{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:00:25Z","timestamp":1776106825166,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642413193","type":"print"},{"value":"9783642413209","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41320-9_9","type":"book-chapter","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T06:08:20Z","timestamp":1380607700000},"page":"131-148","source":"Crossref","is-referenced-by-count":13,"title":["Awareness about Photos on the Web and How Privacy-Privacy-Tradeoffs Could Help"],"prefix":"10.1007","author":[{"given":"Benjamin","family":"Henne","sequence":"first","affiliation":[]},{"given":"Matthew","family":"Smith","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Ahern, S., Eckles, D., Good, N., King, S., Naaman, M., Nair, R.: Over-exposed? Privacy patterns and considerations in online and mobile photo sharing. In: Proc. SIGCHI Conference on Human Factors in Computing Systems, CHI 2007 (2007)","DOI":"10.1145\/1240624.1240683"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Besmer, A., Lipford, H.R.: Moving beyond untagging: photo privacy in a tagged world. In: Proc. of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2010 (2010)","DOI":"10.1145\/1753326.1753560"},{"key":"9_CR3","unstructured":"Besmer, A., Lipford, H.R.: Privacy Perceptions of Photo Sharing in Facebook. In: Proc. of the Fourth Symposium on Usable Privacy and Security, SOUPS 2008 (2008)"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Fisher, D., Dorner, L., Wagner, D.: Short paper: location privacy: user behavior in the field. In: Proc. of the 2nd ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2012 (2012)","DOI":"10.1145\/2381934.2381945"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Henne, B., Szongott, C., Smith, M.: Snapme if you can: Privacy threats of other peoples\u2019 geo-tagged media and what we can do about it. In: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec) (April 2013)","DOI":"10.1145\/2462096.2462113"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Johnson, M., Egelman, S., Bellovin, S.M.: Facebook and privacy: it\u2019s complicated. In: Proc. of the 8th Symposium on Usable Privacy and Security, SOUPS 2012 (2012)","DOI":"10.1145\/2335356.2335369"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Klemperer, P., Liang, Y., Mazurek, M., Sleeper, M., Ur, B., Bauer, L., Cranor, L.F., Gupta, N., Reiter, M.: Tag, you can see it!: using tags for access control in photo sharing. In: Proc. of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2012 (2012)","DOI":"10.1145\/2207676.2207728"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Krumm, J.: A survey of computational location privacy. Personal and Ubiquitous Computing\u00a013(6) (August 2009)","DOI":"10.1007\/s00779-008-0212-5"},{"key":"9_CR9","unstructured":"Kumaraguru, P., Cranor, L.F.: Privacy Indexes: A Survey of Westin\u2019s Studies. Tech. Rep. CMU-ISRI-05-138, Carnegie Mellon University (2005)"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove, A.: Analyzing Facebook privacy settings: User expectations vs. reality. In: Proc. of the 2011 ACM SIGCOMM Internet Measurement Conference, pp. 61\u201370. ACM (2011)","DOI":"10.1145\/2068816.2068823"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Porter Felt, A., Egelman, S., Wagner, D.: I\u2019ve got 99 problems, but vibration ain\u2019t one: a survey of smartphone users\u2019 concerns. In: Proc. of the 2nd ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2012 (2012)","DOI":"10.1145\/2381934.2381943"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Squicciarini, A., Xu, H., Zhang, X.: CoPE: Enabling collaborative privacy management in online social networks. Journal of the American Society for Information Science and Technology 62(3) (March 2011)","DOI":"10.1002\/asi.21473"},{"issue":"5","key":"9_CR13","doi-asserted-by":"publisher","first-page":"193","DOI":"10.2307\/1321160","volume":"4","author":"S.D. Warren","year":"1890","unstructured":"Warren, S.D., Brandeis, L.D.: The right to privacy. Harward Law Review\u00a04(5), 193\u2013220 (1890)","journal-title":"Harward Law Review"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41320-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T18:49:12Z","timestamp":1558118952000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41320-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642413193","9783642413209"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41320-9_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}