{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:43:30Z","timestamp":1743032610480,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":68,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819951765"},{"type":"electronic","value":"9789819951772"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-5177-2_12","type":"book-chapter","created":{"date-parts":[[2023,8,2]],"date-time":"2023-08-02T23:02:34Z","timestamp":1691017354000},"page":"203-223","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Detection of\u00a0Privacy-Harming Social Media Posts in\u00a0Italian"],"prefix":"10.1007","author":[{"given":"Federico","family":"Peiretti","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5145-3438","authenticated-orcid":false,"given":"Ruggero G.","family":"Pensa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,3]]},"reference":[{"key":"12_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.112851","volume":"139","author":"Z Ahmad","year":"2020","unstructured":"Ahmad, Z., Jindal, R., Ekbal, A., Bhattachharyya, P.: Borrow from rich cousin: transfer learning for emotion detection using cross lingual embedding. Expert Syst. Appl. 139, 112851 (2020)","journal-title":"Expert Syst. Appl."},{"key":"12_CR2","doi-asserted-by":"publisher","first-page":"143631","DOI":"10.1109\/ACCESS.2019.2944723","volume":"7","author":"J Alemany","year":"2019","unstructured":"Alemany, J., del Val Noguera, E., Alberola, J.M., Garc\u00eda-Fornes, A.: Metrics for privacy assessment when sharing information in online social networks. IEEE Access 7, 143631\u2013143645 (2019)","journal-title":"IEEE Access"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1162\/tacl_a_00288","volume":"7","author":"M Artetxe","year":"2019","unstructured":"Artetxe, M., Schwenk, H.: Massively multilingual sentence embeddings for zero-shot cross-lingual transfer and beyond. Trans. Assoc. Comput. Linguist. 7, 597\u2013610 (2019)","journal-title":"Trans. Assoc. Comput. Linguist."},{"issue":"2","key":"12_CR4","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/j.adolescence.2011.08.002","volume":"35","author":"R Baiocco","year":"2012","unstructured":"Baiocco, R., Laghi, F., Di Pomponio, I., Nigito, C.S.: Self-disclosure to the best friend: friendship quality and internalized sexual stigma in Italian lesbian and gay adolescents. J. Adolesc. 35(2), 381\u2013387 (2012)","journal-title":"J. Adolesc."},{"issue":"3","key":"12_CR5","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1089\/cpb.2006.9938","volume":"10","author":"A Barak","year":"2007","unstructured":"Barak, A., Gluck-Ofri, O.: Degree and reciprocity of self-disclosure in online forums. Cyberpsychol. Behav. Soc. Netw. 10(3), 407\u2013417 (2007)","journal-title":"Cyberpsychol. Behav. Soc. Netw."},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Barbieri, F., Basile, V., Croce, D., Nissim, M., Novielli, N., Patti, V.: Overview of the evalita 2016 sentiment polarity classification task. In: Proceedings of CLiC-it 2016 & EVALITA 2016. CEUR-WS.org (2016)","DOI":"10.4000\/books.aaccademia.1992"},{"issue":"7","key":"12_CR7","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1016\/j.tele.2017.04.013","volume":"34","author":"S Barth","year":"2017","unstructured":"Barth, S., de Jong, M.D.T.: The privacy paradox - investigating discrepancies between expressed privacy concerns and actual online behavior - a systematic literature review. Telemat. Inform. 34(7), 1038\u20131058 (2017)","journal-title":"Telemat. Inform."},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-030-44584-3_6","volume-title":"Advances in Intelligent Data Analysis XVIII","author":"E Battaglia","year":"2020","unstructured":"Battaglia, E., Bioglio, L., Pensa, R.G.: Towards content sensitivity analysis. In: Berthold, M.R., Feelders, A., Krempl, G. (eds.) IDA 2020. LNCS, vol. 12080, pp. 67\u201379. