{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:46:30Z","timestamp":1742985990996,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_35","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"391-403","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Hey, I Have a Problem in the System: Who Can Help Me? An Investigation of Facebook Users Interaction When Facing Privacy Problems"],"prefix":"10.1007","author":[{"given":"Marilia S.","family":"Mendes","sequence":"first","affiliation":[]},{"given":"Elizabeth","family":"Furtado","sequence":"additional","affiliation":[]},{"given":"Guido","family":"Militao","sequence":"additional","affiliation":[]},{"given":"Miguel F.","family":"de Castro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"35_CR1","doi-asserted-by":"crossref","unstructured":"Agosto, D.E.; Abbas, J.: High school seniors\u2019 social network and other ICT use preferences and concerns. In: Proceedings of the 73rd ASIS&T Annual Meeting on Navigating Streams in an Information Ecosystem (ASIS&T 2010), Pittsburgh, vol. 47, no. 65, pp. 1\u201310, October 2010","DOI":"10.1002\/meet.14504701025"},{"key":"35_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/978-3-642-25073-6_3","volume-title":"The Semantic Web \u2013 ISWC 2011","author":"S Angeletou","year":"2011","unstructured":"Angeletou, S., Rowe, M., Alani, H.: Modelling and analysis of user behaviour in online communities. In: Aroyo, L., Welty, C., Alani, H., Taylor, J., Bernstein, A., Kagal, L., Noy, N., Blomqvist, E. (eds.) ISWC 2011, Part I. LNCS, vol. 7031, pp. 35\u201350. Springer, Heidelberg (2011)"},{"key":"35_CR3","unstructured":"Bergmann, F.B.; Silveira, M.S.: \u201cEu vi o que voc\u00ea fez.:. e eu sei quem voc\u00ea \u00e9!\u201d: uma an\u00e1lise sobre privacidade no Facebook do ponto de vista dos usu\u00e1rios. In: Proceedings of the Symposium on Human Factors in Computing Systems (IHC 2012), Cuiab\u00e1, MT, Brazil (2012)"},{"key":"35_CR4","doi-asserted-by":"crossref","unstructured":"Castillo, C., Mendoza, M., Poblete, B.: Information credibility on twitter. In: Proceedings of the 20th International Conference on World Wide Web (WWW 2011), Hyderabad, India, pp. 675\u2013684 (2011)","DOI":"10.1145\/1963405.1963500"},{"key":"35_CR5","doi-asserted-by":"crossref","unstructured":"Cvijikj, I.P., Michahelles, F.: Understanding social media marketing: a case study on topics, categories and sentiment on a facebook brand page. In: MindTrek 2011, Tampere, Finland, 28\u201330 September 2011","DOI":"10.1145\/2181037.2181066"},{"key":"35_CR6","doi-asserted-by":"crossref","unstructured":"Fahl, S., Harbach, M., Muders, T., Smith, M., Sander, U.: Helping Johnny 2.0 to encrypt his Facebook conversations. In: Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS 2012), Article No. 11, Washington, DC, USA (2012)","DOI":"10.1145\/2335356.2335371"},{"key":"35_CR7","doi-asserted-by":"crossref","unstructured":"Faisal, M., Alsumait, A.: Social network privacy and trust concerns. In: Proceedings of the 13th International Conference on Information Integration and Web-based Applications and Services (iiWAS 2011), Ho Chi Minh City, Vietnam, pp. 416\u2013419 (2011)","DOI":"10.1145\/2095536.2095620"},{"key":"35_CR8","doi-asserted-by":"crossref","unstructured":"Hanne, M., Silva, C., Almeida, J., Gon\u00e7alves, M.: Analysis of vulnerability to Facebook users. In: Proceedings of the 18th Brazilian symposium on Multimedia and the Web (WebMedia 2012), S\u00e3o Paulo-SP, Brazil, pp. 335\u2013342 (2012)","DOI":"10.1145\/2382636.2382707"},{"key":"35_CR9","doi-asserted-by":"crossref","unstructured":"Java, A., Finin, T., Song, X., Tseng, B.: Why we Twitter: understanding microblogging usage and communities. In: 9th WEBKDD and 1st SNA-KDD Workshop 2007, San Jose, California, USA (2007)","DOI":"10.1145\/1348549.1348556"},{"key":"35_CR10","volume-title":"Handbook of Usability Testing: How To Plan, Design, and conduct Effective Tests","author":"R Jeffrey","year":"2008","unstructured":"Jeffrey, R., Chisnell, D.: Handbook of Usability Testing: How To Plan, Design, and conduct Effective Tests. Wiley, New York (2008)"},{"key":"35_CR11","doi-asserted-by":"crossref","unstructured":"Lampinen, A., Lehtinen, V., Lehmuskallio, A., Tamminen, S.: We\u2019re in it together: interpersonal management of disclosure in social network services. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2011), Vancouver, BC, pp. 3217\u20133226 (2011)","DOI":"10.1145\/1978942.1979420"},{"key":"35_CR12","doi-asserted-by":"crossref","unstructured":"Leit\u00e3o, T., Morgado, C., Cunha, J.C.: Measuring popularity in social network groups. In: Second International Conference on Cloud and Green Computing (CGC), pp. 485\u2013492 (2012)","DOI":"10.1109\/CGC.2012.85"},{"key":"35_CR13","doi-asserted-by":"crossref","unstructured":"Mao, H., Shuai, X., Kapadia, A.: Loose tweets: an analysis of privacy leaks on twitter. