{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:43:14Z","timestamp":1725496994492},"reference-count":86,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1016\/j.cose.2020.101822","type":"journal-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T20:07:11Z","timestamp":1588622831000},"page":"101822","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":22,"special_numbering":"C","title":["Duplicitous social media and data surveillance: An evaluation of privacy risk"],"prefix":"10.1016","volume":"94","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-2892-7954","authenticated-orcid":false,"given":"Karl van der","family":"Schyff","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4591-3802","authenticated-orcid":false,"given":"Stephen","family":"Flowerday","sequence":"additional","affiliation":[]},{"given":"Steven","family":"Furnell","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.cose.2020.101822_bib0001","article-title":"Online social networking as participatory surveillance","volume":"13","author":"Albrechtslund","year":"2008","journal-title":"First Monday"},{"key":"10.1016\/j.cose.2020.101822_bib0002","unstructured":"Amer K, Noujaim J.The great hack. Netflix; 2019. Available from:https:\/\/www.netflix.com\/za\/title\/80117542"},{"key":"10.1016\/j.cose.2020.101822_bib0003","series-title":"iSpy: Surveillance and Power in the Interactive Era","author":"Andrejevic","year":"2007"},{"issue":"4","key":"10.1016\/j.cose.2020.101822_bib0004","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1016\/S0736-5853(88)80062-5","article-title":"Threat to privacy: the federal government's use of personal information in the new communication environment","volume":"5","author":"Apostolou","year":"1988","journal-title":"Telemat Informat."},{"key":"10.1016\/j.cose.2020.101822_bib0005","series-title":"Proceedings of the 2010 IEEE\/WIC\/ACM International Conference on Web Intelligence","first-page":"492","article-title":"Predicting the future with social media","volume":"1","author":"Asur","year":"2010"},{"key":"10.1016\/j.cose.2020.101822_bib0006","series-title":"The Consumer Society: Myths and Structures","author":"Baudrillard","year":"2016"},{"issue":"5","key":"10.1016\/j.cose.2020.101822_bib0007","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1080\/01972240490507956","article-title":"International differences in information privacy concerns: a global survey of consumers","volume":"20","author":"Bellman","year":"2004","journal-title":"Inf. Soc."},{"issue":"1","key":"10.1016\/j.cose.2020.101822_bib0008","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1177\/016224399101600103","article-title":"Computers, personal data, and theories of technology: comparative approaches to privacy protection in the 1990s","volume":"16","author":"Bennett","year":"1991","journal-title":"Sci Technol Hum. Values"},{"issue":"3","key":"10.1016\/j.cose.2020.101822_bib0009","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1023\/A:1012235815384","article-title":"Cookies, web bugs, webcams and cue cats: patterns of surveillance on the world wide web","volume":"3","author":"Bennett","year":"2001","journal-title":"Ethics Inf. Technol."},{"issue":"1","key":"10.1016\/j.cose.2020.101822_bib0010","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1177\/002224299405800108","article-title":"Avoiding misuse of new information technologies: legal and societal considerations","volume":"58","author":"Bloom","year":"1994","journal-title":"J. Mark"},{"issue":"1","key":"10.1016\/j.cose.2020.101822_bib0011","first-page":"210","article-title":"Social network sites: definition, history, and scholarship","volume":"13","author":"Boyd","year":"2007","journal-title":"J. Comput. Commun."},{"issue":"1","key":"10.1016\/j.cose.2020.101822_bib0012","first-page":"1","article-title":"Recordkeeping as a technology of power","volume":"39","author":"Boyes-Watson","year":"1994","journal-title":"Berkeley J. Sociol."},{"key":"10.1016\/j.cose.2020.101822_bib0013","doi-asserted-by":"crossref","first-page":"475","DOI":"10.2307\/975569","article-title":"Public management information systems: theory and prescription","author":"Bozeman","year":"1986","journal-title":"Public Adm. Rev."