{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T09:10:40Z","timestamp":1776071440528,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,3,3]],"date-time":"2022-03-03T00:00:00Z","timestamp":1646265600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,3,3]],"date-time":"2022-03-03T00:00:00Z","timestamp":1646265600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100007364","name":"fondazione crt","doi-asserted-by":"publisher","award":["2019-0450"],"award-info":[{"award-number":["2019-0450"]}],"id":[{"id":"10.13039\/100007364","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EPJ Data Sci."],"published-print":{"date-parts":[[2022,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>User-generated contents often contain private information, even when they are shared publicly on social media and on the web in general. Although many filtering and natural language approaches for automatically detecting obscenities or hate speech have been proposed, determining whether a shared post contains sensitive information is still an open issue. The problem has been addressed by assuming, for instance, that sensitive contents are published anonymously, on anonymous social media platforms or with more restrictive privacy settings, but these assumptions are far from being realistic, since the authors of posts often underestimate or overlook their actual exposure to privacy risks. Hence, in this paper, we address the problem of content sensitivity analysis directly, by presenting and characterizing a new annotated corpus with around ten thousand posts, each one annotated as sensitive or non-sensitive by a pool of experts. We characterize our data with respect to the closely-related problem of self-disclosure, pointing out the main differences between the two tasks. We also present the results of several deep neural network models that outperform previous naive attempts of classifying social media posts according to their sensitivity, and show that state-of-the-art approaches based on anonymity and lexical analysis do not work in realistic application scenarios.<\/jats:p>","DOI":"10.1140\/epjds\/s13688-022-00324-y","type":"journal-article","created":{"date-parts":[[2022,3,3]],"date-time":"2022-03-03T13:04:38Z","timestamp":1646312678000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Analysis and classification of privacy-sensitive content in social media posts"],"prefix":"10.1140","volume":"11","author":[{"given":"Livio","family":"Bioglio","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5145-3438","authenticated-orcid":false,"given":"Ruggero G.","family":"Pensa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,3]]},"reference":[{"key":"324_CR1","first-page":"522","volume-title":"Proceedings of AAAI ICWSM 2020, held virtually, original venue","author":"K Papadamou","year":"2020","unstructured":"Papadamou K, Papasavva A, Zannettou S, Blackburn J, Kourtellis N, Leontiadis I et al. (2020) Disturbed YouTube for kids: characterizing and detecting inappropriate videos targeting Young children. In: Choudhury MD, Chunara R, Culotta A, Welles BF (eds) Proceedings of AAAI ICWSM 2020, held virtually, original venue, Atlanta, Georgia, USA, June 8-11, 2020. AAAI Press, Menlo Park, pp\u00a0522\u2013533"},{"key":"324_CR2","doi-asserted-by":"crossref","first-page":"5796","DOI":"10.24963\/ijcai.2018\/841","volume-title":"Proceedings of IJCAI 2018","author":"A Anagnostou","year":"2018","unstructured":"Anagnostou A, Mollas I, Hatebusters TG (2018) A web application for actively reporting YouTube hate speech. In: Lang J (ed) Proceedings of IJCAI 2018, Stockholm, Sweden, July 13-19, 2018. ijcai.org, pp\u00a05796\u20135798"},{"key":"324_CR3","first-page":"185","volume-title":"Proceedings of CIKM 2020, virtual event","author":"L Cheng","year":"2020","unstructured":"Cheng L, Shu K, Wu S, Silva YN, Hall DL, Unsupervised LH (2020) Cyberbullying detection via time-informed Gaussian mixture model. In: d\u2019Aquin M, Dietze S, Hauff C, Curry E, Cudr\u00e9-Mauroux P (eds) Proceedings of CIKM 2020, virtual event, Ireland, October 19\u201323, 2020. ACM, New York, pp\u00a0185\u2013194"},{"issue":"1","key":"324_CR4","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1002\/asi.23363","volume":"67","author":"D S\u00e1nchez","year":"2016","unstructured":"S\u00e1nchez