{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T03:20:09Z","timestamp":1752549609954,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319459813"},{"type":"electronic","value":"9783319459820"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45982-0_13","type":"book-chapter","created":{"date-parts":[[2016,8,24]],"date-time":"2016-08-24T14:31:38Z","timestamp":1472049098000},"page":"133-147","source":"Crossref","is-referenced-by-count":5,"title":["Perceived Versus Actual Predictability of Personal Information in Social Networks"],"prefix":"10.1007","author":[{"given":"Eleftherios","family":"Spyromitros-Xioufis","sequence":"first","affiliation":[]},{"given":"Georgios","family":"Petkos","sequence":"additional","affiliation":[]},{"given":"Symeon","family":"Papadopoulos","sequence":"additional","affiliation":[]},{"given":"Rob","family":"Heyman","sequence":"additional","affiliation":[]},{"given":"Yiannis","family":"Kompatsiaris","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Acquisti, A.: The economics and behavioral economics of privacy. In: Lane, J., Stodden, V., Bender, S., Nissenbaum, H. (eds.) Privacy, Big Data, and the Public Good: Frameworks for Engagement, pp. 98\u2013112. Cambridge University Press (2014)","DOI":"10.1017\/CBO9781107590205.005"},{"key":"13_CR2","unstructured":"Acquisti, A., Fong, C.M.: An experiment in hiring discrimination via online social networks. (2015). Available at SSRN 2031979"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Agarwal, L., Shrivastava, N., Jaiswal, S., Panjwani, S.: Do not embarrass: re-examining user concerns for online tracking and advertising. In: Proceedings of the Ninth Symposium on Usable Privacy and Security (2013)","DOI":"10.1145\/2501604.2501612"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Backstrom, L., Kleinberg, J., Romantic partnerships, the dispersion of social ties: a network analysis of relationship status on facebook. In: Proceedings of CSCW 2014, pp. 831\u2013841. ACM (2014)","DOI":"10.1145\/2531602.2531642"},{"key":"13_CR5","first-page":"993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent dirichlet allocation. J. Mach. Learn. Res. 3, 993\u20131022 (2003)","journal-title":"J. Mach. Learn. Res."},{"key":"13_CR6","unstructured":"Brandimarte, L., Acquisti, A., Loewenstein, G.: Misplaced confidences: privacy and the control paradox. In: Ninth Annual Workshop on the Economics of InformationSecurity, p. 43, Cambridge (2010)"},{"issue":"1","key":"13_CR7","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Conover, M.D., Goncalves, B., Ratkiewicz, J., Flammini, A., Menczer, F.: Predicting the political alignment of twitter users. In: Privacy, Security, Risk and Trust (PASSAT) and SocialCom 2011, pp. 192\u2013199 (2011)","DOI":"10.1109\/PASSAT\/SocialCom.2011.34"},{"issue":"1","key":"13_CR9","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1111\/j.1083-6101.2009.01494.x","volume":"15","author":"B Debatin","year":"2009","unstructured":"Debatin, B., Lovejoy, J.P., Horn, A.-K., Hughes, B.N.: Facebook and online privacy: attitudes, behaviors, and unintended consequences. J. Comput. Mediated Commun. 15(1), 83\u2013108 (2009)","journal-title":"J. Comput. Mediated Commun."},{"key":"13_CR10","first-page":"1871","volume":"9","author":"R-E Fan","year":"2008","unstructured":"Fan, R.-E., Chang, K.-W., Hsieh, C.-J., Wang, X.-R., Lin, C.-J.: Liblinear: a library for large linear classification. J. Mach. Learn. Res. 9, 1871\u20131874 (2008)","journal-title":"J. Mach. Learn. Res."