{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T07:27:08Z","timestamp":1770708428414,"version":"3.49.0"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,2,27]],"date-time":"2023-02-27T00:00:00Z","timestamp":1677456000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,2,27]],"date-time":"2023-02-27T00:00:00Z","timestamp":1677456000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":["61872090"],"award-info":[{"award-number":["61872090"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":["62272103"],"award-info":[{"award-number":["62272103"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":["61872086"],"award-info":[{"award-number":["61872086"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":["61972096"],"award-info":[{"award-number":["61972096"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2023,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Information leakage has become an urgent problem in multiple Online Social Networks (OSNs). The interactive communication of users has raised several privacy concerns. However, the current related work on privacy measurement only considers the privacy disclosure of user profile settings, ignoring the importance of profile attributes. To solve the efficient measurement problem, we consider the influence of attribute weight on privacy disclosure scores and propose a privacy measurement method by quantifying users\u2019 privacy disclosure scores in social networks. Through introducing Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS), we propose a Privacy Scores calculation model based on Fuzzy TOPSIS decision method (PSFT), that is more accurate calculate users\u2019 privacy disclosure scores and that can improve users\u2019 privacy awareness in multiple OSNs. Users can reasonably set the attribute file configuration based on privacy scores and attribute weight. We conduct extensive experiments on synthetic data set and real data set. The results of the experiments demonstrate the effectiveness of our model.<\/jats:p>","DOI":"10.1007\/s40747-023-00991-y","type":"journal-article","created":{"date-parts":[[2023,2,27]],"date-time":"2023-02-27T08:03:35Z","timestamp":1677485015000},"page":"6089-6101","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Fuzzy TOPSIS-based privacy measurement in multiple online social networks"],"prefix":"10.1007","volume":"9","author":[{"given":"Lijun","family":"Guo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8612-5984","authenticated-orcid":false,"given":"Zhiqiang","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Mingwei","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Zeshui","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,27]]},"reference":[{"key":"991_CR1","unstructured":"Statista (2019) Number of social media users worldwide from 2010 to 2021. https:\/\/www.statista.com\/statistics\/278414\/number-of-worldwide-social network-users\/"},{"key":"991_CR2","doi-asserted-by":"crossref","unstructured":"Al-Asmari HA, Saleh MS (2019) A conceptual framework for measuring personal privacy risks in Facebook online social network. In: 2019 International conference on computer and information sciences (ICCIS), IEEE, pp 1\u20136","DOI":"10.1109\/ICCISci.2019.8716477"},{"issue":"1","key":"991_CR3","first-page":"11","volume":"1","author":"MM Joe","year":"2014","unstructured":"Joe MM, Ramakrishnan DB (2014) A survey of various security issues in online social networks. Int J Comput Netw Appl 1(1):11\u201314","journal-title":"Int J Comput Netw Appl"},{"issue":"3","key":"991_CR4","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1080\/09540091.2020.1854181","volume":"33","author":"S Zhang","year":"2021","unstructured":"Zhang S, Yao T, Arthur Sandor VK, Weng TH, Liang W, Su J (2021) A novel blockchain-based privacy-preserving framework for online social networks. Connect Sci 33(3):555\u2013575","journal-title":"Connect Sci"},{"issue":"102157","key":"991_CR5","first-page":"1","volume":"102","author":"Y Wu","year":"2021","unstructured":"Wu Y, Pan L (2021) SG-PAC: a stochastic game approach to generate personal privacy paradox access-control policies in social networks. Comput Secur 102(102157):1\u201317","journal-title":"Comput Secur"},{"key":"991_CR6","doi-asserted-by":"crossref","unstructured":"Mitchell D, El-Gayar OF (2020) The effect of privacy policies on information sharing behavior on social networks: a systematic literature review. In: Proceedings of the 53rd Hawaii international conference on system sciences, pp 4223\u20134230","DOI":"10.24251\/HICSS.2020.517"},{"issue":"102606","key":"991_CR7","first-page":"1","volume":"114","author":"X Lin","year":"2022","unstructured":"Lin X, Liu H, Li Z, Xiong G, Gou G (2022) Privacy protection of Chinas top