},{"key":"10.1016\/j.cose.2020.101822_bib0014","first-page":"1","article-title":"Social media surveillance","author":"Brown","year":"2015","journal-title":"Int. Encycl. Digit. Commun. Soc."},{"issue":"1","key":"10.1016\/j.cose.2020.101822_bib0015","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/BF00873736","article-title":"The two-tiered ethics of EDP","volume":"14","author":"Byrne","year":"1995","journal-title":"J. Bus Ethics"},{"issue":"3","key":"10.1016\/j.cose.2020.101822_bib0016","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1177\/1461444815605463","article-title":"Algorithmic brands: a decade of brand experiments with mobile and social media","volume":"19","author":"Carah","year":"2017","journal-title":"New Media Soc."},{"key":"10.1016\/j.cose.2020.101822_bib0017","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1016\/j.dss.2016.07.001","article-title":"Members\u2019 site use continuance on Facebook: examining the role of relational capital","volume":"90","author":"Chen","year":"2016","journal-title":"Decis. Support Syst."},{"issue":"5","key":"10.1016\/j.cose.2020.101822_bib0018","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1145\/42411.42413","article-title":"Information technology and dataveillance","volume":"31","author":"Clarke","year":"1988","journal-title":"Commun. ACM"},{"issue":"2","key":"10.1016\/j.cose.2020.101822_bib0019","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1080\/01972243.1994.9960160","article-title":"The digital persona and its application to data surveillance","volume":"10","author":"Clarke","year":"1994","journal-title":"Inf. Soc."},{"issue":"2","key":"10.1016\/j.cose.2020.101822_bib0020","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1108\/09593840110695767","article-title":"Person location and person tracking-Technologies, risks and policy implications","volume":"14","author":"Clarke","year":"2001","journal-title":"Inf. Technol. People"},{"issue":"1","key":"10.1016\/j.cose.2020.101822_bib0021","first-page":"10","article-title":"While you were sleeping... surveillance technologies arrived","volume":"73","author":"Clarke","year":"2001","journal-title":"AQ-EAST Melb"},{"key":"10.1016\/j.cose.2020.101822_bib0022","unstructured":"Clement J.Percentage of adults in the United States who use social networks as of February 2019, by educational background. 2019."},{"key":"10.1016\/j.cose.2020.101822_bib0023","unstructured":"Coldewey D. Facebook bans first app since Cambridge Analytica, myPersonality, and suspends hundreds more. 2018. Available from: https:\/\/techcrunch.com\/2018\/08\/22\/facebook-bans-first-app-since-cambridge-analytica-mypersonality-and-suspends-hundreds-more\/"},{"issue":"2","key":"10.1016\/j.cose.2020.101822_bib0024","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/j.chb.2009.09.003","article-title":"Who interacts on the Web?: The intersection of users\u2019 personality and social media use","volume":"26","author":"Correa","year":"2010","journal-title":"Comput. Hum. Behav."},{"issue":"3","key":"10.1016\/j.cose.2020.101822_bib0025","doi-asserted-by":"crossref","first-page":"341","DOI":"10.2307\/249775","article-title":"\u201cHow did they get my name?\u201d: An exploratory investigation of consumer attitudes toward secondary information use","volume":"17","author":"Culnan","year":"1993","journal-title":"MIS Q."},{"key":"10.1016\/j.cose.2020.101822_bib0026","unstructured":"DigitalWatch. Cambridge Analytica explained: the facts, implications, and open questions. 2018. Available from:https:\/\/dig.watch\/trends\/cambridge-analytica"},{"issue":"1","key":"10.1016\/j.cose.2020.101822_bib0027","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1060.0080","article-title":"An extended Privacy Calculus transactions model for e-commerce transactions","volume":"17","author":"Dinev","year":"2006","journal-title":"Inf. Syst. Res."},{"key":"10.1016\/j.cose.2020.101822_bib0028","unstructured":"DOMO. Data never sleeps 6.0. 