},{"key":"13_CR11","unstructured":"World Economic Forum. Rethinking personal data: strengthening trust. Technical report, May 2012"},{"key":"13_CR12","first-page":"148","volume":"96","author":"Y Freund","year":"1996","unstructured":"Freund, Y., Schapire, R.E., et al.: Experiments with a new boosting algorithm. ICML 96, 148\u2013156 (1996)","journal-title":"ICML"},{"key":"13_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1007\/978-3-319-14445-0_28","volume-title":"MultiMedia Modeling","author":"AL Ginsca","year":"2015","unstructured":"Ginsca, A.L., Popescu, A., Le Borgne, H., Ballas, N., Vo, P., Kanellos, I.: Large-scale image mining with flickr groups. In: He, X., Luo, S., Tao, D., Xu, C., Yang, J., Hasan, M.A. (eds.) MMM 2015, Part I. LNCS, vol. 8935, pp. 318\u2013334. Springer, Heidelberg (2015)"},{"issue":"1","key":"13_CR14","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The weka data mining software: an update. ACM SIGKDD Explor. Newslett. 11(1), 10\u201318 (2009)","journal-title":"ACM SIGKDD Explor. Newslett."},{"issue":"4","key":"13_CR15","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1108\/info-01-2014-0004","volume":"16","author":"R Heyman","year":"2014","unstructured":"Heyman, R., De Wolf, R., Pierson, J.: Evaluating social media privacy settings for personal, advertising purposes. Info 16(4), 18\u201332 (2014)","journal-title":"Info"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Jernigan, C., Mistree, B.F., Gaydar: Facebook friendships expose sexual orientation. First Monday, 14(10) (2009)","DOI":"10.5210\/fm.v14i10.2611"},{"issue":"12","key":"13_CR17","doi-asserted-by":"crossref","first-page":"1144","DOI":"10.1016\/j.ijhcs.2013.06.003","volume":"71","author":"BP Knijnenburg","year":"2013","unstructured":"Knijnenburg, B.P., Kobsa, A., Jin, H.: Dimensionality of information disclosure behavior. Int. J. Hum. Comput. Stud. 71(12), 1144\u20131162 (2013)","journal-title":"Int. J. Hum. Comput. Stud."},{"issue":"15","key":"13_CR18","doi-asserted-by":"crossref","first-page":"5802","DOI":"10.1073\/pnas.1218772110","volume":"110","author":"M Kosinski","year":"2013","unstructured":"Kosinski, M., Stillwell, D., Graepel, T.: Private traits and attributes are predictable from digital records of human behavior. Proc. Nat. Acad. Sci. 110(15), 5802\u20135805 (2013)","journal-title":"Proc. Nat. Acad. Sci."},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Madejski, M., Johnson, M., Bellovin, S.M.: A study of privacy settings errors in an online social network. In: PERCOM Workshops (2012)","DOI":"10.1109\/PerComW.2012.6197507"},{"key":"13_CR20","first-page":"101","volume":"79","author":"H Nissenbaum","year":"2004","unstructured":"Nissenbaum, H.: Privacy as contextual integrity. Wash. L. Rev. 79, 101\u2013139 (2004)","journal-title":"Wash. L. Rev."},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Pennacchiotti, M., Popescu, A.-M.: Democrats, republicans, starbucks afficionados: user classification in twitter. In: SIGKDD (2011)","DOI":"10.1145\/2020408.2020477"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Petkos, G., Papadopoulos, S., Kompatsiaris, Y.: PScore: A framework for enhancing privacy awareness in online social networks. In: Availability, Reliability and Security (ARES 2015), pp. 592\u2013600. IEEE (2015)","DOI":"10.1109\/ARES.2015.80"},{"key":"13_CR23","series-title":"SUNY series in communication studies","doi-asserted-by":"crossref","DOI":"10.1353\/book4588","volume-title":"Boundaries of Privacy: Dialectics of Disclosure","author":"SS Petronio","year":"2002","unstructured":"Petronio, S.S.: Boundaries of Privacy: Dialectics of Disclosure. SUNY series in communication studies. State University of New York Press, Albany (2002)"},{"issue":"7","key":"13_CR24","first-page":"81","volume":"28","author":"AS Raman","year":"2012","unstructured":"Raman, A.S., Barloon, J.L., Welch, D.M.: Social media: emerging fair lending issues. Rev. Banking Financial Serv. 28(7), 81\u201388 (2012)","journal-title":"Rev. Banking Financial Serv."