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society (WPES 2011), Chicago, IL, USA, pp. 1\u201312 (2011)","DOI":"10.1145\/2046556.2046558"},{"key":"35_CR14","doi-asserted-by":"crossref","unstructured":"Mazzia, A., Lefevre, K., Adar, E.: The PViz comprehension tool for social network privacy settings. In: Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS 2012), Article No. 13, Washington, DC, USA (2012)","DOI":"10.1145\/2335356.2335374"},{"key":"35_CR15","unstructured":"Mendes, M.S.: MALTU - model for evaluation of interaction in social systems from the users textual language. 200 f. Thesis (Ph.D. in computer science) \u2013 Federal University of Cear\u00e1 (UFC), Fortaleza, CE, Brazil (2015)"},{"key":"35_CR16","doi-asserted-by":"crossref","unstructured":"Mendes, M.S., Furtado, E.S., Castro, M.F.: Do users write about the system in use? an investigation from messages in natural language on Twitter. In: 7th Euro American Association on Telematics and Information Systems (EATIS 2014), Valparaiso, Chile (2014)","DOI":"10.1145\/2590651.2590654"},{"key":"35_CR17","doi-asserted-by":"crossref","unstructured":"Morris, M.R., Teevan, J., Panovich, K. What do people ask their social networks and why? a survey study of status message Q&A behavior. In: Proceedings of the CHI 2010, pp. 1739\u20131748. ACM Press (2010)","DOI":"10.1145\/1753326.1753587"},{"key":"35_CR18","doi-asserted-by":"crossref","unstructured":"Newman, M.W., Lauterbach, D., Munson, S.A., Resnick, P., Morris, M.E.: \u201cIt\u2019s not that I don\u2019t have problems, I\u2019m just not putting them on Facebook\u201d: challenges and opportunities in using online social networks for health. In: CSCW 2011, Hangzhou, China (2011)","DOI":"10.1145\/1958824.1958876"},{"key":"35_CR19","first-page":"25","volume-title":"Usability Inspection Methods","author":"J Nielsen","year":"1994","unstructured":"Nielsen, J.: Heuristic evaluation. In: Mack, R., Nielsen, J. (eds.) Usability Inspection Methods, pp. 25\u201362. Wiley, New York (1994)"},{"key":"35_CR20","doi-asserted-by":"crossref","unstructured":"Quercia, D., Lambiotte, R., Stillwell, D., Kosinski, M., Crowcroft, J.: The personality of popular Facebook users. In: Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work (CSCW 2012), Seattle, Washington, USA, pp. 955\u2013964 (2012)","DOI":"10.1145\/2145204.2145346"},{"key":"35_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1007\/978-3-642-23765-2_14","volume-title":"Human-Computer Interaction \u2013 INTERACT 2011","author":"B Reynolds","year":"2011","unstructured":"Reynolds, B., Venkatanathan, J., Gon\u00e7alves, J., Kostakos, V.: Sharing ephemeral information in online social networks: privacy perceptions and behaviours. In: Campos, P., Graham, N., Jorge, J., Nunes, N., Palanque, P., Winckler, M. (eds.) INTERACT 2011, Part III. LNCS, vol. 6948, pp. 204\u2013215. Springer, Heidelberg (2011)"},{"key":"35_CR22","unstructured":"Rodrigues, K.H., Canal, M. C., Xavier R.C., Alencar, T.S., Neris, V.P.A.: Avaliando aspectos de privacidade no Facebook pelas lentes de usabilidade, acessibilidade e fatores emocionais. In Proceedings of the IX Symposium on Human Factors in Computing Systems (IHC 2012), Cuiab\u00e1, MT, Brazil (2012)"},{"key":"35_CR23","volume-title":"Scenario-Based Development of Human-Computer Interaction","author":"MB Rosson","year":"2002","unstructured":"Rosson, M.B., Carroll, J.M.: Scenario-Based Development of Human-Computer Interaction. Morgan Kaufmann Publishers, San Francisco (2002)"},{"key":"35_CR24","unstructured":"Sharoda, A., Lichan, H. Chi, E.H.: What is a question? crowdsourcing tweet categorization. In: CHI 2011 (2011)"},{"key":"35_CR25","unstructured":"Silveira, M.S., de Souza, C.S., Barbosa, S.D.J. (2003) Um M\u00e9todo da Engenharia Semi\u00f3tica para a Constru\u00e7\u00e3o de Sistemas de Ajuda Online. In: Proceedings of the Latin-American Conference on Human-Computer Interaction (CLIHC 2003), Rio de Janeiro, Brazil (2003)"},{"key":"35_CR26","doi-asserted-by":"crossref","unstructured":"Staddon, J., Huffaker, D., Brown, L., Sedley, A.: Are privacy concerns a turn-off?: engagement and privacy in social networks. In: Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS 2012), Article No. 10, Washington, DC, USA (2012)","DOI":"10.1145\/2335356.2335370"},{"key":"35_CR27","unstructured":"Terto, A., Alves, C., Rocha, J., Prates, R. Imagem e privacidade: contradi\u00e7\u00f5es no Facebook. In: Proceedings of the IX Symposium on Human Factors in Computing Systems (IHC 2012), Cuiab\u00e1, MT, Brazil (2012)"},{"key":"35_CR28","doi-asserted-by":"crossref","unstructured":"Wang, N., Xu, H., Grossklags, J.: Third-party apps on Facebook: privacy and the illusion of control. In: Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology (CHIMIT 2011), Boston, MA, USA (2011)","DOI":"10.1145\/2076444.2076448"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:19:09Z","timestamp":1583507949000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}