{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:57:22Z","timestamp":1776085042031,"version":"3.50.1"},"reference-count":72,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T00:00:00Z","timestamp":1694995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T00:00:00Z","timestamp":1694995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,18]]},"DOI":"10.1109\/fmec59375.2023.10305886","type":"proceedings-article","created":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T18:51:37Z","timestamp":1699469497000},"page":"42-51","source":"Crossref","is-referenced-by-count":5,"title":["An Overview of using of Artificial Intelligence in Enhancing Security and Privacy in Mobile Social Networks"],"prefix":"10.1109","author":[{"given":"Hussam N.","family":"Fakhouri","sequence":"first","affiliation":[{"name":"University of Petra,Faculty of Information Technology,Data Science and Artificial Intelligence Department,Amman,Jordan"}]},{"given":"Sadi","family":"Alawadi","sequence":"additional","affiliation":[{"name":"Blekinge Institute of Technology,Department of Computer Science,Karlskrona,Sweden"}]},{"given":"Feras M.","family":"Awaysheh","sequence":"additional","affiliation":[{"name":"University of Tartu,Tartu,Estonia"}]},{"given":"Faten","family":"Hamad","sequence":"additional","affiliation":[{"name":"Sultan Qaboos University, Sultanate of Oman The University of Jordan, Amman,Amman,Jordan"}]},{"given":"Sawsan","family":"Alzubi","sequence":"additional","affiliation":[{"name":"Tartu University,Tartu,Estonia"}]},{"given":"Mohammad Naser","family":"AlAdwan","sequence":"additional","affiliation":[{"name":"Jerash University,Jerash,Jordan"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397747"},{"key":"ref57","first-page":"680","article-title":"Analysis of a third-party application for mobile forensic investigation","volume":"14","author":"ryu","year":"2018","journal-title":"J Inf Process Syst"},{"key":"ref12","article-title":"Privacy Protection for Social Networking APIs","author":"felt","year":"2008","journal-title":"W2SP '08"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.07.008"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2008.01432.x"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/DESEC.2017.8073812"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397744"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934958"},{"key":"ref53","first-page":"97","article-title":"Regulators, mount up! analysis of privacy policies for mobile money services","author":"bowers","year":"2017","journal-title":"Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017)"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1177\/0002764218787867"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10742-008-0041-z"},{"key":"ref55","first-page":"49","article-title":"Mobiclique: middleware for mobile social networking","author":"pietil\u00e4incn","year":"0","journal-title":"Proc 2nd ACM Workshop Online Social Netw"},{"key":"ref10","author":"boyd","year":"2007","journal-title":"Facebook's privacy trainwreck Exposure invasion and drama"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3319723"},{"key":"ref17","first-page":"271","article-title":"Computer Systems and Applications","author":"maiga","year":"2009","journal-title":"AICCSA 2009 IEEE\/ACS International Conference"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2009.01494.x"},{"key":"ref19","article-title":"Randoms in my bedroom: Negotiating privacy and unsolicited contact on social network sites","volume":"7","author":"robards","year":"2010","journal-title":"Prism"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v15i8.3086"},{"key":"ref51","author":"hermida","year":"2020","journal-title":"Horizontal surveillance mobile communication and social networking sites The lack of privacy in young people's daily lives"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1177\/0961000620966644"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.2307\/41703505"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102307"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2911451.2911464"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04631-x"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2888568"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3442588"},{"key":"ref44","article-title":"Social media and information overload: Survey results","author":"bontcheva","year":"2013","journal-title":"ArXiv Preprint"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.106217"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0157933"},{"key":"ref8","article-title":"Ubiquitous social networks? Opportunities and challenges for privacy-aware user modeling","author":"preibusch","year":"2007","journal-title":"Proceedings of the Workshop on Data Mining for User Modelling at UM 2007 Corfu Greece"},{"key":"ref7","article-title":"Teens, privacy and online social networks: How teens manage their online identities and personal information in the age of MySpace","author":"lenhart","year":"2007","journal-title":"Tech Report"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2011.6012166"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.66"},{"key":"ref6","article-title":"Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace","author":"dwyer","year":"2007","journal-title":"Proceedings of AMCIS 2007 Keystone CO"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2010.5510913"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2018.8514216"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2014.6757895"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840718"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700406"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.243"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1111\/j.1083-6101.2007.00399.x","article-title":"Mobile social networks and social practice: A case study of Dodgeball","volume":"13","author":"lee","year":"2007","journal-title":"J Comput -Mediat Commun"},{"key":"ref30","article-title":"WVANET: Modelling a novel web based communication architecture for vehicular network","author":"joe","year":"2015","journal-title":"Wire"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2011.045230"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-1996-4"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2015.07.014"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11882-012-0299-7"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.01.100830"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-821599-9.00003-0"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.1800573"},{"key":"ref70","first-page":"647","article-title":"Seer: A secure and efficient service review system for service-oriented mobile social networks","author":"liang","year":"0","journal-title":"Proc IEEE 32nd Int Conf Distrib Comput Syst"},{"key":"ref72","first-page":"416","article-title":"An exploration on artificial intelligence application: From security, privacy and ethic perspective","author":"li","year":"0","journal-title":"Proc 2nd IEEE Int Conf Cloud Comput Big Data Anal (ICCCBDA)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/info2010140"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.12.9.524-531"},{"key":"ref23","article-title":"Social Privacy in Networked Publics: Teens' Attitudes, Practices, and Strategies","author":"boyd","year":"2011","journal-title":"Privacy Law Scholars Conference Berkeley CA"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2813432"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2020.0253"},{"key":"ref25","author":"raynes-goldie","year":"2011","journal-title":"Annotated bibliography Digitally mediated surveillance privacy and social network sites"},{"key":"ref69","doi-asserted-by":"crossref","first-page":"130906","DOI":"10.1109\/ACCESS.2020.3009691","article-title":"A survey on privacy issues in mobile social networks","volume":"8","author":"sai","year":"2020","journal-title":"IEEE Access"},{"key":"ref20","first-page":"185","article-title":"When Social Links are Network Links: The Dawn of Peer-to-Peer Social Networks and Its Implications for Privacy","volume":"4","author":"musiani","year":"2010","journal-title":"Observatorio (OBS*)"},{"key":"ref64","article-title":"A general architecture of mobile social network services","author":"liu","year":"0","journal-title":"Proc Int Conf Convergence Inf Technol"},{"key":"ref63","author":"abdulkader","year":"2023","journal-title":"Why do people use public Wi-Fi? An investigation of risk-taking behaviour and factors lead to decisions"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-019-04285-9"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-8857-6"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15257-3_8"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934958"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1201\/9781003134527-10"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2016.08.016"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.50"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v15i1.2775"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-76346-6_58"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2007.132"}],"event":{"name":"2023 Eighth International Conference on Fog and Mobile Edge Computing (FMEC)","location":"Tartu, Estonia","start":{"date-parts":[[2023,9,18]]},"end":{"date-parts":[[2023,9,20]]}},"container-title":["2023 Eighth International Conference on Fog and Mobile Edge Computing (FMEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10305711\/10305726\/10305886.pdf?arnumber=10305886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,11]],"date-time":"2023-12-11T19:22:47Z","timestamp":1702322567000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10305886\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,18]]},"references-count":72,"URL":"https:\/\/doi.org\/10.1109\/fmec59375.2023.10305886","relation":{},"subject":[],"published":{"date-parts":[[2023,9,18]]}}}