{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:13:37Z","timestamp":1729638817149,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/temu.2014.6917762","type":"proceedings-article","created":{"date-parts":[[2014,10,14]],"date-time":"2014-10-14T18:05:07Z","timestamp":1413309907000},"page":"208-213","source":"Crossref","is-referenced-by-count":3,"title":["Discovering the impact of user profiling in e-services"],"prefix":"10.1109","author":[{"given":"Kleanthis","family":"Gatziolis","sequence":"first","affiliation":[]},{"given":"Anthony C.","family":"Boucouvalas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Friends Friendsters and Top 8: Writing community into being on social network sites","volume":"11","author":"danah","year":"2006","journal-title":"First Monday"},{"journal-title":"Social Norm Expression and Agent Interaction Submitted to Computers in Human Behavior","year":"2003","author":"boucouvalas xu zhe","key":"35"},{"key":"17","first-page":"1","author":"hannah inbarani","year":"2009","journal-title":"Rough Set Based User Profiling for Web Personalization"},{"journal-title":"Emotional Momentum and Text to Emotion Analysis Engines -Theory and Practice Submitted to Special Issue on Journal of Visual Languages and Computing","year":"2003","author":"boucouvalas xu zhe","key":"36"},{"key":"18","first-page":"1","author":"synthesio","year":"2011","journal-title":"The Truth about Sentiment & Natural Language Processing"},{"journal-title":"Representing Emotional Momentum Within Expressive Internet Communication IASTED International Conference on Internet and Multimedia Systems and Applications (EuroIMSA 2006)","year":"2006","author":"xu","key":"33"},{"key":"15","first-page":"1","author":"rocha","year":"2011","journal-title":"User Profiling on Twitter"},{"journal-title":"Fuzzy Logic Usage in Emotion Communication of Human Machine Interaction Social and Activities Encyclopedia of Human Computer Interaction","year":"2005","author":"zhe","key":"34"},{"key":"16","first-page":"1","author":"macskassy","year":"2012","journal-title":"On the Study of Social Interactions in Twitter"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72079-9"},{"key":"14","first-page":"1","author":"sacco","year":"2011","journal-title":"Privacy Aware and Faceted User-Profile Management Using Social Data"},{"key":"11","first-page":"1","author":"balduzzi","year":"2010","journal-title":"Abusing Social Networks for Automated User Profiling"},{"key":"12","first-page":"671","author":"brusilovsky","year":"2007","journal-title":"Open Corpus Adaptive Educational Hypermedia"},{"key":"21","first-page":"2569","author":"george","year":"2006","journal-title":"Living Online The End of Privacy? New Scientist"},{"key":"20","article-title":"The power and politics of weblogs","author":"david","year":"2004","journal-title":"Proceedings of the ACM Conference on Computer Supported Cooperative Work (CSCW'04)"},{"journal-title":"What You Say Online Could Haunt You","year":"2006","author":"kornblum","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_3"},{"key":"24","first-page":"10","article-title":"An evaluation of identity-sharing behavior in social network communities","volume":"3","author":"stutzman","year":"2006","journal-title":"Journal of the International Digital Media and Arts Association"},{"key":"25","doi-asserted-by":"crossref","DOI":"10.5210\/fm.v11i9.1394","article-title":"A privacy paradox: Social networking in the United States","volume":"11","author":"barnes","year":"2006","journal-title":"First Monday"},{"key":"26","article-title":"Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace","author":"dwyer","year":"2007","journal-title":"AMCIS 2007 Proceedings"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"28","article-title":"Ubiquitous social networks-opportunities and challenges for privacyaware user modeling","author":"preibusch","year":"2007","journal-title":"Proceedings of Workshop on Data Mining for User Modeling"},{"journal-title":"Teens Privacy & Online Social Networks","year":"2007","author":"lenhart","key":"29"},{"key":"3","first-page":"1","author":"schiaffino","year":"2009","journal-title":"Intelligent User Profiling"},{"year":"0","key":"2"},{"key":"10","first-page":"84","article-title":"The future of intelligent internet user profiling","volume":"111","author":"boucouvalas","year":"0","journal-title":"PPT"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02794-9_1"},{"key":"30","first-page":"95","article-title":"The Fourth Amendment and privacy issues on the \"new\" Internet: Facebook.com and MySpace.com","volume":"31","author":"hodge","year":"2006","journal-title":"Southern Illinois University Law Journal"},{"year":"0","key":"7"},{"year":"0","key":"6"},{"journal-title":"Text-to-Emotion Analysis Engines-Theory","year":"2006","author":"john","key":"32"},{"key":"5","first-page":"1","author":"frank","year":"2002","journal-title":"The Physical Limits of Computing"},{"journal-title":"Log File Analysis of E-commerce Systems in Rich Internet Web 2 0 Applications PCI 2011 -15th Panhellenic Conference on Informatics","year":"2011","author":"aivalis","key":"31"},{"key":"4","first-page":"1","author":"kotinurmi","year":"2001","journal-title":"User Profiles and Their Management"},{"key":"9","first-page":"1","author":"neuhold","year":"2003","journal-title":"Personalization and User Profiling & Recommender Systems"},{"year":"0","key":"8"}],"event":{"name":"2014 International Conference on Telecommunications and Multimedia (TEMU)","start":{"date-parts":[[2014,7,28]]},"location":"Heraklion, Crete, Greece","end":{"date-parts":[[2014,7,30]]}},"container-title":["2014 International Conference on Telecommunications and Multimedia (TEMU)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6909332\/6917722\/06917762.pdf?arnumber=6917762","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T18:25:09Z","timestamp":1498155909000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6917762\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/temu.2014.6917762","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}