{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T16:51:05Z","timestamp":1767372665207,"version":"3.40.3"},"publisher-location":"Cham","reference-count":66,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319478739"},{"type":"electronic","value":"9783319478746"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47874-6_28","type":"book-chapter","created":{"date-parts":[[2016,10,18]],"date-time":"2016-10-18T12:33:55Z","timestamp":1476794035000},"page":"400-420","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["PPM: A Privacy Prediction Model for Online Social Networks"],"prefix":"10.1007","author":[{"given":"Cailing","family":"Dong","sequence":"first","affiliation":[]},{"given":"Hongxia","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Bart P.","family":"Knijnenburg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,19]]},"reference":[{"key":"28_CR1","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/11957454_3","volume-title":"Privacy Enhancing Technologies","author":"Alessandro Acquisti","year":"2006","unstructured":"Acquisti, A., Gross, R.: Imagined communities: awareness, information sharing, and privacy on the facebook. In: 6th Workshop on Privacy Enhancing Technologies, pp. 36\u201358 (2006)"},{"key":"28_CR2","first-page":"24","volume":"2","author":"A Acquisti","year":"2005","unstructured":"Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Secur. Priv. 2, 24\u201330 (2005)","journal-title":"IEEE Secur. Priv."},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Adams, A.: Multimedia information changes the whole privacy ballgame. In: Proceedings of the Tenth Conference on Computers, Freedom and Privacy: Challenging the Assumptions, CFP 2000, pp. 25\u201332. ACM (2000)","DOI":"10.1145\/332186.332199"},{"issue":"11","key":"28_CR4","first-page":"288","volume":"9","author":"A Al Hasib","year":"2009","unstructured":"Al Hasib, A.: Threats of online social networks. IJCSNS. Int. J. Comput. Sci. Netw. Secur. 9(11), 288\u2013293 (2009)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"28_CR5","unstructured":"Baker, D., Buoni, N., Fee, M., Vitale, C.: Social networking and its effects on companies and their employees. Retrieved November 15 (2011)"},{"key":"28_CR6","unstructured":"Balebako, R., Leon, P.G., Mugan, J., Acquisti, A., Cranor, L.F., Sadeh, N.: Nudging users towards privacy on mobile devices. In: CHI 2011 Workshop on Persuasion, Influence, Nudge and Coercion Through Mobile Devices, Vancouver, Canada, pp. 23\u201326 (2011). http:\/\/www.andrew.cmu.edu\/user\/jmugan\/Publications\/chiworkshop.pdf"},{"key":"28_CR7","unstructured":"Bansal, G., Zahedi, F., Gefen, D.: The moderating influence of privacy concern on the efficacy of privacy assurance mechanisms for building trust: a multiple-context investigation. In: Proceedings of the ICIS 2008, Paris, France (2008). http:\/\/aisel.aisnet.org\/icis2008\/7"},{"key":"28_CR8","unstructured":"Barocas, S., Nissenbaum, H.: On notice: the trouble with notice and consent. In: Proceedings of the Engaging Data Forum: The First International Forum on the Application and Management of Personal Electronic Information (2009). http:\/\/www.nyu.edu\/pages\/projects\/nissenbaum\/papers\/ED_SII_On_Notice.pdf"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Becker, L., Pousttchi, K.: Social networks: The role of users\u2019 privacy concerns. In: Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services, IIWAS 2012, pp. 187\u2013195. ACM (2012). http:\/\/doi.acm.org\/10.1145\/2428736.2428767","DOI":"10.1145\/2428736.2428767"},{"issue":"7","key":"28_CR10","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1007\/s00779-010-0346-0","volume":"15","author":"M Benisch","year":"2011","unstructured":"Benisch, M., Kelley, P.G., Sadeh, N., Cranor, L.F.: Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs. Pers. Ubiquit. Comput. 