{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T04:03:29Z","timestamp":1746331409685,"version":"3.40.4"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319076195"},{"type":"electronic","value":"9783319076201"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07620-1_34","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T16:55:03Z","timestamp":1402419303000},"page":"387-399","source":"Crossref","is-referenced-by-count":0,"title":["\"My Life Doesn\u2019t Have to Be an Open Book\": A Model to Help Designers to Enhance Privacy Controls on Social Network Sites"],"prefix":"10.1007","author":[{"given":"Francine B.","family":"Bergmann","sequence":"first","affiliation":[]},{"given":"Milene S.","family":"Silveira","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Ai, H., Maiga, A., Aimeur, E.: Privacy protection issues in social networking sites. In: IEEE\/ACS International Conference on Computer Systems and Applications (AICCSA 2009), pp. 271\u2013278 (2009)","DOI":"10.1109\/AICCSA.2009.5069336"},{"key":"34_CR2","first-page":"109","volume-title":"11th Brazilian Symposium on Human Factors in Computing Systems (IHC 2012)","author":"F.B. Bergmann","year":"2012","unstructured":"Bergmann, F.B., Silveira, M.S.: Eu vi o que voc\u00ea fez.. e eu sei quem voc\u00ea \u00e9!\u201d: uma an\u00e1lise sobre privacidade no facebook do ponto de vista dos usu\u00e1rios. In: 11th Brazilian Symposium on Human Factors in Computing Systems (IHC 2012), pp. 109\u2013118. Brazilian Computer Society, Porto Alegre (2012)"},{"key":"34_CR3","first-page":"1563","volume-title":"28th International Conference on Human Factors in Computing Systems (CHI 2010)","author":"A. Besmer","year":"2010","unstructured":"Besmer, A., Lipford, H.R.: Moving beyond untagging: photo privacy in a tagged world. In: 28th International Conference on Human Factors in Computing Systems (CHI 2010), pp. 1563\u20131572. ACM, New York (2010)"},{"key":"34_CR4","first-page":"6","volume-title":"15th Workshop on Social Network Systems (SNS 2012)","author":"L.A. Cutillo","year":"2012","unstructured":"Cutillo, L.A., Molva, R., \u00d6nen, M.: Privacy preserving picture sharing: enforcing usage control in distributed on-line social networks. In: 15th Workshop on Social Network Systems (SNS 2012), p. 6. ACM, New York (2012)"},{"key":"34_CR5","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1145\/2320765.2320828","volume-title":"15th Joint EDBT\/ICDT Workshops (EDBT-ICDT 2012)","author":"I.B. Dhia","year":"2012","unstructured":"Dhia, I.B.: Access control in social networks: a reachability-based approach. In: 15th Joint EDBT\/ICDT Workshops (EDBT-ICDT 2012), pp. 227\u2013232. ACM, New York (2012)"},{"issue":"3","key":"34_CR6","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MTS.2011.942309","volume":"30","author":"C. Dwyer","year":"2011","unstructured":"Dwyer, C.: Privacy in the Age of Google and Facebook. IEEE Technology and Society Magazine\u00a030(3), 58\u201363 (2011)","journal-title":"IEEE Technology and Society Magazine"},{"key":"34_CR7","unstructured":"Facebook Newsroom, http:\/\/newsroom.fb.com"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Faliagka, E., Tsakalidis, A., Vaikousi, D.: Teenagers\u2019 Use of Social Network Websites and Privacy Concerns: A Survey. In: 15th Panhellenic Conference on Informatics (PCI 2011), pp. 207\u2013211 (2011)","DOI":"10.1109\/PCI.2011.17"},{"key":"34_CR9","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1145\/2020408.2020489","volume-title":"17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2011)","author":"P. Gundecha","year":"2011","unstructured":"Gundecha, P., Barbier, G., Liu, H.: Exploiting vulnerability to secure user privacy on a social networking site. In: 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2011), pp. 511\u2013519. ACM, New York (2011)"},{"key":"34_CR10","volume-title":"Computer