{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T18:39:42Z","timestamp":1760985582583,"version":"3.41.2"},"reference-count":97,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T00:00:00Z","timestamp":1489968000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AJIM"],"published-print":{"date-parts":[[2017,3,20]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>The purpose of this paper to investigate the current information systems security (ISS) practices of the social software application (SSA) users via the internet.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>The paper opted for a systematic literature review survey on ISS and its practices in SSAs between 2010 and 2015. The study includes a set of 39 papers from among 1,990 retrieved papers published in 35 high-impact journals. The selected papers were filtered using the Publish or Perish software by Harzing and Journal Citation Report (JCR) with an inclusion criterion of least one citation per article.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>The practice of ISS is driven by the need to protect the confidentiality, integrity, and availability of the data from being tampered. It is coherent with the current practice as reported by many researchers in this study. Four important factors lead to the ISS practice in SSA: protection tools offered, ownership, user behaviour, and security policy.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title>\n<jats:p>The paper highlights the implication of successful ISS practices is having clear security purpose and security supported environment (user behaviour and security protection tools) and governance (security policy and ownership) protection tools offered, ownership, user behaviour, and security policy towards ISS practice by the users.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>This paper fulfils an identified need to study how to enable ISS practice.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ajim-08-2016-0124","type":"journal-article","created":{"date-parts":[[2017,5,3]],"date-time":"2017-05-03T06:09:28Z","timestamp":1493791768000},"page":"131-157","source":"Crossref","is-referenced-by-count":6,"title":["Information systems security practices in social software applications"],"prefix":"10.1108","volume":"69","author":[{"given":"Suraya Ika","family":"Tamrin","sequence":"first","affiliation":[]},{"given":"Azah Anir","family":"Norman","sequence":"additional","affiliation":[]},{"given":"Suraya","family":"Hamid","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"issue":"6","key":"key2020120820214828200_ref001","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1016\/j.ijmedinf.2010.01.006","article-title":"Revisiting the online health information reliability debate in the wake of \u2018Web 2.0\u2019: an interdisciplinary literature and website review","volume":"79","year":"2010","journal-title":"International Journal of Medical Informatics"},{"issue":"3","key":"key2020120820214828200_ref002","first-page":"14","article-title":"Privacy and national security issues in social networks: the challenges","volume":"19","year":"2014","journal-title":"International Journal of the Computer, the Internet and Management"},{"issue":"1","key":"key2020120820214828200_ref003","first-page":"14","article-title":"A lexical analysis of social software literature","volume":"17","year":"2013","journal-title":"Informatica Economica"},{"key":"key2020120820214828200_ref004","first-page":"1","article-title":"Analysis of privacy in mobile telephony systems","year":"2016","journal-title":"International Journal of Information Security"},{"issue":"1","key":"key2020120820214828200_ref005","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1109\/TKDE.2011.147","article-title":"Nonadaptive mastermind algorithms for string and vector databases, with case studies","volume":"25","year":"2013","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"3","key":"key2020120820214828200_ref006","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1007\/s10618-012-0254-1","article-title":"More than modelling and hiding: towards a comprehensive view of web mining and privacy","volume":"24","year":"2012","journal-title":"Data Mining and Knowledge Discovery"},{"key":"key2020120820214828200_ref007","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1016\/j.ins.2014.02.035","article-title":"Identify obfuscation in graphs through the information theoretic lens","volume":"275","year":"2014","journal-title":"Information Sciences"},{"issue":"1","key":"key2020120820214828200_ref008","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","article-title":"Social network sites: definition, history and scholarship","volume":"13","year":"2007","journal-title":"Journal of