2018. Available from:https:\/\/www.domo.com\/assets\/downloads\/18_domo_data-never-sleeps-6+verticals.pdf"},{"key":"10.1016\/j.cose.2020.101822_bib0029","doi-asserted-by":"crossref","unstructured":"Van Eemeren FH, Grootendorst R. Fallacies in pragma-dialectical perspective. Argumentation. 1987;","DOI":"10.1007\/BF00136779"},{"key":"10.1016\/j.cose.2020.101822_bib0030","doi-asserted-by":"crossref","unstructured":"Van Eemeren FH, Grootendorst R. Rationale for a pragma-dialectical perspective. Argumentation. 1988;","DOI":"10.1007\/BF00178026"},{"key":"10.1016\/j.cose.2020.101822_bib0031","series-title":"Peirce's Theory of Abduction","author":"Fann","year":"1970"},{"key":"10.1016\/j.cose.2020.101822_bib0032","series-title":"Internet and Online Privacy: A Legal and Business Guide","author":"Frackman","year":"2002"},{"issue":"1","key":"10.1016\/j.cose.2020.101822_bib0033","doi-asserted-by":"crossref","first-page":"140","DOI":"10.3390\/info2010140","article-title":"An alternative view of privacy on Facebook","volume":"2","author":"Fuchs","year":"2011","journal-title":"Information"},{"key":"10.1016\/j.cose.2020.101822_bib0034","series-title":"Social Media: A Critical Introduction","author":"Fuchs","year":"2017"},{"issue":"2","key":"10.1016\/j.cose.2020.101822_bib0035","doi-asserted-by":"crossref","first-page":"171","DOI":"10.2307\/144357","article-title":"\u201cWe know who you are and we know where you live\u201d: The instrumental rationality of geodemographic systems","volume":"71","author":"Goss","year":"1995","journal-title":"Econ. Geogr."},{"issue":"2","key":"10.1016\/j.cose.2020.101822_bib0036","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1023\/A:1010011512024","article-title":"Privacy lost: the Net, autonomous agents, and \u201cvirtual information.\u201d","volume":"1","author":"Gotterbarn","year":"1999","journal-title":"Ethics Inf. Technol."},{"issue":"3","key":"10.1016\/j.cose.2020.101822_bib0037","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1177\/016224398901400303","article-title":"Electronic databases and privacy: policy for the 1990s","volume":"14","author":"Gray","year":"1989","journal-title":"Sci. Technol. Hum. Values"},{"key":"10.1016\/j.cose.2020.101822_bib0038","unstructured":"Greenwald G. Why privacy matters. 2014. Available from:https:\/\/www.ted.com\/talks\/glenn_greenwald_why_privacy_matters#t-906710"},{"key":"10.1016\/j.cose.2020.101822_bib0039","doi-asserted-by":"crossref","unstructured":"Hajian S, Bonchi F, Castillo C. Algorithmic bias: from discrimination discovery to fairness-aware data mining. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2016. p. 2125\u20132126.","DOI":"10.1145\/2939672.2945386"},{"key":"10.1016\/j.cose.2020.101822_bib0040","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.chb.2016.11.033","article-title":"Online self-disclosure: the privacy paradox explained as a temporally discounted balance between concerns and rewards","volume":"68","author":"Hallam","year":"2017","journal-title":"Comput. Hum. Behav."},{"key":"10.1016\/j.cose.2020.101822_bib0041","unstructured":"Hayden M. State Surveillance. 2014. Available from:https:\/\/goo.gl\/WD7M7M"},{"issue":"2","key":"10.1016\/j.cose.2020.101822_bib0042","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1016\/j.chb.2011.11.001","article-title":"A tale of two sites: Twitter vs. Facebook and the personality predictors of social media usage","volume":"28","author":"Hughes","year":"2012","journal-title":"Comput. Hum. Behav."},{"issue":"12","key":"10.1016\/j.cose.2020.101822_bib0043","first-page":"123","article-title":"Exploratory analysis of the readability of information privacy statement of the primary social networks","volume":"7","author":"Jafar","year":"2011","journal-title":"J. Bus. Econ. Res."},{"key":"10.1016\/j.cose.2020.101822_bib0044","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.chb.2016.12.048","article-title":"Online privacy-related predictors of Facebook usage intensity","volume":"70","author":"Jordaan","year":"2017","journal-title":"Comput. Hum. Behav."