{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T16:43:31Z","timestamp":1759941811542,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030578046"},{"type":"electronic","value":"9783030578053"}],"license":[{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-57805-3_18","type":"book-chapter","created":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T13:04:15Z","timestamp":1598533455000},"page":"184-194","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Automatic Detection of Sensitive Information in Educative Social Networks"],"prefix":"10.1007","author":[{"given":"V\u00edctor","family":"Botti-Cebri\u00e1","sequence":"first","affiliation":[]},{"given":"Elena","family":"del Val","sequence":"additional","affiliation":[]},{"given":"Ana","family":"Garc\u00eda-Fornes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,28]]},"reference":[{"key":"18_CR1","unstructured":"Official legal text. \nhttps:\/\/gdpr-info.eu\/"},{"key":"18_CR2","doi-asserted-by":"publisher","first-page":"13118","DOI":"10.1109\/ACCESS.2017.2720187","volume":"5","author":"E Aghasian","year":"2017","unstructured":"Aghasian, E., Garg, S., Gao, L., Yu, S., Montgomery, J.: Scoring users\u2019 privacy disclosure across multiple online social networks. IEEE Access 5, 13118\u201313130 (2017)","journal-title":"IEEE Access"},{"issue":"5","key":"18_CR3","doi-asserted-by":"publisher","first-page":"107","DOI":"10.3390\/info9050107","volume":"9","author":"G Aguado","year":"2018","unstructured":"Aguado, G., Julian, V., Garcia-Fornes, A.: Towards aiding decision-making in social networks by using sentiment and stress combined analysis. Information 9(5), 107 (2018)","journal-title":"Information"},{"key":"18_CR4","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.ijhcs.2019.03.008","volume":"129","author":"J Alemany","year":"2019","unstructured":"Alemany, J., del Val, E., Alberola, J., Garc\u00eda-Fornes, A.: Enhancing the privacy risk awareness of teenagers in online social networks through soft-paternalism mechanisms. Int. J. Hum Comput Stud. 129, 27\u201340 (2019)","journal-title":"Int. J. Hum Comput Stud."},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Alemany, J., del Val, E., Alberola, J., Garc\u00eda-Fornes, A.: Estimation of privacy risk through centrality metrics. Future Generation Computer Systems (2018)","DOI":"10.1016\/j.future.2017.12.030"},{"key":"18_CR6","doi-asserted-by":"publisher","first-page":"143631143645","DOI":"10.1109\/ACCESS.2019.2944723","volume":"7","author":"J Alemany","year":"2019","unstructured":"Alemany, J., Del Val, E., Alberola, J.M., Gar\u0107ia-Fornes, A.: Metrics for privacy assessment when sharing information in online social networks. IEEE Access 7, 143631143645 (2019)","journal-title":"IEEE Access"},{"key":"18_CR7","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1016\/0895-4356(93)90018-V","volume":"46","author":"T Byrt","year":"1993","unstructured":"Byrt, T., Bishop, J., Carlin, J.B.: Bias, prevalence and kappa. J. Clin. Epidemiol. 46, 423\u2013429 (1993). \nhttps:\/\/doi.org\/10.1016\/0895-4356(93)90018-V","journal-title":"J. Clin. Epidemiol."},{"issue":"5","key":"18_CR8","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1016\/0895-4356(93)90018-V","volume":"46","author":"T Byrt","year":"1993","unstructured":"Byrt, T., Bishop, J., Carlin, J.B.: Bias, prevalence and kappa. J. Clin. Epidemiol. 46(5), 423\u2013429 (1993)","journal-title":"J. Clin. Epidemiol."},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Caliskan\u00a0Islam, A., Walsh, J., Greenstadt, R.: Privacy detective: Detecting private information and collective privacy behavior in a large social network. In: Proceedings of the 13th Workshop on Privacy in the Electronic Society. ACM (2014)","DOI":"10.1145\/2665943.2665958"},{"key":"18_CR10","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1016\/j.chb.2016.02.040","volume":"59","author":"A Dhir","year":"2016","unstructured":"Dhir, A., Kaur, P., Chen, S., Lonka, K.: Understanding online regret experience in Facebook use-effects of brand participation, accessibility & problematic use. Comput. Hum. Behav. 59, 420\u2013430 (2016)","journal-title":"Comput. Hum. Behav."},{"issue":"2","key":"18_CR11","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/s11135-014-0003-1","volume":"49","author":"R Falotico","year":"2015","unstructured":"Falotico, R., Quatto, P.: Fleiss\u2019 kappa statistic without paradoxes. Qual. Quant. 