15(7), 679\u2013694 (2011). http:\/\/dx.doi.org\/10.1007\/s00779-010-0346-0","journal-title":"Pers. Ubiquit. Comput."},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Borcea-Pfitzmann, K., Pfitzmann, A., Berg, M.: Privacy 3.0 := data minimization + user control + contextual integrity. Inf. Technol. 53(1), 34\u201340 (2011). http:\/\/www.oldenbourg-link.com\/doi\/abs\/10.1524\/itit.2011.0622","DOI":"10.1524\/itit.2011.0622"},{"key":"28_CR12","unstructured":"Brenner, J., Smith, A.: 72% of online adults are social networking site users. PewResearch Internet Project (2013)"},{"key":"28_CR13","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-1-4419-6967-5_9","volume-title":"Economics of Information Security and Privacy","author":"Ram\u00f3n Compa\u00f1\u00f3","year":"2010","unstructured":"Compa\u00f1\u00f3, R., Lusoli, W.: The policy maker\u2019s anguish: regulating personal data behavior between paradoxes and dilemmas. In: Moore, T., Pym, D., Ioannidis, C. (eds.) Economics of Information Security and Privacy, pp. 169\u2013185. Springer, US (2010). doi:10.1007\/978-1-4419-6967-5_9"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Consolvo, S., Smith, I.E., Matthews, T., LaMarca, A., Tabert, J., Powledge, P.: Location disclosure to social relations: Why, when, & what people want to share. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2005, pp. 81\u201390. ACM (2005)","DOI":"10.1145\/1054972.1054985"},{"issue":"3","key":"28_CR15","doi-asserted-by":"crossref","first-page":"341","DOI":"10.2307\/249775","volume":"17","author":"Mary J. Culnan","year":"1993","unstructured":"Culnan, M.J.: \u201chow did they get my name?\u201d: An exploratory investigation of consumer attitudes toward secondary information use. MIS Q. 17(3), 341\u2013363 (1993). http:\/\/www.jstor.org\/stable\/249775","journal-title":"MIS Quarterly"},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"DiMicco, J., Millen, D.R., Geyer, W., Dugan, C., Brownholtz, B., Muller, M.: Motivations for social networking at work. In: Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, CSCW 2008, pp. 711\u2013720. ACM (2008). http:\/\/doi.acm.org\/10.1145\/1460563.1460674","DOI":"10.1145\/1460563.1460674"},{"key":"28_CR17","unstructured":"Dong, C., Jin, H., Knijnenburg, B.P.: Predicting privacy behavior on online social networks. In: Proceedings of the Ninth International Conference on Web and Social Media, ICWSM 2015, University of Oxford, Oxford, UK, 26\u201329 May 2015, pp. 91\u2013100 (2015). http:\/\/www.aaai.org\/ocs\/index.php\/ICWSM\/ICWSM15\/paper\/view\/10554"},{"key":"28_CR18","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.1111\/j.1083-6101.2007.00367.x","volume":"12","author":"N Ellison","year":"2007","unstructured":"Ellison, N., Steinfield, C., Lampe, C.: The benefits of facebook \u201cfriends:\u201d social capital and college students\u2019 use of online social network sites. J. Comput. Mediated Commun. 12, 1143\u20131168 (2007)","journal-title":"J. Comput. Mediated Commun."},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"Fang, L., LeFevre, K.: Privacy wizards for social networking sites. In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, pp. 351\u2013360. ACM (2010)","DOI":"10.1145\/1772690.1772727"},{"key":"28_CR20","doi-asserted-by":"crossref","unstructured":"Gong, N.Z., Xu, W., Huang, L., Mittal, P., Stefanov, E., Sekar, V., Song, D.: Evolution of social-attribute networks: measurements, modeling, and implications using google+. In: Proceedings of the 2012 ACM Conference on Internet Measurement Conference, IMC 2011, pp. 131\u2013144 (2011)","DOI":"10.1145\/2398776.2398792"},{"key":"28_CR21","doi-asserted-by":"crossref","unstructured":"Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, pp. 71\u201380. ACM (2005). http:\/\/doi.acm.org\/10.1145\/1102199.1102214","DOI":"10.1145\/1102199.1102214"},{"issue":"1","key":"28_CR22","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The weka data mining software: An update. SIGKDD Explor. 