Computer-Mediated Communications"},{"issue":"3","key":"key2020120820214828200_ref009","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","article-title":"Information security compliance: an empirical study of rationality-based beliefs and information security awareness","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2020120820214828200_ref010","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.ins.2009.06.027","article-title":"The SocialTrust framework for trusted social information management: architecture and algorithms","volume":"180","year":"2010","journal-title":"Information Sciences"},{"issue":"4","key":"key2020120820214828200_ref011","doi-asserted-by":"crossref","first-page":"948","DOI":"10.1016\/j.dss.2013.01.004","article-title":"Privacy preserving actions of older adults on social media: exploring the behavior of opting out of information sharing","volume":"55","year":"2013","journal-title":"Decision Support Systems"},{"issue":"3","key":"key2020120820214828200_ref012","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1108\/02635570610653498","article-title":"Organizational factors to the effectiveness of implementing information security management","volume":"106","year":"2006","journal-title":"Industrial Management & Data Systems"},{"issue":"4","key":"key2020120820214828200_ref013","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1109\/TSC.2011.39","article-title":"Social cloud computing: a vision for socially motivated resource sharing","volume":"5","year":"2012","journal-title":"IEEE Transactions on Service Computing"},{"issue":"3","key":"key2020120820214828200_ref014","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1016\/j.dss.2012.12.003","article-title":"Living a private life in public social networks: an exploration of member self-disclosure","volume":"55","year":"2013","journal-title":"Decision Support Systems"},{"issue":"4","key":"key2020120820214828200_ref015","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1109\/SURV.2011.092110.00088","article-title":"A survey on trust management for mobile ad hoc networks","volume":"13","year":"2011","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"key2020120820214828200_ref016","first-page":"1","article-title":"Cyber security issues for advanced metering infrastructure (AMI)","year":"2008","journal-title":"IEEE PES Power System Communications Committee"},{"key":"key2020120820214828200_ref017","unstructured":"ComScore (2015), \u201cComScore\u201d, available at: www.comscoredatamine.com\/ (accessed 2 February 2015)."},{"issue":"B","key":"key2020120820214828200_ref018","first-page":"531","article-title":"Distributing privacy policies over multimedia content across multiple online social networks","volume":"75","year":"2014","journal-title":"Computer Networks"},{"key":"key2020120820214828200_ref019","doi-asserted-by":"crossref","unstructured":"Dyba, T., Dingsoyr, T. and Hanssen, G.K. (2007), \u201cApplying systematic reviews to diverse study types: an experience report\u201d, First International Symposium on Empirical Software Engineering and Measurement, pp. 225-234.","DOI":"10.1109\/ESEM.2007.59"},{"issue":"5","key":"key2020120820214828200_ref020","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1108\/09596110710757570","article-title":"Social software practices on the Internet: implications for the hotel industry","volume":"19","year":"2007","journal-title":"International Journal of Contemporary Hospitality Management"},{"key":"key2020120820214828200_ref021","unstructured":"eMarketer (2013), \u201ceMarketer\u201d, available at: www.emarketer.com\/Article\/Social-Networking-Reaches-Nearly-One-Four-Around-World\/1009976 (accessed 12 December 2015)."},{"edition":"2nd ed.","volume-title":"Conducting Research Literature Reviews: From the Internet to Paper","year":"2005","key":"key2020120820214828200_ref022"},{"volume-title":"Security in Computing","year":"1989","key":"key2020120820214828200_ref023"},{"issue":"3","key":"key2020120820214828200_ref024","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1109\/TSC.2011.13","article-title":"Service-oriented architecture for high-dimensional private data mashup","volume":"5","year":"2012","journal-title":"IEEE Transactions on Service Computing"},{"issue":"3","key":"key2020120820214828200_ref025","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MIS.2011.52","article-title":"Harnessing the crowdsourcing power of social media for disaster relief","volume":"26","year":"2011","journal-title":"IEEE Intelligent Systems"},{"key":"key2020120820214828200_ref026","unstructured":"George, A. (2006), \u201cNew scientist\u201d, available at: www.newscientist.com\/article\/mg19125691.700-living-online-the-end-of-privacy\/ (accessed 1 December 2014)."