{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:55:25Z","timestamp":1725900925225},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642353857"},{"type":"electronic","value":"9783642353864"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35386-4_15","type":"book-chapter","created":{"date-parts":[[2012,11,26]],"date-time":"2012-11-26T08:54:28Z","timestamp":1353920068000},"page":"188-201","source":"Crossref","is-referenced-by-count":8,"title":["C4PS - Helping Facebookers Manage Their Privacy Settings"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Paul","sequence":"first","affiliation":[]},{"given":"Martin","family":"Stopczynski","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Puscher","sequence":"additional","affiliation":[]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[]},{"given":"Thorsten","family":"Strufe","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/11957454_3","volume-title":"Privacy Enhancing Technologies","author":"A. Acquisti","year":"2006","unstructured":"Acquisti, A., Gross, R.: Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol.\u00a04258, pp. 36\u201358. Springer, Heidelberg (2006)"},{"issue":"1","key":"15_CR2","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/MSP.2010.38","volume":"8","author":"A.I. Ant\u00f3n","year":"2010","unstructured":"Ant\u00f3n, A.I., Earp, J.B., Young, J.D.: How Internet Users\u2019 Privacy Concerns Have Evolved since 2002. IEEE Security & Privacy Magazine\u00a08(1), 21\u201327 (2010)","journal-title":"IEEE Security & Privacy Magazine"},{"key":"15_CR3","unstructured":"Balfanz, D., et al.: In Search of Usable Security. IEEE Security & Privacy (2004)"},{"key":"15_CR4","unstructured":"Becker, J., Chen, H.: Measuring privacy risk in online social networks"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In: WWW (2009)","DOI":"10.1145\/1526709.1526784"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Boshmar, Y., et al.: The Socialbot Network: When Bots Socialize for Fame and Money. In: ACSAC (2011)","DOI":"10.1145\/2076732.2076746"},{"key":"15_CR7","unstructured":"Boyd, D., Hargittai, E.: Facebook privacy settings: Who cares? First Monday (Online)"},{"key":"15_CR8","unstructured":"Brooke, J.: SUS - A quick and dirty usability scale. Usability evaluation in industry (1996)"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Buchegger, S., et al.: PeerSoN: P2P Social Networking - Early Experiences and Insights. In: SNS (2009)","DOI":"10.1145\/1578002.1578010"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Castelluccia, C., Kafaar, D.: Owner-Centric Networking: Toward a Data Pollution-Free Internet. In: SAINT (2010)","DOI":"10.1109\/SAINT.2009.34"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Cutillo, L.-A., Molva, R., Strufe, T.: Safebook: a privacy preserving online social network leveraging on real-life trust. IEEE Communications Magazine (2009)","DOI":"10.1109\/MCOM.2009.5350374"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Egelman, S., Oates, A., Krishnamurthi, S.: Oops, i did it again: mitigating repeated access control errors on facebook. In: CHI 2011 (2011)","DOI":"10.1145\/1978942.1979280"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Fang, L., Kim, H., LeFevre, K., Tami, A.: A Privacy Recommendation Wizard for Users of Social Networking Sites. In: CCS (2010)","DOI":"10.1145\/1866307.1866378"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Guha, S., Tang, K., Francis, P.: NOYB: Privacy in Online Social Networks. In: WOSP (2008)","DOI":"10.1145\/1397735.1397747"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social Phishing. Commun. ACM (2007)","DOI":"10.1145\/1290958.1290968"},{"key":"15_CR16","unstructured":"Jahid, S., Nilizadeh, S., Mittal, P., Borisov, N., Kapadia, A.: DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks"},{"key":"15_CR17","unstructured":"Kagal, L., Abelson, H.: Access Control is an Inadequate Framework for Privacy Protection. In: W3C Privacy (2010)"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"King, J., Lampinen, A., Smolen, A.: Privacy: Is There An App for That? In: Symposium on Usable Privacy and Security, SOUPS (2011)","DOI":"10.1145\/2078827.2078843"},{"key":"15_CR19","unstructured":"Krishnamurthy, B., Naryshkin, K.: Privacy leakage vs. Protection measures: the growing disconnect. In: W2SP (May 2011)"},{"key":"15_CR20","unstructured":"Krug, S.: Don\u2019t Make Me Think: A Common Sense Approach to the Web, 2nd edn. New Riders Publishing (2005)"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Lindamood, J., et al.: Inferring Private Information Using Social Network Data. In: WWW (2009)","DOI":"10.1145\/1526709.1526899"},{"key":"15_CR22","unstructured":"Lipford, H.R., Besmer, A., Watson, J.: Understanding Privacy Settings in Facebook with an Audience View. In: UPSEC (2008)"},{"key":"15_CR23","unstructured":"Madejski, M., Johnson, M., Bellovin, S.: The Failure of Online Social Network Privacy Settings. Tech. rep., Columbia University (2011)"},{"key":"15_CR24","doi-asserted-by":"crossref","unstructured":"Mazzia, A., LeFevre, K., Adar, E.: The pviz comprehension tool for social network privacy settings. Tech. rep., University of Michigan (2011)","DOI":"10.1145\/2335356.2335374"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Strufe, T.: Profile Popularity in a Business-oriented Online Social Network. In: EuroSys\/SNS (2010)","DOI":"10.1145\/1852658.1852660"}],"container-title":["Lecture Notes in Computer Science","Social Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35386-4_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,6]],"date-time":"2019-07-06T03:14:53Z","timestamp":1562382893000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35386-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642353857","9783642353864"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35386-4_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}