{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T05:29:05Z","timestamp":1768454945660,"version":"3.49.0"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2016,10,1]],"date-time":"2016-10-01T00:00:00Z","timestamp":1475280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100000544","name":"BAP","doi-asserted-by":"publisher","award":["03A102P"],"award-info":[{"award-number":["03A102P"]}],"id":[{"id":"10.13039\/501100000544","id-type":"DOI","asserted-by":"publisher"}]},{"name":"TUBITAK","award":["113E543"],"award-info":[{"award-number":["113E543"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2016,10,1]]},"DOI":"10.1109\/tkde.2016.2583425","type":"journal-article","created":{"date-parts":[[2016,6,22]],"date-time":"2016-06-22T16:10:39Z","timestamp":1466611839000},"page":"2724-2737","source":"Crossref","is-referenced-by-count":51,"title":["PriGuard: A Semantic Approach to Detect Privacy Violations in Online Social Networks"],"prefix":"10.1109","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2653-6669","authenticated-orcid":false,"given":"Nadin","family":"Kokciyan","sequence":"first","affiliation":[]},{"given":"Pinar","family":"Yolum","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1592665.1592675"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.120"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.57"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1870096.1870102"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772727"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2320729"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.66"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-013-7124-8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943539"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.97"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.08.003"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008319631231"},{"key":"ref28","article-title":"Celebrities&#x2019; photos, videos mayreveal location","author":"heussner","year":"2010","journal-title":"ABC News"},{"key":"ref3","author":"baader","year":"2003","journal-title":"The Description Logic Handbook Theory Implementation and Applications"},{"key":"ref27","first-page":"3217","article-title":"We&#x2019;re in it together: Interpersonal management of disclosure in social network services","author":"lampinen","year":"0","journal-title":"Proc SIGCHI Conf Hum Factors Comput Syst"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470658"},{"key":"ref5","author":"solove","year":"2008","journal-title":"Understanding Privacy"},{"key":"ref29","first-page":"539","article-title":"Learning to discover social circles in ego networks","author":"leskovec","year":"2012","journal-title":"Advances in Neural Information Processing Systems 25"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2559206.2579408"},{"key":"ref7","author":"andrews","year":"2013","journal-title":"I Know Who You Are and I Saw What You Did Social Networks and the Death of Privacy"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2014.1001300"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23046"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2013.07.004"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/544865.544867"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/69.43410"},{"key":"ref21","first-page":"275","article-title":"On the characterisation of law and computer systems: The normative systems perspective","author":"jones","year":"1993","journal-title":"Deontic Logic in Computer Science Normative System Specification"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.1201\/9781420090512","author":"hitzler","year":"2009","journal-title":"Foundations of Semantic Web Technologies"},{"key":"ref23","first-page":"2004","article-title":"OWL web ontology language overview","volume":"10","author":"mcguinness","year":"2004","journal-title":"W3C Recommendation"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2007.03.004"},{"key":"ref25","article-title":"Semantics and complexity of SPARQL","volume":"34","author":"arenas","year":"2009","journal-title":"ACM Trans Database Syst"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/7563937\/07496848.pdf?arnumber=7496848","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:42:39Z","timestamp":1641987759000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7496848\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,1]]},"references-count":30,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2016.2583425","relation":{},"ISSN":["1041-4347"],"issn-type":[{"value":"1041-4347","type":"print"}],"subject":[],"published":{"date-parts":[[2016,10,1]]}}}