{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T02:43:28Z","timestamp":1747104208971,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/cts.2015.7210451","type":"proceedings-article","created":{"date-parts":[[2015,8,20]],"date-time":"2015-08-20T21:46:15Z","timestamp":1440107175000},"page":"370-375","source":"Crossref","is-referenced-by-count":10,"title":["Privacy impact assessment for online social networks"],"prefix":"10.1109","author":[{"given":"Yong","family":"Wang","sequence":"first","affiliation":[]},{"given":"Raj Kumar","family":"Nepali","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2013.49"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2013.99"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2014.6785440"},{"key":"ref13","article-title":"Measuring Privacy Risk in Online Social Networks","author":"becker","year":"2009","journal-title":"Web 2 0 Security and Privacy Workshop"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2010.5452715"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.99"},{"first-page":"59","article-title":"Guide to Protecting the Confidentiality of Personally Identifiable Information","year":"2010","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526781"},{"key":"ref18","article-title":"Uniqueness of Simple Demographics in the U. S. Population","author":"sweeney","year":"2000","journal-title":"Data Privacy Lab White Paper Series LIDAP-WP4"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1179601.1179615"},{"year":"2013","key":"ref4","article-title":"Securely Enabling Social Media"},{"key":"ref27","article-title":"Hackers Target Social Media for Social Engineering Attacks","author":"dieterle","year":"2012","journal-title":"Infosec Island"},{"key":"ref3","article-title":"Associated Press Twitter Account Hacked in Market-Moving Attack","author":"lee","year":"2013","journal-title":"Bloomberg Technology"},{"year":"2011","key":"ref6","article-title":"The Risk of Social Engineering on Information Security: A Survey of IT Professionals"},{"year":"2013","key":"ref5","article-title":"2013 Data Breach Investigations Report"},{"key":"ref8","article-title":"Privacy-as-a-service: Models, algorithms, and results on the facebook platform","volume":"2","author":"maximilien","year":"2009","journal-title":"Proceedings of Web3D"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068823"},{"key":"ref2","first-page":"1","article-title":"A Benchmark Analysis of the Strategic Use of Social Media for Fortune's Most Admired U.S. Companies on Facebook, Twitter and Youtube","volume":"7","author":"distaso","year":"2013","journal-title":"Public Rel J"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1870096.1870102"},{"year":"2014","key":"ref1","article-title":"Key Facts"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2124295.2124382"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1038\/srep01376"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"}],"event":{"name":"2015 International Conference on Collaboration Technologies and Systems (CTS)","start":{"date-parts":[[2015,6,1]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2015,6,5]]}},"container-title":["2015 International Conference on Collaboration Technologies and Systems (CTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7169724\/7210375\/07210451.pdf?arnumber=7210451","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T22:38:18Z","timestamp":1490395098000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7210451\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/cts.2015.7210451","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}