"4","key":"5_CR1","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1093\/idpl\/ipu023","volume":"4","author":"B Koops","year":"2014","unstructured":"Koops, B.: The trouble with European data protection law. Int. Data Priv. Law 4(4), 250\u2013261 (2014)","journal-title":"Int. Data Priv. Law"},{"issue":"4","key":"5_CR2","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1016\/S1071-5819(03)00111-3","volume":"59","author":"M Featherman","year":"2003","unstructured":"Featherman, M., Pavlou, P.: Predicting e-services adoption: a perceived risk facets perspective. Int. J. Hum. Comput. Stud. 59(4), 451\u2013474 (2003)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"5_CR3","unstructured":"ISO 31000:2009 Risk management - Principles and guidelines, ISO (2009)"},{"key":"5_CR4","unstructured":"Betterley, R.S.: Cyber\/Privacy Insurance Market Survey \u20132014: \u201cMaybe Next Year\u201d Turns Into \u201cI Need It Now\u201d. International Risk Management Institute, Inc. (IRMI) (2014)"},{"key":"5_CR5","unstructured":"Most popular activities of Facebook users worldwide as of 1st quarter 2016. The Statista Portal (2016). http:\/\/www.statista.com\/statistics\/420714\/top-facebook-activities-worldwide\/ . Accessed 7 July 2017"},{"issue":"4","key":"5_CR6","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/MSP.2010.118","volume":"8","author":"B Schneier","year":"2010","unstructured":"Schneier, B.: A taxonomy of social networking data. IEEE Secur. Priv. 8(4), 88 (2010)","journal-title":"IEEE Secur. Priv."},{"key":"5_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27901-0_1","volume-title":"Computational Social Networks: Security and Privacy","author":"M Beye","year":"2012","unstructured":"Beye, M., Jeckmans, A., Erkin, Z., Hartel, P., Lagendijk, R., Tang, Q.: Privacy in online social networks. In: Abraham, A. (ed.) Computational Social Networks: Security and Privacy. Springer, London (2012). https:\/\/doi.org\/10.1007\/978-3-642-27901-0_1"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Ho, A., Maiga, A., Aimeur, E.: Privacy protection issues in social networking sites. In: ACS\/IEEE International Conference on Computer Systems and Applications (AICCSA), Los Alamitos (2009)","DOI":"10.1109\/AICCSA.2009.5069336"},{"key":"5_CR9","first-page":"1","volume":"11","author":"C Richthammer","year":"2014","unstructured":"Richthammer, C., Netter, M., Riesner, M., S\u00e4nger, J., Pernul, G.: Taxonomy of social network data types. EURASIP J. Inf. Secur. 11, 1\u201317 (2014)","journal-title":"EURASIP J. Inf. Secur."},{"key":"5_CR10","volume-title":"Social Network Services and Privacy","author":"A \u00c5rnes","year":"2011","unstructured":"\u00c5rnes, A., Skorstad, J., Michelsen, L.: Social Network Services and Privacy. Datatilsynet, Oslo (2011)"},{"key":"5_CR11","series-title":"lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-642-13241-4_11","volume-title":"Communications and Multimedia Security","author":"N Racz","year":"2010","unstructured":"Racz, N., Weippl, E., Seufert, A.: A frame of reference for research of integrated governance, risk and compliance (GRC). In: De Decker, B., Schaum\u00fcller-Bichl, I. (eds.) CMS 2010. LNCS, vol. 6109, pp. 106\u2013117. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13241-4_11"},{"issue":"1","key":"5_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1870096.1870102","volume":"5","author":"K Liu","year":"2010","unstructured":"Liu, K., Terzi, E.: A framework for computing the privacy scores of users in online social networks. ACM Trans. Knowl. Discov. Data 5(1), 1\u201330 (2010)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Cutillo, L., Molva, R., Onen, M.: Analysis of privacy in online social networks from the graph theory perspective. In: 2011 IEEE Global Telecommunications Conference (GLOBECOM 2011), Kathmandu, Nepal (2011)","DOI":"10.1109\/GLOCOM.2011.6133517"},{"key":"5_CR14","unstructured":"Symeonids, I., Beato, F., Tsormpatzoudi, P., Preneel, B.: Collateral damage of Facebook apps: an enhanced privacy scoring model. In: IACR Cryptology ePrint Archive, IACR (2015)"},{"key":"5_CR15","unstructured":"Becker, J., Chen, H.: Measuring privacy risk in online social networks (2009). http:\/\/web.cs.ucdavis.edu\/~hchen\/paper\/w2sp2009.pdf . Accessed 11 July 2017"},{"issue":"2","key":"5_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5121\/ijsptm.2015.4201","volume":"4","author":"S