49(2), 463\u2013470 (2015)","journal-title":"Qual. Quant."},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Mao, H., Shuai, X., Kapadia, A.: Loose tweets: an analysis of privacy leaks on Twitter. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, pp. 1\u201312. ACM (2011)","DOI":"10.1145\/2046556.2046558"},{"key":"18_CR13","unstructured":"Observatorio Espa\u00f1ol de las Drogas y Adicciones: ESTAD\u00cdSTICAS 2018 Alcohol, tabaco y drogas ilegales en Espa\u00f1a. Ministerio de Sanidad, Servicios Sociales e Igualdad (2018)"},{"issue":"1","key":"18_CR14","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1177\/1094670511424924","volume":"15","author":"DL Mothersbaugh","year":"2012","unstructured":"Mothersbaugh, D.L., Foxx, W.K., Beatty, S.E., Wang, S.: Disclosure antecedents in an online service context: the role of sensitivity of information. J. Serv. Res. 15(1), 76\u201398 (2012)","journal-title":"J. Serv. Res."},{"key":"18_CR15","unstructured":"Amigas, P.: Privacy and data protection. Accessed 14 Jun 2019"},{"key":"18_CR16","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.eswa.2017.05.054","volume":"86","author":"RG Pensa","year":"2017","unstructured":"Pensa, R.G., Di Blasi, G.: A privacy self-assessment framework for online social networks. Expert Syst. Appl. 86, 18\u201331 (2017)","journal-title":"Expert Syst. Appl."},{"issue":"14","key":"18_CR17","doi-asserted-by":"publisher","first-page":"2097","DOI":"10.1080\/1369118X.2018.1477968","volume":"22","author":"F Requena","year":"2019","unstructured":"Requena, F., Ayuso, L.: Individualism or complementarity? The effect of digital personal networks on face-to-face personal networks. Inf. Commun. Soc. 22(14), 2097\u20132111 (2019)","journal-title":"Inf. Commun. Soc."},{"key":"18_CR18","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.bdr.2017.11.001","volume":"12","author":"JM Rumbold","year":"2018","unstructured":"Rumbold, J.M., Pierscionek, B.K.: What are data? A categorization of the data sensitivity spectrum. Big Data Res. 12, 49\u201359 (2018)","journal-title":"Big Data Res."},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"S\u00e1nchez, D., Viejo, A.: Privacy risk assessment of textual publications in social networks. In: ICAART (1), pp. 236\u2013241 (2015)","DOI":"10.5220\/0005281202360241"},{"issue":"1","key":"18_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/505282.505283","volume":"34","author":"F Sebastiani","year":"2002","unstructured":"Sebastiani, F.: Machine learning in automated text categorization. ACM Comput. Surv. (CSUR) 34(1), 1\u201347 (2002)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Talukder, N., Ouzzani, M., Elmagarmid, A.K., Elmeleegy, H., Yakout, M.: Privometer: privacy protection in social networks. In: 2010 IEEE 26th International Conference on Data Engineering Workshops (ICDEW 2010). IEEE (2010)","DOI":"10.1109\/ICDEW.2010.5452715"},{"issue":"4","key":"18_CR22","doi-asserted-by":"publisher","first-page":"72","DOI":"10.2478\/popets-2019-0059","volume":"2019","author":"Q Wang","year":"2019","unstructured":"Wang, Q., Xue, H., Li, F., Lee, D., Luo, B.: # donttweetthis: scoring private information in social networks. Proc. Priv. Enhancing Technol. 2019(4), 72\u201392 (2019)","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Wang, Y., Leon, P.G., Acquisti, A., Cranor, L.F., Forget, A., Sadeh, N.: A field trial of privacy nudges for Facebook. In: Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems, pp. 2367\u20132376. ACM (2014)","DOI":"10.1145\/2556288.2557413"},{"key":"18_CR24","first-page":"1307","volume":"74","author":"Y Wang","year":"2013","unstructured":"Wang, Y., Leon, P.G., Chen, X., Komanduri, S.: From Facebook regrets to Facebook privacy nudges. Ohio St. LJ 74, 1307 (2013)","journal-title":"Ohio St. LJ"}],"container-title":["Advances in Intelligent Systems and Computing","13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57805-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T11:11:02Z","timestamp":1599477062000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57805-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,28]]},"ISBN":["9783030578046","9783030578053"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57805-3_18","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,28]]},"assertion":[{"value":"28 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}