{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:52:50Z","timestamp":1743087170023,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319672557"},{"type":"electronic","value":"9783319672564"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67256-4_38","type":"book-chapter","created":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T14:45:33Z","timestamp":1504277133000},"page":"477-490","source":"Crossref","is-referenced-by-count":6,"title":["Nudging Nemo: Helping Users Control Linkability Across Social Networks"],"prefix":"10.1007","author":[{"given":"Rishabh","family":"Kaushal","sequence":"first","affiliation":[]},{"given":"Srishti","family":"Chandok","sequence":"additional","affiliation":[]},{"given":"Paridhi","family":"Jain","sequence":"additional","affiliation":[]},{"given":"Prateek","family":"Dewan","sequence":"additional","affiliation":[]},{"given":"Nalin","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Ponnurangam","family":"Kumaraguru","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,2]]},"reference":[{"key":"38_CR1","unstructured":"HootSuite web application, https:\/\/blog.hootsuite.com\/types-of-social-media\/"},{"key":"38_CR2","doi-asserted-by":"crossref","unstructured":"Pew Research Center, Social Media Report, http:\/\/www.pewinternet.org\/2016\/11\/11\/social-media-update-2016\/","DOI":"10.1007\/978-94-6300-702-3_3"},{"key":"38_CR3","unstructured":"Kumaraguru, P., Cranor, L.F.: Privacy indexes: a survey of Westin\u2019s studies. Technical report, Carnegie Mellon University CMU-ISRI-5-138 (2005)"},{"key":"38_CR4","doi-asserted-by":"crossref","unstructured":"Zafarani, R., Liu, H.: Connecting users across social media sites: a behavioral-modeling approach. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM (2013)","DOI":"10.1145\/2487575.2487648"},{"key":"38_CR5","unstructured":"Bartunov, S., et al.: Joint link-attribute user identity resolution in online social networks. In: Proceedings of the 6th International Conference on Knowledge Discovery and Data Mining, Workshop on Social Network Mining and Analysis. ACM (2012)"},{"key":"38_CR6","doi-asserted-by":"crossref","unstructured":"Carmagnola, F., Osborne, F., Torre, I.: User data distributed on the social web: how to identify users on different social systems and collecting data about them. In: Proceedings of the 1st International Workshop on Information Heterogeneity and Fusion in Recommender Systems. ACM (2010)","DOI":"10.1145\/1869446.1869448"},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"Jain, P., Kumaraguru, P., Joshi, A.: @ i seek\u2018fb.me\u2019: identifying users across multiple online social networks. In: Proceedings of the 22nd International Conference on World Wide Web. ACM (2013)","DOI":"10.1145\/2487788.2488160"},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"Jain, P.: Automated methods for identity resolution across heterogeneous social platforms. In: Proceedings of the 26th ACM Conference on Hypertext & Social Media. ACM (2015)","DOI":"10.1145\/2700171.2804448"},{"key":"38_CR9","doi-asserted-by":"crossref","unstructured":"Liu, J., et al.: What\u2019s in a name?: an unsupervised approach to link users across communities. In: Proceedings of the Sixth ACM International Conference on Web Search and Data Mining. ACM (2013)","DOI":"10.1145\/2433396.2433457"},{"key":"38_CR10","doi-asserted-by":"crossref","unstructured":"Goga, O., et al.: Exploiting innocuous activity for correlating users across sites. In: Proceedings of the 22nd International Conference on World Wide Web. ACM (2013)","DOI":"10.1145\/2488388.2488428"},{"key":"38_CR11","doi-asserted-by":"crossref","unstructured":"Lim, B.H., et al.: # mytweet via Instagram: Exploring user behaviour across multiple social networks. In: 2015 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE (2015)","DOI":"10.1145\/2808797.2808820"},{"key":"38_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-319-12844-3_17","volume-title":"Information Retrieval Technology","author":"H Zhang","year":"2014","unstructured":"Zhang, H., Kan, M.