{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T02:01:58Z","timestamp":1760061718751,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1109\/issa.2012.6320443","type":"proceedings-article","created":{"date-parts":[[2013,5,15]],"date-time":"2013-05-15T21:02:08Z","timestamp":1368651728000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Claimed vs observed information disclosure on social networking sites"],"prefix":"10.1109","author":[{"given":"Phumezo","family":"Ntlatywa","sequence":"first","affiliation":[]},{"given":"Reinhardt A.","family":"Botha","sequence":"additional","affiliation":[]},{"given":"Bertram","family":"Haskins","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","DOI":"10.5210\/fm.v11i9.1394","article-title":"A privacy paradox: Social networking in the United States","volume":"11","author":"barnes","year":"2006","journal-title":"First Monday"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019637632584"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1177\/0270467607311484"},{"key":"18","first-page":"204","article-title":"Sharing ephemeral information in online social networks: Privacy perceptions and behaviours","author":"reynolds","year":"0","journal-title":"Proceedings of the 13th IFIP TC 13 International Conference on Human-computer Interaction - Volume Part III Berlin Heidelberg 2011"},{"key":"15","first-page":"265","article-title":"Information revelation and internet privacy concerns on social network sites: A case study of Facebook","author":"young","year":"0","journal-title":"Proceedings of the Fourth International Conference on Communities and Technologies New York NY USA 2009"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.08.006"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/501158.501163"},{"key":"14","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1007\/1-4020-2148-8_17","article-title":"Impacts of user privacy preferences on personalized systems","volume":"5","author":"teltzrow","year":"2004","journal-title":"Designing Personalized User Experiences in eCommerce"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1386\/macp.6.1.81\/1"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21521-6"},{"journal-title":"Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)","year":"2010","author":"mccallister","key":"21"},{"key":"3","first-page":"522","article-title":"Social network sites and its popularity","volume":"2","author":"ahmad","year":"2011","journal-title":"International Journal of Research and Reviews in Computer Science"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.11.012"},{"journal-title":"Privacy and Social Networking Sites","year":"2007","author":"goettke","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"journal-title":"Student Awareness of the Privacy Implications when Using Facebook","year":"2005","author":"govani","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00393.x"},{"key":"6","first-page":"103","article-title":"Citizen journalism: Back to the future?","volume":"3","author":"bentley","year":"2008","journal-title":"Geopolitics History and International Relations"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879190"},{"key":"4","article-title":"Facebook now has 800 million users","author":"ostrow","year":"2011","journal-title":"Mashable Social Media"},{"key":"9","first-page":"35","article-title":"Social networks privacy issues that affect young societies","author":"azimi","year":"0","journal-title":"Planetary Scientific Research Center Proceeding Bangkok 2011"},{"key":"8","first-page":"1","article-title":"Privacy protection for social networking platforms","volume":"2","author":"evans","year":"0","journal-title":"2008 IEEE Symposium on Security and Privacy Oakland 2008"}],"event":{"name":"2012 Information Security for South Africa (ISSA)","start":{"date-parts":[[2012,8,15]]},"location":"Johannesburg, Gauteng, South Africa","end":{"date-parts":[[2012,8,17]]}},"container-title":["2012 Information Security for South Africa"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6305018\/6320423\/06320443.pdf?arnumber=6320443","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T13:07:15Z","timestamp":1498050435000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6320443\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/issa.2012.6320443","relation":{},"subject":[],"published":{"date-parts":[[2012,8]]}}}