{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T07:26:50Z","timestamp":1743146810327,"version":"3.40.3"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319448046"},{"type":"electronic","value":"9783319448053"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-44805-3_19","type":"book-chapter","created":{"date-parts":[[2016,8,24]],"date-time":"2016-08-24T01:03:04Z","timestamp":1472000584000},"page":"229-240","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Denial of Choice: Group Level Disclosure of Private Information"],"prefix":"10.1007","author":[{"given":"Tharntip Tawnie","family":"Chutikulrungsee","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Oliver K.","family":"Burmeister","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yeslam","family":"Al-Saggaf","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Maumita","family":"Bhattacharya","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"key":"19_CR1","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1016\/j.chb.2015.06.048","volume":"53","author":"M Fodor","year":"2015","unstructured":"Fodor, M., Brem, A.: Do privacy concerns matter for Millennials? Results from an empirical analysis of location-based services adoption in Germany. Comput. Hum. Behav. 53, 344\u2013353 (2015)","journal-title":"Comput. Hum. Behav."},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1016\/j.comnet.2014.08.023","volume":"75","author":"C Patsakis","year":"2014","unstructured":"Patsakis, C., Zigomitros, A., Papageorgiou, A., Galv\u00e1n-L\u00f3pez, E.: Distributing privacy policies over multimedia content across multiple online social networks. Comput. Netw. 75, 531\u2013543 (2014)","journal-title":"Comput. Netw."},{"key":"19_CR3","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1016\/j.chb.2014.04.014","volume":"36","author":"Y Al-Saggaf","year":"2014","unstructured":"Al-Saggaf, Y., Nielsen, S.: Self-disclosure on Facebook among female users and its relationship to feelings of loneliness. Comput. Hum. Behav. 36, 460\u2013468 (2014)","journal-title":"Comput. Hum. Behav."},{"key":"19_CR4","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.chb.2014.12.012","volume":"45","author":"LN Zlatolas","year":"2015","unstructured":"Zlatolas, L.N., Welzer, T., Heri\u010dko, M., H\u00f6lbl, M.: Privacy antecedents for SNS self-disclosure: the case of Facebook. Comput. Hum. Behav. 45, 158\u2013167 (2015)","journal-title":"Comput. Hum. Behav."},{"issue":"2","key":"19_CR5","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1111\/jcc4.12052","volume":"19","author":"M Taddicken","year":"2014","unstructured":"Taddicken, M.: The \u201cprivacy paradox\u201d in the social web: the impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. J. Comput.-Mediated Commun. 19(2), 248\u2013273 (2014)","journal-title":"J. Comput.-Mediated Commun."},{"issue":"8","key":"19_CR6","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1109\/TKDE.2012.120","volume":"25","author":"R Heatherly","year":"2013","unstructured":"Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: Preventing private information inference attacks on social networks. IEEE Trans. Knowl. Data Eng. 25(8), 1849\u20131862 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"19_CR7","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1016\/j.chb.2013.10.046","volume":"31","author":"KT Kwak","year":"2014","unstructured":"Kwak, K.T., Choi, S.K., Lee, B.G.: SNS flow, SNS self-disclosure and post hoc interpersonal relations change: focused on Korean Facebook user. Comput. Hum. Behav. 31, 294\u2013304 (2014)","journal-title":"Comput. Hum. Behav."},{"key":"19_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.chb.2014.11.076","volume":"45","author":"S Utz","year":"2015","unstructured":"Utz, S.: The function of self-disclosure on social network sites: not only intimate, but also positive and entertaining self-disclosures increase the feeling of connection. Comput. Hum. Behav. 45, 1\u201310 (2015)","journal-title":"Comput. Hum. Behav."},{"key":"19_CR9","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.chb.2015.06.049","volume":"53","author":"C Chang","year":"2015","unstructured":"Chang, C.: Self-construal and Facebook activities: exploring differences in social interaction orientation. Comput. Hum. Behav. 