},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Rao, D., Yarowsky, D., Shreevats, A., Gupta, M.: Classifying latent user attributes in twitter. In: Proceedings of the 2nd International Workshop on Search and Mining User-Generated Contents, pp. 37\u201344. ACM (2010)","DOI":"10.1145\/1871985.1871993"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Read, J., Pfahringer, B., Holmes, G.: Multi-label classification using ensembles of pruned sets. In: ICDM 2008, pp. 995\u20131000 (2008)","DOI":"10.1109\/ICDM.2008.74"},{"issue":"3","key":"13_CR27","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/s10994-011-5256-5","volume":"85","author":"J Read","year":"2011","unstructured":"Read, J., Pfahringer, B., Holmes, G., Frank, E.: Classifier chains for multi-label classification. Mach. Learn. 85(3), 333\u2013359 (2011)","journal-title":"Mach. Learn."},{"issue":"9","key":"13_CR28","doi-asserted-by":"crossref","first-page":"e73791","DOI":"10.1371\/journal.pone.0073791","volume":"8","author":"H Andrew Schwartz","year":"2013","unstructured":"Andrew Schwartz, H., Eichstaedt, J.C., Kern, M.L., Dziurzynski, L., Ramones, S.M., Agrawal, M., Shah, A., Kosinski, M., Stillwell, D., Seligman, M.E.P., et al.: Personality, gender, and age in the language of social media: the open-vocabulary approach. PloS one 8(9), e73791 (2013)","journal-title":"PloS one"},{"key":"13_CR29","doi-asserted-by":"crossref","unstructured":"Spyromitros-Xioufis, E., Papadopoulos, S., Popescu, A., Kompatsiaris, Y.: Personalized privacy-aware image classification. In: Proceedings of the 6th ACM International Conference on Multimedia Retrieval, ICMR 2016 (2016)","DOI":"10.1145\/2911996.2912018"},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Spyromitros-Xioufis, E., Tsoumakas, G., Groves, W., Vlahavas, I.: Multi-target regression via input space expansion: treating targets as inputs. Machine Learning, pp. 1\u201344 (2016)","DOI":"10.1007\/s10994-016-5546-z"},{"issue":"2","key":"13_CR31","first-page":"7","volume":"4","author":"F Stutzman","year":"2012","unstructured":"Stutzman, F., Gross, R., Acquisti, A.: Silent listeners: the evolution of privacy and disclosure on Facebook. J. Privacy Confidentiality 4(2), 7\u201341 (2012)","journal-title":"J. Privacy Confidentiality"},{"key":"13_CR32","doi-asserted-by":"crossref","unstructured":"Theodoridis, T., Papadopoulos, S., Kompatsiaris, Y.: Assessing the reliability of facebook user profiling. In: WWW (2015)","DOI":"10.1145\/2740908.2742728"},{"key":"13_CR33","doi-asserted-by":"crossref","first-page":"667","DOI":"10.1007\/978-0-387-09823-4_34","volume-title":"Data Mining and Knowledge Discovery Handbook","author":"G Tsoumakas","year":"2009","unstructured":"Tsoumakas, G., Katakis, I., Vlahavas, I.: Mining multi-label data. In: Maimon, O., Rokach, L. (eds.) Data Mining and Knowledge Discovery Handbook, pp. 667\u2013685. Springer, New York (2009)"},{"key":"13_CR34","volume-title":"Privacy and Freedom","author":"A Westin","year":"1970","unstructured":"Westin, A.: Privacy and Freedom. Bodley Head, London (1970)"},{"key":"13_CR35","doi-asserted-by":"crossref","unstructured":"Zheleva, E., Getoor, L.: To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In: WWW (2009)","DOI":"10.1145\/1526709.1526781"}],"container-title":["Lecture Notes in Computer Science","Internet Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45982-0_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,19]],"date-time":"2023-08-19T20:47:02Z","timestamp":1692478022000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45982-0_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319459813","9783319459820"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45982-0_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}