{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:27:43Z","timestamp":1763202463502},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T00:00:00Z","timestamp":1612915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T00:00:00Z","timestamp":1612915200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s00500-021-05601-y","type":"journal-article","created":{"date-parts":[[2021,2,11]],"date-time":"2021-02-11T07:36:43Z","timestamp":1613029003000},"page":"6083-6100","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Fuzzy-based multiparty privacy management in social media using modified elliptic curve cryptography"],"prefix":"10.1007","volume":"25","author":[{"given":"P.","family":"Jayaprabha","sequence":"first","affiliation":[]},{"given":"K.","family":"Paulose Jacob","sequence":"additional","affiliation":[]},{"given":"K.","family":"Preetha Mathew","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,10]]},"reference":[{"key":"5601_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10674-4","volume-title":"Feature selection and enhanced krill herd algorithm for text document clustering","author":"LMQ Abualigah","year":"2019","unstructured":"Abualigah LMQ (2019) Feature selection and enhanced krill herd algorithm for text document clustering. Springer, Berlin"},{"key":"5601_CR5","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1016\/j.jocs.2017.07.018","volume":"25","author":"LM Abualigah","year":"2018","unstructured":"Abualigah LM, Khader AT, Hanandeh ES (2018) A new feature selection method to improve the document clustering using particle swarm optimization algorithm. Comput Sci 25:456\u2013466","journal-title":"Comput Sci"},{"issue":"11","key":"5601_CR4","doi-asserted-by":"publisher","first-page":"4047","DOI":"10.1007\/s10489-018-1190-6","volume":"48","author":"LM Abualigah","year":"2018","unstructured":"Abualigah LM, Khader AT, Hanandeh ES (2018) Hybrid clustering analysis using improved krill herd algorithm. Appl Intell 48(11):4047\u20134071","journal-title":"Appl Intell"},{"key":"5601_CR6","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.jebo.2019.02.026","volume":"160","author":"A Antoci","year":"2019","unstructured":"Antoci A, Bonelli L, Paglieri F, Reggiani T, Sabatini F (2019) Civility and trust in social media. J Econ Behav Organ 160:83\u201399","journal-title":"J Econ Behav Organ"},{"key":"5601_CR7","doi-asserted-by":"crossref","unstructured":"B\u00f6rekci R, Aydin S (2019) Foreign language teachers\u2019 interactions with their students on Facebook. Comput Assist Lang Learn 1\u201323","DOI":"10.1080\/09588221.2018.1557691"},{"key":"5601_CR8","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-981-13-1402-5_8","volume-title":"Data management, analytics and innovation","author":"SS Devi","year":"2019","unstructured":"Devi SS, Indhumathi R (2019) A study on privacy-preserving approaches in online social network for data publishing. Data management, analytics and innovation. Springer, Singapore, pp 99\u2013115"},{"issue":"4","key":"5601_CR9","first-page":"621","volume":"15","author":"M Guerar","year":"2018","unstructured":"Guerar M, Migliardi M, Merlo A, Benmohammed M, Palmieri F, Castiglione A (2018) Using screen brightness to improve security in mobile social network access. IEEE Trans Dependable Secure Comput 15(4):621\u2013632","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"5601_CR10","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1016\/j.chb.2018.03.016","volume":"84","author":"A Heravi","year":"2018","unstructured":"Heravi A, Mubarak S, Choo K-KR (2018) Information privacy in online social networks: uses and gratification perspective. Comput Hum Behav 84:441\u2013459","journal-title":"Comput Hum Behav"},{"key":"5601_CR11","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-030-03937-0_11","volume-title":"Ethical and secure computing","author":"MJ Kizza","year":"2019","unstructured":"Kizza MJ (2019) Ethical, privacy and security issues in the online social network ecosystems. Ethical and secure computing. Springer, Cham, pp 229\u2013257"},{"issue":"2","key":"5601_CR12","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1109\/TDSC.2016.2540637","volume":"15","author":"N