{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T04:43:49Z","timestamp":1725684229131},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1109\/percomw.2013.6529494","type":"proceedings-article","created":{"date-parts":[[2013,7,11]],"date-time":"2013-07-11T16:26:40Z","timestamp":1373560000000},"page":"273-278","source":"Crossref","is-referenced-by-count":2,"title":["Ineluctable background checking on social networks: Linking job seeker's r&amp;#x00E9;sum&amp;#x00E9; and posts"],"prefix":"10.1109","author":[{"given":"Tomotaka","family":"Okuno","sequence":"first","affiliation":[]},{"given":"Masatsugu","family":"Ichino","sequence":"additional","affiliation":[]},{"given":"Isao","family":"Echizen","sequence":"additional","affiliation":[]},{"given":"Akira","family":"Utsumi","sequence":"additional","affiliation":[]},{"given":"Hiroshi","family":"Yoshiura","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"35","article-title":"Myspace, facebook, and other social networking siters: How are they used by human resource personnel?","author":"roberts","year":"2008","journal-title":"Delta Pi Epsilon National Conference"},{"journal-title":"Faces of Facebook Privacy in the Age of Augmented Reality","year":"2011","author":"acquisti","key":"17"},{"journal-title":"K Mart Corp No 1-8-2172","year":"0","author":"johnson","key":"18"},{"journal-title":"On Exploiting Innocuous User Activity for Correlating Accounts Across Social Network Sites","year":"2012","author":"goga","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1866919.1866922"},{"key":"13","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/978-3-540-89598-5_11","article-title":"Involuntary information leakage in social network services","author":"lam","year":"2008","journal-title":"Proceeding of the 3rd International Workshop on Security Advances in Information and Computer Security"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197511"},{"key":"11","article-title":"RT@ IWantPrivacy: Widespread violation of privacy settings in the Twitter social network","author":"meeder","year":"2010","journal-title":"Proceedings of the Web 2 0 Privacy and Security Workshop"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046558"},{"journal-title":"One-in-Five Employers Use Social Networking Sites to Reasearch Job Candidates","year":"0","key":"3"},{"journal-title":"MeCab Yet Another Part-of-Speech and Morphological Aanalyzer","year":"0","author":"kudo","key":"20"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"journal-title":"Infographics for Finding Out the Newest Data of Mixi","year":"0","author":"mixi","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197508"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.46"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988678"},{"journal-title":"California Schools Employers Banned from Social Media Snooping","year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068823"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"}],"event":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops 2013)","start":{"date-parts":[[2013,3,18]]},"location":"San Diego, CA","end":{"date-parts":[[2013,3,22]]}},"container-title":["2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6523359\/6529412\/06529494.pdf?arnumber=6529494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T12:07:27Z","timestamp":1498046847000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6529494\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/percomw.2013.6529494","relation":{},"subject":[],"published":{"date-parts":[[2013,3]]}}}