},{"issue":"4","key":"10.1016\/j.cose.2020.101822_bib0045","doi-asserted-by":"crossref","first-page":"1193","DOI":"10.2307\/1229286","article-title":"Information privacy in cyberspace transactions","volume":"50","author":"Kang","year":"1998","journal-title":"Stanford Law Rev."},{"issue":"1","key":"10.1016\/j.cose.2020.101822_bib0046","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.bushor.2009.09.003","article-title":"Users of the world, unite! The challenges and opportunities of social media","volume":"53","author":"Kaplan","year":"2010","journal-title":"Bus Horiz"},{"key":"10.1016\/j.cose.2020.101822_bib0048","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/j.chb.2017.10.015","article-title":"Quid pro quo in Web 2.0. Connecting personality traits and Facebook usage intensity to uncivil commenting intentions in public online discussions","volume":"79","author":"Koban","year":"2018","journal-title":"Comput. Hum. Behav."},{"issue":"1","key":"10.1016\/j.cose.2020.101822_bib0049","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1080\/07421222.2017.1296744","article-title":"What leads to prosocial behaviors on social networking services: a tripartite model","volume":"34","author":"Kuem","year":"2017","journal-title":"J. Manag. Inf. Syst."},{"key":"10.1016\/j.cose.2020.101822_bib0050","unstructured":"Leetaru K. Facebook's device partners and how nothing has changed since Cambridge Analytica. 2018. Available from:https:\/\/www.forbes.com\/sites\/kalevleetaru\/2018\/06\/18\/facebooks-device-partners-and-how-nothing-has-changed-since-cambridge-analytica\/#7d77f12375a7"},{"issue":"7","key":"10.1016\/j.cose.2020.101822_bib0051","doi-asserted-by":"crossref","first-page":"882","DOI":"10.1016\/j.im.2015.07.006","article-title":"An empirical analysis of users\u2019 privacy disclosure behaviors on social network sites","volume":"52","author":"Li","year":"2015","journal-title":"Inf. Manag."},{"issue":"3","key":"10.1016\/j.cose.2020.101822_bib0052","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1057\/sth.2012.6","article-title":"M-health and health promotion: the digital cyborg and surveillance society","volume":"10","author":"Lupton","year":"2012","journal-title":"Soc. Theory Heal"},{"issue":"1","key":"10.1016\/j.cose.2020.101822_bib0053","first-page":"159","article-title":"The new surveillance: electronic technologies and the maximum security society","volume":"18","author":"Lyon","year":"1992","journal-title":"Crime, Law Soc. Change"},{"issue":"3","key":"10.1016\/j.cose.2020.101822_bib0054","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1023\/A:1012227629496","article-title":"Facing the future: seeking ethics for everyday surveillance","volume":"3","author":"Lyon","year":"2001","journal-title":"Ethics Inf. Technol."},{"key":"10.1016\/j.cose.2020.101822_bib0055","unstructured":"Lyon D. Social media surveillance: who is doing it?. 2013. Available from:https:\/\/www.youtube.com\/watch?v=_hX1r2Tbv5g"},{"key":"10.1016\/j.cose.2020.101822_bib0056","series-title":"Facebook Democracy: The Architecture of Disclosure and the Threat to Public Life","author":"Marichal","year":"2016"},{"key":"10.1016\/j.cose.2020.101822_bib0057","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.addbeh.2016.07.001","article-title":"Modeling the contribution of personality, social identity and social norms to problematic Facebook use in adolescents","volume":"63","author":"Marino","year":"2016","journal-title":"Addict Behav."},{"issue":"2","key":"10.1016\/j.cose.2020.101822_bib0058","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1177\/002224299505900204","article-title":"Exonerating unethical marketing executive behaviors: a diagnostic framework","volume":"59","author":"Mascarenhas","year":"1995","journal-title":"J. Mark."},{"issue":"1","key":"10.1016\/j.cose.2020.101822_bib0059","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1177\/074391568900800118","article-title":"Information technology, privacy, and the public good","volume":"8","author":"McCrohan","year":"1989","journal-title":"J. Public Policy Mark."