{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T18:58:41Z","timestamp":1773082721756,"version":"3.50.1"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030051709","type":"print"},{"value":"9783030051716","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05171-6_19","type":"book-chapter","created":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T10:52:06Z","timestamp":1544007126000},"page":"364-385","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Efficacy of GDPR\u2019s Right-to-be-Forgotten on Facebook"],"prefix":"10.1007","author":[{"given":"Vishwas T.","family":"Patil","sequence":"first","affiliation":[]},{"given":"R. K.","family":"Shyamasundar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,5]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Acar, G., Eubank, C., Englehardt, S., Juarez, M., Narayanan, A., Diaz, C.: The web never forgets: persistent tracking mechanisms in the wild. In: ACM CCS 2014, pp. 674\u2013689 (2014)","DOI":"10.1145\/2660267.2660347"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Barth, A., Datta, A., Mitchell, J.C., Nissenbaum, H.: Privacy and contextual integrity: framework and applications. In: IEEE S&P 2006, pp. 184\u2013198 (2006)","DOI":"10.1109\/SP.2006.32"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Chaabane, A., Kaafar, M.A., Boreli, R.: Big friend is watching you: analyzing online social networks tracking capabilities. In: Proceedings of ACM Workshop on Online Social Networks, pp. 7\u201312. ACM (2012)","DOI":"10.1145\/2342549.2342552"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Costa, P.T., McCrae, R.R.: The Five-Factor Model, Five-Factor Theory, and Interpersonal Psychology, Chap. 6, pp. 91\u2013104. Wiley-Blackwell, Hoboken (2012)","DOI":"10.1002\/9781118001868.ch6"},{"key":"19_CR5","doi-asserted-by":"publisher","first-page":"1376","DOI":"10.1038\/srep01376","volume":"3","author":"YA Montjoye De","year":"2013","unstructured":"De Montjoye, Y.A., Hidalgo, C.A., Verleysen, M., Blondel, V.D.: Unique in the crowd: the privacy bounds of human mobility. Sci. Rep. 3, 1376 (2013)","journal-title":"Sci. Rep."},{"key":"19_CR6","unstructured":"DeKoven, L.F., Savage, S., Voelker, G.M., Leontiadis, N.: Malicious browser extensions at scale: bridging the observability gap between web site and browser. In: 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17) (2017)"},{"issue":"1","key":"19_CR7","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1093\/idpl\/ipw026","volume":"7","author":"A Esteve","year":"2017","unstructured":"Esteve, A.: The business of personal data: Google, Facebook, and privacy issues in the EU and the USA. Int. Data Priv. Law 7(1), 36\u201347 (2017)","journal-title":"Int. Data Priv. Law"},{"key":"19_CR8","unstructured":"European Union: 2018 reform of EU data protection rules (2018). https:\/\/ec.europa.eu\/commission\/priorities\/justice-and-fundamental-rights\/data-protection\/2018-reform-eu-data-protection-rulesen"},{"key":"19_CR9","unstructured":"Forbrukerr\u00e5det: Deceived by Design: how tech companies use dark patterns to discourage us from exercising our rights to privacy, Norwegian Consumer Council (2018). https:\/\/fil.forbrukerradet.no\/wp-content\/uploads\/2018\/06\/2018-06-27-deceived-by-design-final.pdf"},{"key":"19_CR10","unstructured":"FTC: Protecting Consumer Privacy in an Era of Rapid Change: Recommendations for Businesses and Policymakers (2012). https:\/\/www.ftc.gov\/sites\/default\/files\/documents\/reports\/federal-trade-commission-report-protecting-consumer-privacy-era-rapid-change-recommendations\/120326privacyreport.pdf"},{"issue":"7","key":"19_CR11","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/2838730","volume":"59","author":"Y Gurevich","year":"2016","unstructured":"Gurevich, Y., Hudis, E., Wing, J.M.: Inverse privacy. Commun. ACM 59(7), 38\u201342 (2016)","journal-title":"Commun. ACM"},{"key":"19_CR12","unstructured":"International Personality Item Pool: The 3,320 IPIP Items in Alphabetical Order (2018). https:\/\/ipip.ori.org\/AlphabeticalItemList.htm"},{"issue":"15","key":"19_CR13","doi-asserted-by":"publisher","first-page":"5802","DOI":"10.1073\/pnas.1218772110","volume":"110","author":"M Kosinski","year":"2013","unstructured":"Kosinski, M., Stillwell, D., Graepel, T.: Private traits and attributes are predictable from digital records of human behavior. Proc. Natl. Acad. Sci. 110(15), 5802\u20135805 (2013)","journal-title":"Proc. Natl. Acad. Sci."