53, 91\u2013101 (2015)","journal-title":"Comput. Hum. Behav."},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1007\/978-3-642-39884-1_29","volume-title":"Financial Cryptography and Data Security","author":"G Bicz\u00f3k","year":"2013","unstructured":"Bicz\u00f3k, G., Chia, P.H.: Interdependent privacy: let me share your data. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 338\u2013353. Springer, Heidelberg (2013)"},{"key":"19_CR11","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.cose.2013.04.003","volume":"37","author":"L Jin","year":"2013","unstructured":"Jin, L., Joshi, J.B.D., Anwar, M.: Mutual-friend based attacks in social network systems. Comput. Secur. 37, 15\u201330 (2013)","journal-title":"Comput. Secur."},{"issue":"3","key":"19_CR12","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1109\/TEM.2015.2432117","volume":"62","author":"J Chen","year":"2015","unstructured":"Chen, J., Ping, J.W., Xu, Y.C., Tan, B.C.: Information privacy concern about peer disclosure in online social networks. IEEE Trans. Eng. Manag. 62(3), 311\u2013324 (2015)","journal-title":"IEEE Trans. Eng. Manag."},{"issue":"1","key":"19_CR13","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","volume":"13","author":"DM Boyd","year":"2007","unstructured":"Boyd, D.M., Ellison, N.B.: Social network sites: definition, history, and scholarship. J. Comput.-Mediated Commun. 13(1), 210\u2013230 (2007)","journal-title":"J. Comput.-Mediated Commun."},{"key":"19_CR14","first-page":"1","volume":"19","author":"OK Burmeister","year":"2015","unstructured":"Burmeister, O.K., Islam, M.Z., Dayhew, M., Crichton, M.: Enhancing client welfare through better communication of private mental health data between rural service providers. Australas. J. Inf. Syst. 19, 1\u201314 (2015)","journal-title":"Australas. J. Inf. Syst."},{"issue":"3","key":"19_CR15","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/s10551-013-1770-7","volume":"122","author":"M Bernoth","year":"2014","unstructured":"Bernoth, M., Dietsch, E., Burmeister, O.K., Schwartz, M.: Information management in aged care: cases of confidentiality and elder abuse. J. Bus. Ethics 122(3), 453\u2013460 (2014)","journal-title":"J. Bus. Ethics"},{"issue":"1","key":"19_CR16","first-page":"1","volume":"8","author":"OK Burmeister","year":"2012","unstructured":"Burmeister, O.K.: What seniors value about online community. J. Commun. Inform. 8(1), 1\u201312 (2012)","journal-title":"J. Commun. Inform."},{"issue":"2","key":"19_CR17","first-page":"99","volume":"8","author":"OK Burmeister","year":"2010","unstructured":"Burmeister, O.K.: Websites for seniors: cognitive accessibility. Int. J. Emerg. Technol. Soc. 8(2), 99\u2013113 (2010)","journal-title":"Int. J. Emerg. Technol. Soc."},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Conti, M., Poovendran, R., Secchiero, M.: FakeBook: detecting fake profiles in on-line social networks. In: Proceedings of the International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 1071\u20131078. IEEE Computer Society (2012)","DOI":"10.1109\/ASONAM.2012.185"},{"key":"19_CR19","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.cose.2014.04.004","volume":"44","author":"SH Ahmadinejad","year":"2014","unstructured":"Ahmadinejad, S.H., Fong, P.W.: Unintended disclosure of information: inference attacks by third-party extensions to social network systems. Comput. Secur. 44, 75\u201391 (2014)","journal-title":"Comput. Secur."},{"key":"19_CR20","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.cose.2013.07.007","volume":"41","author":"A Squicciarini","year":"2014","unstructured":"Squicciarini, A., Karumanchi, S., Lin, D., DeSisto, N.: Identifying hidden social circles for advanced privacy configuration. Comput. Secur. 41, 40\u201351 (2014)","journal-title":"Comput. Secur."},{"issue":"3","key":"19_CR21","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1002\/asi.21473","volume":"62","author":"AC Squicciarini","year":"2011","unstructured":"Squicciarini, A.C., Xu, H., Zhang, X.: CoPE: enabling collaborative privacy management in online social networks. J. Am. Soc. Inform. Sci. Technol. 62(3), 521\u2013534 (2011)","journal-title":"J. Am. Soc. Inform. Sci. Technol."