{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:36:54Z","timestamp":1742913414731,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031221309"},{"type":"electronic","value":"9783031221316"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-22131-6_46","type":"book-chapter","created":{"date-parts":[[2022,11,24]],"date-time":"2022-11-24T18:52:04Z","timestamp":1669315924000},"page":"623-641","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["User Awareness and Privacy Regarding Instant Games on Facebook"],"prefix":"10.1007","author":[{"given":"Stacy","family":"Nicholson","sequence":"first","affiliation":[]},{"suffix":"II","given":"Robert J.","family":"Hammell","sequence":"additional","affiliation":[]},{"given":"Joyram","family":"Chakraborty","sequence":"additional","affiliation":[]},{"given":"Aisha","family":"Ali-Gombe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,25]]},"reference":[{"key":"46_CR1","unstructured":"Facebook: Best Practices - Games (2022). https:\/\/developers.facebook.com\/docs\/games\/monetization\/best-practices\/. Accessed 25 Apr 2022"},{"key":"46_CR2","doi-asserted-by":"publisher","unstructured":"Jackson, M.O., Watts, A.: Social games: matching and the play of finitely repeated games. Games Econ. Behav. 70(1), 170\u2013191, 2010. https:\/\/doi.org\/10.1016\/j.geb.2008.02.004. http:\/\/dx.doi.org\/10.1016\/j.geb.2008.02.004","DOI":"10.1016\/j.geb.2008.02.004"},{"key":"46_CR3","doi-asserted-by":"publisher","unstructured":"Liu, C.-C.: Understanding player behavior in online games: the role of gender. Technol. Forecast. Soc. Change 111, 265\u2013274 (2016). https:\/\/doi.org\/10.1016\/j.techfore.2016.07.018. https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0040162516301627","DOI":"10.1016\/j.techfore.2016.07.018"},{"key":"46_CR4","doi-asserted-by":"publisher","unstructured":"Chen, K., Shen, K., Ma, M.: The functional and usable appeal of Facebook SNS games. Internet Res. 22(4), 467\u2013481 (2012). https:\/\/doi.org\/10.1108\/10662241211250999. https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662241211250999\/full\/html","DOI":"10.1108\/10662241211250999"},{"key":"46_CR5","unstructured":"Facebook: Instant Games SDK (2021). https:\/\/developers.facebook.com\/docs\/games\/instant-games\/sdk\/fbinstant6.3. Accessed 05 Mar 2021"},{"key":"46_CR6","unstructured":"TIME: Facebook\u2019s Cambridge Analytica Controversy Could Be Big Trouble for the Social Network, 04 April 2018. https:\/\/time.com\/5205314\/facebook-cambridge-analytica-breach\/"},{"key":"46_CR7","doi-asserted-by":"publisher","unstructured":"Farooqi, S., Musa, M., Shafiq, Z., Zaffar, F.: CanaryTrap: detecting data misuse by third-party apps on online social networks. Comput. Soc. 2020(4), 336\u2013354 (2020). https:\/\/doi.org\/10.2478\/popets-2020-0076. https:\/\/www.researchgate.net\/publication\/346937462_CanaryTrap_Detecting_Data_Misuse_by_Third-Party_Apps_on_Online_Social_Networks","DOI":"10.2478\/popets-2020-0076"},{"key":"46_CR8","unstructured":"Dance, G.J.X., LaForgia, M., Confessore, N.: As Facebook raised a privacy wall, it carved an opening for tech giants. New York Times, pp. 1\u201317 (2018). https:\/\/www.nytimes.com\/2018\/12\/18\/technology\/facebook-privacy.html"},{"key":"46_CR9","unstructured":"Nicholson, S., Chakraborty, J., Ali-Gombe, A., Hammell, R.J., II: Data sharing and exposure: findings from descriptive and network analysis of instant games on Facebook (2021). https:\/\/proc.conisar.org\/2021\/pdf\/5613.pdf. Accessed 14 Jan 2022"},{"key":"46_CR10","unstructured":"Polygon: The dangers of in-game data collection. https:\/\/www.polygon.com\/features\/2019\/5\/9\/18522937\/video-game-privacy-player-data-collection. Accessed 16 Apr 2022"},{"key":"46_CR11","unstructured":"INSIDER: China social credit system, punishments and rewards explained (2021). https:\/\/www.businessinsider.com\/china-social-credit-system-punishments-and-rewards-explained-2018-4. Accessed 25 Apr 2022"},{"key":"46_CR12","unstructured":"ABC News: China\u2019s social credit system seeks to assign citizens scores, engineer social behaviour - ABC News (2018). https:\/\/www.abc.net.au\/news\/2018-03-31\/chinas-social-credit-system-punishes-untrustworthy-citizens\/9596204. Accessed 25 Apr 2022"},{"key":"46_CR13","doi-asserted-by":"publisher","unstructured":"Nyoni, P., Velempini, M.: Privacy