{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:28:52Z","timestamp":1725902932615},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319615417"},{"type":"electronic","value":"9783319615424"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61542-4_32","type":"book-chapter","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T04:02:27Z","timestamp":1499140947000},"page":"342-353","source":"Crossref","is-referenced-by-count":1,"title":["Evaluating User Vulnerability to Privacy Disclosures over Online Dating Platforms"],"prefix":"10.1007","author":[{"given":"Mona","family":"Nandwani","sequence":"first","affiliation":[]},{"given":"Rishabh","family":"Kaushal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"issue":"4","key":"32_CR1","first-page":"46","volume":"4","author":"AA Alassiri","year":"2014","unstructured":"Alassiri, A.A., et al.: Usage of social networking sites and technological impact on interaction enabling features. Int. J. Hum. Soc. Sci. 4(4), 46\u201361 (2014)","journal-title":"Int. J. Hum. Soc. Sci."},{"issue":"1","key":"32_CR2","doi-asserted-by":"crossref","first-page":"42","DOI":"10.4018\/ijcbpl.2015010104","volume":"5","author":"S Tait","year":"2015","unstructured":"Tait, S., Jeske, D.: Hello stranger! Trust and self-disclosure effects on online information sharing. Int. J. Cyber Behav. Psychol. Learn. 5(1), 42\u201355 (2015)","journal-title":"Int. J. Cyber Behav. Psychol. Learn."},{"key":"32_CR3","unstructured":"Utz, S., Krmer, N.C.: The privacy paradox on social network sites revisited: the role of individual characteristics and group norms. Cyberpsychol. J. Psychosoc. Res. Cyberspace 3(2) (2015)"},{"issue":"4","key":"32_CR4","doi-asserted-by":"crossref","first-page":"2019","DOI":"10.1109\/COMST.2014.2321628","volume":"16","author":"M Fire","year":"2014","unstructured":"Fire, M., Goldschmidt, R., Elovici, Y.: Online social networks: threats and solutions. IEEE Commun. Surv. Tutor. 16(4), 2019\u20132036 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"7","key":"32_CR5","doi-asserted-by":"crossref","first-page":"1051","DOI":"10.1177\/1461444814543995","volume":"16","author":"AE Marwick","year":"2014","unstructured":"Marwick, A.E., Boyd, D.: Networked privacy: How teenagers negotiate context in social media. New Media Soc. 16(7), 1051\u20131067 (2014)","journal-title":"New Media Soc."},{"issue":"6","key":"32_CR6","first-page":"456","volume":"3","author":"A Algarni","year":"2013","unstructured":"Algarni, A., Yue, X.: Social engineering in social networking sites: phase-based and source-based models. Int. J. e-Education e-Business e-Management e-Learning 3(6), 456 (2013)","journal-title":"Int. J. e-Education e-Business e-Management e-Learning"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Reynolds, B., et al.: Sharing ephemeral information in online social networks: privacy perceptions and behaviours. In: IFIP Conference on Human-Computer Interaction, Heidelberg (2011)","DOI":"10.1007\/978-3-642-23765-2_14"},{"key":"32_CR8","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1177\/0093650210377091","volume":"38","author":"JL Gibbs","year":"2010","unstructured":"Gibbs, J.L., Ellison, N.B., Lai, C.-H.: First comes love, then comes Google: a investigation of uncertainty reduction strategies and self-disclosure in online dating. Commun. Res. 38, 70\u2013100 (2010). Article No. 0093650210377091","journal-title":"Commun. Res."},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Toma, C.L., Hancock, J.T.: Looks and lies: the role of physical attractiveness in online dating self-presentation and deception. Commun. Res. (2010)","DOI":"10.1177\/0093650209356437"},{"key":"32_CR10","doi-asserted-by":"crossref","unstructured":"Young, A.L., Quan-Haase, A.: Information revelation and internet privacy concerns on social network sites: a case study of Facebook. In: Proceedings of the Fourth International Conference on Communities and Technologies. ACM (2009)","DOI":"10.1145\/1556460.1556499"},{"key":"32_CR11","unstructured":"Tuunainen, V.K., Pitknen, O., Hovi, M.: Users\u2019 awareness of privacy on online social networking sites-case Facebook. In: Bled 2009 Proceedings, p. 42 (2009)"},{"issue":"2","key":"32_CR12","first-page":"215","volume":"12","author":"MA Urista","year":"2009","unstructured":"Urista, M.A., Dong, Q., Day, K.D.: Explaining why young adults use MySpace and Facebook through uses and gratifications theory. Hum. Commun. 12(2), 215\u2013229 (2009)","journal-title":"Hum. Commun."},{"issue":"8","key":"32_CR13","doi-asserted-by":"crossref","first-page":"1321","DOI":"10.1002\/asi.20835","volume":"59","author":"M Thelwall","year":"2008","unstructured":"Thelwall, M.: Social networks, gender, and friending: an analysis of MySpace member profiles. J. Am. Soc. Inf. Sci. Technol. 59(8), 1321\u20131330 (2008)","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"Barnes, S.B.: A privacy paradox: social networking in the United States. First Monday 11(9) (2006)","DOI":"10.5210\/fm.v11i9.1394"},{"key":"32_CR15","doi-asserted-by":"crossref","unstructured":"Giani, A., Berk, V.H., Cybenko, G.V.: Data exfiltration and covert channels. In: Defense and Security Symposium. International Society for Optics and Photonics (2006)","DOI":"10.1117\/12.670123"},{"issue":"3","key":"32_CR16","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1016\/0022-1031(66)90087-4","volume":"2","author":"TC Brock","year":"1966","unstructured":"Brock, T.C., Becker, L.A.: Debriefing and susceptibility to subsequent experimental manipulations. J. Exp. Soc. Psychol. 2(3), 314\u2013323 (1966)","journal-title":"J. Exp. Soc. Psychol."}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61542-4_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,28]],"date-time":"2019-09-28T06:55:10Z","timestamp":1569653710000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61542-4_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615417","9783319615424"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61542-4_32","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}