{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T03:03:34Z","timestamp":1774926214788,"version":"3.50.1"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031365737","type":"print"},{"value":"9783031365744","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-36574-4_17","type":"book-chapter","created":{"date-parts":[[2023,7,15]],"date-time":"2023-07-15T13:01:58Z","timestamp":1689426118000},"page":"295-306","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The Need for\u00a0Biometric Anti-spoofing Policies: The Case of Etsy"],"prefix":"10.1007","author":[{"given":"Mohsen","family":"Jozani","sequence":"first","affiliation":[]},{"given":"Gianluca","family":"Zanella","sequence":"additional","affiliation":[]},{"given":"Maxium","family":"Khanov","sequence":"additional","affiliation":[]},{"given":"Gokila","family":"Dorai","sequence":"additional","affiliation":[]},{"given":"Esra","family":"Akbas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,16]]},"reference":[{"issue":"3","key":"17_CR1","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1147\/sj.403.0614","volume":"40","author":"NK Ratha","year":"2001","unstructured":"Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614\u2013634 (2001)","journal-title":"IBM Syst. J."},{"issue":"4","key":"17_CR2","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TIFS.2015.2400395","volume":"10","author":"D Wen","year":"2015","unstructured":"Wen, D., Han, H., Jain, A.K.: Face spoof detection with image distortion analysis. IEEE Trans. Inf. Forensics Secur. 10(4), 746\u2013761 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR3","unstructured":"Mott, N.: Hacking fingerprints is actually pretty easy-and cheap, November 2021"},{"issue":"03","key":"17_CR4","doi-asserted-by":"publisher","first-page":"1173","DOI":"10.35940\/ijitee.B7855.019320","volume":"9","author":"H Alnabhi","year":"2020","unstructured":"Alnabhi, H., Al-naamani, Y., Al-madhehagi, M., Alhamzi, M.: Enhanced security methods of door locking based fingerprint. Int. J. Innov. Technol. Explor. Eng. 9(03), 1173\u20131178 (2020)","journal-title":"Int. J. Innov. Technol. Explor. Eng."},{"issue":"1","key":"17_CR5","doi-asserted-by":"publisher","first-page":"60","DOI":"10.4103\/2349-5014.162807","volume":"2","author":"CMA Girelli","year":"2016","unstructured":"Girelli, C.M.A., et al.: Application of a standard procedure to avoid errors when comparing fingerprints with their reversals in fake documents. J. Forensic Sci. Med. 2(1), 60 (2016)","journal-title":"J. Forensic Sci. Med."},{"issue":"12","key":"17_CR6","doi-asserted-by":"publisher","first-page":"15545","DOI":"10.1007\/s11042-017-5132-9","volume":"77","author":"C Boididou","year":"2018","unstructured":"Boididou, C., et al.: Verifying information with multimedia content on twitter. Multimed. Tools Appl. 77(12), 15545\u201315571 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"17_CR7","unstructured":"Dean, B.: Social network usage & growth statistics: how many people use social media in 2021, vol. 2, p. 2021 (2021). Accessed July 2021"},{"key":"17_CR8","first-page":"2","volume":"01","author":"C Gouert","year":"2022","unstructured":"Gouert, C., Tsoutsos, N.G.: Dirty metadata: understanding a threat to online privacy. IEEE Secur. Priv. 01, 2\u20139 (2022)","journal-title":"IEEE Secur. Priv."},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.copsyc.2019.08.003","volume":"31","author":"NC Kr\u00e4mer","year":"2020","unstructured":"Kr\u00e4mer, N.C., Sch\u00e4wel, J.: Mastering the challenge of balancing self-disclosure and privacy in social media. Curr. Opin. Psychol. 31, 67\u201371 (2020)","journal-title":"Curr. Opin. Psychol."},{"issue":"1\u20132","key":"17_CR10","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1080\/10548408.2013.751220","volume":"30","author":"J Kim","year":"2013","unstructured":"Kim, J., Tussyadiah, I.P.: Social networking and social support in tourism experience: the moderating role of online self-presentation strategies. J. Travel Tour. Mark. 30(1\u20132), 78\u201392 (2013)","journal-title":"J. Travel Tour. Mark."