websites: a multi-layer privacy measurement via network behaviours and privacy policies. Comput Secur 114(102606):1\u201320","journal-title":"Comput Secur"},{"key":"991_CR8","first-page":"88","volume":"2","author":"D Bui","year":"2021","unstructured":"Bui D, Shin KG, Choi JM, Shin J (2021) Automated extraction and presentation of data practices in privacy policies. Proc Priv Enhanc Technol 2:88\u2013110","journal-title":"Proc Priv Enhanc Technol"},{"key":"991_CR9","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/j.future.2020.01.019","volume":"106","author":"F Amato","year":"2020","unstructured":"Amato F, Coppolino L, D\u2019Antonio S, Mazzocca N, Moscato F, Sgaglione L (2020) An abstract reasoning architecture for privacy policies monitoring. Future Gener Comput Syst 106:393\u2013400","journal-title":"Future Gener Comput Syst"},{"issue":"2","key":"991_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3494067","volume":"55","author":"J Alemany","year":"2022","unstructured":"Alemany J, Val ED, Garc\u0142a-Fornes A (2022) A review of privacy decision-making mechanisms in online social networks. ACM Comput Surv 55(2):1\u201332","journal-title":"ACM Comput Surv"},{"issue":"3","key":"991_CR11","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/TFUZZ.2018.2860967","volume":"27","author":"F Feng","year":"2018","unstructured":"Feng F, Fujita H, Ali MI, Yager R, Liu X (2018) Another view on generalized intuitionistic fuzzy soft sets and related multiattribute decision making methods. IEEE Trans Fuzzy Syst 27(3):474\u2013488","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"4","key":"991_CR12","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1109\/TEM.2019.2918050","volume":"68","author":"ASK Kannan","year":"2019","unstructured":"Kannan ASK, Alias Balamurugan SA, Sasikala S (2019) A novel software package selection method using teaching\u2013learning based optimization and multiple criteria decision making. IEEE Trans Eng Manag 68(4):941\u2013954","journal-title":"IEEE Trans Eng Manag"},{"key":"991_CR13","doi-asserted-by":"publisher","first-page":"200112","DOI":"10.1109\/ACCESS.2020.3034398","volume":"8","author":"B Chen","year":"2020","unstructured":"Chen B, Zhu N, Jingsha HE, He P, Jin S, Pan S (2020) A semantic inference based method for privacy measurement. IEEE Access 8:200112\u2013200128","journal-title":"IEEE Access"},{"issue":"1","key":"991_CR14","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1109\/TDSC.2020.2980271","volume":"19","author":"Y Zhao","year":"2022","unstructured":"Zhao Y, Wagner I (2022) Using metrics suites to improve the measurement of privacy in graphs. IEEE Trans Dependable Secur Comput 19(1):259\u2013274","journal-title":"IEEE Trans Dependable Secur Comput"},{"issue":"1","key":"991_CR15","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MBITS.2021.3108124","volume":"1","author":"H Hsu","year":"2021","unstructured":"Hsu H, Martinez N, Bertran M, Sapiro G, Calmon F (2021) A survey on statistical, information, and estimation-theoretic views on privacy. IEEE BITS Inf Theory Mag 1(1):45\u201356","journal-title":"IEEE BITS Inf Theory Mag"},{"key":"991_CR16","first-page":"5","volume":"2","author":"E Michael","year":"2010","unstructured":"Michael E, Grandison T, Sun T, Richardson D, Guo S, Liu K (2010) Privacy-as-a-service: models, algorithms, and results on the Facebook platform. Proc Web 2:5\u201310","journal-title":"Proc Web"},{"issue":"2","key":"991_CR17","first-page":"117","volume":"2","author":"FB Baker","year":"2014","unstructured":"Baker FB, Kim SH (2014) Item response theory: parameter estimation techniques. Lan Test 2(2):117\u2013126","journal-title":"Lan Test"},{"key":"991_CR18","doi-asserted-by":"crossref","unstructured":"Petkos G, Papadopoulos S, Kompatsiaris Y (2015) PScore: a framework for enhancing privacy awareness in online social networks. In: 2015 10th International conference on availability, reliability and security, pp 592\u2013600","DOI":"10.1109\/ARES.2015.80"},{"issue":"1","key":"991_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1870096.1870102","volume":"5","author":"K Liu","year":"2010","unstructured":"Liu K, Terzi E (2010) A framework for computing the privacy scores of users in online social networks. ACM Trans Knowl Discov Data 5(1):1\u201330","journal-title":"ACM Trans Knowl Discov Data"},{"key":"991_CR20","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.eswa.2017.05.054","volume":"86","author":"RG Pensa","year":"2017","unstructured":"Pensa RG, Di Blasi G (2017) A privacy self-assessment framework for online social networks. Expert Syst Appl 86:18\u201331","journal-title":"Expert Syst Appl"},{"key":"991_CR21","doi-asserted-by":"crossref","unstructured":"Wagner I, Boiten E (2018) Privacy risk assessment: from art to science, by metrics. Data Privacy Management, Cry Bloc Tec 225\u2013241","DOI":"10.1007\/978-3-030-00305-0_17"},{"key":"991_CR22","unstructured":"Bakopoulou E, Shuba A, Markopoulou A (2020) Exposures exposed: a measurement and user study to assess mobile data privacy in context. arXiv preprint arXiv:2008.08973. 