D, Batet M (2016) C-sanitized: A privacy model for document redaction and sanitization. J Assoc Inf Sci Technol 67(1):148\u2013163. https:\/\/doi.org\/10.1002\/asi.23363","journal-title":"J Assoc Inf Sci Technol"},{"key":"324_CR5","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.comcom.2020.07.032","volume":"161","author":"C Iwendi","year":"2020","unstructured":"Iwendi C, Moqurrab SA, Anjum A, Khan S, Mohan S, Srivastava G (2020) N-sanitization: A semantic privacy-preserving framework for unstructured medical datasets. Comput Commun 161:160\u2013171. https:\/\/doi.org\/10.1016\/j.comcom.2020.07.032","journal-title":"Comput Commun"},{"key":"324_CR6","first-page":"1","volume-title":"IEEE transactions on knowledge and data engineering","author":"F Hassan","year":"2021","unstructured":"Hassan F, Sanchez D, Domingo-Ferrer J (2021) Utility-preserving privacy protection of textual documents via word embeddings. In: IEEE transactions on knowledge and data engineering, pp\u00a01\u201314"},{"key":"324_CR7","unstructured":"Jourard SM (1971) Self-disclosure: an experimental analysis of the transparent self"},{"issue":"3","key":"324_CR8","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1089\/cpb.2006.9938","volume":"10","author":"A Barak","year":"2007","unstructured":"Barak A, Gluck-Ofri O (2007) Degree and reciprocity of self-disclosure in online forums. Cyberpsychol Behav Soc Netw 10(3):407\u2013417","journal-title":"Cyberpsychol Behav Soc Netw"},{"key":"324_CR9","first-page":"704","volume-title":"Proceedings of the eleventh international conference on web and social media, ICWSM 2017","author":"D Yang","year":"2017","unstructured":"Yang D, Yao Z, Kraut RE (2017) Self-disclosure and channel difference in online health support groups. In: Proceedings of the eleventh international conference on web and social media, ICWSM 2017, Montr\u00e9al, Qu\u00e9bec, Canada, May 15-18, 2017. AAAI Press, Menlo Park, pp\u00a0704\u2013707"},{"key":"324_CR10","doi-asserted-by":"crossref","first-page":"3857","DOI":"10.1145\/2858036.2858414","volume-title":"Proceedings of the 2016 CHI conference on human factors in computing systems","author":"X Ma","year":"2016","unstructured":"Ma X, Hancock JT, Naaman M (2016) Anonymity, intimacy and self-disclosure in social media. In: Proceedings of the 2016 CHI conference on human factors in computing systems, San Jose, CA, USA, May 7-12, 2016. ACM, New York, pp\u00a03857\u20133869."},{"key":"324_CR11","series-title":"CEUR workshop proceedings","first-page":"118","volume-title":"Proceedings of the 3rd workshop on affective content analysis (AffCon 2020) co-located with thirty-fourth AAAI conference on artificial intelligence (AAAI 2020)","author":"K Jaidka","year":"2020","unstructured":"Jaidka K, Singh I, Liu J, Chhaya N, Ungar L (2020) A report of the CL-aff OffMyChest shared task: modeling supportiveness and disclosure. In: Proceedings of the 3rd workshop on affective content analysis (AffCon 2020) co-located with thirty-fourth AAAI conference on artificial intelligence (AAAI 2020), New York, USA, February 7, 2020. CEUR workshop proceedings, vol\u00a02614. CEUR-WS.org, pp\u00a0118\u2013129."},{"issue":"7","key":"324_CR12","doi-asserted-by":"crossref","first-page":"1038","DOI":"10.1016\/j.tele.2017.04.013","volume":"34","author":"S Barth","year":"2017","unstructured":"Barth S, de Jong MDT (2017) The privacy paradox \u2013 investigating discrepancies between expressed privacy concerns and actual online behavior \u2013 A systematic literature review. Telemat Inform 34(7):1038\u20131058","journal-title":"Telemat Inform"},{"key":"324_CR13","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.chb.2017.12.001","volume":"81","author":"H Choi","year":"2018","unstructured":"Choi H, Park J, Jung Y (2018) The role of privacy fatigue in online privacy behavior. Comput Hum Behav 81:42\u201351","journal-title":"Comput Hum Behav"},{"issue":"1","key":"324_CR14","doi-asserted-by":"crossref","first-page":"15:1","DOI":"10.1007\/s13278-019-0558-x","volume":"9","author":"RG Pensa","year":"2019","unstructured":"Pensa RG, di Blasi G, Bioglio L (2019) Network-aware privacy risk estimation in online social networks. Soc Netw Anal Min 9(1):15:1\u201315:15","journal-title":"Soc Netw Anal