11(1), 10\u201318 (2009)","journal-title":"SIGKDD Explor."},{"key":"28_CR23","unstructured":"Harris, L., Westin, A., Associates: Personalized marketing and privacy on the net: What consumers want. Privacy and American Business Newsletter (1998)"},{"key":"28_CR24","doi-asserted-by":"crossref","unstructured":"Ho, A., Maiga, A., A\u00efmeur, E.: Privacy protection issues in social networking sites. In: AICCSA, pp. 271\u2013278. IEEE (2009)","DOI":"10.1109\/AICCSA.2009.5069336"},{"key":"28_CR25","doi-asserted-by":"crossref","unstructured":"Hsu, C.W.: Privacy concerns, privacy practices and web site categories: toward a situational paradigm. Online Inf. Rev. 30(5), 569\u2013586 (2006). http:\/\/www.emeraldinsight.com\/journals.htm?articleid=1576312&show=abstract","DOI":"10.1108\/14684520610706433"},{"key":"28_CR26","doi-asserted-by":"crossref","unstructured":"Johnson, M., Egelman, S., Bellovin, S.M.: Facebook and privacy: it\u2019s complicated. In: Proceedings of the 8th Symposium on Usable Privacy and Security. ACM, Pittsburgh (2012). http:\/\/doi.acm.org\/10.1145\/2335356.2335369","DOI":"10.1145\/2335356.2335369"},{"key":"28_CR27","doi-asserted-by":"crossref","unstructured":"Joinson, A.N.: Looking at, looking up or keeping up with people?: motives and use of facebook. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2008, pp. 1027\u20131036. ACM (2008). http:\/\/doi.acm.org\/10.1145\/1357054.1357213","DOI":"10.1145\/1357054.1357213"},{"key":"28_CR28","doi-asserted-by":"crossref","unstructured":"Kairam, S., Brzozowski, M., Huffaker, D., Chi, E.: Talking in circles: selective sharing in google+. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1065\u20131074. ACM Press, Austin (2012). http:\/\/dl.acm.org\/citation.cfm?id=2208552","DOI":"10.1145\/2207676.2208552"},{"key":"28_CR29","unstructured":"Knijnenburg, B.P., Kobsa, A.: Increasing sharing tendency without reducing satisfaction: finding the best privacy-settings user interface for social networks. In: ICIS 2014 Proceedings. Auckland, New Zealand (2014)"},{"key":"28_CR30","unstructured":"Knijnenburg, B.P.: Simplifying privacy decisions: towards interactive and adaptive solutions. In: Proceedings of the Recsys 2013 Workshop on Human Decision Making in Recommender Systems (Decisions@ RecSys 2013), Hong Kong, China, pp. 40\u201341 (2013)"},{"key":"28_CR31","doi-asserted-by":"crossref","unstructured":"Knijnenburg, B.P., Jin, H.: The persuasive effect of privacy recommendations. In: Twelfth Annual Workshop on HCI Research in MIS. Milan, Italy (2013). http:\/\/aisel.aisnet.org\/sighci2013\/16","DOI":"10.2139\/ssrn.2399725"},{"issue":"3","key":"28_CR32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2499670","volume":"3","author":"Bart P. Knijnenburg","year":"2013","unstructured":"Knijnenburg, B.P., Kobsa, A.: Making decisions about privacy: information disclosure in context-aware recommender systems. ACM Trans. Interact. Intell. Syst. 3(3), 20:1\u201320:23. http:\/\/doi.acm.org\/10.1145\/2499670","journal-title":"ACM Transactions on Interactive Intelligent Systems"},{"issue":"12","key":"28_CR33","doi-asserted-by":"publisher","first-page":"1144","DOI":"10.1016\/j.ijhcs.2013.06.003","volume":"71","author":"BP Knijnenburg","year":"2013","unstructured":"Knijnenburg, B.P., Kobsa, A., Jin, H.: Dimensionality of information disclosure behavior. Int. J. Hum. Comput. Stud. 71(12), 1144\u20131162 (2013)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"28_CR34","doi-asserted-by":"crossref","unstructured":"Knijnenburg, B.P., Kobsa, A., Jin, H.: Preference-based location sharing: are more privacy options really better? In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2013, pp. 2667\u20132676. ACM (2013)","DOI":"10.1145\/2470654.2481369"},{"key":"28_CR35","unstructured":"Knijnenburg, B.P.: A user-tailored approach to privacy decision support. Ph.D., University of California, Irvine, United States - California (2015). http:\/\/search.proquest.com\/docview\/1725139739\/abstract"},{"key":"28_CR36","unstructured":"Kyumin Lee, B.D.E., Caverlee, J.: Seven months with the devils: a long-term study of content polluters on twitter. In: International AAAI Conference on Weblogs and Social Media (ICWSM) (2011)"},{"key":"28_CR37","doi-asserted-by":"crossref","unstructured":"Lampe, C., Ellison, N.B., Steinfield, C.: Changes in use and perception of facebook. In: Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, CSCW 2008, pp. 721\u2013730. ACM (2008)","DOI":"10.1145\/1460563.1460675"},{"key":"28_CR38","doi-asserted-by":"crossref","unstructured":"Lampe, C., Gray, R., Fiore, A.T., Ellison, N.: Help is on the way: patterns of responses to resource requests on facebook. In: Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing, CSCW 2014, pp. 3\u201315. ACM (2014). http:\/\/doi.acm.org\/10.1145\/2531602.2531720","DOI":"10.1145\/2531602.2531720"},{"issue":"3","key":"28_CR39","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1111\/j.1540-4560.1977.tb01880.x","volume":"33","author":"RS Laufer","year":"1977","unstructured":"Laufer, R.S., Wolfe, M.: Privacy as a concept and a social issue: a multidimensional developmental theory. J. Soc. Issues 33(3), 22\u201342 (1977)","journal-title":"J. Soc. Issues"},{"issue":"6","key":"28_CR40","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1007\/s00779-004-0304-9","volume":"8","author":"Scott Lederer","year":"2004","unstructured":"Lederer, S., Hong, J.I., Dey, A.K., Landay, J.A.: Personal privacy through understanding and action: five pitfalls for designers. Pers. Ubiquit. Comput. 8(6), 440\u2013454 (2004). http:\/\/www.springerlink.com\/index\/10.1007\/s00779-004-0304-9","journal-title":"Personal and Ubiquitous Computing"},{"key":"28_CR41","doi-asserted-by":"crossref","unstructured":"Lederer, S., Mankoff, J., Dey, A.K.: Who wants to know what when? privacy preference determinants in ubiquitous computing. In: CHI \u201903 Extended Abstracts on Human Factors in Computing Systems, CHI EA 2003, pp. 724\u2013725. ACM (2003). http:\/\/doi.acm.org\/10.1145\/765891.765952","DOI":"10.1145\/765891.765952"},{"issue":"1","key":"28_CR42","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1111\/j.1083-6101.2008.01432.x","volume":"14","author":"K Lewis","year":"2008","unstructured":"Lewis, K., Kaufman, J., Christakis, N.: The taste for privacy: an analysis of college student privacy settings in an online social network. J. Comput. Mediated Commun. 14(1), 79\u2013100 (2008)","journal-title":"J. Comput. Mediated Commun."},{"key":"28_CR43","doi-asserted-by":"crossref","unstructured":"Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove., A.: Analyzing facebook privacy settings: user expectations vs. reality. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, pp. 61\u201370. ACM (2011)","DOI":"10.1145\/2068816.2068823"},{"key":"28_CR44","unstructured":"Madden, M.: Privacy management on social media sites. Technical report, Pew Internet & American Life Project, Pew Research Center, Washington, DC, February 2012. http:\/\/www.pewinternet.org\/2012\/02\/24\/privacy-management-on-social-media-sites\/"},{"key":"28_CR45","doi-asserted-by":"crossref","unstructured":"Madejski, M., Johnson, M., Bellovin, S.: A study of privacy settings errors in an online social network. In: 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), Lugano, Switzerland, pp. 340\u2013345 (2012)","DOI":"10.1109\/PerComW.2012.6197507"},{"key":"28_CR46","doi-asserted-by":"crossref","DOI":"10.1515\/9780804772891","volume-title":"Privacy in Context: Technology, Policy, and the Integrity of Social Life","author":"H