},{"issue":"3","key":"key2020120820214828200_ref027","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1080\/02692171.2013.872088","article-title":"The professors and the banks: US views on the subprime crisis","volume":"28","year":"2014","journal-title":"International Review of Applied Economics"},{"year":"2014","key":"key2020120820214828200_ref028","article-title":"History of information: the case of privacy and security in social media"},{"first-page":"71","volume-title":"Information Revelation and Privacy in Online Social Networks","year":"2005","key":"key2020120820214828200_ref029"},{"issue":"1","key":"key2020120820214828200_ref030","first-page":"1","article-title":"Exploring the security of information sharing on social networking sites: the role of perceived control of information","volume":"133","year":"2014","journal-title":"Journal of Business Ethics"},{"volume-title":"CISSP: All-in-One Exam Guide","year":"2007","key":"key2020120820214828200_ref031"},{"key":"key2020120820214828200_ref032","unstructured":"Haughn, M. and Gibilisco, S. (2014), \u201cWhatls.com\u201d, available at: http:\/\/whatis.techtarget.com\/definition\/Confidentiality-integrity-and-availability-CIA (accessed 28 December 2014)."},{"issue":"6","key":"key2020120820214828200_ref033","doi-asserted-by":"crossref","first-page":"797","DOI":"10.1007\/s00778-010-0210-x","article-title":"Resisting structural re-identification in anonymized social networks","volume":"19","year":"2010","journal-title":"The VLDB Journal"},{"issue":"8","key":"key2020120820214828200_ref034","doi-asserted-by":"crossref","first-page":"1849","DOI":"10.1109\/TKDE.2012.120","article-title":"Preventing private information inference attacks on social networks","volume":"25","year":"2013","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"key2020120820214828200_ref035","unstructured":"HillAssociates (2007), \u201cHill Associates\u201d, available at: www.hill2dot0.com\/wiki\/index.php?title=CIA_triad (accessed 15 November 2014)."},{"issue":"7","key":"key2020120820214828200_ref036","doi-asserted-by":"crossref","first-page":"1614","DOI":"10.1109\/TKDE.2012.97","article-title":"Multiparty access control for online social networks: model and mechanisms","volume":"25","year":"2013","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"1","key":"key2020120820214828200_ref037","first-page":"61","article-title":"Consideration of competencies of the future learners from a review of \u2018Web 2.0\u2019 literature","volume":"6","year":"2012","journal-title":"International Journal"},{"key":"key2020120820214828200_ref038","unstructured":"ISO\/IEC (2005), \u201cInformation technology \u2013 security techniques: code of practise for information security management\u201d, available at: www.iso.org\/iso\/en\/prodsservices\/popstds\/informationsecurity.html (accessed 18 November 2014)."},{"volume-title":"Information Security: Terms and Definition","year":"2014","author":"ISO\/IEC","key":"key2020120820214828200_ref039"},{"issue":"6","key":"key2020120820214828200_ref040","first-page":"1189","article-title":"Calculating the H-index and other bibliometric and scientometric indicators from Google Scholar with the Publish or Perish software","volume":"33","year":"2009","journal-title":"Emerald Insight"},{"issue":"1","key":"key2020120820214828200_ref042","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1109\/SURV.2012.031412.00077","article-title":"Mobile phone sensing systems: a survey","volume":"15","year":"2013","journal-title":"IEEE Communications Surveys & Tutorials"},{"year":"2007","key":"key2020120820214828200_ref043","article-title":"Guidelines for performing systematic literature reviews in software engineering"},{"issue":"1","key":"key2020120820214828200_ref044","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.infsof.2008.09.009","article-title":"Systematic literature review in software engineering \u2013 a systematic literature review","volume":"51","year":"2009","journal-title":"Information and Software Technology"},{"issue":"7","key":"key2020120820214828200_ref045","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1016\/j.im.2013.07.011","article-title":"Why do users continue using social networking sites? An exploratory study of members in the United States and Taiwan","volume":"50","year":"2013","journal-title":"Information & Management"},{"key":"key2020120820214828200_ref046","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.ins.2014.08.015","article-title":"The relativity of privacy preservation based on social tagging","volume":"288","year":"2014","journal-title":"Information Sciences"},{"issue":"2","key":"key2020120820214828200_ref047","doi-asserted-by":"crossref","first-page":"357","DOI":"10.2307\/25148735","article-title":"A review of culture in information systems research: toward a theory of information technology culture conflict","volume":"30","year":"2006","journal-title":"MIS Quarterly"},{"key":"key2020120820214828200_ref048","unstructured":"Lenhart, A. and Madden, M. (2007), \u201cPew Research Center\u201d, available at: www.pewinternet.org\/2007\/04\/18\/teens-privacy-and-online-social-networks\/ (accessed 25 January 2015)."