and user awareness on Facebook. S. Afr. J. Sci. 114(5\/6), 27\u201332 (2018). https:\/\/doi.org\/10.17159\/sajs.2018\/20170103. https:\/\/www.sajs.co.za\/article\/view\/5165","DOI":"10.17159\/sajs.2018\/20170103"},{"key":"46_CR14","unstructured":"The New York Times: Facebook\u2019s Suspension of \u2018Tens of Thousands\u2019 of Apps Reveals Wider Privacy Issues - The New York Times (2019). https:\/\/www.nytimes.com\/2019\/09\/20\/technology\/facebook-data-privacy-suspension.html. Accessed 25 Apr 2022"},{"key":"46_CR15","doi-asserted-by":"publisher","unstructured":"Golbeck, J., Mauriello, M.L.: User perception of Facebook app data access: a comparison of methods and privacy concerns. Futur. Internet 8(2), (2016). https:\/\/doi.org\/10.3390\/fi8020009. https:\/\/pdfs.semanticscholar.org\/5732\/7552d964d144a3c966c3a766aeabaa941903.pdf","DOI":"10.3390\/fi8020009"},{"key":"46_CR16","doi-asserted-by":"publisher","unstructured":"Wang, N.: Third-party applications data practices on Facebook. In: Proceedings of the 2012 ACM Annual Conference Extended Abstracts on Human Factors in Computing Systems Extended Abstracts - CHI EA 2012, p. 1399 (2012). https:\/\/doi.org\/10.1145\/2212776.2212462. http:\/\/dl.acm.org\/citation.cfm?doid=2212776.2212462. Accessed 15 Oct 2019","DOI":"10.1145\/2212776.2212462"},{"key":"46_CR17","doi-asserted-by":"publisher","unstructured":"Wang, N., Xu, H., Grossklags, J.: Third-party apps on Facebook: privacy and the illusion of control. In: Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology - CHIMIT 2011, December 2011, pp. 1\u201310 (2011). https:\/\/doi.org\/10.1145\/2076444.2076448. http:\/\/dl.acm.org\/citation.cfm?doid=2076444.2076448","DOI":"10.1145\/2076444.2076448"},{"key":"46_CR18","doi-asserted-by":"publisher","unstructured":"Symeonidis, I., Bicz\u00f3k, G., Shirazi, F., P\u00e9rez-Sol\u00e0, C., Schroers, J., Preneel, B.: Collateral damage of Facebook third-party applications: a comprehensive study. Comput. Secur. 77, 179\u2013208 (2018). https:\/\/doi.org\/10.1016\/j.cose.2018.03.015. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S016740481830302X. Accessed 15 Oct 2019","DOI":"10.1016\/j.cose.2018.03.015"},{"key":"46_CR19","unstructured":"Dictionary.cambridge.org: Privacy (2021). https:\/\/dictionary.cambridge.org\/us\/dictionary\/english\/privacy. Accessed 23 Sept 2021"},{"issue":"14","key":"46_CR20","doi-asserted-by":"publisher","first-page":"2833","DOI":"10.1016\/j.comnet.2013.06.013","volume":"57","author":"D Malandrino","year":"2013","unstructured":"D Malandrino V Scarano 2013 Privacy leakage on the web: diffusion and countermeasures Comput. Networks 57 14 2833 2855 https:\/\/doi.org\/10.1016\/j.comnet.2013.06.013","journal-title":"Comput. Networks"},{"key":"46_CR21","doi-asserted-by":"publisher","unstructured":"Yang, C.C.: Privacy-preserving social network integration, analysis, and mining. In: Intelligent Systems for Security Informatics, pp. 51\u201367. Elsevier Inc. (2013). https:\/\/doi.org\/10.1016\/B978-0-12-404702-0.00003-3. Accessed 16 Sept 2021","DOI":"10.1016\/B978-0-12-404702-0.00003-3"},{"key":"46_CR22","doi-asserted-by":"publisher","unstructured":"Krishnamurthy, B., Wills, C.E.: On the leakage of personally identifiable information via online social networks. In: Proceedings of the 2nd ACM Workshop on Online Social Networks - WOSN 2009, p. 7 (2009). https:\/\/doi.org\/10.1145\/1592665.1592668. http:\/\/portal.acm.org\/citation.cfm?doid=1592665.1592668","DOI":"10.1145\/1592665.1592668"},{"key":"46_CR23","unstructured":"NIST: NIST Privacy Framework (2020). https:\/\/nvlpubs.nist.gov\/nistpubs\/CSWP\/NIST.CSWP.01162020.pdf"},{"key":"46_CR24","unstructured":"Brooke, A., Lee, R., Monica, A., Andrew, P., Madhu, K., Erica, T.: Americans and privacy: concerned, confused and feeling lack of control over their personal information. Pew Research Center, 15 November 2019. https:\/\/www.pewresearch.org\/internet\/2019\/11\/15\/americans-and-privacy-concerned-confused-and-feeling-lack-of-control-over-their-personal-information\/. Accessed 27 Sept 2021"},{"key":"46_CR25","unstructured":"Auth0.Inc.: First-party and third-party applications (2021). https:\/\/auth0.com\/docs\/applications\/first-party-and-third-party-applications#third-party-applications. Accessed 27 July 2021"},{"key":"46_CR26","unstructured":"Facebook: Facebook for developers (2022). https:\/\/developers.facebook.com\/docs\/games\/instant-games"},{"key":"46_CR27","doi-asserted-by":"crossref","unstructured":"Costante, E., Sun, Y., Petkovi\u0107, M., den Hartog, J.: A machine learning solution to assess privacy policy completeness, pp. 91\u201396 (2012). https:\/\/dl-acm-org.proxy-tu.researchport.umd.edu\/doi\/pdf\/10.1145\/2381966.2381979","DOI":"10.1145\/2381966.2381979"},{"key":"46_CR28","doi-asserted-by":"publisher","unstructured":"Wu, K., Yan, S., Yen, D.C., Popova, I.: Computers in human behavior the effect of online privacy policy on consumer privacy concern and trust. Comput. Hum. Behav. 