},{"issue":"6221","key":"19_CR22","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.aaa1465","volume":"347","author":"A Acquisti","year":"2015","unstructured":"Acquisti, A., Brandimarte, L., Loewenstein, G.: Privacy and human behavior in the age of information. Science 347(6221), 509\u2013514 (2015)","journal-title":"Science"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove, A.: Analyzing Facebook privacy settings: user expectations vs. reality. In: Proceedings of ACM SIGCOMM Conference on Internet Measurement Conference. ACM, Berlin (2011)","DOI":"10.1145\/2068816.2068823"},{"key":"19_CR24","unstructured":"Madejski, M., Johnson, M., Bellovin, S.M.: The failure of online social network privacy settings. Department of Computer Science, Columbia University, Technical report CUCS-010-11 (2011)"},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"Masoumzadeh, A., Joshi, J.: Privacy settings in social networking systems: what you cannot control. In: Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security (SIGSAC), pp. 149\u2013154 (2013)","DOI":"10.1145\/2484313.2484331"},{"key":"19_CR26","doi-asserted-by":"crossref","unstructured":"Netter, M., Riesner, M., Weber, M., Pernul, G.: Privacy settings in online social networks\u2013preferences, perception, and reality. In: Proceedings of the 46th Hawaii International Conference on System Sciences (HICSS), pp. 3219\u20133228 (2013)","DOI":"10.1109\/HICSS.2013.455"},{"key":"19_CR27","doi-asserted-by":"crossref","unstructured":"Anthonysamy, P., Rashid, A., Greenwood, P.: Do the privacy policies reflect the privacy controls on social networks? In: Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third International Conference on Social Computing (SocialCom), pp. 1155\u20131158 (2011)","DOI":"10.1109\/PASSAT\/SocialCom.2011.150"},{"key":"19_CR28","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.chb.2013.10.010","volume":"31","author":"YM Baek","year":"2014","unstructured":"Baek, Y.M., Kim, E., Bae, Y.: My privacy is okay, but theirs is endangered: why comparative optimism matters in online privacy concerns. Comput. Hum. Behav. 31, 48\u201356 (2014)","journal-title":"Comput. Hum. Behav."},{"key":"19_CR29","doi-asserted-by":"crossref","unstructured":"Staddon, J., Huffaker, D., Brown, L., Sedley, A.: Are privacy concerns a turn-off?: engagement and privacy in social networks. In: Proceedings of the 8th Symposium on Usable Privacy and Security (SOUP), pp. 1\u201313. ACM, Washington, D.C. (2012)","DOI":"10.1145\/2335356.2335370"},{"issue":"1","key":"19_CR30","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1109\/TKDE.2012.248","volume":"26","author":"J Parra-Arnau","year":"2014","unstructured":"Parra-Arnau, J., Perego, A., Ferrari, E., Forne, J., Rebollo-Monedero, D.: Privacy-preserving enhanced collaborative tagging. IEEE Trans. Knowl. Data Eng. 26(1), 180\u2013193 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"19_CR31","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.chb.2014.10.051","volume":"43","author":"C Lang","year":"2015","unstructured":"Lang, C., Barton, H.: Just untag it: exploring the management of undesirable Facebook photos. Comput. Hum. Behav. 43, 147\u2013155 (2015)","journal-title":"Comput. Hum. Behav."},{"key":"19_CR32","doi-asserted-by":"crossref","unstructured":"Hu, H., Ahn, G.-J., Jorgensen, J.: Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. In: Proceedings of the 27th Annual Computer Security Applications Conference. ACM, Orlando (2011)","DOI":"10.1145\/2076732.2076747"},{"issue":"9","key":"19_CR33","doi-asserted-by":"publisher","first-page":"1883","DOI":"10.1002\/asi.23299","volume":"66","author":"P Wisniewski","year":"2015","unstructured":"Wisniewski, P., Xu, H., Lipford, H., Bello-Ogunu, E.: Facebook apps and tagging: the trade-off between personal privacy and engaging with friends. J. Assoc. Inf. Sci. Technol. 66(9), 1883\u20131896 (2015)","journal-title":"J. Assoc. Inf. Sci. Technol."},{"key":"19_CR34","doi-asserted-by":"crossref","unstructured":"Wang, N., Xu, H., Grossklags, J.: Third-party apps on Facebook: privacy and the illusion of control. In: Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology (ACM CHIMIT 2011), pp. 1\u201310. ACM, Cambridge (2011)","DOI":"10.1145\/2076444.2076448"},{"key":"19_CR35","doi-asserted-by":"crossref","unstructured":"Ryu, E., Rong, Y., Li, J., Machanavajjhala, A.: Curso: protect yourself from curse of attribute inference: a social network privacy-analyzer. In: Proceedings of the ACM SIGMOD Workshop on Databases and Social Networks, pp. 13\u201318. ACM, New York (2013)","DOI":"10.1145\/2484702.2484706"},{"key":"19_CR36","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.chb.2015.12.021","volume":"57","author":"DY Wohn","year":"2016","unstructured":"Wohn, D.Y., Spottswood, E.L.: Reactions to other-generated face threats on Facebook and their relational consequences. Comput. Hum. Behav. 