{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T07:26:41Z","timestamp":1742801201310},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2013,8,30]],"date-time":"2013-08-30T00:00:00Z","timestamp":1377820800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1007\/s12243-013-0388-1","type":"journal-article","created":{"date-parts":[[2013,8,29]],"date-time":"2013-08-29T03:27:27Z","timestamp":1377746847000},"page":"37-45","source":"Crossref","is-referenced-by-count":6,"title":["Improving user content privacy on social networks using rights management systems"],"prefix":"10.1007","volume":"69","author":[{"given":"Joaquim","family":"Marques","sequence":"first","affiliation":[]},{"given":"Carlos","family":"Serr\u00e3o","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,8,30]]},"reference":[{"key":"388_CR1","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","volume":"13","author":"M Boyd","year":"2008","unstructured":"Boyd M, Ellison B (2008) Social network sites: definition, history and scholarship. J Comput-Mediated Commun 13:210\u2013230","journal-title":"J Comput-Mediated Commun"},{"key":"388_CR2","unstructured":"Beye M, Jeckmans A, Erkin Z, Hartel P, Lagendijk R, Tang Q (2010) Privacy in online social networks. University of Twente Publications"},{"key":"388_CR3","doi-asserted-by":"crossref","unstructured":"Acquisti A, Gross R (2006) Imagined communities: awareness, information sharing, and privacy on the facebook. In: Proceedings from privacy enhancing technologies workshop, pp 36\u201358","DOI":"10.1007\/11957454_3"},{"key":"388_CR4","volume-title":"Student awareness of the privacy implications when using Facebook","author":"T Govani","year":"2005","unstructured":"Govani T, Pashley H (2005) Student awareness of the privacy implications when using Facebook. EUA: Carnegie Mellon University, Pittsburgh"},{"key":"388_CR5","doi-asserted-by":"crossref","unstructured":"Boyd D, Golder S, Lotan G (2010) Tweet, tweet, retweet: conversational aspects of retweeting on twitter. In: Hawaii international conference on system sciences, pp 1\u201310","DOI":"10.1109\/HICSS.2010.412"},{"key":"388_CR6","doi-asserted-by":"crossref","unstructured":"De Cristofaro E, Soriente C, Tsudik G, Williams A (2012) Hummingbird: privacy at the time of twitter. In: IEEE symposium on security and privacy","DOI":"10.1109\/SP.2012.26"},{"key":"388_CR7","doi-asserted-by":"crossref","unstructured":"Chen X, Shi S (2009) A literature review of privacy research on social network sites. In: International conference on multimedia information networking and security","DOI":"10.1109\/MINES.2009.268"},{"key":"388_CR8","unstructured":"OpenSDRM (2010) http:\/\/www.opensdrm.org . Accessed Jul 2013"},{"key":"388_CR9","unstructured":"OpenSDRM specifications (2007) OpenSDoRM API specification. http:\/\/www.opensdrm.org\/files\/OpenSDoRM_API_Specification.pdf . Accessed Jul 2013"},{"key":"388_CR10","unstructured":"Serr\u00e3o C, Serra A, Dias M, Delgado J (2007) Secure license management-management of digital object licenses in a DRM environment. In: Proceedings of the international conference on security and cryptography (SECRYPT2007). Barcelona, 28\u201331 July, August 2007"},{"issue":"12","key":"388_CR11","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MC.2004.242","volume":"37","author":"D Geer","year":"2004","unstructured":"Geer D (2004) Digital rights technology sparks interoperability concerns. Computer 37(12):20\u201322","journal-title":"Computer"},{"key":"388_CR12","unstructured":"Serr\u00e3o C, Dias M, Delgado J (2006) Using service-oriented architectures towards rights management interoperability. In: Proceedings of the international joint conferences on computer, information and systems sciences and engineering (CISSE06). University of Bridgeport, USA, 4\u201314 December 2006"},{"key":"388_CR13","unstructured":"Serr\u00e3o C, Siegert G (2004) Open secure infrastructure to control user access to multimedia content. In: Proceedings of the second international workshop on security in information systems (ICEIS2004-WOSIS2004), Porto, 13 April 2004"},{"key":"388_CR14","unstructured":"Serr\u00e3o C, Neves D, Kudumakis P, Barker T, Balestri M (2003) OpenSDRM an open and secure digital rights management solution. In: Proceedings of the IADIS international conference e-society 2003. Lisboa, 3\u20136 June 2003"},{"issue":"2","key":"388_CR15","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MMUL.2008.38","volume":"15","author":"V Torres","year":"2008","unstructured":"Torres V, Serr\u00e3o C, Dias M, Delgado J (2008) Open DRM and the future of media. IEEE MultiMed 15(2):28\u201336. ISSN 1070-986X doi: 10.1109\/MMUL.2008.38","journal-title":"IEEE MultiMed"},{"key":"388_CR16","unstructured":"Delgado J et al (2009) A Digital Rights management approach to privacy. In: Delgado J, Rodriguez V (eds), 1st workshop on privacy and protection in web-based social networks. IDT series, Barcelona"},{"key":"388_CR17","unstructured":"Social networking users say they want more control over their info. (n.d.). AllThingsD. http:\/\/allthingsd.com\/20111130\/networking-users-say-they-want-more-control-over-their-info\/ . Accessed 28 Jun 2013"}],"container-title":["annals of telecommunications - annales des t\u00e9l\u00e9communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-013-0388-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12243-013-0388-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-013-0388-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T11:04:51Z","timestamp":1563793491000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12243-013-0388-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,30]]},"references-count":17,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2014,2]]}},"alternative-id":["388"],"URL":"https:\/\/doi.org\/10.1007\/s12243-013-0388-1","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,8,30]]}}}