},{"key":"10.1016\/j.cose.2020.101822_bib0060","series-title":"Qualitative Data Analysis A methods Sourcebook Edition 3","author":"Milles","year":"2014"},{"key":"10.1016\/j.cose.2020.101822_bib0061","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.dss.2014.03.001","article-title":"A data-driven approach to predict the success of bank telemarketing","volume":"62","author":"Moro","year":"2014","journal-title":"Decis. Support Syst."},{"issue":"9","key":"10.1016\/j.cose.2020.101822_bib0062","doi-asserted-by":"crossref","first-page":"3341","DOI":"10.1016\/j.jbusres.2016.02.010","article-title":"Predicting social media performance metrics and evaluation of the impact on brand building: a data mining approach","volume":"69","author":"Moro","year":"2016","journal-title":"J. Bus. Res."},{"issue":"4","key":"10.1016\/j.cose.2020.101822_bib0063","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/S0749-3797(99)00024-0","article-title":"Privacy, confidentiality, and security in information systems of state health agencies","volume":"16","author":"O'Brien","year":"1999","journal-title":"Am. J. Prev. Med."},{"key":"10.1016\/j.cose.2020.101822_bib0064","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/s10603-018-9399-7","article-title":"Does the GDPR Enhance Consumers\u2019 Control over Personal Data? An Analysis from a Behavioural Perspective","volume":"42","author":"van Ooijen","year":"2019","journal-title":"J. Consum. Policy"},{"key":"10.1016\/j.cose.2020.101822_bib0065","unstructured":"Pegg D, Cadwalladr C. US data firm admits employee approached Cambridge Analytica: Palantir confirm employee \u2018engaged in a personal capacity\u2019 with the company. 2018. Available from:https:\/\/www.theguardian.com\/uk-news\/2018\/mar\/28\/palantir-employee-cambridge-analytica"},{"key":"10.1016\/j.cose.2020.101822_bib0066","author":"Rainbolt","year":"2012"},{"issue":"1","key":"10.1016\/j.cose.2020.101822_bib0067","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1177\/1469540509354673","article-title":"Production, consumption, prosumption: The nature of capitalism in the age of the digital \u201cprosumer.\u201d","volume":"10","author":"Ritzer","year":"2010","journal-title":"J. Consum. Cult."},{"issue":"5","key":"10.1016\/j.cose.2020.101822_bib0068","first-page":"493","article-title":"The loss of personal privacy and its consequences for social research","volume":"28","author":"Robbin","year":"2001","journal-title":"J. Gov. Inf."},{"issue":"2","key":"10.1016\/j.cose.2020.101822_bib0069","doi-asserted-by":"crossref","first-page":"222","DOI":"10.2307\/800214","article-title":"Documentary identification and mass surveillance in the United States","volume":"31","author":"Rule","year":"1983","journal-title":"Soc. Probl."},{"key":"10.1016\/j.cose.2020.101822_bib0070","series-title":"Proceedings of the 19th International Conference on World Wide Web","first-page":"851","article-title":"Earthquake shakes Twitter users: Real-time event detection by social sensors","author":"Sakaki","year":"2010"},{"issue":"2","key":"10.1016\/j.cose.2020.101822_bib0071","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1017\/bap.2016.11","article-title":"Club goods, intellectual property rights, and profitability in the information economy","volume":"19","author":"Schwartz","year":"2017","journal-title":"Bus. Polit."},{"key":"10.1016\/j.cose.2020.101822_bib0072","series-title":"Proceedings of the 24th Americas Conference on Information Systems","first-page":"1","article-title":"Facebook and dataveillance: demonstrating a multimodal discourse analysis","author":"van der Schyff","year":"2018"},{"key":"10.1016\/j.cose.2020.101822_bib0073","series-title":"Jean Baudrillard. Fifty Key Sociologists: The Contemporary Theorists","author":"Scott","year":"1983"},{"issue":"6","key":"10.1016\/j.cose.2020.101822_bib0074","doi-asserted-by":"crossref","first-page":"538","DOI":"10.1145\/358080.358090","article-title":"Computer matching is a serious threat to individual rights","volume":"27","author":"Shattuck","year":"1984","journal-title":"Commun. ACM"},{"key":"10.1016\/j.cose.2020.101822_bib0075","first-page":"1","article-title":"Did you really agree to that? The evolution of Facebook's privacy policy","author":"Shore","year":"2015","journal-title":"Technol. Sci."