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-44584-3_6"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Baziotis, C., Pelekis, N., Doulkeridis, C.: DataStories at SemEval-2017 task 4: deep LSTM with attention for message-level and topic-based sentiment analysis. In: Proceedings of SemEval-2017, pp. 747\u2013754. ACL (2017)","DOI":"10.18653\/v1\/S17-2126"},{"key":"12_CR10","unstructured":"Bianchi, F., Nozza, D., Hovy, D.: FEEL-IT: emotion and sentiment classification for the Italian language. In: Proceedings of WASSA@EACL 2021, pp. 76\u201383. ACL (2021)"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Biega, J.A., Gummadi, K.P., Mele, I., Milchevski, D., Tryfonopoulos, C., Weikum, G.: R-susceptibility: an IR-centric approach to assessing privacy risks for users in online communities. In: Proceedings of ACM SIGIR 2016, pp. 365\u2013374 (2016)","DOI":"10.1145\/2911451.2911533"},{"issue":"1","key":"12_CR12","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1140\/epjds\/s13688-022-00324-y","volume":"11","author":"L Bioglio","year":"2022","unstructured":"Bioglio, L., Pensa, R.G.: Analysis and classification of privacy-sensitive content in social media posts. EPJ Data Sci. 11(1), 12 (2022)","journal-title":"EPJ Data Sci."},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Blanco-Herrero, D., Rodr\u00edguez-Contreras, L.: The risks of new technologies in black mirror: a content analysis of the depiction of our current socio-technological reality in a TV series. In: Gonz\u00e1lez, M.\u00c1.C., Rodr\u00edguez-Sedano, F.J., Llamas, C.F., Garc\u00eda-Pe\u00f1alvo, F.J. (eds.) Proceedings of the Seventh International Conference on Technological Ecosystems for Enhancing Multiculturality, TEEM 2019, Le\u00f3n Spain, October 2019, pp. 899\u2013905. ACM (2019)","DOI":"10.1145\/3362789.3362844"},{"issue":"1","key":"12_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2022.103118","volume":"60","author":"C Bosco","year":"2023","unstructured":"Bosco, C., Patti, V., Frenda, S., Cignarella, A.T., Paciello, M., D\u2019Errico, F.: Detecting racial stereotypes: an Italian social media corpus where psychology meets NLP. Inf. Process. Manag. 60(1), 103118 (2023)","journal-title":"Inf. Process. Manag."},{"key":"12_CR15","unstructured":"Bradbury, J., Merity, S., Xiong, C., Socher, R.: Quasi-recurrent neural networks. In: Proceedings of ICLR 2017. OpenReview.net (2017)"},{"key":"12_CR16","unstructured":"Celli, F., Pianesi, F., Stillwell, D., Kosinski, M.: Workshop on computational personality recognition: shared task. In: Proceedings of ICWSM 2013 (2013)"},{"key":"12_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12864-019-6413-7","volume":"21","author":"D Chicco","year":"2020","unstructured":"Chicco, D., Jurman, G.: The advantages of the Matthews correlation coefficient (MCC) over F1 score and accuracy in binary classification evaluation. BMC Genomics 21, 1\u201313 (2020)","journal-title":"BMC Genomics"},{"key":"12_CR18","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.chb.2017.12.001","volume":"81","author":"H Choi","year":"2018","unstructured":"Choi, H., Park, J., Jung, Y.: The role of privacy fatigue in online privacy behavior. Comput. Hum. Behav. 81, 42\u201351 (2018)","journal-title":"Comput. Hum. Behav."