{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T23:06:48Z","timestamp":1756076808364,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319680583"},{"type":"electronic","value":"9783319680590"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68059-0_48","type":"book-chapter","created":{"date-parts":[[2017,9,20]],"date-time":"2017-09-20T12:54:10Z","timestamp":1505912050000},"page":"445-449","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Fine-Grained Privacy Setting Prediction Using a Privacy Attitude Questionnaire and Machine Learning"],"prefix":"10.1007","author":[{"given":"Frederic","family":"Raber","sequence":"first","affiliation":[]},{"given":"Felix","family":"Kosmalla","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Krueger","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,21]]},"reference":[{"key":"48_CR1","doi-asserted-by":"crossref","unstructured":"Barnes, S.B.: A privacy paradox: social networking in the united states. First Monday 11(9) (2006). http:\/\/firstmonday.org\/ojs\/index.php\/fm\/article\/view\/1394","DOI":"10.5210\/fm.v11i9.1394"},{"key":"48_CR2","doi-asserted-by":"publisher","unstructured":"Fang, L., LeFevre, K.: Privacy wizards for social networking sites. In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, NY, USA, pp. 351\u2013360 (2010). doi:10.1145\/1772690.1772727","DOI":"10.1145\/1772690.1772727"},{"key":"48_CR3","unstructured":"Kumaraguru, P., Cranor, L.F.: Privacy Indexes: A Survey of Westin\u2019s Studies. Technical report CMU-ISRI-5-138, Institute for Software Research International, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, December 2005"},{"key":"48_CR4","doi-asserted-by":"publisher","unstructured":"Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet users\u2019 information privacy concerns (iuipc): the construct, the scale, and a causal model. Info. Sys. Res. 15(4), 336\u2013355 (2004). doi:10.1287\/isre.1040.0032","DOI":"10.1287\/isre.1040.0032"},{"key":"48_CR5","unstructured":"Mondal, M., Liu, Y., Viswanath, B., Gummadi, K.P., Mislove, A.: Understanding and specifying social access control lists. In: Symposium On Usable Privacy and Security (SOUPS 2014), pp. 271\u2013283. USENIX Association, Menlo Park, (July 2014). https:\/\/www.usenix.org\/conference\/soups2014\/proceedings\/presentation\/mondal"},{"key":"48_CR6","doi-asserted-by":"crossref","unstructured":"Shehab, M., Cheek, G., Touati, H., Squicciarini, A., Cheng, P.C.: User centric policy management in online social networks. In: 2010 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), pp. 9\u201313, (July 2010)","DOI":"10.1109\/POLICY.2010.10"},{"key":"48_CR7","doi-asserted-by":"publisher","unstructured":"Shehab, M., Touati, H.: Semi-supervised policy recommendation for online social networks. In: Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), ASONAM 2012, pp. 360\u201336 (2012). doi:10.1109\/ASONAM.2012.66","DOI":"10.1109\/ASONAM.2012.66"},{"key":"48_CR8","doi-asserted-by":"publisher","unstructured":"Sinha, A., Li, Y., Bauer, L.: What you want is not what you get: predicting sharing policies for text-based content on facebook. In: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, AISec 2013, NY, USA, pp. 13\u201324 (2013). doi:10.1145\/2517312.2517317","DOI":"10.1145\/2517312.2517317"},{"key":"48_CR9","unstructured":"Strauss, A., Corbin, J.M.: Basics of Qualitative Research : Techniques and Procedures for Developing Grounded Theory. SAGE Publications, Thousand Oaks (1998). http:\/\/www.amazon.co.uk\/exec\/obidos\/ASIN\/0803959400\/citeulike-21"},{"key":"48_CR10","doi-asserted-by":"publisher","unstructured":"Wisniewski, P., Islam, A.N., Knijnenburg, B.P., Patil, S.: Give social network users the privacy they want. In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work #38; Social Computing, CSCW 2015, NY, USA, pp. 1427\u20131441 (2015). doi:10.1145\/2675133.2675256","DOI":"10.1145\/2675133.2675256"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction \u2013 INTERACT 2017"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68059-0_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,20]],"date-time":"2021-09-20T00:24:37Z","timestamp":1632097477000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-68059-0_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319680583","9783319680590"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68059-0_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"21 September 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INTERACT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bombay","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"interact2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}