{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T04:21:51Z","timestamp":1751516511511,"version":"3.41.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030773915"},{"type":"electronic","value":"9783030773922"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-77392-2_30","type":"book-chapter","created":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T23:06:05Z","timestamp":1625267165000},"page":"475-487","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Gaming Apps\u2019 and Social Media Partnership: A Privacy Perspective"],"prefix":"10.1007","author":[{"given":"Tian","family":"Wang","sequence":"first","affiliation":[]},{"given":"Masooda","family":"Bashir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,3]]},"reference":[{"key":"30_CR1","unstructured":"The State of Mobile Gaming Industry \u2013 Statistics and Trends: Go-Globe (2018). https:\/\/www.go-globe.com\/mobile-gaming-industry\/"},{"key":"30_CR2","unstructured":"Hutchinson, A.: Twitter updates permissions to clarify which third-party apps you approve for DM access (2019). https:\/\/www.socialmediatoday.com\/news\/twitter-updates-permissions-to-clarify-which-third-party-apps-you-approve-f\/561140"},{"key":"30_CR3","unstructured":"The complete guide to online gaming privacy. ProtonVPN (2020). https:\/\/protonvpn.com\/blog\/online-gaming-privacy\/"},{"key":"30_CR4","unstructured":"Data privacy and online gaming: why gamers make for ideal targets. TrendMicro (2015). https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/online-privacy\/data-privacy-and-online-gaming-why-gamers-make-for-ideal-targets"},{"key":"30_CR5","doi-asserted-by":"publisher","first-page":"106260","DOI":"10.1016\/j.chb.2020.106260","volume":"107","author":"M Jozani","year":"2020","unstructured":"Jozani, M., Ayaburi, E., Ko, M., Choo, K.K.R.: Privacy concerns and benefits of engagement with social media-enabled apps: a privacy calculus perspective. Comput. Hum. Behav. 107, 106260 (2020)","journal-title":"Comput. Hum. Behav."},{"key":"30_CR6","doi-asserted-by":"publisher","unstructured":"Ellison, N.B., Vitak, J., Steinfield, C., Gray, R., Lampe, C.: Negotiating privacy concerns and social capital needs in a social media environment. In: Privacy Online, pp. 19\u201332. Springer, Berlin, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21521-6_3","DOI":"10.1007\/978-3-642-21521-6_3"},{"issue":"1055","key":"30_CR7","first-page":"2","volume":"21","author":"M Madden","year":"2013","unstructured":"Madden, M., Lenhart, A., Cortesi, S., Gasser, U., Duggan, M., Smith, A., Beaton, M.: Teens, social media, and privacy. Pew Res. Cent. 21(1055), 2\u201386 (2013)","journal-title":"Pew Res. Cent."},{"key":"30_CR8","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-7091-0894-9_2","volume-title":"Security and Privacy Preserving in Social Networks","author":"S Mahmood","year":"2013","unstructured":"Mahmood, S.: Online social networks: Privacy threats and defenses. In: C, Richard, B, Bechara Al (eds.) Security and Privacy Preserving in Social Networks, pp. 47\u201371. Springer, Vienna (2013). https:\/\/doi.org\/10.1007\/978-3-7091-0894-9_2"},{"key":"30_CR9","unstructured":"Khattar, A., Dabas, K., Gupta, K., Chopra, S., Kumaraguru, P.: White or blue, the whale gets its vengeance: a social media analysis of the blue whale challenge. arXiv preprint arXiv:1801.05588 (2018)"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Mahmood, S.: New privacy threats for facebook and twitter users. In: 2012 Seventh International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp. 164\u2013169. IEEE, November (2012)","DOI":"10.1109\/3PGCIC.2012.46"},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"King, J., Lampinen, A., Smolen, A.: Privacy: is there an app for that? In: Proceedings of the Seventh Symposium on Usable Privacy and Security, pp. 1\u201320, July (2011)","DOI":"10.1145\/2078827.2078843"},{"key":"30_CR12","unstructured":"Steel, E., Fowler, G.: Facebook in privacy breach. Wall Street J. October 18 (2010)"},{"key":"30_CR13","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1108\/ICS-10-2014-0071","volume":"23","author":"M Tsavli","year":"2015","unstructured":"Tsavli, M., Efraimidis, P.S., Katos, V., Mitrou, L.: Reengineering the user: privacy concerns about personal data on smartphones. Inf. Comput. Secur. 23, 394\u2013405 (2015)","journal-title":"Inf. Comput. Secur."},{"key":"30_CR14","unstructured":"Vallina-Rodriguez, N., et al.: Tracking the trackers: towards understanding the mobile advertising and tracking ecosystem.\u00a0arXiv preprint arXiv:1609.07190 (2016)"},{"key":"30_CR15","unstructured":"Mobile gaming apps: how to develop and make them succeed. July 7 2017. Adoriasoft. https:\/\/medium.com\/@Adoriasoft\/mobile-gaming-apps-how-to-develop-and-make-them-succeed-488f49cb229"},{"key":"30_CR16","unstructured":"About third-party apps and log in sessions. Twitter. https:\/\/help.twitter.com\/en\/managing-your-account\/connect-or-revoke-access-to-third-party-apps"},{"key":"30_CR17","unstructured":"App Visibility and Privacy. Facebook. https:\/\/www.facebook.com\/help\/1727608884153160"},{"key":"30_CR18","unstructured":"Snapchat Support. https:\/\/support.snapchat.com\/en-GB\/a\/remove-connected-app"},{"issue":"4","key":"30_CR19","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1287\/isre.1040.0032","volume":"15","author":"NK Malhotra","year":"2004","unstructured":"Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet users\u2019 information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inf. Syst. Res. 15(4), 336\u2013355 (2004)","journal-title":"Inf. Syst. Res."},{"key":"30_CR20","unstructured":"Lynkova, D.: How many people play mobile games in 2020 \u2013 everything you need to know. https:\/\/techjury.net\/blog\/mobile-gaming-demographics\/#gref"},{"key":"30_CR21","unstructured":"Haelle, T.: Online risks are everyday events for teens -- but they rarely tell their parents. https:\/\/www.forbes.com\/sites\/tarahaelle\/2017\/02\/28\/online-risks-are-everyday-events-for-teens-but-they-rarely-tell-their-parents\/?sh=1862fb523861"},{"key":"30_CR22","unstructured":"Williams, R.: Mobile games sparked 60% of 2019 global game revenue, study finds. https:\/\/www.marketingdive.com\/news\/mobile-games-sparked-60-of-2019-global-game-revenue-study-finds\/569658\/"}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-77392-2_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:20:16Z","timestamp":1751494816000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-77392-2_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030773915","9783030773922"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-77392-2_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}