1\u201318"},{"key":"991_CR23","doi-asserted-by":"crossref","unstructured":"Srivastava A, Geethakumari G (2013) Measuring privacy leaks in online social networks. In: 2013 International conference on advances in computing, communications and informatics (ICACCI), IEEE, pp 2095\u20132100","DOI":"10.1109\/ICACCI.2013.6637504"},{"key":"991_CR24","volume-title":"Measuring privacy risk in online social networks","author":"JL Becker","year":"2009","unstructured":"Becker JL (2009) Measuring privacy risk in online social networks. University of California, Davis"},{"key":"991_CR25","doi-asserted-by":"crossref","unstructured":"Talukder N, Ouzzani M, Elmagarmid AK, Elmeleegy H (2010) Privometer: privacy protection in social networks. In: 2010 IEEE 26th international conference on data engineering workshops, IEEE, pp 266\u2013269","DOI":"10.1109\/ICDEW.2010.5452715"},{"issue":"3","key":"991_CR26","doi-asserted-by":"publisher","first-page":"1029","DOI":"10.3846\/20294913.2016.1266529","volume":"24","author":"B Zhu","year":"2016","unstructured":"Zhu B, Xu Z (2016) Probability-hesitant fuzzy sets and the representation of preference relations. Technol Econ Dev Econ 24(3):1029\u20131040","journal-title":"Technol Econ Dev Econ"},{"issue":"10","key":"991_CR27","doi-asserted-by":"publisher","first-page":"1790","DOI":"10.3390\/app8101790","volume":"8","author":"X Li","year":"2018","unstructured":"Li X, Yang Y, Chen Y, Niu X (2018) A privacy measurement framework for multiple online social networks against social identity linkage. Appl Sci 8(10):1790","journal-title":"Appl Sci"},{"key":"991_CR28","unstructured":"Li XF (2020) Research on privacy measurement method in social networks. Beijing University of Posts and Telecommunications"},{"key":"991_CR29","doi-asserted-by":"publisher","first-page":"13118","DOI":"10.1109\/ACCESS.2017.2720187","volume":"5","author":"E Aghasian","year":"2017","unstructured":"Aghasian E, Garg S, Gao L, Yu S, Montgomery J (2017) Scoring users privacy disclosure across multiple online social networks. IEEE Access 5:13118\u201313130","journal-title":"IEEE Access"},{"key":"991_CR30","volume-title":"Decision making in the manufacturing environment: using graph theory and fuzzy multiple attribute decision making methods","author":"RV Rao","year":"2007","unstructured":"Rao RV (2007) Decision making in the manufacturing environment: using graph theory and fuzzy multiple attribute decision making methods. Springer, London"},{"key":"991_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/b100605","volume-title":"Multiple criteria decision analysis: state of the art surveys","author":"J Figueira","year":"2005","unstructured":"Figueira J, Greco S, Ehrgott M (2005) Multiple criteria decision analysis: state of the art surveys. Springer Science & Business Media, Berlin"},{"issue":"4","key":"991_CR32","first-page":"287","volume":"404","author":"GH Tzeng","year":"2011","unstructured":"Tzeng GH, Huang JJ (2011) Multiple attributes decision making\u2014methods and applications. Lec Ecos Mathl Syst 404(4):287\u2013288","journal-title":"Lec Ecos Mathl Syst"},{"issue":"3","key":"991_CR33","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"LA Zadeh","year":"1965","unstructured":"Zadeh LA (1965) Fuzzy sets. Inf Control 8(3):338\u2013353","journal-title":"Inf Control"},{"key":"991_CR34","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/j.ins.2020.10.061","volume":"551","author":"MW Lin","year":"2021","unstructured":"Lin MW, Chen ZY, Xu ZS, Gou XJ, Herrera F (2021) Score function based on concentration degree for probabilistic linguistic term sets: an application to TOPSIS and VIKOR. Inf Sci 551:270\u2013290","journal-title":"Inf Sci"},{"issue":"11","key":"991_CR35","doi-asserted-by":"publisher","first-page":"11195","DOI":"10.1109\/JIOT.2020.2997133","volume":"7","author":"MW Lin","year":"2020","unstructured":"Lin MW, Huang C, Xu ZS, Chen RQ (2020) Evaluating IoT platforms using integrated probabilistic linguistic MCDM method. IEEE Internet Things J 7(11):11195\u201311208","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"991_CR36","doi-asserted-by":"publisher","first-page":"2125","DOI":"10.1007\/s11071-019-04910-0","volume":"96","author":"MW Lin","year":"2019","unstructured":"Lin MW, Chen ZY, Liao HC, Xu ZS (2019) ELECTRE II method to deal with probabilistic linguistic term sets and its application to edge computing. Nonlinear Dyn 