},{"key":"17_CR11","unstructured":"Sheth, S., Kim, J.: Social media marketing: the effect of information sharing, entertainment, emotional connection and peer pressure on the attitude and purchase intentions. GSTF J. Bus. Rev. (GBR) 5(1) (2017)"},{"issue":"2","key":"17_CR12","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1111\/j.1468-2958.1975.tb00258.x","volume":"1","author":"CR Berger","year":"1974","unstructured":"Berger, C.R., Calabrese, R.J.: Some explorations in initial interaction and beyond: toward a developmental theory of interpersonal communication. Hum. Commun. Res. 1(2), 99\u2013112 (1974)","journal-title":"Hum. Commun. Res."},{"issue":"4","key":"17_CR13","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.1111\/j.1083-6101.2007.00367.x","volume":"12","author":"NB Ellison","year":"2007","unstructured":"Ellison, N.B., Steinfield, C., Lampe, C.: The benefits of Facebook \u201cfriends:\u201d social capital and college students\u2019 use of online social network sites. J. Comput.-Mediat. Commun. 12(4), 1143\u20131168 (2007)","journal-title":"J. Comput.-Mediat. Commun."},{"issue":"6","key":"17_CR14","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1177\/1461444810385389","volume":"13","author":"NB Ellison","year":"2011","unstructured":"Ellison, N.B., Steinfield, C., Lampe, C.: Connection strategies: social capital implications of Facebook-enabled communication practices. New Media Soc. 13(6), 873\u2013892 (2011)","journal-title":"New Media Soc."},{"key":"17_CR15","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.cose.2015.07.002","volume":"64","author":"S Kokolakis","year":"2017","unstructured":"Kokolakis, S.: Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122\u2013134 (2017)","journal-title":"Comput. Secur."},{"key":"17_CR16","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.chb.2016.11.033","volume":"68","author":"C Hallam","year":"2017","unstructured":"Hallam, C., Zanella, G.: Online self-disclosure: the privacy paradox explained as a temporally discounted balance between concerns and rewards. Comput. Hum. Behav. 68, 217\u2013227 (2017)","journal-title":"Comput. Hum. Behav."},{"issue":"1","key":"17_CR17","first-page":"166","volume":"25","author":"AF Westin","year":"1968","unstructured":"Westin, A.F.: Privacy and freedom. Wash. Lee Law Rev. 25(1), 166 (1968)","journal-title":"Wash. Lee Law Rev."},{"key":"17_CR18","unstructured":"Mekovec, R., Hutinski, \u017d.: The role of perceived privacy and perceived security in online market. In: 2012 Proceedings of the 35th International Convention MIPRO, pp. 1549\u20131554. IEEE (2012)"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Flavi\u00e1n, C., Guinal\u00edu, M.: Consumer trust, perceived security and privacy policy: three basic elements of loyalty to a web site. Ind. Manag. Data Syst. (2006)","DOI":"10.1108\/02635570610666403"},{"issue":"5","key":"17_CR20","doi-asserted-by":"publisher","first-page":"798","DOI":"10.1080\/02650487.2017.1348035","volume":"36","author":"M De Veirman","year":"2017","unstructured":"De Veirman, M., Cauberghe, V., Hudders, L.: Marketing through instagram influencers: the impact of number of followers and product divergence on brand attitude. Int. J. Advert. 36(5), 798\u2013828 (2017)","journal-title":"Int. J. Advert."},{"key":"17_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106260","volume":"107","author":"M Jozani","year":"2020","unstructured":"Jozani, M., Ayaburi, E., Ko, M., Choo, K.-K.R.: Privacy concerns and benefits of engagement with social media-enabled apps: a privacy calculus perspective. Comput. Hum. Behav. 107, 106260 (2020)","journal-title":"Comput. Hum. Behav."},{"key":"17_CR22","unstructured":"Madden, M.: Public perceptions of privacy and security in the post-snowden era, (2014)"},{"issue":"4","key":"17_CR23","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/S1363-4127(02)00407-7","volume":"7","author":"SA Schuckers","year":"2002","unstructured":"Schuckers, S.A.: Spoofing and anti-spoofing measures. Inf. Secur. Tech. Rep. 7(4), 56\u201362 (2002)","journal-title":"Inf. Secur. Tech. Rep."