Min"},{"key":"324_CR15","first-page":"493","volume-title":"Proceedings of IEEE SP 2014","author":"ST Peddinti","year":"2014","unstructured":"Peddinti ST, Korolova A, Bursztein E, Sampemane G (2014) Cloak and Swagger: understanding data sensitivity through the lens of user anonymity. In: Proceedings of IEEE SP 2014, pp\u00a0493\u2013508"},{"issue":"3","key":"324_CR16","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/MSP.2017.74","volume":"15","author":"ST Peddinti","year":"2017","unstructured":"Peddinti ST, Ross KW, Cappos J (2017) User anonymity on Twitter. IEEE Secur Priv 15(3):84\u201387","journal-title":"IEEE Secur Priv"},{"key":"324_CR17","first-page":"71","volume-title":"Proceedings of ICWSM 2015","author":"D Correa","year":"2015","unstructured":"Correa D, Silva LA, Mondal M, Benevenuto F, Gummadi KP (2015) The many shades of anonymity: characterizing anonymous social media content. In: Proceedings of ICWSM 2015, pp\u00a071\u201380"},{"issue":"5","key":"324_CR18","doi-asserted-by":"crossref","first-page":"1005","DOI":"10.1109\/TIFS.2016.2636090","volume":"12","author":"J Yu","year":"2017","unstructured":"Yu J, Zhang B, Kuang Z, Lin D, Fan J (2017) iPrivacy: image privacy protection by identifying sensitive objects via deep multi-task learning. IEEE Trans Inf Forensics Secur 12(5):1005\u20131016","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"324_CR19","first-page":"67","volume-title":"Proceedings of IDA 2020","author":"E Battaglia","year":"2020","unstructured":"Battaglia E, Bioglio L, Pensa RG (2020) Towards content sensitivity analysis. In: Berthold MR, Feelders A, Krempl G (eds) Proceedings of IDA 2020, Konstanz, Germany, April 27-29, 2020. Springer, Berlin, pp\u00a067\u201379"},{"issue":"3","key":"324_CR20","first-page":"60:1","volume":"52","author":"S Oukemeni","year":"2019","unstructured":"Oukemeni S, Rif\u00e0-Pous H, i\u00a0Puig JMM (2019) Privacy analysis on microblogging online social networks: A survey. ACM Comput Surv 52(3):60:1\u201360:36","journal-title":"ACM Comput Surv"},{"key":"324_CR21","doi-asserted-by":"crossref","first-page":"114817","DOI":"10.1109\/ACCESS.2019.2932899","volume":"7","author":"S Oukemeni","year":"2019","unstructured":"Oukemeni S, Rif\u00e0-Pous H, i\u00a0Puig JMM (2019) IPAM: information privacy assessment metric in microblogging online social networks. IEEE Access 7:114817\u2013114836","journal-title":"IEEE Access"},{"issue":"3","key":"324_CR22","first-page":"57:1","volume":"51","author":"I Wagner","year":"2018","unstructured":"Wagner I, Eckhoff D (2018) Technical privacy metrics: A systematic survey. ACM Comput Surv 51(3):57:1\u201357:38","journal-title":"ACM Comput Surv"},{"key":"324_CR23","doi-asserted-by":"crossref","first-page":"143631","DOI":"10.1109\/ACCESS.2019.2944723","volume":"7","author":"J Alemany","year":"2019","unstructured":"Alemany J, del Val Noguera E, Alberola JM, Garc\u00eda-Fornes A (2019) Metrics for privacy assessment when sharing information in online social networks. IEEE Access 7:143631\u2013143645","journal-title":"IEEE Access"},{"issue":"1","key":"324_CR24","first-page":"6:1","volume":"5","author":"K Liu","year":"2010","unstructured":"Liu K, Terzi E (2010) A framework for computing the privacy scores of users in online social networks. ACM Trans Knowl Discov Data 5(1):6:1\u20136:30","journal-title":"ACM Trans Knowl Discov Data"},{"key":"324_CR25","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.eswa.2017.05.054","volume":"86","author":"RG Pensa","year":"2017","unstructured":"Pensa RG, Blasi GD (2017) A privacy self-assessment framework for online social networks. Expert Syst Appl 86:18\u201331","journal-title":"Expert Syst Appl"},{"key":"324_CR26","first-page":"3227","volume-title":"Proceedings of ACM CHI 2011","author":"AJ Gill","year":"2011","unstructured":"Gill AJ, Vasalou A, Papoutsi C, Joinson AN (2011) Privacy dictionary: a linguistic taxonomy of privacy for content analysis. In: Proceedings of ACM CHI 2011, pp\u00a03227\u20133236"},{"issue":"11","key":"324_CR27","doi-asserted-by":"crossref","first-page":"2095","DOI":"10.1002\/asi.21610","volume":"62","author":"A Vasalou","year":"2011","unstructured":"Vasalou A, Gill AJ, Mazanderani F, Papoutsi C, Joinson AN (2011) Privacy dictionary: a new resource for the automated content analysis of privacy. J Am Soc Inf