{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T05:31:32Z","timestamp":1744867892745,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031709050"},{"type":"electronic","value":"9783031709067"}],"license":[{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-70906-7_22","type":"book-chapter","created":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T09:02:51Z","timestamp":1729155771000},"page":"259-269","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Discovering Personal Data Security Issues: Insights from \u201cHave I Been Pwned\u201d"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6970-0799","authenticated-orcid":false,"given":"Ton Nguyen Trong","family":"Hien","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6231-4000","authenticated-orcid":false,"given":"Adisak","family":"Sangsongfa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2413-1430","authenticated-orcid":false,"given":"Noppadol","family":"Amm-Dee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,18]]},"reference":[{"key":"22_CR1","unstructured":"Actual status of data security worldwide 2010\u20132025, Statista. https:\/\/www.statista.com\/statistics\/815167\/worldwide-actual-status-of-data-security. Accessed 24 Dec 202"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Sood, G., Cor, K.: Pwned: the risk of exposure from data breaches. In: Proceedings of the 10th ACM Conference on Web Science, pp. 289\u2013292. ACM, New York (2019)","DOI":"10.1145\/3292522.3326046"},{"key":"22_CR3","doi-asserted-by":"publisher","unstructured":"Bicz\u00f3k, G., Horv\u00e1th, M., Szebeni, S., L\u00e1m, I., Butty\u00e1n, L.: The cost of having been Pwned: a security service provider\u2019s perspective. In: Andrea S., Paolo M. (eds.) ETAA 2020, LNSC, vol. 12515, pp. 154\u2013167. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64455-0_10","DOI":"10.1007\/978-3-030-64455-0_10"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Shevchuk, R., Melnyk, A., Opalko, O., Shevchuk, H.: Software for automatic estimating security settings of social media accounts. In: 10th International Conference on Advanced Computer Information Technologies (ACIT), pp. 769\u2013773. IEEE, Deggendorf (2020)","DOI":"10.1109\/ACIT49673.2020.9208879"},{"key":"22_CR5","doi-asserted-by":"publisher","unstructured":"Verma, B., Thakur, R. S.: Sentiment analysis using lexicon and machine learning-based approaches: a survey. In: Tiwari, B., Tiwari, V., Das, K., Mishra, D., Bansal, J. (eds.) Proceedings of International Conference on Recent Advancement on Computer and Communication. Lecture Notes in Networks and Systems, vol. 34, pp. 441\u2013447. Springer, Singapore (2018). https:\/\/doi.org\/10.1007\/978-981-10-8198-9_46","DOI":"10.1007\/978-981-10-8198-9_46"},{"issue":"16","key":"22_CR6","doi-asserted-by":"publisher","first-page":"24203","DOI":"10.1007\/s11042-023-14411-3","volume":"82","author":"P Thangavel","year":"2023","unstructured":"Thangavel, P., Lourdusamy, R.: A lexicon-based approach for sentiment analysis of multimodal content in tweets. Multimed. Tools Appl. 82(16), 24203\u201324226 (2023)","journal-title":"Multimed. Tools Appl."},{"key":"22_CR7","doi-asserted-by":"publisher","first-page":"12505","DOI":"10.1007\/s10462-023-10442-2","volume":"56","author":"M Bordoloi","year":"2023","unstructured":"Bordoloi, M., Biswas, S.K.: Sentiment analysis: a survey on design framework, applications and future scopes. Artif. Intell. Rev. 56, 12505\u201312560 (2023)","journal-title":"Artif. Intell. Rev."},{"issue":"6","key":"22_CR8","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1108\/JCM-03-2017-2141","volume":"34","author":"C Dhaoui","year":"2017","unstructured":"Dhaoui, C., Webster, C.M., Tan, L.P.: Social media sentiment analysis: lexicon versus machine learning. J. Consum. Mark. 34(6), 480\u2013488 (2017)","journal-title":"J. Consum. Mark."},{"key":"22_CR9","unstructured":"Wikanta, P., Uperiati, A. Dwijotomo, A.: Lexicon-based sentiment analysis using inset dictionary: a systematic literature review. In: Proceedings of the 5th International Conference on Applied Engineering, ICAE 2022, Batam, Indonesia, pp. 258\u2013267 (2022)"},{"key":"22_CR10","first-page":"1006","volume":"81","author":"R Singh","year":"2023","unstructured":"Singh, R., Singh, R.: Applications of sentiment analysis and machine learning techniques in disease outbreak prediction \u2013 a review. Mater. Today: Proc. 81, 1006\u20131011 (2023)","journal-title":"Mater. Today: Proc."