{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T07:56:50Z","timestamp":1764835010657,"version":"3.46.0"},"reference-count":60,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T00:00:00Z","timestamp":1756166400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T00:00:00Z","timestamp":1756166400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,26]]},"DOI":"10.1109\/pst65910.2025.11268851","type":"proceedings-article","created":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:40:04Z","timestamp":1764787204000},"page":"1-12","source":"Crossref","is-referenced-by-count":0,"title":["From Birthday Cheers to Privacy Fears: Unraveling the Paradox of Social Media Celebrations in Nigeria"],"prefix":"10.1109","author":[{"given":"Victor","family":"Yisa","sequence":"first","affiliation":[{"name":"Dalhousie University,Faculty of Computer Science,Halifax,Canada"}]},{"given":"Rita","family":"Orji","sequence":"additional","affiliation":[{"name":"Dalhousie University,Faculty of Computer Science,Halifax,Canada"}]}],"member":"263","reference":[{"article-title":"Cybersecurity Awareness of University Students in Nigeria: Analysis Approach","year":"2021","author":"Garba","key":"ref1"},{"year":"2022","key":"ref2","article-title":"Sub-saharan africa"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.24251\/HICSS.2018.111","article-title":"Your Privacy Is Your Friend\u2019s Privacy: Examining Interdependent Information Disclosure on Online Social Networks","author":"Alsarkal","year":"2018"},{"key":"ref4","article-title":"From an Authentication Question to a Public Social Event: Characterizing Birthday Sharing on Twitter","author":"Kek\u00fcll\u00fco\u0142lu","year":"2022","journal-title":"arXiv:2201.10655 [cs]"},{"issue":"4","key":"ref5","first-page":"468","article-title":"On the Role and Form of Personal Information Disclosure in Cyberbullying Incidents","volume-title":"Proceedings on Privacy Enhancing Technologies","volume":"2023","author":"Aliyu"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa1465"},{"key":"ref7","article-title":"Michigan man\u2019s identity stolen by Nigerian romance scammers","author":"Dupnack","year":"2020","journal-title":"Fox news 2"},{"key":"ref8","article-title":"Fraudsters Clone Pius Akinyelure\u2019s Facebook, Demand N275,000 For NNPC Contracts","author":"Akinsuyi","year":"2022","journal-title":"Daily Independent"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SPAC.2017.8304266"},{"article-title":"Council Post: Nigeria\u2019s Cybersecurity Challenge: Four Steps To Curb Cybercrime","year":"2024","author":"Femi-Oyewole","key":"ref10"},{"key":"ref11","article-title":"Examining the impacts of privacy awareness on user\u2019s self-disclosure on social media","volume":"abs\/2303.07927","author":"Lee","year":"2023","journal-title":"ArXiv"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4314\/ejotmas.v7i1-2.2"},{"article-title":"Online social networks: A survey of usage and risks experience among university students in north-central nigeria","volume-title":"International Conference on Information and Communication Technology and Its","author":"Yisa","key":"ref13"},{"year":"2023","key":"ref14","article-title":"Exploring the Disparities in Internet Penetration Across Nigeria: Understanding the Importance and Implications"},{"article-title":"A Review of the Basic Education Situation in Nigeria","year":"2020","author":"Adeyeye","key":"ref15"},{"article-title":"The educational imbalance between the northern and southern states of nigeria: A re-direction of educational policies","year":"2002","author":"Okobiah","key":"ref16"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1016\/j.jbusres.2019.12.006","article-title":"User self-disclosure on social network sites: A cross-cultural study on facebook\u2019s privacy concepts","volume":"112","author":"Oghazi","year":"2020","journal-title":"Journal of Business Research"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-017-9621-2"},{"issue":"24","key":"ref19","article-title":"African Cultural Values and Inter-communal Relations: The Case with Nigeria","volume":"4","author":"Columbus","year":"2014","journal-title":"Developing Country Studies"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2024.2327200"},{"key":"ref21","first-page":"372","article-title":"Defensive Technology Use by Political Activists During the Sudanese Revolution","volume-title":"2021 IEEE Symposium on Security and Privacy (SP)","volume":"2021-May","author":"Daffalla"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2016.1232909"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/j.ssresearch.2016.04.022","article-title":"Thumbs up for privacy?: Differences in online self-disclosure behavior across national cultures","volume":"59","author":"Reed","year":"2016","journal-title":"Social Science Research"},{"key":"ref24","article-title":"Global variations in online privacy concerns across 57 countries","volume-title":"Computers in Human Behavior Reports","volume":"9","author":"Engstr\u00e1m","year":"2023"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.2196\/20472"},{"key":"ref26","first-page":"3","article-title":"Causes of inequalities in educational development among nationalities in nigeria","volume":"26","author":"Aluede","year":"2003","journal-title":"Educational research quarterly"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.9734\/BJEMT\/2014\/7080"},{"article-title":"Investigation of how social media influenced the endsars protests in Lagos","year":"2023","author":"Augustine","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445204"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11469-018-9940-6"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1177\/0735633117743917"},{"key":"ref32","first-page":"239","article-title":"The Effect of Personal Information Management