},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Choi, H., Kim, J., Joe, S., Min, S., Gwon, Y.: Analyzing zero-shot cross-lingual transfer in supervised NLP tasks. In: 2020 25th International Conference on Pattern Recognition (ICPR), pp. 9608\u20139613. IEEE (2021)","DOI":"10.1109\/ICPR48806.2021.9412570"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Conneau, A., et al.: Unsupervised cross-lingual representation learning at scale. arXiv preprint arXiv:1911.02116 (2019)","DOI":"10.18653\/v1\/2020.acl-main.747"},{"key":"12_CR21","unstructured":"Conneau, A., Lample, G.: Cross-lingual language model pretraining. In: Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, 8\u201314 December 2019, Vancouver, BC, Canada, pp. 7057\u20137067 (2019)"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Correa, D., Silva, L.A., Mondal, M., Benevenuto, F., Gummadi, K.P.: The many shades of anonymity: characterizing anonymous social media content. In: Proceedings of ICWSM 2015, pp. 71\u201380 (2015)","DOI":"10.1609\/icwsm.v9i1.14635"},{"key":"12_CR23","doi-asserted-by":"publisher","first-page":"2366","DOI":"10.1007\/s12144-018-0003-8","volume":"39","author":"M Danet","year":"2018","unstructured":"Danet, M., Miljkovitch, R., Deborde, A.S.: Online self-disclosure: validation study of the French version of the real me on the net questionnaire. Curr. Psychol. 39, 2366\u20132370 (2018)","journal-title":"Curr. Psychol."},{"key":"12_CR24","unstructured":"Devlin, J., Chang, M.W., Lee, K., Toutanova, K.: Bert: pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)"},{"key":"12_CR25","unstructured":"Dong, X., de Melo, G.: Cross-lingual propagation for deep sentiment analysis. In: McIlraith, S.A., Weinberger, K.Q. (eds.) Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, (AAAI-18), the 30th innovative Applications of Artificial Intelligence (IAAI-18), and the 8th AAAI Symposium on Educational Advances in Artificial Intelligence (EAAI-18), New Orleans, Louisiana, USA, 2\u20137 February 2018, pp. 5771\u20135778. AAAI Press (2018)"},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Eisenschlos, J., Ruder, S., Czapla, P., Kardas, M., Gugger, S., Howard, J.: MultiFiT: efficient multi-lingual language model fine-tuning. In: Proceedings of EMNLP-IJCNLP 2019, pp. 5701\u20135706. ACL (2019)","DOI":"10.18653\/v1\/D19-1572"},{"key":"12_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.chb.2015.06.039","volume":"53","author":"M El Ouirdi","year":"2015","unstructured":"El Ouirdi, M., Segers, J., El Ouirdi, A., Pais, I.: Predictors of job seekers\u2019 self-disclosure on social media. Comput. Hum. Behav. 53, 1\u201312 (2015)","journal-title":"Comput. Hum. Behav."},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"Gill, A.J., Vasalou, A., Papoutsi, C., Joinson, A.N.: Privacy dictionary: a linguistic taxonomy of privacy for content analysis. In: Proceedings of ACM CHI 2011, pp. 3227\u20133236 (2011)","DOI":"10.1145\/1978942.1979421"},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"Howard, J., Ruder, S.: Universal language model fine-tuning for text classification. In: Proceedings of ACL 2018, pp. 328\u2013339. ACL (2018)","DOI":"10.18653\/v1\/P18-1031"},{"key":"12_CR30","doi-asserted-by":"crossref","unstructured":"Jaidka, K., Guntuku, S., Ungar, L.: Facebook versus twitter: differences in self-disclosure and trait prediction. In: Proceedings of ICWSM 2018, pp. 141\u2013150. AAAI Press (2018)","DOI":"10.1609\/icwsm.v12i1.15026"},{"key":"12_CR31","unstructured":"Jaidka, K., Singh, I., Liu, J., Chhaya, N., Ungar, L.: A report of the CL-Aff OffMyChest shared task: modeling supportiveness and disclosure. In: Proceedings of AffCon@AAAI 2020, pp. 118\u2013129. CEUR-WS.org (2020)"},{"key":"12_CR32","volume-title":"Self-Disclosure: An Experimental Analysis of the Transparent Self","author":"SM Jourard","year":"1971","unstructured":"Jourard, S.M.: Self-Disclosure: An Experimental Analysis of the Transparent Self. Wiley, Hoboken (1971)"},{"issue":"15","key":"12_CR33","doi-asserted-by":"publisher","first-page":"5802","DOI":"10.1073\/pnas.1218772110","volume":"110","author":"M Kosinski","year":"2013","unstructured":"Kosinski, M., Stillwell, D., Graepel, T.: Private traits and attributes are predictable from digital records of human behavior. PNAS 110(15), 5802\u20135805 (2013)","journal-title":"PNAS"},{"key":"12_CR34","doi-asserted-by":"crossref","unstructured":"Lewis, M., et al.: BART: denoising sequence-to-sequence pre-training for natural language generation, translation, and comprehension. In: Proceedings of ACL 2020, pp. 7871\u20137880. ACL (2020)","DOI":"10.18653\/v1\/2020.acl-main.703"},{"key":"12_CR35","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.chb.2014.06.003","volume":"38","author":"D Liu","year":"2014","unstructured":"Liu, D., Brown, B.B.: Self-disclosure on social networking sites, positive feedback, and social capital among Chinese college students. Comput. Hum. Behav. 38, 213\u2013219 (2014)","journal-title":"Comput. Hum. Behav."},{"key":"12_CR36","doi-asserted-by":"crossref","unstructured":"Liu, K., Terzi, E.: A framework for computing the privacy scores of users in online social networks. TKDD 5(1), 6:1\u20136:30 (2010)","DOI":"10.1145\/1870096.1870102"},{"key":"12_CR37","doi-asserted-by":"publisher","first-page":"726","DOI":"10.1162\/tacl_a_00343","volume":"8","author":"Y Liu","year":"2020","unstructured":"Liu, Y., et al.: Multilingual denoising pre-training for neural machine translation. Trans. Assoc. Comput. Linguist. 8, 726\u2013742 (2020)","journal-title":"Trans. Assoc. Comput. Linguist."},{"key":"12_CR38","unstructured":"Loshchilov, I., Hutter, F.: Decoupled weight decay regularization. In: Proceedings of ICLR 2019. OpenReview.net (2019)"},{"key":"12_CR39","doi-asserted-by":"crossref","unstructured":"Ma, X., Hancock, J.T., Naaman, M.: Anonymity, intimacy and self-disclosure in social media. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, San Jose, CA, USA, 7\u201312 May 2016, pp. 3857\u20133869. ACM (2016)","DOI":"10.1145\/2858036.2858414"},{"key":"12_CR40","doi-asserted-by":"crossref","unstructured":"Mondal, M., Correa, D., Benevenuto, F.: Anonymity effects: a large-scale dataset from an anonymous social media platform. In: Gadiraju, U. (ed.) Proceedings of ACM HT 2020, Virtual Event, USA, 13\u201315 July 2020, pp. 69\u201374. ACM (2020)","DOI":"10.1145\/3372923.3404792"},{"key":"12_CR41","doi-asserted-by":"crossref","unstructured":"Oukemeni, S., Rif\u00e0-Pous, H., i Puig, J.M.M.: IPAM: information privacy assessment metric in microblogging online social networks. IEEE Access 7, 114817\u2013114836 (2019)","DOI":"10.1109\/ACCESS.2019.2932899"},{"key":"12_CR42","doi-asserted-by":"crossref","unstructured":"Oukemeni, S., Rif\u00e0-Pous, H., i Puig, J.M.M.: Privacy analysis on microblogging online social networks: a survey. ACM Comput. Surv. 52(3), 60:1\u201360:36 (2019)","DOI":"10.1145\/3321481"},{"key":"12_CR43","unstructured":"Pan, X., Wang, M., Wu, L., Li, L.: Contrastive learning for many-to-many multilingual neural machine translation. In: Proceedings of ACL\/IJCNLP 2021, pp. 244\u2013258. ACL (2021)"},{"key":"12_CR44","unstructured":"Parisi, L., Francia, S., Magnani, P.: Umberto: an Italian language model trained with whole word masking (2020). https:\/\/github.com\/musixmatchresearch\/umberto"},{"key":"12_CR45","doi-asserted-by":"crossref","unstructured":"Peddinti, S.T., Korolova, A., Bursztein, E., Sampemane, G.: Cloak and swagger: understanding data sensitivity through the lens of user anonymity. In: Proceedings of IEEE SP 2014, pp. 493\u2013508 (2014)","DOI":"10.1109\/SP.2014.38"},{"issue":"3","key":"12_CR46","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MSP.2017.74","volume":"15","author":"ST Peddinti","year":"2017","unstructured":"Peddinti, S.T., Ross, K.W., Cappos, J.: User anonymity on Twitter. IEEE Secur. Priv. 15(3), 84\u201387 (2017)","journal-title":"IEEE Secur. Priv."