},{"key":"22_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ijresmar.2021.10.011","volume":"39","author":"HJ Alantari","year":"2022","unstructured":"Alantari, H.J., Currim, I.S., Deng, Y., Singh, S.: An empirical comparison of machine learning methods for text-based sentiment analysis of online consumer reviews. Int. J. Res. Mark. 39, 1\u201319 (2022)","journal-title":"Int. J. Res. Mark."},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Noreen, R., et al.: Unraveling the inner world of PhD sacholars with sentiment analysis for mental health prognosis. Behav. Inf. Technol. 1\u201313 (2023)","DOI":"10.1080\/0144929X.2023.2289057"},{"issue":"4","key":"22_CR13","doi-asserted-by":"publisher","first-page":"1093","DOI":"10.1016\/j.asej.2014.04.011","volume":"5","author":"W Medhat","year":"2014","unstructured":"Medhat, W., Hassan, A., Korashy, H.: Sentiment analysis algorithms and applications: a survey. Ain Shams Eng. J. 5(4), 1093\u20131113 (2014)","journal-title":"Ain Shams Eng. J."},{"key":"22_CR14","doi-asserted-by":"publisher","first-page":"100003","DOI":"10.1016\/j.nlp.2022.100003","volume":"2","author":"T Shaik","year":"2023","unstructured":"Shaik, T., Tao, X., Dann, C., Xie, H., Li, Y., Galligan, L.: Sentiment analysis and opinion mining on educational data: a survey. Nat. Lang. Process. J. 2, 100003 (2023)","journal-title":"Nat. Lang. Process. J."},{"issue":"1","key":"22_CR15","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.ijresmar.2022.05.005","volume":"40","author":"J Hartmann","year":"2023","unstructured":"Hartmann, J., Heitmann, M., Siebert, C., Schamp, C.: More than a feeling: accuracy and application of sentiment analysis. Int. J. Res. Mark. 40(1), 75\u201387 (2023)","journal-title":"Int. J. Res. Mark."},{"key":"22_CR16","first-page":"102770","volume":"106","author":"R Spring","year":"2022","unstructured":"Spring, R., Johnson, M.: The possibility of improving automated calculation of measures of lexical richness for EFL writing: a comparison of the LCA. NLTK SpaCy Tools Syst. 106, 102770 (2022)","journal-title":"NLTK SpaCy Tools Syst."},{"issue":"1","key":"22_CR17","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/S0306-4573(02)00021-3","volume":"39","author":"A Aizawa","year":"2003","unstructured":"Aizawa, A.: An information-theoretic perspective of TF\u2013IDF measures. Inf. Process. Manage. 39(1), 45\u201365 (2003)","journal-title":"Inf. Process. Manage."},{"issue":"5","key":"22_CR18","doi-asserted-by":"publisher","first-page":"1092","DOI":"10.1109\/TIFS.2015.2398363","volume":"10","author":"X Shu","year":"2015","unstructured":"Shu, X., Yao, D., Bertino, E.: Privacy-preserving detection of sensitive data exposure. IEEE Trans. Inf. Forensics Secur. 10(5), 1092\u20131103 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"22_CR19","doi-asserted-by":"publisher","first-page":"32280","DOI":"10.1109\/ACCESS.2022.3160172","volume":"10","author":"H Liu","year":"2022","unstructured":"Liu, H., Chen, X., Liu, X.: A study of the application of weight distributing method combining sentiment dictionary and TF-IDF for text sentiment analysis. IEEE Access 10, 32280\u201332289 (2022)","journal-title":"IEEE Access"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Data Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-70906-7_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T09:16:41Z","timestamp":1729156601000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-70906-7_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,18]]},"ISBN":["9783031709050","9783031709067"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-70906-7_22","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024,10,18]]},"assertion":[{"value":"18 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICACDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing and Data Sciences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Velizy","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 May 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 May 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icacds2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icacds.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}