Nissenbaum","year":"2009","unstructured":"Nissenbaum, H.: Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press, Stanford (2009)"},{"issue":"4","key":"28_CR47","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1162\/DAED_a_00113","volume":"140","author":"Helen Nissenbaum","year":"2011","unstructured":"Nissenbaum, H.: A contextual approach to privacy online. Daedalus 140(4), 32\u201348 (2011). http:\/\/dx.doi.org\/10.1162\/DAED_a_00113","journal-title":"Daedalus"},{"issue":"1","key":"28_CR48","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","volume":"41","author":"PA Norberg","year":"2007","unstructured":"Norberg, P.A., Horne, D.R., Horne, D.A.: The privacy paradox: personal information disclosure intentions versus behaviors. J. Consum. Aff. 41(1), 100\u2013126 (2007)","journal-title":"J. Consum. Aff."},{"key":"28_CR49","doi-asserted-by":"crossref","unstructured":"Olson, J.S., Grudin, J., Horvitz, E.: A study of preferences for sharing and privacy. In: CHI \u201905 Extended Abstracts on Human Factors in Computing Systems, CHI EA 2005, pp. 1985\u20131988. ACM (2005)","DOI":"10.1145\/1056808.1057073"},{"key":"28_CR50","doi-asserted-by":"crossref","unstructured":"Page, X., Kobsa, A., Knijnenburg, B.P.: Don\u2019t disturb my circles! boundary preservation is at the center of location-sharing concerns. In: Proceedings of the Sixth International AAAI Conference on Weblogs and Social Media, pp. 266\u2013273. Dublin, Ireland, May 2012. http:\/\/www.aaai.org\/ocs\/index.php\/ICWSM\/ICWSM12\/paper\/view\/4679","DOI":"10.1609\/icwsm.v6i1.14277"},{"key":"28_CR51","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1016\/j.pmcj.2013.12.004","volume":"12","author":"Gautham Pallapa","year":"2014","unstructured":"Pallapa, G., Das, S.K., Di Francesco, M., Aura, T.: Adaptive and context-aware privacy preservation exploiting user interactions in smart environments. Pervasive Mobile Comput. 12, 232\u2013243 (2014). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1574119213001557","journal-title":"Pervasive and Mobile Computing"},{"key":"28_CR52","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-03168-7_1","volume-title":"Privacy Enhancing Technologies","author":"R Ravichandran","year":"2009","unstructured":"Ravichandran, R., Benisch, M., Kelley, P.G., Sadeh, N.M.: Capturing social networking privacy preferences: In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 1\u201318. Springer, Heidelberg (2009). doi:10.1007\/978-3-642-03168-7_1"},{"key":"28_CR53","unstructured":"Reports, C.: Facebook & your privacy: Who sees the data you share on the biggest social network? (2012). http:\/\/www.consumerreports.org\/cro\/magazine\/2012\/06\/facebook-your-privacy"},{"issue":"6","key":"28_CR54","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/s00779-008-0214-3","volume":"13","author":"N Sadeh","year":"2009","unstructured":"Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M., Rao, J.: Understanding and capturing people\u2019s privacy policies in a mobile social networking application. Pers. Ubiquit. Comput. 13(6), 401\u2013412 (2009)","journal-title":"Pers. Ubiquit. Comput."},{"issue":"1","key":"28_CR55","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1080\/01972240252818207","volume":"18","author":"KB Sheehan","year":"2002","unstructured":"Sheehan, K.B.: Toward a typology of internet users and online privacy concerns. Inf. Soc. 18(1), 21\u201332 (2002)","journal-title":"Inf. Soc."},{"key":"28_CR56","doi-asserted-by":"crossref","unstructured":"Smith, N.C., Goldstein, D.G., Johnson, E.J.: Choice without awareness: ethical and policy implications of defaults. J. Public Policy Mark. 32(2), 159\u2013172 (2013). http:\/\/search.ebscohost.com\/login.aspx?direct=true&db=bth&AN=91886736&site=ehost-live","DOI":"10.1509\/0743-9156-32.2.159"},{"key":"28_CR57","unstructured":"Solove, D.J.: Privacy self-management and the consent dilemma. Harvard Law Rev. 126, 1880\u20131903 (2013). http:\/\/papers.ssrn.com\/abstract=2171018"},{"issue":"4857","key":"28_CR58","doi-asserted-by":"publisher","first-page":"1285","DOI":"10.1126\/science.3287615","volume":"240","author":"JA Swets","year":"1988","unstructured":"Swets, J.A.: Measuring the accuracy of diagnostic systems. Science (New York, N.Y.) 240(4857), 1285\u20131293 (1988)","journal-title":"Science (New York, N.Y.)"