-Y., Liu, Y., Ma, S.: Online social network profile linkage. In: Jaafar, A., Mohamad Ali, N., Mohd Noah, S.A., Smeaton, A.F., Bruza, P., Bakar, Z.A., Jamil, N., Sembok, T.M.T. (eds.) AIRS 2014. LNCS, vol. 8870, pp. 197\u2013208. Springer, Cham (2014). doi: 10.1007\/978-3-319-12844-3_17"},{"key":"38_CR13","doi-asserted-by":"crossref","unstructured":"Li, J., Alan Wang, G., Chen, H.: Identity matching using personal and social identity features. Inf. Syst. Front. 13(1), 101\u2013113 (2011)","DOI":"10.1007\/s10796-010-9270-0"},{"key":"38_CR14","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-642-14282-6_4","volume-title":"Privacy and Identity Management for Life","author":"R Leenes","year":"2010","unstructured":"Leenes, R.: Context is everything sociality and privacy in online social network sites. In: Bezzi, M., Duquenoy, P., Fischer-H\u00fcbner, S., Hansen, M., Zhang, G. (eds.) Privacy and Identity 2009. IAICT, vol. 320, pp. 48\u201365. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-14282-6_4"},{"key":"38_CR15","doi-asserted-by":"crossref","unstructured":"Liu, S., et al.: Hydra: large-scale social identity linkage via heterogeneous behavior modeling. In: Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data. ACM (2014)","DOI":"10.1145\/2588555.2588559"},{"key":"38_CR16","doi-asserted-by":"crossref","unstructured":"Wang, Y., et al.: A field trial of privacy nudges for facebook. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM (2014)","DOI":"10.1145\/2556288.2557413"},{"key":"38_CR17","doi-asserted-by":"crossref","unstructured":"Wang, Y., et al.: Privacy nudges for social media: an exploratory Facebook study. In: Proceedings of the 22nd International Conference on World Wide Web. ACM (2013)","DOI":"10.1145\/2487788.2488038"},{"key":"38_CR18","unstructured":"Wang, Y., et al.: From facebook regrets to facebook privacy nudges. Ohio State Law J. 74, 1307 (2013)"},{"key":"38_CR19","doi-asserted-by":"crossref","unstructured":"Wang, Y., et al.: I regretted the minute I pressed share: a qualitative study of regrets on Facebook. In: Proceedings of the Seventh Symposium on Usable Privacy and Security. ACM (2011)","DOI":"10.1145\/2078827.2078841"},{"key":"38_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-319-29883-2_15","volume-title":"Data Privacy Management, and Security Assurance","author":"JH Ziegeldorf","year":"2016","unstructured":"Ziegeldorf, J.H., Henze, M., Hummen, R., Wehrle, K.: Comparison-based privacy: nudging privacy in social media (position paper). In: Garcia-Alfaro, J., Navarro-Arribas, G., Aldini, A., Martinelli, F., Suri, N. (eds.) DPM\/QASA -2015. LNCS, vol. 9481, pp. 226\u2013234. Springer, Cham (2016). doi: 10.1007\/978-3-319-29883-2_15"},{"key":"38_CR21","doi-asserted-by":"crossref","unstructured":"Almuhimedi, H., et al.: Your location has been shared 5,398 times!: a field study on mobile app privacy nudging. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM (2015)","DOI":"10.1145\/2702123.2702210"},{"key":"38_CR22","doi-asserted-by":"crossref","unstructured":"Zhang, B., Xu, H.: Privacy nudges for mobile applications: effects on the creepiness emotion and privacy attitudes. In: Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. ACM (2016)","DOI":"10.1145\/2818048.2820073"},{"key":"38_CR23","unstructured":"Schaub, F., et al.: A design space for effective privacy notices. In: Eleventh Symposium on Usable Privacy and Security (SOUPS 2015). USENIX Association (2015)"},{"key":"38_CR24","doi-asserted-by":"crossref","unstructured":"Acquisti, A., et al.: Nudges for Privacy and Security: Understanding and Assisting Users Choices Online, 25 October 2016. SSRN, https:\/\/ssrn.com\/abstract=2859227","DOI":"10.2139\/ssrn.2859227"}],"container-title":["Lecture Notes in Computer Science","Social Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67256-4_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T22:01:41Z","timestamp":1570053701000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67256-4_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319672557","9783319672564"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67256-4_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}