Laleh","year":"2018","unstructured":"Laleh N, Carminati B, Ferrari E (2018) Risk assessment in social networks based on user anomalous behaviors. IEEE Trans Dependable Secure Comput 15(2):295\u2013308","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"5601_CR13","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.ins.2016.09.057","volume":"387","author":"F Li","year":"2017","unstructured":"Li F, He Y, Niu B, Li H (2017) Small-world: secure friend matching over physical world and social networks. Inf Sci 387:205\u2013220","journal-title":"Inf Sci"},{"issue":"4","key":"5601_CR14","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1109\/TDSC.2016.2604383","volume":"15","author":"H Li","year":"2018","unstructured":"Li H, Zhu H, Du S, Liang X, Shen XS (2018) Privacy leakage of location sharing in mobile social networks: attacks and defense. IEEE Trans Dependable Secure Comput 15(4):646\u2013660","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"5601_CR15","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.future.2016.09.013","volume":"68","author":"E Luo","year":"2017","unstructured":"Luo E, Liu Q, Abawajy JH, Wang G (2017) Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks. Future Gener Comput Syst 68:222\u2013233","journal-title":"Future Gener Comput Syst"},{"key":"5601_CR16","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1016\/j.future.2016.11.029","volume":"86","author":"K Muhammad","year":"2018","unstructured":"Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2018) Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Future Gener Comput Syst 86:951\u2013960","journal-title":"Future Gener Comput Syst"},{"key":"5601_CR17","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1016\/j.jbusres.2018.05.005","volume":"94","author":"TM Nisar","year":"2019","unstructured":"Nisar TM, Prabhakar G, Strakova L (2019) Social media information benefits, knowledge management and smart organizations. J Bus Res 94:264\u2013272","journal-title":"J Bus Res"},{"issue":"2","key":"5601_CR18","first-page":"105","volume":"59","author":"B Osatuyi","year":"2019","unstructured":"Osatuyi B, Hiltz SR (2019) The impact of cross-addiction on information sharing behaviors on social networking sites. J Comput Inf Syst 59(2):105\u2013115","journal-title":"J Comput Inf Syst"},{"issue":"3","key":"5601_CR19","first-page":"94","volume":"10","author":"KF Priya","year":"2019","unstructured":"Priya KF, Patil N (2019) Resolving privacy conflict for maintaining privacy policies in online social networks. Int J Comput Eng Technol 10(3):94\u2013101","journal-title":"Int J Comput Eng Technol"},{"key":"5601_CR20","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1016\/j.asoc.2017.09.032","volume":"67","author":"S Rathore","year":"2018","unstructured":"Rathore S, Loia V, Park JH (2018) SpamSpotter: an efficient spammer detection framework based on intelligent decision support system on facebook. Appl Soft Comput 67:920\u2013932","journal-title":"Appl Soft Comput"},{"key":"5601_CR21","doi-asserted-by":"crossref","unstructured":"Ruas HBP, Machado AD, Silva MC, Meireles MRG, Cardoso AMP, Z\u00e1rate LE, Nobre CN (2019) Identification and characterisation of Facebook user profiles considering interaction aspects. Behav Inform Technol 1\u201315","DOI":"10.1080\/0144929X.2019.1566498"},{"issue":"8","key":"5601_CR22","doi-asserted-by":"publisher","first-page":"3596","DOI":"10.1007\/s11227-016-1790-z","volume":"74","author":"M Salehan","year":"2018","unstructured":"Salehan M, Kim DJ, Koo C (2018) A study of the effect of social trust, trust in social networking services, and sharing attitude, on two dimensions of personal information sharing behavior. J Supercomput 74(8):3596\u20133619","journal-title":"J Supercomput"},{"key":"5601_CR23","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.jretconser.2017.11.001","volume":"46","author":"AM Shareef","year":"2019","unstructured":"Shareef AM, Mukerji B, Dwivedi YK, Rana NP, Islam R (2019) Social media marketing: comparative effect of advertisement sources. J Retail Consumer Serv 46:58\u201369","journal-title":"J Retail Consumer Serv"},{"issue":"1","key":"5601_CR24","doi-asserted-by":"publisher","first-page":"e79","DOI":"10.1111\/jar.12321","volume":"31","author":"C-N