Ananthula","year":"2015","unstructured":"Ananthula, S., Abuzaghleh, O., Alla, N., Prabha, S.: Measuring privacy in online social networks. Int. J. Secur. Priv. Trust Manage. (IJSPTM) 4(2), 1\u20139 (2015)","journal-title":"Int. J. Secur. Priv. Trust Manage. (IJSPTM)"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Wang, Y., Nepali, R.: Privacy impact assessment for online social networks. In: International Conference on Collaboration Technologies and Systems (CTS), Atlanta, Georgia, USA (2015)","DOI":"10.1109\/CTS.2015.7210451"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Ghazinour, K., Majedi, M., Barker, K.: A model for privacy policy visualization. In: 33rd Annual IEEE International Computer Software and Applications Conference (COMPSAC 2009), Seattle, WA, USA (2009)","DOI":"10.1109\/COMPSAC.2009.156"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Birge, C.: Enhancing research into usable privacy and security. In: 27th ACM International Conference on Design of Communication, Bloomington, Indiana, USA (2009)","DOI":"10.1145\/1621995.1622039"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Becker, J., Heddier, M., \u00d6ksuz, A.: The Effect of providing visualizations in privacy policies on trust in data privacy and security. In: 47th Hawaii International Conference on System Sciences (HICSS), Waikoloa, HI, USA (2014)","DOI":"10.1109\/HICSS.2014.399"},{"key":"5_CR21","series-title":"lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1007\/978-3-319-17533-1_37","volume-title":"Information Security Practice and Experience","author":"J Kang","year":"2015","unstructured":"Kang, J., Kim, H., Cheong, Y.G., Huh, J.H.: Visualizing privacy risks of mobile applications through a privacy meter. In: Lopez, J., Wu, Y. (eds.) ISPEC 2015. LNCS, vol. 9065, pp. 548\u2013558. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-17533-1_37"},{"key":"5_CR22","series-title":"communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-319-27164-4_7","volume-title":"E-Democracy \u2013 Citizen Rights in the World of the New Computing Paradigms","author":"AK Michota","year":"2015","unstructured":"Michota, A.K., Katsikas, S.K.: Tagged data breaches in online social networks. In: Katsikas, S.K., Sideridis, A.B. (eds.) e-Democracy 2015. CCIS, vol. 570, pp. 95\u2013106. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-27164-4_7"},{"key":"5_CR23","unstructured":"W\u00fcest, S.: The Risks of Social Networking. Symantec (2006)"},{"key":"5_CR24","unstructured":"Facebook Data Policy (2017). https:\/\/www.facebook.com\/policy.php . Accessed 11 July 2017"},{"key":"5_CR25","unstructured":"Open Web Application Security Project (OWASP) (2017). https:\/\/www.owasp.org\/index.php\/Main_Page . Accessed 11 July 2017"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Brooks, S., Garcia, M., Lefkovitz, N., Lightman, S., Nadeau, E.: An introduction to privacy engineering and risk management in federal systems. National Institute of Standards and Technology, Gaithersburg, MD, USA (2017)","DOI":"10.6028\/NIST.IR.8062"},{"key":"5_CR27","unstructured":"Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, Brussels: European Commission (1995)"},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Michota, A., Katsikas, S.: The evolution of privacy-by-default in social networks. In: 18th Panhellenic Conference in Informatics (PCI 2014), Athens, Greece (2014)","DOI":"10.1145\/2645791.2645823"},{"key":"5_CR29","unstructured":"Facebook. What\u2019s the Privacy Checkup and how can I find it? (2015). Retrieved May 2015. https:\/\/www.facebook.com\/help\/443357099140264"},{"key":"5_CR30","unstructured":"NIST SP 800-63-1. Electronic authentication guidelines. From National Institute of Standards and Technology (2011)"}],"container-title":["Communications in Computer and Information Science","E-Democracy \u2013 Privacy-Preserving, Secure, Intelligent E-Government Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71117-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T23:33:02Z","timestamp":1603323182000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71117-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319711164","9783319711171"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71117-1_5","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}