},{"key":"28_CR59","doi-asserted-by":"crossref","unstructured":"Tang, K., Hong, J., Siewiorek, D.: The implications of offering more disclosure choices for social location sharing. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2012, pp. 391\u2013394. ACM (2012)","DOI":"10.1145\/2207676.2207730"},{"key":"28_CR60","doi-asserted-by":"crossref","unstructured":"Tang, K., Lin, J., Hong, J., Siewiorek, D., Sadeh, N.: Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing. In: Proceedings of the UbiComp. 2010, Copenhagen, Denmark, pp. 85\u201304 (2010). http:\/\/portal.acm.org\/citation.cfm?doid=1864349.1864363","DOI":"10.1145\/1864349.1864363"},{"key":"28_CR61","unstructured":"Taylor, H.: Most people are \u201cprivacy pragmatists\u201d who, while concerned about privacy, will sometimes trade it off for other benefits. Harris Poll 17(19) (2003)"},{"key":"28_CR62","doi-asserted-by":"crossref","unstructured":"Toch, E., Cranshaw, J., Drielsma, P.H., Tsai, J.Y., Kelley, P.G., Springfield, J., Cranor, L., Hong, J., Sadeh, N.: Empirical models of privacy in location sharing. In: Proceedings of the 12th ACM International Conference on Ubiquitous Computing, Copenhagen, Denmark, pp. 129\u2013138. ACM Press (2010). http:\/\/doi.acm.org\/10.1145\/1864349.1864364","DOI":"10.1145\/1864349.1864364"},{"key":"28_CR63","doi-asserted-by":"crossref","unstructured":"Watson, J., Besmer, A., Lipford, H.R.: +your circles: sharing behavior on google+. In: Proceedings of the 8th Symposium on Usable Privacy and Security. ACM, Pittsburgh (2012). http:\/\/doi.acm.org\/10.1145\/2335356.2335373","DOI":"10.1145\/2335356.2335373"},{"key":"28_CR64","unstructured":"Woodruff, A., Pihur, V., Consolvo, S., Schmidt, L., Brandimarte, L., Acquisti, A.: Would a privacy fundamentalist sell their DNA for $1000.. if nothing bad happened as a result? The Westin categories, behavioral intentions, and consequences. In: Symposium on Usable Privacy and Security (SOUPS) (2014). https:\/\/www.usenix.org\/system\/files\/conference\/soups2014\/soups14-paper-woodruff.pdf"},{"key":"28_CR65","unstructured":"Xu, H., Dinev, T., Smith, H.J., Hart, P.: Examining the formation of individual\u2019s privacy concerns: toward an integrative view. In: ICIS 2008 Proceedings, Paris, France (2008)"},{"key":"28_CR66","unstructured":"Zickuhr, K.: Three-quarters of smartphone owners use location-based services. Technical report, D Pew Research Center (2012). http:\/\/pewinternet.org\/~\/media\/\/Files\/Reports\/2012\/PIP_Location_based_services_2012_Report.pdf"}],"container-title":["Lecture Notes in Computer Science","Social Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47874-6_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T16:23:08Z","timestamp":1712074988000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-47874-6_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319478739","9783319478746"],"references-count":66,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47874-6_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"19 October 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SocInfo","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Social Informatics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bellevue","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 November 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 November 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"socinfo2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}