},{"key":"12_CR47","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.eswa.2017.05.054","volume":"86","author":"RG Pensa","year":"2017","unstructured":"Pensa, R.G., Di Blasi, G.: A privacy self-assessment framework for online social networks. Expert Syst. Appl. 86, 18\u201331 (2017)","journal-title":"Expert Syst. Appl."},{"key":"12_CR48","doi-asserted-by":"crossref","unstructured":"Pensa, R.G., Di Blasi, G., Bioglio, L.: Network-aware privacy risk estimation in online social networks. Social Netw. Analys. Mining 9(1), 15:1\u201315:15 (2019)","DOI":"10.1007\/s13278-019-0558-x"},{"key":"12_CR49","unstructured":"Polignano, M., Basile, P., De Gemmis, M., Semeraro, G., Basile, V., et al.: Alberto: Italian BERT language understanding model for NLP challenging tasks based on tweets. In: CEUR Workshop Proceedings, vol. 2481, pp. 1\u20136. CEUR (2019)"},{"key":"12_CR50","unstructured":"Ravasio, G., Di Perna, L.: Gilberto: an Italian pretrained language model based on Roberta (2020). https:\/\/github.com\/idb-ita\/GilBERTo"},{"key":"12_CR51","doi-asserted-by":"crossref","unstructured":"Ren, S., Wu, Y., Liu, S., Zhou, M., Ma, S.: Explicit cross-lingual pre-training for unsupervised machine translation. In: Proceedings of EMNLP-IJCNLP 2019, pp. 770\u2013779. ACL (2019)","DOI":"10.18653\/v1\/D19-1071"},{"key":"12_CR52","doi-asserted-by":"crossref","unstructured":"Ruder, S.: Neural transfer learning for natural language processing. Ph.D. thesis, NUI Galway (2019)","DOI":"10.18653\/v1\/N19-5004"},{"key":"12_CR53","unstructured":"Sanguinetti, M., Poletto, F., Bosco, C., Patti, V., Stranisci, M.: An Italian twitter corpus of hate speech against immigrants. In: Proceedings of LREC 2018. ELRA (2018)"},{"key":"12_CR54","unstructured":"Schroepfer, M.: An update on our plans to restrict data access on Facebook (2018). https:\/\/about.fb.com\/news\/2018\/04\/restricting-data-access\/"},{"key":"12_CR55","unstructured":"Smith, L.N.: A disciplined approach to neural network hyper-parameters: part 1 - learning rate, batch size, momentum, and weight decay. CoRR abs\/1803.09820 (2018). http:\/\/arxiv.org\/abs\/1803.09820"},{"key":"12_CR56","doi-asserted-by":"crossref","unstructured":"Tang, D., Chou, T., Drucker, N., Robertson, A., Smith, W.C., Hancock, J.T.: A tale of two languages: strategic self-disclosure via language selection on Facebook. In: Proceedings of ACM CSCW 2011, pp. 387\u2013390. ACM (2011)","DOI":"10.1145\/1958824.1958884"},{"issue":"11","key":"12_CR57","doi-asserted-by":"publisher","first-page":"2095","DOI":"10.1002\/asi.21610","volume":"62","author":"A Vasalou","year":"2011","unstructured":"Vasalou, A., Gill, A.J., Mazanderani, F., Papoutsi, C., Joinson, A.N.: Privacy dictionary: a new resource for the automated content analysis of privacy. JASIST 62(11), 2095\u20132105 (2011)","journal-title":"JASIST"},{"key":"12_CR58","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"key":"12_CR59","doi-asserted-by":"crossref","unstructured":"Vulic, I., Moens, M.: Monolingual and cross-lingual information retrieval models based on (bilingual) word embeddings. In: Proceedings of ACM SIGIR 2015, pp. 363\u2013372. ACM (2015)","DOI":"10.1145\/2766462.2767752"},{"key":"12_CR60","doi-asserted-by":"crossref","unstructured":"Wagner, I., Eckhoff, D.: Technical privacy metrics: a systematic survey. ACM Comput. Surv. 51(3), 57:1\u201357:38 (2018)","DOI":"10.1145\/3168389"},{"issue":"2","key":"12_CR61","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1162\/coli_a_00435","volume":"48","author":"Y Wan","year":"2022","unstructured":"Wan, Y., et al.: Challenges of neural machine translation for short texts. Comput. Linguist. 