Shpigelman","year":"2018","unstructured":"Shpigelman C-N (2018) Leveraging social capital of individuals with intellectual disabilities through participation on Facebook. J Appl Res Intellect Disabil 31(1):e79\u2013e91","journal-title":"J Appl Res Intellect Disabil"},{"key":"5601_CR25","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-981-10-6710-5_9","volume-title":"New media and Chinese Society","author":"X Song","year":"2017","unstructured":"Song X, Zhou M (2017) Challenges to China\u2019s diplomacy in the context of new media. New media and Chinese Society. Springer, Singapore, pp 149\u2013164"},{"issue":"7","key":"5601_CR26","doi-asserted-by":"publisher","first-page":"1851","DOI":"10.1109\/TKDE.2016.2539165","volume":"28","author":"JM Such","year":"2016","unstructured":"Such JM, Criado N (2016) Resolving multi-party privacy conflicts in social media. IEEE Trans Knowl Data Eng 28(7):1851\u20131863","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"5601_CR27","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.comcom.2017.10.007","volume":"119","author":"Y Tian","year":"2018","unstructured":"Tian Y, Li X, Sangaiah AK, Ngai E, Song Z, Zhang L, Wang W (2018) Privacy-preserving scheme in social participatory sensing based on secure multi-party cooperation. Comput Commun 119:167\u2013178","journal-title":"Comput Commun"},{"key":"5601_CR28","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1016\/j.future.2017.08.002","volume":"87","author":"S Wang","year":"2018","unstructured":"Wang S, Sinnott R, Nepal S (2018) Privacy-protected statistics publication over social media user trajectory streams. Future Gener Comput Syst 87:792\u2013802","journal-title":"Future Gener Comput Syst"},{"key":"5601_CR29","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.ins.2018.07.016","volume":"470","author":"H Wang","year":"2019","unstructured":"Wang H, He D, Yu J (2019) Privacy-preserving incentive and rewarding scheme for crowd computing in social media. Inf Sci 470:15\u201327","journal-title":"Inf Sci"},{"issue":"9","key":"5601_CR30","doi-asserted-by":"publisher","first-page":"11241","DOI":"10.1007\/s11042-017-5502-3","volume":"77","author":"F Yu","year":"2018","unstructured":"Yu F, Chen M, Yu B, Li W, Ma L, Gao H (2018) Privacy preservation based on clustering perturbation algorithm for social network. Multimed Tools Appl 77(9):11241\u201311258","journal-title":"Multimed Tools Appl"},{"key":"5601_CR31","doi-asserted-by":"publisher","first-page":"914","DOI":"10.1016\/j.future.2016.10.007","volume":"86","author":"Z Zhang","year":"2018","unstructured":"Zhang Z, Gupta BB (2018) Social media security and trustworthiness: overview and new direction. Future Gener Comput Syst 86:914\u2013925","journal-title":"Future Gener Comput Syst"},{"key":"5601_CR32","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.comnet.2015.12.022","volume":"101","author":"B Zhang","year":"2016","unstructured":"Zhang B, Liu CH, Lu J, Song Z, Ren Z, Ma J, Wang W (2016) Privacy-preserving QoI-aware participant coordination for mobile crowdsourcing. Comput Netw 101:29\u201341","journal-title":"Comput Netw"},{"key":"5601_CR33","doi-asserted-by":"crossref","unstructured":"Zhang S, Kwok RC-W, Lowry PB, Liu Z, Wu J (2019) The influence of role stress on self-disclosure on social networking sites: a conservation of resources perspective. Inform Manag","DOI":"10.1016\/j.im.2019.02.002"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-021-05601-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-021-05601-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-021-05601-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T19:53:59Z","timestamp":1619294039000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-021-05601-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,10]]},"references-count":31,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["5601"],"URL":"https:\/\/doi.org\/10.1007\/s00500-021-05601-y","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,10]]},"assertion":[{"value":"10 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"All authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}