},{"issue":"9","key":"19_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0184562","volume":"12","author":"JB Kristensen","year":"2017","unstructured":"Kristensen, J.B., lbrechtsen, T., Dahl-Nielsen, E., Jensen, M., Skovrind, M., Bornakke, T.: Parsimonious data: how a single Facebook like predicts voting behavior in multiparty systems. PLOS ONE 12(9), 1\u201312 (2017)","journal-title":"PLOS ONE"},{"key":"19_CR15","unstructured":"Edwards, L.: Cambridge Analytica and the deeper malaise in the persuasion industry (2018). http:\/\/blogs.lse.ac.uk\/polis\/2018\/03\/26\/cambridge-analytica-a-symptom-of-a-deeper-malaise-in-the-persuasion-industry\/"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Leon, P.G., et al.: What matters to users?: factors that affect users\u2019 willingness to share information with online advertisers. In: SOUPS, pp. 7:1\u20137:12. ACM (2013)","DOI":"10.1145\/2501604.2501611"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"McCallister, E., Grance, T., Scarfone, K.A.: SP 800\u2013122. Guide to protecting the confidentiality of personally identifiable information (PII). Technical report, National Institute of Standards and Technology (2010)","DOI":"10.6028\/NIST.SP.800-122"},{"issue":"6221","key":"19_CR18","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1126\/science.1256297","volume":"347","author":"YA Montjoye de","year":"2015","unstructured":"de Montjoye, Y.A., Radaelli, L., Singh, V.K., Pentland, A.: Unique in the shopping mall: on the reidentifiability of credit card metadata. Science 347(6221), 536\u2013539 (2015)","journal-title":"Science"},{"key":"19_CR19","unstructured":"Ohm, P.: Broken promises of privacy: responding to the surprising failure of anonymization. UCLA Law Rev. 57, 1701 (2009, 2010)"},{"key":"19_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-319-95729-6_6","volume-title":"Data and Applications Security and Privacy XXXII","author":"VT Patil","year":"2018","unstructured":"Patil, V.T., Jatain, N., Shyamasundar, R.K.: Role of apps in undoing of privacy policies on facebook. In: Kerschbaum, F., Paraboschi, S. (eds.) DBSec 2018. LNCS, vol. 10980, pp. 85\u201398. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-95729-6_6"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Patil, V.T., Shyamasundar, R.K.: Privacy as a currency: un-regulated? In: Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017). SECRYPT, vol. 4, pp. 586\u2013595. SciTePress (2017)","DOI":"10.5220\/0006478705860595"},{"key":"19_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-319-61176-1_13","volume-title":"Data and Applications Security and Privacy XXXI","author":"VT Patil","year":"2017","unstructured":"Patil, V.T., Shyamasundar, R.K.: Undoing of privacy policies on Facebook. In: Livraga, G., Zhu, S. (eds.) DBSec 2017. LNCS, vol. 10359, pp. 239\u2013255. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-61176-1_13"},{"key":"19_CR23","unstructured":"Portokalidis, G., Polychronakis, M., Keromytis, A.D., Markatos, E.P.: Privacy-preserving social plugins. In: USENIX Security Symposium, pp. 631\u2013646 (2012)"},{"key":"19_CR24","unstructured":"ProPublica Data Store: Facebook ad categories (2016). https:\/\/www.propublica.org\/datastore\/dataset\/facebook-ad-categories"},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"Quercia, D., Lambiotte, R., Stillwell, D., Kosinski, M., Crowcroft, J.: The personality of popular Facebook users. In: Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work, pp. 955\u2013964 (2012)","DOI":"10.1145\/2145204.2145346"},{"key":"19_CR26","volume-title":"Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World","author":"B Schneier","year":"2015","unstructured":"Schneier, B.: Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. W. W. Norton & Company, New York City (2015)"},{"issue":"4","key":"19_CR27","doi-asserted-by":"publisher","first-page":"1036","DOI":"10.1073\/pnas.1418680112","volume":"112","author":"W Youyou","year":"2015","unstructured":"Youyou, W., Kosinski, M., Stillwell, D.: Computer-based personality judgments are more accurate than those made by humans. Proc. Natl. Acad. Sci. 112(4), 1036\u20131040 (2015)","journal-title":"Proc. Natl. Acad. Sci."}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05171-6_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T15:27:04Z","timestamp":1573054024000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05171-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030051709","9783030051716"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05171-6_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iciss.org.in","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"51","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"45% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}