{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T17:32:01Z","timestamp":1725384721150},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/icsmc.2009.5346318","type":"proceedings-article","created":{"date-parts":[[2009,12,10]],"date-time":"2009-12-10T14:44:31Z","timestamp":1260456271000},"page":"74-79","source":"Crossref","is-referenced-by-count":0,"title":["Sh@re: Negotiated audit in social networks"],"prefix":"10.1109","author":[{"given":"Alejandro","family":"Gutierrez","sequence":"first","affiliation":[]},{"given":"Apeksha","family":"Godiyal","sequence":"additional","affiliation":[]},{"given":"Matt","family":"Stockton","sequence":"additional","affiliation":[]},{"given":"Michael","family":"LeMay","sequence":"additional","affiliation":[]},{"given":"Carl A.","family":"Gunter","sequence":"additional","affiliation":[]},{"given":"Roy H.","family":"Campbell","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2005.25"},{"year":"0","key":"13"},{"journal-title":"Six Degrees The Science of a Connected Age","year":"2003","author":"watts","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/507711.507722"},{"year":"0","key":"12"},{"key":"3","article-title":"Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace","author":"dwyer","year":"2007","journal-title":"Proceedings of the Thirteenth Americas Conference on Information Systems"},{"journal-title":"How your creepy ex-co-workers will kill facebook","year":"2007","author":"cory doctorow","key":"2"},{"journal-title":"Apache Xampp","year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456405"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397747"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1086\/225469"},{"year":"0","key":"4"},{"journal-title":"Facebook Threats to privacy","year":"2005","author":"jones","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"}],"event":{"name":"2009 IEEE International Conference on Systems, Man and Cybernetics - SMC","start":{"date-parts":[[2009,10,11]]},"location":"San Antonio, TX, USA","end":{"date-parts":[[2009,10,14]]}},"container-title":["2009 IEEE International Conference on Systems, Man and Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5340904\/5345886\/05346318.pdf?arnumber=5346318","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T22:11:25Z","timestamp":1489875085000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5346318\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icsmc.2009.5346318","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}