},{"issue":"1","key":"key2020120820214828200_ref049","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/jcc4.12029","article-title":"Enterprise social media: definition, history, and prospects for the study of social technologies in organizations","volume":"19","year":"2013","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"5","key":"key2020120820214828200_ref050","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MNET.2010.5578914","article-title":"Sharing locations in online social networks","volume":"24","year":"2010","journal-title":"IEEE Network"},{"issue":"1","key":"key2020120820214828200_ref051","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/MWC.2014.6757895","article-title":"Security and privacy in mobile social networks: challenges and solutions","volume":"21","year":"2014","journal-title":"IEEE Wireless Communications"},{"issue":"2","key":"key2020120820214828200_ref052","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1109\/TSC.2011.58","article-title":"Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks","volume":"6","year":"2013","journal-title":"IEEE Transactions on Service Computing"},{"first-page":"648","article-title":"An analysis of security in social networks","year":"2009","key":"key2020120820214828200_ref053"},{"issue":"5","key":"key2020120820214828200_ref054","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MNET.2010.5578913","article-title":"Understanding the behaviour of malicious applications in social networks","volume":"24","year":"2010","journal-title":"IEEE Network"},{"issue":"4","key":"key2020120820214828200_ref055","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1007\/s00778-010-0213-7","article-title":"Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies","volume":"20","year":"2011","journal-title":"The VLDB Journal"},{"issue":"26","key":"key2020120820214828200_ref056","first-page":"1","article-title":"A guide to conducting a systematic literature review of information systems research","volume":"10","year":"2010","journal-title":"Sprouts: Working Papers on Information Systems"},{"key":"key2020120820214828200_ref057","unstructured":"Paganini, P. (2015), \u201cInfoSec Institute\u201d, available at: http:\/\/resources.infosecinstitute.com\/phishing-dangerous-cyber-threat\/ (accessed 5 January 2015)."},{"key":"key2020120820214828200_ref058","unstructured":"PandaLabs (2012), \u201c2012 annual report PandaLabs\u201d, available at: http:\/\/press.pandasecurity.com\/wp-content\/uploads\/2013\/02\/PandaLabs-Annual-Report-2012.pdf (accessed 23 December 2014)."},{"key":"key2020120820214828200_ref059","unstructured":"PandaLabs (2013), \u201cPandaLabs quarterly report January-March\u201d, available at: http:\/\/press.pandasecurity.com\/wpcontent\/uploads\/2010\/05\/PandaLabsQuaterly-Report.Pdf (accessed 23 December 2014)."},{"issue":"4","key":"key2020120820214828200_ref060","doi-asserted-by":"crossref","first-page":"1217","DOI":"10.2307\/41703505","article-title":"A social network-based inference model for validating customer profile data","volume":"36","year":"2012","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2020120820214828200_ref061","first-page":"35","article-title":"Facebook or Fakebook? The effects of simulated mobile applications on simulated mobile networks","volume":"12","year":"2014","journal-title":"Ad Hoc Networks"},{"first-page":"308","volume-title":"Information Security Risk Analysis","year":"2001","key":"key2020120820214828200_ref062"},{"volume-title":"Systematic Reviews in the Social Sciences: A Practical Guide","year":"2006","key":"key2020120820214828200_ref063"},{"issue":"1","key":"key2020120820214828200_ref064","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MWC.2012.6155875","article-title":"Information and inference in the wireless physical layer","volume":"19","year":"2012","journal-title":"IEEE Wireless Communications"},{"issue":"1","key":"key2020120820214828200_ref065","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1109\/TMC.2012.247","article-title":"Preserving location privacy in geo-social applications","volume":"13","year":"2014","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"key2020120820214828200_ref066","unstructured":"Reuters, T. (2012), \u201cWeb of knowledge\u201d, available at: http:\/\/admin-apps.webofknowledge.com\/JCR\/help\/h_impfact.htm (accessed 7 March 2015)."