48(2), 321\u2013342 (2022)","journal-title":"Comput. Linguist."},{"key":"12_CR62","doi-asserted-by":"crossref","unstructured":"Wang, D., Chen, J., Zhou, H., Qiu, X., Li, L.: Contrastive aligned joint learning for multilingual summarization. In: Proceedings of ACL\/IJCNLP 2021, pp. 2739\u20132750. ACL (2021)","DOI":"10.18653\/v1\/2021.findings-acl.242"},{"key":"12_CR63","doi-asserted-by":"crossref","unstructured":"Wang, Y., Burke, M., Kraut, R.E.: Modeling self-disclosure in social networking sites. In: Proceedings of ACM CSCW 2016, pp. 74\u201385. ACM (2016)","DOI":"10.1145\/2818048.2820010"},{"key":"12_CR64","doi-asserted-by":"crossref","unstructured":"Xue, L., et al.: mT5: a massively multilingual pre-trained text-to-text transformer. In: Proceedings of NAACL-HLT 2021, pp. 483\u2013498. ACL (2021)","DOI":"10.18653\/v1\/2021.naacl-main.41"},{"key":"12_CR65","doi-asserted-by":"crossref","unstructured":"Yang, D., Yao, Z., Kraut, R.E.: Self-disclosure and channel difference in online health support groups. In: Proceedings of the Eleventh International Conference on Web and Social Media, ICWSM 2017, Montr\u00e9al, Qu\u00e9bec, Canada, 15\u201318 May 2017, pp. 704\u2013707. AAAI Press (2017)","DOI":"10.1609\/icwsm.v11i1.14935"},{"issue":"5","key":"12_CR66","doi-asserted-by":"publisher","first-page":"1317","DOI":"10.1109\/TIFS.2017.2787986","volume":"13","author":"J Yu","year":"2018","unstructured":"Yu, J., Kuang, Z., Zhang, B., Zhang, W., Lin, D., Fan, J.: Leveraging content sensitiveness and user trustworthiness to recommend fine-grained privacy settings for social image sharing. IEEE Trans. Inf. Forensics Secur. 13(5), 1317\u20131332 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"12_CR67","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1109\/TIFS.2016.2636090","volume":"12","author":"J Yu","year":"2017","unstructured":"Yu, J., Zhang, B., Kuang, Z., Lin, D., Fan, J.: iPrivacy: image privacy protection by identifying sensitive objects via deep multi-task learning. IEEE Trans. Inf. Forensics Secur. 12(5), 1005\u20131016 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"12_CR68","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.chb.2014.12.012","volume":"45","author":"LN Zlatolas","year":"2015","unstructured":"Zlatolas, L.N., Welzer, T., Hericko, M., H\u00f6lbl, M.: Privacy antecedents for SNS self-disclosure: the case of Facebook. Comput. Hum. Behav. 45, 158\u2013167 (2015)","journal-title":"Comput. Hum. Behav."}],"container-title":["Lecture Notes in Computer Science","Security and Privacy in Social Networks and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-5177-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,25]],"date-time":"2024-10-25T15:58:05Z","timestamp":1729871885000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-5177-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819951765","9789819951772"],"references-count":68,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-5177-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"3 August 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SocialSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security and Privacy in Social Networks and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canterbury","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 August 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"socialsec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nss-socialsec2023.cyber.kent.ac.uk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}