57, 187\u2013194 (2016)","journal-title":"Comput. Hum. Behav."},{"key":"19_CR37","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1016\/j.chb.2014.04.027","volume":"36","author":"E Litt","year":"2014","unstructured":"Litt, E., Hargittai, E.: A bumpy ride on the information superhighway: exploring turbulence online. Comput. Hum. Behav. 36, 520\u2013529 (2014)","journal-title":"Comput. Hum. Behav."},{"key":"19_CR38","doi-asserted-by":"crossref","unstructured":"Litt, E., Spottswood, E., Birnholtz, J., Hancock, J.T., Smith, M.E., Reynolds, L.: Awkward encounters of an \u201cother\u201d kind: collective self-presentation and face threat on Facebook. In: Proceedings of the 17th ACM conference on Computer Supported Cooperative Work and Social Computing (CSCW), pp. 449\u2013460. ACM, Baltimore (2014)","DOI":"10.1145\/2531602.2531646"},{"key":"19_CR39","unstructured":"Company Info | Facebook Newsroom, 4 February 2004. http:\/\/newsroom.fb.com\/company-info\/ . Accessed 15 Jan 2016"},{"key":"19_CR40","unstructured":"He took the innocence and made it disgusting, 3 February (2015). http:\/\/www.news.com.au\/technology\/online\/man-steals-pictures-from-facebook-posts-them-to-child-porn-website\/story-fnjwnhzf-1227208112703 . Accessed 29 Oct 2015"},{"key":"19_CR41","unstructured":"Chang, L.: Baby role-play, or virtual kidnapping, is the most disturbing Instagram hashtag ever. http:\/\/www.digitaltrends.com\/mobile\/baby-role-play-virtual-kidnapping\/ . Accessed 4 Aug 2015"},{"key":"19_CR42","unstructured":"Beware: Digital kidnappers of children are lurking, 4 March 2015. http:\/\/www.kidspot.com.au\/could-digital-kidnappers-steal-images-of-your-child\/ . Accessed 29 Jan 2016"},{"issue":"2","key":"19_CR43","first-page":"107","volume":"32","author":"OK Burmeister","year":"2000","unstructured":"Burmeister, O.K.: Applying the ACS code of ethics. J. Res. Pract. Inf. Technol. 32(2), 107\u2013120 (2000)","journal-title":"J. Res. Pract. Inf. Technol."},{"issue":"3","key":"19_CR44","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1108\/14779960380000231","volume":"3","author":"OK Burmeister","year":"2003","unstructured":"Burmeister, O.K., Weckert, J.: Applying the new software engineering code of ethics to usability engineering: a study of 4 cases. J. Inf. Commun. Ethics Soc. 3(3), 119\u2013132 (2003)","journal-title":"J. Inf. Commun. Ethics Soc."},{"issue":"2","key":"19_CR45","first-page":"168","volume":"13","author":"M Bowern","year":"2006","unstructured":"Bowern, M., Burmeister, O., Gotterbarn, D., Weckert, J.: ICT integrity: bringing the ACS code of ethics up to date. Australas. J. Inf. Syst. 13(2), 168\u2013181 (2006)","journal-title":"Australas. J. Inf. Syst."},{"issue":"4","key":"19_CR46","first-page":"25","volume":"10","author":"OK Burmeister","year":"2013","unstructured":"Burmeister, O.K.: Achieving the goal of a global computing code of ethics through an international-localisation hybrid. Ethical Space: Int. J. Commun. Ethics 10(4), 25\u201332 (2013)","journal-title":"Ethical Space: Int. J. Commun. Ethics"}],"container-title":["IFIP Advances in Information and Communication Technology","Technology and Intimacy: Choice or Coercion"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-44805-3_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T01:07:19Z","timestamp":1718759239000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-44805-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319448046","9783319448053"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-44805-3_19","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"25 August 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Human Choice and Computers","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salford","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcc2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}