},{"key":"key2020120820214828200_ref067","unstructured":"Reuters, T. (2014), \u201cThomson Reuters\u201d, available at: http:\/\/thomsonreuters.com\/en\/products-services\/scholarly-scientific-research\/research-management-and-evaluation\/journal-citation-reports.html (accessed 15 January 2015)."},{"first-page":"407","article-title":"The age of confidentiality: a review of the security in social networks and internet distributed computing and artificial intelligence","year":"2014","key":"key2020120820214828200_ref068"},{"issue":"2","key":"key2020120820214828200_ref069","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1109\/TSC.2011.2","article-title":"Expert discovery and interactions in mixed service-oriented systems","volume":"5","year":"2012","journal-title":"IEEE Transactions on Service Computing"},{"key":"key2020120820214828200_ref078","unstructured":"Secker, J. (2008), \u201cSocial software, libraries and distance learners: literature review\u201d, available at: http:\/\/eprints.lse.ac.uk\/4058\/1\/LASSIE_lit_review%28LSERO%29.pdf (accessed 5 October 2014)."},{"key":"key2020120820214828200_ref070","unstructured":"SGPPWritingCenter (2009), \u201cLiterature reviews: using a matrix to organize research\u201d, available at: www2.smumn.edu\/deptpages\/tcwritingcenter\/forms_of_writing\/litrevmatrix_tc.pdf (accessed 5 October 2014)."},{"issue":"5\/6","key":"key2020120820214828200_ref083","first-page":"353","article-title":"Role of social software tools in education: a literature review","volume":"51","year":"2009","journal-title":"Education+Training"},{"issue":"1","key":"key2020120820214828200_ref071","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/S1386-5056(98)00168-3","article-title":"Security in health-care information systems \u2013 current trends","volume":"54","year":"1999","journal-title":"International Journal of Medical Informatics"},{"issue":"1","key":"key2020120820214828200_ref072","first-page":"83","article-title":"Citation analysis","volume":"30","year":"1981","journal-title":"Library Trends"},{"issue":"6","key":"key2020120820214828200_ref073","doi-asserted-by":"crossref","first-page":"777","DOI":"10.1007\/s00778-010-0193-7","article-title":"Privacy policies for shared content in social network sites","volume":"19","year":"2010","journal-title":"The VLDB Journal"},{"key":"key2020120820214828200_ref074","doi-asserted-by":"crossref","unstructured":"Squicciarini, A.C., Xu, H. and Zhang, X. (2011), \u201cCoPE: enabling collaborative privacy management in online social networks\u201d, Journal of the American Society for Information Science and Technology, Vol. 62 No. 3, pp. 521-534.","DOI":"10.1002\/asi.21473"},{"issue":"7324","key":"key2020120820214828200_ref075","first-page":"101","article-title":"Investigating and dealing with publications and other biases in meta-analysis","volume":"323","year":"2001","journal-title":"British Medical Association"},{"issue":"1","key":"key2020120820214828200_ref076","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1109\/TKDE.2013.40","article-title":"Structural diversity for resisting community identification in published social networks","volume":"26","year":"2014","journal-title":"IEEE Transaction on Knowledge and Data Engineering"},{"issue":"2","key":"key2020120820214828200_ref077","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1109\/TKDE.2011.232","article-title":"Anonymization of centralized and distributed social networks by sequential clustering","volume":"25","year":"2013","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"5","key":"key2020120820214828200_ref079","first-page":"437","article-title":"Citation analysis of selected clinical pharmacology journals","volume":"26","year":"1991","journal-title":"Hospital Pharmacy"},{"issue":"5","key":"key2020120820214828200_ref080","doi-asserted-by":"crossref","first-page":"669","DOI":"10.1109\/TKDE.2010.147","article-title":"Cosedes: a collaborative spam detection system with a novel e-mail abstraction scheme","volume":"23","year":"2011","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"2","key":"key2020120820214828200_ref081","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1109\/TKDE.2011.230","article-title":"A system to filter unwanted messages from OSN user walls","volume":"25","year":"2013","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"3","key":"key2020120820214828200_ref082","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1109\/SURV.2012.060912.00108","article-title":"Mobile social networks: architectures, social properties, and key research challenges","volume":"15","year":"2013","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"4","key":"key2020120820214828200_ref084","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1016\/j.cose.2004.01.013","article-title":"From