},{"issue":"4","key":"10.1016\/j.cose.2020.101822_bib0076","doi-asserted-by":"crossref","first-page":"989","DOI":"10.2307\/41409970","article-title":"Information privacy research: an interdisciplinary review","volume":"35","author":"Smith","year":"2011","journal-title":"MIS Q."},{"key":"10.1016\/j.cose.2020.101822_bib0077","series-title":"Permanent Record","author":"Snowden","year":"2019"},{"key":"10.1016\/j.cose.2020.101822_bib0078","unstructured":"Snowden M.\u201cState of Surveillance\u201d with Edward Snowden and Shane Smith. 2016. Available from: https:\/\/www.youtube.com\/watch?v=ucRWyGKBVzo&t=35s"},{"issue":"6","key":"10.1016\/j.cose.2020.101822_bib0079","doi-asserted-by":"crossref","first-page":"1393","DOI":"10.2307\/1229546","article-title":"Privacy and power: computer databases and metaphors for information privacy","volume":"53","author":"Solove","year":"2001","journal-title":"Stanford Law Rev."},{"key":"10.1016\/j.cose.2020.101822_bib0080","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/j.cose.2018.03.015","article-title":"Collateral damage of Facebook third-party applications: a comprehensive study","volume":"77","author":"Symeonidis","year":"2018","journal-title":"Comput. Secur."},{"issue":"2","key":"10.1016\/j.cose.2020.101822_bib0081","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1023\/A:1010063528863","article-title":"Informational privacy, data mining, and the Internet","volume":"1","author":"Tavani","year":"1999","journal-title":"Ethics Inf. Technol."},{"key":"10.1016\/j.cose.2020.101822_bib0082","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.ijhcs.2015.03.004","article-title":"The role of security notices and online consumer behaviour: an empirical study of social networking users","volume":"80","author":"Vladlena","year":"2015","journal-title":"Int. J. Hum. Comput. Stud."},{"issue":"8","key":"10.1016\/j.cose.2020.101822_bib0083","doi-asserted-by":"crossref","first-page":"1254","DOI":"10.1177\/0163443711418741","article-title":"Spookipedia: intelligence, social media and biopolitics","volume":"33","author":"Werbin","year":"2011","journal-title":"Media Cult. Soc."},{"issue":"1","key":"10.1016\/j.cose.2020.101822_bib0084","first-page":"166","article-title":"Privacy and freedom","volume":"25","author":"Westin","year":"1968","journal-title":"Washingt Lee Law Rev."},{"key":"10.1016\/j.cose.2020.101822_bib0085","series-title":"Information Technology in a Democracy","author":"Westin","year":"1971"},{"issue":"1","key":"10.1016\/j.cose.2020.101822_bib0086","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/958616.958619","article-title":"Databanks in a free society","volume":"4","author":"Westin","year":"1973","journal-title":"ACM SIGCAS Comput. Soc."},{"issue":"7","key":"10.1016\/j.cose.2020.101822_bib0087","doi-asserted-by":"crossref","first-page":"1087","DOI":"10.1177\/1461444814543997","article-title":"Places nearby: Facebook as a location-based social media platform","volume":"16","author":"Wilken","year":"2014","journal-title":"New Media Soc."}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404820300961?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404820300961?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T03:59:26Z","timestamp":1601524766000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404820300961"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":86,"alternative-id":["S0167404820300961"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2020.101822","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2020,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Duplicitous social media and data surveillance: An evaluation of privacy risk","name":"articletitle","label":"Article Title"},{"value":"Computers & Security","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cose.2020.101822","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2020 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"101822"}}