},{"issue":"4","key":"17_CR24","doi-asserted-by":"publisher","first-page":"848","DOI":"10.1287\/isre.2016.0672","volume":"27","author":"H Cavusoglu","year":"2016","unstructured":"Cavusoglu, H., Phan, T.Q., Cavusoglu, H., Airoldi, E.M.: Assessing the impact of granular privacy controls on content sharing and disclosure on Facebook. Inf. Syst. Res. 27(4), 848\u2013879 (2016)","journal-title":"Inf. Syst. Res."},{"key":"17_CR25","unstructured":"Devlin, J., Chang, M.-W., Lee, K., Toutanova, K.,: Bert: pre-training of deep bidirectional transformers for language understanding, arXiv preprint arXiv:1810.04805 (2018)"},{"key":"17_CR26","first-page":"2","volume":"3","author":"G Bradski","year":"2000","unstructured":"Bradski, G., Kaehler, A.: Opencv. Dr. Dobb\u2019s J. Softw. Tools 3, 2 (2000)","journal-title":"Dr. Dobb\u2019s J. Softw. Tools"},{"issue":"1","key":"17_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1870096.1870102","volume":"5","author":"K Liu","year":"2010","unstructured":"Liu, K., Terzi, E.: A framework for computing the privacy scores of users in online social networks. ACM Trans. Knowl. Discov. Data (TKDD) 5(1), 1\u201330 (2010)","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"},{"key":"17_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108200","volume":"121","author":"MM Alam","year":"2022","unstructured":"Alam, M.M., Islam, M.T., Rahman, S.M.: Unified learning approach for egocentric hand gesture recognition and fingertip detection. Pattern Recogn. 121, 108200 (2022)","journal-title":"Pattern Recogn."},{"key":"17_CR29","unstructured":"Lugaresi, C., et al. : Mediapipe: a framework for perceiving and processing reality. In: Third Workshop on Computer Vision for AR\/VR at IEEE Computer Vision and Pattern Recognition (CVPR) 2019 (2019)"},{"key":"17_CR30","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1016\/j.comnet.2014.08.023","volume":"75","author":"C Patsakis","year":"2014","unstructured":"Patsakis, C., Zigomitros, A., Papageorgiou, A., Galv\u00e1n-L\u00f3pez, E.: Distributing privacy policies over multimedia content across multiple online social networks. Comput. Netw. 75, 531\u2013543 (2014)","journal-title":"Comput. Netw."},{"key":"17_CR31","unstructured":"Ploeg, I.V.D., Lyon, D.: Biometrics and the body as information: normative issues of the socio-technical coding of the body. Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination. Londres e Nova Iorque, Routledge, pp. 57\u201373 (2002)"},{"issue":"2","key":"17_CR32","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1080\/14791420802027452","volume":"5","author":"G Agamben","year":"2008","unstructured":"Agamben, G., Murray, S.J.: No to biopolitical tattooing. Commun. Crit. Cult. Stud. 5(2), 201\u2013202 (2008)","journal-title":"Commun. Crit. Cult. Stud."},{"key":"17_CR33","doi-asserted-by":"crossref","unstructured":"Rebera, A.P., Mordini, E.: Biometrics and ageing: social and ethical considerations. Age Factors Biom. Process. 37\u201358 (2013)","DOI":"10.1049\/PBSP010E_ch3"},{"issue":"6","key":"17_CR34","doi-asserted-by":"publisher","first-page":"703","DOI":"10.2501\/IJMR-2017-050","volume":"59","author":"M Goddard","year":"2017","unstructured":"Goddard, M.: The EU general data protection regulation (GDPR): European regulation that has a global impact. Int. J. Mark. Res. 59(6), 703\u2013705 (2017)","journal-title":"Int. J. Mark. Res."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-36574-4_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,15]],"date-time":"2023-07-15T13:03:45Z","timestamp":1689426225000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-36574-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031365737","9783031365744"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-36574-4_17","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"16 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICDF2C","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Digital Forensics and Cyber Crime","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Boston, MA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icdf2c2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy plus","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"80","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}