policies to culture","volume":"23","year":"2004","journal-title":"Computer & Security"},{"issue":"3","key":"key2020120820214828200_ref085","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1007\/s10115-013-0674-2","article-title":"High utility K-anonymization for social network publishing","volume":"41","year":"2014","journal-title":"Knowledge and Information Systems"},{"issue":"2","key":"key2020120820214828200_ref086","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.pubrev.2009.01.006","article-title":"Engaging stakeholders through social networking: how nonprofit organizations are using Facebook","volume":"35","year":"2009","journal-title":"Public Relations Review"},{"year":"2011","key":"key2020120820214828200_ref087","article-title":"Web 2.0: a definition, literature review, and directions for future research"},{"key":"key2020120820214828200_ref088","unstructured":"Wikipedia (2015), \u201cWikipedia, the free encyclopedia\u201d, available at: https:\/\/en.wikipedia.org\/wiki\/Citation_analysis (accessed 17 March 2015)."},{"issue":"1","key":"key2020120820214828200_ref089","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1889681.1889688","article-title":"Inferring colocation and conversation networks from privacy-sensitive audio with implications for computational social science","volume":"2","year":"2011","journal-title":"ACM Transactions on Intelligent Systems and Technology"},{"issue":"3","key":"key2020120820214828200_ref090","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1007\/s10115-010-0353-5","article-title":"On link privacy in randomizing social networks","volume":"28","year":"2011","journal-title":"Knowledge and Information Systems"},{"issue":"3","key":"key2020120820214828200_ref091","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1109\/TKDE.2011.259","article-title":"Protecting sensitive labels in social network data anonymization","volume":"25","year":"2013","journal-title":"IEEE Transaction on Knowledge and Data Engineering"},{"issue":"4","key":"key2020120820214828200_ref092","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1109\/MNET.2010.5510913","article-title":"Privacy and security for online social networks: challenges and opportunities","volume":"24","year":"2010","journal-title":"IEEE Network"},{"issue":"1","key":"key2020120820214828200_ref093","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/s10115-010-0311-2","article-title":"The K-anonymity and I-diversity approaches for privacy preservation in social networks against neighbourhood attacks","volume":"28","year":"2011","journal-title":"Knowledge and Information Systems"},{"issue":"6","key":"key2020120820214828200_ref094","doi-asserted-by":"crossref","first-page":"906","DOI":"10.1108\/02640470911004020","article-title":"The impact of Social networking 2.0 on organisations","volume":"27","year":"2009","journal-title":"The Electronic Library"},{"issue":"4","key":"key2020120820214828200_ref095","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MWC.2013.6590046","article-title":"Securing M-healthcare social networks: challenges, countermeasures and future directions","volume":"20","year":"2013","journal-title":"IEEE Wireless Communications"},{"edition":"1st ed.","volume-title":"Introduction to Computer Security","year":"2004","key":"key2020120820214828200_ref096"},{"issue":"2","key":"key2020120820214828200_ref097","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1109\/TKDE.2011.230","article-title":"A system to filter unwanted messages from OSN user walls","volume":"25","year":"2013","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"key2020120820214828200_ref098","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1016\/j.jss.2014.01.010","article-title":"Web application testing: a systematic literature review","volume":"91","year":"2014","journal-title":"The Journal of Systems and Software"}],"container-title":["Aslib Journal of Information Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/AJIM-08-2016-0124\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/AJIM-08-2016-0124\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:01:04Z","timestamp":1753398064000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ajim\/article\/69\/2\/131-157\/60601"}},"subtitle":["A systematic literature review"],"short-title":[],"issued":{"date-parts":[[2017,3,20]]},"references-count":97,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,3,20]]}},"alternative-id":["10.1108\/AJIM-08-2016-0124"],"URL":"https:\/\/doi.org\/10.1108\/ajim-08-2016-0124","relation":{},"ISSN":["2050-3806"],"issn-type":[{"type":"print","value":"2050-3806"}],"subject":[],"published":{"date-parts":[[2017,3,20]]}}}