{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:48:08Z","timestamp":1772041688044,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819635306","type":"print"},{"value":"9789819635313","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-3531-3_13","type":"book-chapter","created":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T12:11:36Z","timestamp":1741867896000},"page":"254-274","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Perceived Privacy Conflicts and Monitoring: A Study of Their Effects on Trust and Data Sharing in Social Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1456-7473","authenticated-orcid":false,"given":"Yazan","family":"Alahmed","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2228-519X","authenticated-orcid":false,"given":"Reema","family":"Abadla","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7849-7932","authenticated-orcid":false,"given":"Mahmoud","family":"Khasawneh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"13_CR1","unstructured":"Shahbaz, A., Funk, A.: Social media surveillance. Freedom House (2019). https:\/\/freedomhouse.org\/report\/freedom-on-the-net\/2019\/the-crisis-of-social-media\/social-media-surveillance"},{"issue":"1","key":"13_CR2","first-page":"41","volume":"49","author":"K-L Hsiao","year":"2012","unstructured":"Hsiao, K.-L., Chiou, J.-S.: The impact of online community position on online community participation: Trust, privacy concern, and social influence. Inf. Manag. 49(1), 41\u201348 (2012)","journal-title":"Inf. Manag."},{"issue":"1","key":"13_CR3","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.intmar.2010.09.002","volume":"25","author":"LI Labrecque","year":"2011","unstructured":"Labrecque, L.I., Markos, E., Milne, G.R.: Online personal branding: processes, challenges, and implications. J. Interact. Mark. 25(1), 37\u201350 (2011)","journal-title":"J. Interact. Mark."},{"key":"13_CR4","unstructured":"Lindner, J.: Alarming social media privacy statistics reflect lack of trust and control - WiFiTalents. In: 9th International Proceedings on Proceedings, pp. 1\u20132 (2024)"},{"key":"13_CR5","unstructured":"Tambl\u00e9, M.: [Infographic] Social Media Statistics 2018. Blog2Social Blog \u2013 Tips for social media marketing (2024). https:\/\/www.blog2social.com\/en\/blog\/infographic-social-media-statistics\/"},{"issue":"1","key":"13_CR6","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1080\/07360932.2013.781517","volume":"44","author":"S Grabner-Kr\u00e4uter","year":"2013","unstructured":"Grabner-Kr\u00e4uter, S., Bitter, S.: Trust in online social networks: a multifaceted perspective. Forum Soc. Econ. 44(1), 48\u201368 (2013). https:\/\/doi.org\/10.1080\/07360932.2013.781517","journal-title":"Forum Soc. Econ."},{"key":"13_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2020.101400","volume":"64","author":"S Khan","year":"2021","unstructured":"Khan, S., Umer, R., Umer, S., Naqvi, S.: Antecedents of trust in using social media for E-government services: ZN empirical study in Pakistan. Technol. Soc. 64, 101400 (2021). https:\/\/doi.org\/10.1016\/j.techsoc.2020.101400","journal-title":"Technol. Soc."},{"key":"13_CR8","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.ijinfomgt.2019.05.014","volume":"50","author":"EW Ayaburi","year":"2020","unstructured":"Ayaburi, E.W., Treku, D.N.: Effect of penitence on social media trust and privacy concerns: the case of Facebook. Int. J. Inf. Manage. 50, 171\u2013181 (2020)","journal-title":"Int. J. Inf. Manage."},{"key":"13_CR9","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.chb.2017.10.007","volume":"78","author":"P van Schaik","year":"2018","unstructured":"van Schaik, P., Jansen, J., Onibokun, J., Camp, J., Kusev, P.: Security and privacy in online social networking: risk perceptions and precautionary behaviour. Comput. Hum. Behav. 78, 283\u2013297 (2018). https:\/\/doi.org\/10.1016\/j.chb.2017.10.007","journal-title":"Comput. Hum. Behav."