{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:08:05Z","timestamp":1725570485848},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/cicybs.2011.5949410","type":"proceedings-article","created":{"date-parts":[[2011,7,13]],"date-time":"2011-07-13T15:55:21Z","timestamp":1310572521000},"page":"160-163","source":"Crossref","is-referenced-by-count":1,"title":["Location privacy protection on social networks"],"prefix":"10.1109","author":[{"given":"Justin","family":"Zhan","sequence":"first","affiliation":[]},{"given":"Xing","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Naveen","family":"Bandaru","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/AICCSA.2009.5069336"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/1102199.1102214"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1142\/S0218488502001648"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/MSP.2007.75"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/978-3-642-19656-0_12"},{"key":"ref5","first-page":"1","author":"lipford","year":"0","journal-title":"Proceedings of the 1st Conference on Usability Psychology and Security"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1504\/IJWMC.2009.028896"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/MC.2003.1250896"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/1871437.1871480"},{"year":"0","author":"sogholan","journal-title":"The next facebook privacy scandal","key":"ref9"},{"year":"0","author":"blakely","article-title":"Does Facebook's Privacy Policy Stack Up?","key":"ref1"}],"event":{"name":"2011 IEEE Symposium On Computational Intelligence In Cyber Security - Part Of 17273 - 2011 Ssci","start":{"date-parts":[[2011,4,11]]},"location":"Paris, France","end":{"date-parts":[[2011,4,15]]}},"container-title":["2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5937004\/5949383\/05949410.pdf?arnumber=5949410","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T06:31:51Z","timestamp":1490077911000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5949410\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/cicybs.2011.5949410","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}