{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:21:14Z","timestamp":1730211674750,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679350","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"551-556","source":"Crossref","is-referenced-by-count":0,"title":["The Effect of Privacy Concerns, Interaction, Trust, Age, and Gender on Self-Disclosure Behaviours on Social Networking Sites"],"prefix":"10.1109","author":[{"given":"Alexis","family":"Coca","sequence":"first","affiliation":[{"name":"School of Computing, University of Portsmouth,Portsmouth,UK"}]},{"given":"Fudong","family":"Li","sequence":"additional","affiliation":[{"name":"Bournemouth University,Department of Computing and Informatics,Bournemouth,UK"}]},{"given":"Stavros","family":"Shiaeles","sequence":"additional","affiliation":[{"name":"School of Computing, University of Portsmouth,Portsmouth,UK"}]},{"given":"Deha","family":"Wu","sequence":"additional","affiliation":[{"name":"Bournemouth University,Department of Computing and Informatics,Bournemouth,UK"}]},{"given":"Fan","family":"Liu","sequence":"additional","affiliation":[{"name":"Morgan Stanley Asia,Cyber Security Division"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2020.543388"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/su13031220"},{"volume-title":"Social Engineering: The Art of Human Hacking","year":"2011","author":"Hadnagy","key":"ref3"},{"article-title":"Cyberint","volume-title":"Why Digital Risk Protection on Social Media is a Must For Online Retailers","year":"2021","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1057\/9781137312716"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1177\/0270467607311484"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23765-2_14"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.12.012"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/bs8060058"},{"issue":"3","key":"ref10","doi-asserted-by":"crossref","first-page":"889","DOI":"10.1016\/j.chb.2011.12.008","article-title":"The effect of online privacy policy on consumer privacy concern and trust","volume":"28","author":"Wu","year":"2012","journal-title":"Computers in Human Behavior"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.06.003"},{"issue":"1","key":"ref12","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1111\/j.1083-6101.2009.01494.x","article-title":"Facebook and online privacy: attitudes, behaviors, and unintended consequences","volume":"15","author":"Debatin","year":"2009","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"1","key":"ref13","doi-asserted-by":"crossref","DOI":"10.5817\/CP2012-1-3","article-title":"Connecting and protecting? Comparing predictors of self-disclosure and privacy settings use between adolescents and adults","volume":"6","author":"Walrave","year":"2012","journal-title":"Cyberpsychology"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICACSIS.2018.8618220"},{"key":"ref15","first-page":"382","article-title":"The Interplay Between Privacy, Trust and Self-disclosure on Social Networking Sites","volume-title":"Proceedings of the International Working Conference on Transfer and Diffusion of IT","author":"Fianu","year":"2019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.11.012"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1177\/1948550611408619"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-011-0443-z"},{"key":"ref19","article-title":"Teens and social media: the use of social media gains a greater foothold in teen life as they embrace the conversational nature of interactive online media","author":"Lenhart","year":"2007","journal-title":"Pew Internet & American Live Project"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.01.033"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.11.008"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.10.002"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2004.tb00292.x"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1108\/AJIM-01-2016-0001"},{"issue":"7634","key":"ref25","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1136\/bmj.39379.359560.AD","article-title":"Listen to the data when results are not significant","volume":"336","author":"Hewitt","year":"2008","journal-title":"BMJ"},{"issue":"4","key":"ref26","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1590\/2176-9451.19.4.027-029.ebo","article-title":"How sample size influences research outcomes","volume":"19","author":"Faber","year":"2014","journal-title":"Dental Press Journal of Orthodontics"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2024,9,2]]},"location":"London, United Kingdom","end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679350.pdf?arnumber=10679350","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T05:19:51Z","timestamp":1727241591000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679350\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679350","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}