},{"issue":"3","key":"13_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/0144929x.2020.1831608","volume":"41","author":"Y Li","year":"2020","unstructured":"Li, Y., Rho, E.H.R., Kobsa, A.: Cultural differences in the effects of contextual factors and privacy concerns on users\u2019 privacy decision on social networking sites. Behav. Inf. Technol. 41(3), 1\u201323 (2020). https:\/\/doi.org\/10.1080\/0144929x.2020.1831608","journal-title":"Behav. Inf. Technol."},{"key":"13_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2020.113323","volume":"135","author":"R Mousavi","year":"2020","unstructured":"Mousavi, R., Chen, R., Kim, D.J., Chen, K.: Effectiveness of privacy assurance mechanisms in users\u2019 privacy protection on social networking sites from the perspective of protection motivation theory. Decis. Support. Syst. 135, 113323 (2020). https:\/\/doi.org\/10.1016\/j.dss.2020.113323","journal-title":"Decis. Support. Syst."},{"issue":"1","key":"13_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2019.101413","volume":"37","author":"C Mutimukwe","year":"2019","unstructured":"Mutimukwe, C., Kolkowska, E., Gr\u00f6nlund, \u00c5.: Information privacy in e-service: effect of organizational privacy assurances on individual privacy concerns, perceptions, trust, and self-disclosure behavior. Gov. Inf. Q. 37(1), 101413 (2019). https:\/\/doi.org\/10.1016\/j.giq.2019.101413","journal-title":"Gov. Inf. Q."},{"issue":"1","key":"13_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jjimei.2021.100056","volume":"2","author":"F Kitsios","year":"2022","unstructured":"Kitsios, F., Mitsopoulou, E., Moustaka, E., Kamariotou, M.: User-generated content behavior and digital tourism services: a SEM-neural network model for information trust in social networking sites. Int. J. Inf. Manag. Data Insights 2(1), 100056 (2022). https:\/\/doi.org\/10.1016\/j.jjimei.2021.100056","journal-title":"Int. J. Inf. Manag. Data Insights"},{"key":"13_CR14","unstructured":"Ryan, F., Cruickshank, P., Hall, H., Lawson, A.: Managing and evaluating personal reputations on the basis of information shared on social media: a generation X perspective. Inf. Res. 21(4) (2016). https:\/\/napier-repository.worktribe.com\/output\/305045"},{"key":"13_CR15","unstructured":"Yang, S.: Understanding personal online reputation management: a grounded theory study. Association for information systems AIS electronic library (AISeL) (2015). https:\/\/core.ac.uk\/download\/pdf\/301365271.pdf"},{"key":"13_CR16","doi-asserted-by":"publisher","unstructured":"Portmann, E., Pedrycz, W.: Fuzzy web knowledge aggregation, representation, and reasoning for online privacy and reputation management. Intelligent Systems Reference Library, pp. 89\u2013105. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39739-4_5","DOI":"10.1007\/978-3-642-39739-4_5"},{"key":"13_CR17","doi-asserted-by":"publisher","first-page":"766","DOI":"10.3906\/elk-1110-30","volume":"21","author":"ME Y\u00fcksel","year":"2013","unstructured":"Y\u00fcksel, M.E., Y\u00fcksel, A.S., Zaim, A.H.: A reputation-based privacy management system for social networking sites. Turk. J. Electr. Eng. Comput. Sci. 21, 766\u2013784 (2013). https:\/\/doi.org\/10.3906\/elk-1110-30","journal-title":"Turk. J. Electr. Eng. Comput. Sci."},{"key":"13_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101822","volume":"94","author":"K van der Schyff","year":"2020","unstructured":"van der Schyff, K., Flowerday, S., Furnell, S.: Duplicitous social media and data surveillance: an evaluation of privacy risk. Comput. Secur. 94, 101822 (2020). https:\/\/doi.org\/10.1016\/j.cose.2020.101822","journal-title":"Comput. Secur."