28(3), 889\u2013897 (2012). https:\/\/doi.org\/10.1016\/j.chb.2011.12.008. http:\/\/dx.doi.org\/10.1016\/j.chb.2011.12.008","DOI":"10.1016\/j.chb.2011.12.008"},{"key":"46_CR29","doi-asserted-by":"publisher","unstructured":"Sigmund, T.: Attention paid to privacy policy statements. Information 12(4), 144 (2021). https:\/\/doi.org\/10.3390\/info12040144. https:\/\/www.researchgate.net\/publication\/350473200_Attention_Paid_to_Privacy_Policy_Statements","DOI":"10.3390\/info12040144"},{"key":"46_CR30","doi-asserted-by":"publisher","unstructured":"Obar, J.A., Oeldorf-Hirsch, A.: The biggest lie on the Internet: ignoring the privacy policies and terms of service policies of social networking services. Inf. Commun. Soc. 23(1), 128\u2013147 (2018). https:\/\/doi.org\/10.1080\/1369118X.2018.1486870. http:\/\/www.ssrn.com\/abstract=2757465","DOI":"10.1080\/1369118X.2018.1486870"},{"key":"46_CR31","doi-asserted-by":"publisher","unstructured":"Fabian, B., Ermakova, T., Lentz, T.: Large-scale readability analysis of privacy policies. In: Proceedings of the 2017 IEEE\/WIC\/ACM International Conference on web intelligence, WI 2017, September 2017, pp. 18\u201325 (2017). https:\/\/doi.org\/10.1145\/3106426.3106427. https:\/\/www.researchgate.net\/publication\/317400012_Large-Scale_Readability_Analysis_of_Privacy_Policies","DOI":"10.1145\/3106426.3106427"},{"issue":"4","key":"46_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.osnem.2017.09.001","volume":"3\u20134","author":"I Kayes","year":"2017","unstructured":"I Kayes A Iamnitchi 2017 Privacy and security in online social networks: a survey Online Soc. Netw. Media 3\u20134 4 1 21 https:\/\/doi.org\/10.1016\/j.osnem.2017.09.001 Accessed 13 Jan 2022","journal-title":"Online Soc. Netw. Media"},{"key":"46_CR33","doi-asserted-by":"publisher","unstructured":"O\u2019Brien, D., Torres, A.M.: Social networking and online privacy: Facebook users\u2019 perceptions. In: An Introduction to Social Media Marketing, pp. 149\u2013165 (2018). https:\/\/doi.org\/10.4324\/9780203727836-13","DOI":"10.4324\/9780203727836-13"},{"key":"46_CR34","doi-asserted-by":"publisher","unstructured":"Li, Y., Li, Y., Yan, Q., Deng, R.H.: Privacy leakage analysis in online social networks. Comput. Secur. 49, 239\u2013254 (2015). https:\/\/doi.org\/10.1016\/j.cose.2014.10.012. http:\/\/dx.doi.org\/10.1016\/j.cose.2014.10.012","DOI":"10.1016\/j.cose.2014.10.012"},{"key":"46_CR35","doi-asserted-by":"publisher","unstructured":"Van den Broeck, E., Poels, K., Walrave, M.: Older and wiser? Facebook use, privacy concern, and privacy protection in the life stages of emerging, young, and middle adulthood. Soc. Media Soc. 1(2), 205630511561614 (2015). https:\/\/doi.org\/10.1177\/2056305115616149. http:\/\/journals.sagepub.com\/doi\/10.1177\/2056305115616149","DOI":"10.1177\/2056305115616149"},{"key":"46_CR36","unstructured":"Facebook: What is public information on Facebook? Facebook Help Center (2021). https:\/\/www.facebook.com\/help\/203805466323736?ref=dp"}],"container-title":["Lecture Notes in Computer Science","HCI International 2022 - Late Breaking Papers. Interaction in New Media, Learning and Games"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-22131-6_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,24]],"date-time":"2022-11-24T19:16:23Z","timestamp":1669317383000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-22131-6_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031221309","9783031221316"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-22131-6_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"25 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2022.hci.international\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}