Ethics","author":"D.G. Johnson","year":"1999","unstructured":"Johnson, D.G.: Computer Ethics. Prentice Hall, Englewood Cliffs (1999)"},{"key":"34_CR11","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/2068816.2068823","volume-title":"11th ACM SIGCOMM Conference on Internet Measurement (IMC 2011)","author":"Y. Liu","year":"2011","unstructured":"Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove, A.: Analyzing facebook privacy settings: user expectations vs. reality. In: 11th ACM SIGCOMM Conference on Internet Measurement (IMC 2011), pp. 61\u201370. ACM, New York (2011)"},{"key":"34_CR12","doi-asserted-by":"crossref","unstructured":"Madejski, M., Johnson, M., Bellovin, S.M.: A study of privacy settings errors in an online social network. In: 10th IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom 2012), pp. 340\u2013345 (2012)","DOI":"10.1109\/PerComW.2012.6197507"},{"key":"34_CR13","first-page":"184","volume-title":"14th Panhellenic Conference on Informatics (PCI 2010)","author":"D. Michalopoulos","year":"2010","unstructured":"Michalopoulos, D., Mavridis, I.: Surveying Privacy Leaks Through Online Social Network. In: 14th Panhellenic Conference on Informatics (PCI 2010), pp. 184\u2013187. IEEE Computer Society, Washington (2010)"},{"key":"34_CR14","doi-asserted-by":"crossref","unstructured":"Osman, F.Y., Ab Rahim, N.Z.: Self-disclosure and Social network sites users\u2019 awareness. In: 2nd International Conference on Research and Innovation in Information Systems (ICRIIS 2011), pp. 1\u20136 (2011)","DOI":"10.1109\/ICRIIS.2011.6125719"},{"key":"34_CR15","first-page":"8","volume-title":"1st Workshop on Privacy and Security in Online Social Media (PSOSM 2012)","author":"J.P. Pesce","year":"2012","unstructured":"Pesce, J.P., Casas, D.L., Rauber, G., Almeida, V.: Privacy attacks in social media using photo tagging networks: a case study with Facebook. In: 1st Workshop on Privacy and Security in Online Social Media (PSOSM 2012), p. 8. ACM, New York (2012)"},{"key":"34_CR16","unstructured":"Pimenta, P.C., de Freitas, C.M.: Security and privacy analysis in social network services. In: 5th Iberian Conference on Information Systems and Technologies (CISTI 2010), pp. 1\u20136 (2010)"},{"key":"34_CR17","first-page":"8","volume-title":"7th Brazilian Symposium on Multimedia and the Web (WebMedia 2011)","author":"G. Rauber","year":"2011","unstructured":"Rauber, G., Almeida, V.A.F., Kumaraguru, P.: Privacy Albeit Late. In: 7th Brazilian Symposium on Multimedia and the Web (WebMedia 2011), p. 8. ACM, New York (2011)"},{"key":"34_CR18","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-02185-5","volume-title":"Semiotic Engineering Methods for Scientific Research in HCI","author":"C.S. Souza de","year":"2009","unstructured":"de Souza, C.S., Leit\u00e3o, C.F.: Semiotic Engineering Methods for Scientific Research in HCI. Morgan and Claypool Publishers, San Francisco (2009)"},{"key":"34_CR19","unstructured":"Tomhave, B.: Alphabet Soup: Making Sense of Models, Frameworks, and Methodologies. George Washington University (2005)"},{"key":"34_CR20","first-page":"265","volume-title":"4th International Conference on Communities and Technologies (C&T 2009)","author":"A.L. Young","year":"2009","unstructured":"Young, A.L., Quan-Haase, A.: Information revelation and internet privacy concerns on social network sites: a case study of facebook. In: 4th International Conference on Communities and Technologies (C&T 2009), pp. 265\u2013274. ACM, New York (2009)"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07620-1_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T09:06:18Z","timestamp":1746263178000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07620-1_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076195","9783319076201"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07620-1_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}