},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Odoemelam, C.E.: Adapting to surveillance and privacy issues in the era of technological and social networking. Int. J. Soc. Sci. Humanity 5(6) (2015). https:\/\/www.ijssh.net\/papers\/520-H140.pdf","DOI":"10.7763\/IJSSH.2015.V5.520"},{"key":"13_CR20","unstructured":"Panduranga, H., Mella Pablo, E.: Federal government social media surveillance, Explained | Brennan Center for Justice. Brennan center for justice (2022). https:\/\/www.brennancenter.org\/our-work\/research-reports\/federal-government-social-media-surveillance-explained"},{"key":"13_CR21","unstructured":"Media, S.: Columbia undergraduate law review. Columbia undergraduate law review (2024). https:\/\/www.culawreview.org\/journal\/social-media-surveillance-of-the-black-lives-matter-movement-and-the-right-to-privacy"},{"key":"13_CR22","unstructured":"Human rights watch: Meta\u2019s broken promises. Human rights watch (2023). https:\/\/www.hrw.org\/report\/2023\/12\/21\/metas-broken-promises\/systemic-censorship-palestine-content-instagram-and"},{"key":"13_CR23","doi-asserted-by":"publisher","unstructured":"Ahmed, Y.A., Sharo, A.: On the education effect of CHATGPT: Is AI CHATGPT to dominate education career profession? In: 2023 International Conference on Intelligent Computing, Communication, Networking and Services (ICCNS), Valencia, Spain, 2023, pp. 79\u201384 (2023). https:\/\/doi.org\/10.1109\/ICCNS58795.2023.10192993","DOI":"10.1109\/ICCNS58795.2023.10192993"},{"issue":"6","key":"13_CR24","doi-asserted-by":"publisher","first-page":"688","DOI":"10.1080\/13504630.2017.1291092","volume":"23","author":"S Owen","year":"2017","unstructured":"Owen, S.: Monitoring social media and protest movements: ensuring political order through surveillance and surveillance discourse. Soc. Identities 23(6), 688\u2013700 (2017). https:\/\/doi.org\/10.1080\/13504630.2017.1291092","journal-title":"Soc. Identities"},{"issue":"3","key":"13_CR25","doi-asserted-by":"publisher","first-page":"3034","DOI":"10.15379\/ijmst.v10i3.2953","volume":"10","author":"Y Alahmed","year":"2023","unstructured":"Alahmed, Y., Abadla, R., Ameen, N., Shteiwi, A.: Bridging the gap between ethical AI implementations. Int. J. Membrane Sci. Technol. 10(3), 3034\u20133046 (2023). https:\/\/doi.org\/10.15379\/ijmst.v10i3.2953","journal-title":"Int. J. Membrane Sci. Technol."},{"key":"13_CR26","doi-asserted-by":"publisher","unstructured":"Alahmed, Y., Abadla, R., Badri, A.A., Ameen, N.: How does ChatGPT work\u201d examining functionality to the creative AI CHATGPT on X\u2019s (Twitter) Platform. In: 2023 Tenth International Conference on Social Networks Analysis, Management and Security (SNAMS), Abu Dhabi, United Arab Emirates, 2023, pp. 1\u20137 (2023). https:\/\/doi.org\/10.1109\/SNAMS60348.2023.10375450","DOI":"10.1109\/SNAMS60348.2023.10375450"},{"key":"13_CR27","doi-asserted-by":"publisher","unstructured":"Alahmed, Y., Abadla, R., Ansari, M.J.A.: Exploring the potential implications of AI-generated content in social engineering attacks. In: 2024 International Conference on Multimedia Computing, Networking and Applications (MCNA), Valencia, Spain, pp. 64\u201373 (2024). https:\/\/doi.org\/10.1109\/MCNA63144.2024.10703950","DOI":"10.1109\/MCNA63144.2024.10703950"},{"key":"13_CR28","doi-asserted-by":"publisher","unstructured":"Hesham, H., Al Ahmed, Y., Wael, B., Saleh, M.: Solar-powered smart bin: revolutionizing waste classification for a sustainable future. In: 2023 24th International Arab Conference on Information Technology (ACIT), Ajman, United Arab Emirates, pp. 1\u20138 (2023). https:\/\/doi.org\/10.1109\/ACIT58888.2023.10453850","DOI":"10.1109\/ACIT58888.2023.10453850"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-3531-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T12:11:46Z","timestamp":1741867906000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-3531-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819635306","9789819635313"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-3531-3_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Abu Dhabi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/nss-socialsec2024\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}