{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T11:52:50Z","timestamp":1768909970082,"version":"3.49.0"},"reference-count":78,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"IDSI-Israel Data Science Initiative"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/access.2026.3652489","type":"journal-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T22:02:28Z","timestamp":1768255348000},"page":"6405-6416","source":"Crossref","is-referenced-by-count":0,"title":["Toward Privacy Management Automation: A Framework for Assessing Privacy Sensitivity"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-6593-5438","authenticated-orcid":false,"given":"Benji","family":"Azaria","sequence":"first","affiliation":[{"name":"Department of Industrial Engineering and Management, Faculty of Engineering, Ariel University, Ariel, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0582-5832","authenticated-orcid":false,"given":"Shani","family":"Alkoby","sequence":"additional","affiliation":[{"name":"Department of Industrial Engineering and Management, Faculty of Engineering, Ariel University, Ariel, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1663-9699","authenticated-orcid":false,"given":"Ron S.","family":"Hirschprung","sequence":"additional","affiliation":[{"name":"Department of Industrial Engineering and Management, Faculty of Engineering, Ariel University, Ariel, Israel"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/info12110465"},{"key":"ref2","volume-title":"Web Analytics: An Hour a Day","author":"Kaushik","year":"2007"},{"key":"ref3","volume-title":"Web Analytics 2.0","author":"Kaushik","year":"2009"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1509\/jmr.14.0518"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA.2016.7503293"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1038\/s41591-018-0272-7"},{"key":"ref7","article-title":"Understanding ecommerce consumer privacy from the behavioral marketers\u2019 viewpoint","author":"Jones","year":"2019"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S0736-5853(01)00013-2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2694844"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/13691180210159328"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10982-017-9307-3"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipw007"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.3191268"},{"issue":"2","key":"ref14","first-page":"7","article-title":"The general data protection\u2019s (GDPR) impact on data-driven business models: The case of the right to data portability and Facebook","volume":"9","author":"Bohmecke-Schwafert","year":"2018","journal-title":"ITU J., ICT Discoveries"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.13165\/ST-14-4-2-05"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1080\/1097198x.2019.1569186"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/jcpy.1191"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-019-04237-1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1177\/0093650218800915"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1177\/0002764218792691"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2017.12.003"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23206"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2017.07.002"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretconser.2021.102774"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1556460.1556499"},{"key":"ref26","first-page":"89","article-title":"A comprehensive quality evaluation of security and privacy advice on the Web","volume-title":"Proc. 29th USENIX Secur. Symp. (USENIX Secur. 20)","author":"Redmiles"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00023"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(14)70491-9"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.2307\/1914185"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-3479-3.ch031"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.acl-long.741"},{"key":"ref32","volume-title":"Cambridge Dictionary","year":"2021"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-3670-1_7"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1126\/sciadv.aau4586"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12276"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1056808.1057073"},{"issue":"1","key":"ref37","first-page":"11","article-title":"A survey of various security issues in online social networks","volume":"1","author":"Joe","year":"2014","journal-title":"Int. J. Comput. Netw. Appl."},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3386\/w25626"},{"key":"ref39","first-page":"28080","article-title":"Individual privacy accounting via a Renyi filter","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"34","author":"Feldman"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2944723"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1093\/hcr\/hqaa012"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyaa006"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3436755"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2018.00056"},{"key":"ref45","article-title":"A survey on privacy and security in online social networks","author":"Kayes","year":"2015","journal-title":"arXiv:1504.03342"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"ref47","first-page":"2011","article-title":"Differentially private empirical risk minimization","volume":"12","author":"Chaudhuri","year":"2009","journal-title":"J. Mach. Learn. Res."},{"key":"ref48","article-title":"A privacy sensitivity index for personal data: An analytic hierarchy process-based approach","author":"Yaxin","year":"2017","journal-title":"IEEE Trans. Big Data"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyad005"},{"key":"ref50","first-page":"42","article-title":"Protect personal privacy and wasting time using NLP: A comparative approach using AI","volume":"10","author":"Velu","year":"2021","journal-title":"Vivekananda J. Res."},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162683"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-023-00992-y"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/w19-8633"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1155\/2023\/1727285"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3168389"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2015.01045"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-020-09731-7"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9030483"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMC48092.2020.ICCMC-00099"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.36548\/jscp.2020.4.002"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-019-09794-5"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMU.2014.7066632"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N19-1034"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5107"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/BESC51023.2020.9348291"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.3390\/electronics14173426"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1177\/09636625231171677"},{"key":"ref68","volume-title":"50+ Amazing Facts About Twitter You Must Know","author":"Gupta","year":"2022"},{"key":"ref69","volume-title":"The 500 Most Frequently Used Words on Twitter","author":"Grossman","year":"2009"},{"key":"ref70","volume-title":"Tweepy","author":"Introvert","year":"2024"},{"key":"ref71","volume-title":"GitHub_Tweets_NLP","year":"2025"},{"issue":"3","key":"ref72","first-page":"204","article-title":"Toward effective privacy sensitivity estimation on Twitter: A machine learning approach","volume":"7","author":"Johnson","year":"2021","journal-title":"J. Cybersecurity Privacy"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.7560\/ic57302"},{"key":"ref74","doi-asserted-by":"crossref","DOI":"10.3934\/mbe.2020286","volume-title":"Challenges of the Digital Age for Privacy and Personal Data Protection","author":"Romansky","year":"2020"},{"key":"ref75","doi-asserted-by":"crossref","DOI":"10.1145\/3386263.3407599","volume-title":"Privacy Threats and Protection in Machine Learning","author":"Zhang","year":"2020"},{"key":"ref76","article-title":"Americans and privacy: Concerned, confused and feeling lack of control over their personal information","author":"Auxier","year":"2019"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2024.0150323"},{"issue":"15","key":"ref78","first-page":"122","article-title":"A longitudinal analysis of privacy sensitivity shifts in social media users","volume":"112","author":"Smith","year":"2020","journal-title":"J. Privacy Stud."}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/11323511\/11343742.pdf?arnumber=11343742","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T20:55:43Z","timestamp":1768856143000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11343742\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":78,"URL":"https:\/\/doi.org\/10.1109\/access.2026.3652489","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}