Tool Usage, Personal Information Sensitivity, and Information Ethics Awareness on Information Security Awareness","volume":"3","author":"Kim","year":"2016"},{"key":"ref33","first-page":"372","article-title":"Defensive Technology Use by Political Activists During the Sudanese Revolution","volume-title":"2021 IEEE Symposium on Security and Privacy (SP)","author":"Daffalla"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAS47918.2020.233978"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"108420","DOI":"10.1016\/j.chb.2024.108420","article-title":"Hidden desires, echoed distress: Dissecting nigeria\u2019s sexting landscape and its ties to depression","volume":"161","author":"Yisa","year":"2024","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"ref36","first-page":"294","article-title":"Investigating Privacy Decision-Making Processes Among Nigerian Men and Women","volume-title":"Proceedings on Privacy Enhancing Technologies","volume":"2023","author":"Yisa"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1037\/adb0000160"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s11469-021-00732-7"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfbs.2014.01.002"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/10705519909540118","article-title":"Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives","volume":"6","author":"Hu","year":"1999","journal-title":"Structural Equation Modeling"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-7637-6_9"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1002\/9781118619179"},{"issue":"1","key":"ref43","doi-asserted-by":"crossref","first-page":"4","DOI":"10.3390\/ijfs6010004","article-title":"The Influence of Industry Characteristics and Dynamic Capabilities on Firms\u2019 Profitability","volume":"6","author":"Pervan","year":"2017","journal-title":"International Journal of Financial Studies"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1051\/matecconf\/201825005002"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2001.11045669"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1108\/IMR-09-2014-0304"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1037\/met0000080"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"1339","DOI":"10.1016\/j.patrec.2013.04.019","article-title":"Handling imbalanced data sets with synthetic boundary data generation using bootstrap re-sampling and AdaBoost techniques","volume":"34","author":"Thanathamathee","year":"2013","journal-title":"Pattern Recognit. Lett."},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.17165\/TP.2016.3-4.13"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.26634\/jcom.6.3.15697"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/ijcbpl.2014040101","article-title":"Disclosure and Privacy Settings on Social Networking Sites: Evaluating an Instructional Intervention Designed to Promote Informed Information Sharing","volume":"4","author":"Archer","year":"2014","journal-title":"Int. J. Cyber Behav. Psychol. Learn."},{"key":"ref52","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1192\/bjp.186.5.436","article-title":"Community study of knowledge of and attitude to mental illness in Nigeria","volume":"186","author":"Gureje","year":"2005","journal-title":"British Journal of Psychiatry"},{"key":"ref53","article-title":"Igba Nkwu Nwanyi Ceremony of Igbo People of Nigeria","author":"Ezubem","year":"2020","journal-title":"Indian Journal of Research in Anthropology"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1080\/10220461.2022.2122547","article-title":"Governance and traditional rulership in northern Nigeria","volume":"29","author":"Mlambo","year":"2022","journal-title":"South African Journal of International Affairs"},{"issue":"3","key":"ref55","doi-asserted-by":"crossref","first-page":"265","DOI":"10.3390\/ijerph21030265","article-title":"\"We Live Our Life Normal\u201c: A Qualitative Analysis of Nigerian Women\u2019s Health-Seeking Behavior during the COVID-19 Pandemic","volume":"21","author":"Ndu","year":"2024","journal-title":"International Journal of Environmental Research and Public Health"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445204"},{"key":"ref57","article-title":"An Investigation of Social Media as a Government Digital Public Relations Tool: The Nigerian Experience","author":"Garba","year":"2022","journal-title":"Journal of New Media"},{"key":"ref58","first-page":"50","article-title":"The Impacts of Social Media on National Security: A View from the Northern and South-Eastern Region of Nigeria","volume":"8","author":"Chukwuere","year":"2018","journal-title":"International Review of Management and Marketing"},{"key":"ref59","doi-asserted-by":"crossref","first-page":"N.PAG-N.PAG","DOI":"10.1016\/j.childyouth.2020.105695","article-title":"Social networking and online self-disclosure as predictors of cyberbullying victimization among children and youth","volume":"119","author":"Aizenkot","year":"2020","journal-title":"Children & Youth Services Review"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3643834.3660716"}],"event":{"name":"2025 22nd Annual International Conference on Privacy, Security, and Trust (PST)","start":{"date-parts":[[2025,8,26]]},"location":"Fredericton, NB, Canada","end":{"date-parts":[[2025,8,28]]}},"container-title":["2025 22nd Annual International Conference on Privacy, Security, and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11268482\/11268814\/11268851.pdf?arnumber=11268851","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T07:50:52Z","timestamp":1764834652000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11268851\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,26]]},"references-count":60,"URL":"https:\/\/doi.org\/10.1109\/pst65910.2025.11268851","relation":{},"subject":[],"published":{"date-parts":[[2025,8,26]]}}}