96(3):2125\u20132143","journal-title":"Nonlinear Dyn"},{"issue":"2","key":"991_CR37","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1057\/s41274-017-0182-y","volume":"69","author":"MW Lin","year":"2018","unstructured":"Lin MW, Xu ZS, Zhai YL, Yao ZQ (2018) Multi-attribute group decision-making under probabilistic uncertain linguistic environment. J Oper Res Soc 69(2):157\u2013170","journal-title":"J Oper Res Soc"},{"issue":"4","key":"991_CR38","doi-asserted-by":"publisher","first-page":"225","DOI":"10.5391\/IJFIS.2016.16.4.225","volume":"16","author":"PS Kumar","year":"2016","unstructured":"Kumar PS (2016) A simple method for solving type-2 and type-4 fuzzy transportation problems. Int J Fuzzy Logic Intell 16(4):225\u2013237","journal-title":"Int J Fuzzy Logic Intell"},{"issue":"4","key":"991_CR39","first-page":"121","volume":"5","author":"PS Kumar","year":"2016","unstructured":"Kumar PS (2016) PSK method for solving type-1 and type-3 fuzzy transportation problems. Int J Fuzzy Syst Appl 5(4):121\u2013146","journal-title":"Int J Fuzzy Syst Appl"},{"issue":"1","key":"991_CR40","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/s13198-014-0334-2","volume":"7","author":"PS Kumar","year":"2016","unstructured":"Kumar PS, Hussain RJ (2016) Computationally simple approach for solving fully intuitionistic fuzzy real life transportation problems. Int J Syst Assur Eng 7(1):90\u2013101","journal-title":"Int J Syst Assur Eng"},{"key":"991_CR41","doi-asserted-by":"publisher","DOI":"10.4018\/ijssci.291715","author":"PS Kumar","year":"2022","unstructured":"Kumar PS (2022) Computationally simple and efficient method for solving real-life mixed intuitionistic fuzzy 3D assignment problems. Int J Softw Sci Comput. https:\/\/doi.org\/10.4018\/ijssci.291715","journal-title":"Int J Softw Sci Comput"},{"issue":"1","key":"991_CR42","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/s13198-019-00941-3","volume":"11","author":"PS Kumar","year":"2020","unstructured":"Kumar PS (2020) Algorithms for solving the optimization problems using fuzzy and intuitionistic fuzzy set. Int J Syst Assur Eng 11(1):189\u2013222","journal-title":"Int J Syst Assur Eng"},{"issue":"4","key":"991_CR43","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1007\/s13198-019-00794-w","volume":"10","author":"PS Kumar","year":"2019","unstructured":"Kumar PS (2019) Intuitionistic fuzzy solid assignment problems: a software-based approach. Int J Syst Assur Eng 10(4):661\u2013675","journal-title":"Int J Syst Assur Eng"},{"key":"991_CR44","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-022-00878-4","author":"TM Al-shami","year":"2022","unstructured":"Al-shami TM (2022) (2,1)-Fuzzy sets: properties, weighted aggregated operators and their applications to multi-criteria decision-making methods. Complex Intell Syst. https:\/\/doi.org\/10.1007\/s40747-022-00878-4","journal-title":"Complex Intell Syst"},{"key":"991_CR45","unstructured":"Leskovec J, Leskovec, Krevl A (2014) SNAP datasets: Stanford large network dataset collection. http:\/\/snap.stanford.edu\/data"},{"key":"991_CR46","doi-asserted-by":"crossref","unstructured":"Li NH, Li TC, Venkata S (2007) t-Closeness: privacy beyond k-anonymity and l-diversity. In: 2007 IEEE 23rd international conference on data engineering, IEEE, pp 106-115","DOI":"10.1109\/ICDE.2007.367856"},{"issue":"11","key":"991_CR47","first-page":"2454","volume":"53","author":"HL Zhang","year":"2016","unstructured":"Zhang HL, Shi YL, Zhang SD, Zhou ZM, Cui LZ (2016) A privacy protection mechanism for dynamic data based on partition-confusion. J Comput Rese Dev 53(11):2454\u20132464","journal-title":"J Comput Rese Dev"},{"key":"991_CR48","doi-asserted-by":"crossref","unstructured":"Jorgensen Z, Yu T, Cormode G (2015) Conservative or liberal? Personalized differential privacy. In: 2015 IEEE 31St international conference on data engineering, IEEE, pp 1023\u20131034","DOI":"10.1109\/ICDE.2015.7113353"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-00991-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-023-00991-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-00991-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T19:11:57Z","timestamp":1698433917000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-023-00991-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,27]]},"references-count":48,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["991"],"URL":"https:\/\/doi.org\/10.1007\/s40747-023-00991-y","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,27]]},"assertion":[{"value":"16 October 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 January 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 February 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}