{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T16:02:08Z","timestamp":1759939328736},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030009151"},{"type":"electronic","value":"9783030009168"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00916-8_53","type":"book-chapter","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T03:45:33Z","timestamp":1537847133000},"page":"578-588","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Privacy Settings Prediction Model for Textual Posts on Social Networks"],"prefix":"10.1007","author":[{"given":"Lijun","family":"Chen","sequence":"first","affiliation":[]},{"given":"Ming","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Xue","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Yiming","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Tong","family":"Qiao","sequence":"additional","affiliation":[]},{"given":"Hongbin","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"key":"53_CR1","doi-asserted-by":"crossref","unstructured":"Abuelgasim, A., Kayem, A.: An approach to personalized privacy policy recommendations on online social networks. In: International Conference on Information Systems Security and Privacy, pp. 126\u2013137 (2016)","DOI":"10.5220\/0005689701260137"},{"key":"53_CR2","doi-asserted-by":"crossref","unstructured":"Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Hubaux, J.P.: Adaptive information-sharing for privacy-aware mobile social networks. In: ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 657\u2013666 (2013)","DOI":"10.1145\/2493432.2493510"},{"key":"53_CR3","unstructured":"Chen, L.: Questionnaire about privacy preference on social networks (2016). http:\/\/sec.hdu.edu.cn\/questionnaire\/"},{"key":"53_CR4","doi-asserted-by":"crossref","unstructured":"Fang, L., Lefevre, K.: Privacy wizards for social networking sites. In: International Conference on World Wide Web, pp. 351\u2013360 (2010)","DOI":"10.1145\/1772690.1772727"},{"key":"53_CR5","unstructured":"Goldberg, Y., Levy, O.: word2vec explained: deriving Mikolov et al\u2019.s negative-sampling word-embedding method. Eprint Arxiv (2014)"},{"key":"53_CR6","doi-asserted-by":"crossref","unstructured":"Li, Q., Li, J., Wang, H., Ginjala, A.: Semantics-enhanced privacy recommendation for social networking sites. In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 226\u2013233 (2011)","DOI":"10.1109\/TrustCom.2011.31"},{"issue":"1","key":"53_CR7","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1109\/TKDE.2014.2320729","volume":"27","author":"D Lin","year":"2015","unstructured":"Lin, D., Wede, J., Sundareswaran, S.: Privacy policy inference of user-uploaded images on content sharing sites. IEEE Trans. Knowl. Data Eng. 27(1), 193\u2013206 (2015)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"53_CR8","doi-asserted-by":"crossref","unstructured":"Madejski, M., Johnson, M., Bellovin, S.M.: A study of privacy settings errors in an online social network. In: IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 340\u2013345 (2012)","DOI":"10.1109\/PerComW.2012.6197507"},{"key":"53_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/978-3-319-20267-9_9","volume-title":"User Modeling, Adaptation and Personalization","author":"KD Naini","year":"2015","unstructured":"Naini, K.D., Altingovde, I.S., Kawase, R., Herder, E., Nieder\u00e9e, C.: Analyzing and predicting privacy settings in the social web. In: Ricci, F., Bontcheva, K., Conlan, O., Lawless, S. (eds.) UMAP 2015. LNCS, vol. 9146, pp. 104\u2013117. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-20267-9_9"},{"issue":"2","key":"53_CR10","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1162\/COLI_a_00049","volume":"37","author":"M Taboada","year":"2011","unstructured":"Taboada, M., Brooke, J., Tofiloski, M., Voll, K., Stede, M.: Lexicon-based methods for sentiment analysis. Comput. Linguist. 37(2), 267\u2013307 (2011)","journal-title":"Comput. Linguist."},{"issue":"1","key":"53_CR11","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/s00779-012-0632-0","volume":"18","author":"E Toch","year":"2014","unstructured":"Toch, E.: Crowdsourcing privacy preferences in context-aware applications. Pers. Ubiquitous Comput. 18(1), 129\u2013141 (2014)","journal-title":"Pers. Ubiquitous Comput."},{"key":"53_CR12","doi-asserted-by":"crossref","unstructured":"Watson, J., Besmer, A., Lipford, H.R.: +your circles: sharing behavior on Google+. In: Eighth Symposium on Usable Privacy and Security, p. 12 (2012)","DOI":"10.1145\/2335356.2335373"},{"issue":"3","key":"53_CR13","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/1361684.1361686","volume":"26","author":"HC Wu","year":"2008","unstructured":"Wu, H.C., Luk, R.W.P., Wong, K.F., Kwok, K.L.: Interpreting TF-IDF term weights as making relevance decisions. ACM Trans. Inf. Syst. 26(3), 55\u201359 (2008)","journal-title":"ACM Trans. Inf. Syst."},{"key":"53_CR14","doi-asserted-by":"crossref","unstructured":"Xie, J., Knijnenburg, B.P., Jin, H.: Location sharing privacy preference: analysis and personalized recommendation. In: International Conference on Intelligent User Interfaces, pp. 189\u2013198 (2014)","DOI":"10.1145\/2557500.2557504"},{"key":"53_CR15","unstructured":"Yeung, C.M.A., Kagal, L., Gibbins, N., Shadbolt, N.: Providing access control to online photo albums based on tags and linked data. In: AAAI-SSS: Social Semantic Web (2011)"},{"key":"53_CR16","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-319-58469-0_7","volume-title":"ICT Systems Security and Privacy Protection","author":"Lin Yuan","year":"2017","unstructured":"Yuan, L., Theytaz, J., Ebrahimi, T.: Context-dependent privacy-aware photo sharing based on machine learning. In: IFIP International Conference on ICT Systems Security and Privacy Protection, pp. 93\u2013107 (2017)"},{"key":"53_CR17","doi-asserted-by":"crossref","unstructured":"Zerr, S., Siersdorfer, S., Hare, J., Demidova, E.: Privacy-aware image classification and search. In: International ACM SIGIR Conference on Research & Development on Information Retrieval, Portland, Oregon, pp. 35\u201344 (2012)","DOI":"10.1145\/2348283.2348292"},{"key":"53_CR18","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Ye, J., Henderson, T.: Privacy-aware location privacy preference recommendations. In: International Conference on Mobile and Ubiquitous Systems: Computing, NETWORKING and Services, pp. 120\u2013129 (2014)","DOI":"10.4108\/icst.mobiquitous.2014.258017"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Collaborative Computing: Networking, Applications and Worksharing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00916-8_53","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T16:19:51Z","timestamp":1571933991000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00916-8_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030009151","9783030009168"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00916-8_53","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"CollaborateCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Collaborative Computing: Networking, Applications and Worksharing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Edinburgh","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"colcom2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/collaboratecom.eai-conferences.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}