Sci Technol 62(11):2095\u20132105","journal-title":"J Am Soc Inf Sci Technol"},{"key":"324_CR28","first-page":"69","volume-title":"Proceedings of ACM HT 2020, virtual event","author":"M Mondal","year":"2020","unstructured":"Mondal M, Correa D, Benevenuto F (2020) Anonymity effects: A large-scale dataset from an anonymous social media platform. In: Gadiraju U (ed) Proceedings of ACM HT 2020, virtual event, USA, July 13-15, 2020. ACM, New York, pp\u00a069\u201374"},{"key":"324_CR29","first-page":"365","volume-title":"Proceedings of ACM SIGIR 2016","author":"JA Biega","year":"2016","unstructured":"Biega JA, Gummadi KP, Mele I, Milchevski D, Tryfonopoulos C, Weikum G (2016) R-susceptibility: an IR-centric approach to assessing privacy risks for users in online communities. In: Proceedings of ACM SIGIR 2016, pp\u00a0365\u2013374"},{"key":"324_CR30","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/CSE.2009.353","volume-title":"Proceedings of the 12th IEEE international conference on computational science and engineering, CSE 2009","author":"W Jiang","year":"2009","unstructured":"Jiang W, Murugesan M, Clifton C, Si L (2009) t-plausibility: semantic preserving text sanitization. In: Proceedings of the 12th IEEE international conference on computational science and engineering, CSE 2009. Vancouver, BC, Canada, August 29-31, 2009, IEEE Comput. Soc., Los Alamitos, pp\u00a068\u201375. https:\/\/doi.org\/10.1109\/CSE.2009.353"},{"issue":"6","key":"324_CR31","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1109\/TIFS.2013.2239641","volume":"8","author":"D S\u00e1nchez","year":"2013","unstructured":"S\u00e1nchez D, Batet M, Viejo A (2013) Automatic general-purpose sanitization of textual documents. IEEE Trans Inf Forensics Secur 8(6):853\u2013862. https:\/\/doi.org\/10.1109\/TIFS.2013.2239641","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"324_CR32","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.ins.2014.03.103","volume":"279","author":"D S\u00e1nchez","year":"2014","unstructured":"S\u00e1nchez D, Batet M, Viejo A (2014) Utility-preserving sanitization of semantically correlated terms in textual documents. Inf Sci 279:77\u201393. https:\/\/doi.org\/10.1016\/j.ins.2014.03.103","journal-title":"Inf Sci"},{"key":"324_CR33","volume-title":"Social penetration: the development of interpersonal relationships","author":"I Altman","year":"1973","unstructured":"Altman I, Taylor DA (1973) Social penetration: the development of interpersonal relationships, Holt, Rinehart & Winston, New York"},{"issue":"1","key":"324_CR34","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1080\/00224545.1968.9712476","volume":"75","author":"DA Taylor","year":"1968","unstructured":"Taylor DA (1968) The development of interpersonal relationships: social penetration processes. J Soc Psychol 75(1):79\u201390","journal-title":"J Soc Psychol"},{"issue":"1","key":"324_CR35","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1207\/S15327957PSPR0401_6","volume":"4","author":"KYA McKenna","year":"2000","unstructured":"McKenna KYA, Bargh JA (2000) Plan 9 from cyberspace: the implications of the Internet for personality and social psychology. Personal Soc Psychol Rev 4(1):57\u201375","journal-title":"Personal Soc Psychol Rev"},{"key":"324_CR36","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1016\/j.chb.2014.12.012","volume":"45","author":"LN Zlatolas","year":"2015","unstructured":"Zlatolas LN, Welzer T, Hericko M, H\u00f6lbl M (2015) Privacy antecedents for SNS self-disclosure: the case of Facebook. Comput Hum Behav 45:158\u2013167","journal-title":"Comput Hum Behav"},{"key":"324_CR37","doi-asserted-by":"crossref","first-page":"3272","DOI":"10.1145\/3308558.3313669","volume-title":"The world wide web conference, WWW 2019","author":"P Umar","year":"2019","unstructured":"Umar P, Squicciarini AC, Rajtmajer SM (2019) Detection and analysis of self-disclosure in online news commentaries. In: Liu L, White RW, Mantrach A, Silvestri F, McAuley JJ, Baeza-Yates R et al. (eds) The world wide web conference, WWW 2019, San Francisco, CA, USA, May 13-17, 2019. ACM, New York, pp\u00a03272\u20133278"},{"key":"324_CR38","first-page":"141","volume-title":"Proceedings of ICWSM 2018","author":"K Jaidka","year":"2018","unstructured":"Jaidka K, Guntuku SC, Ungar LH (2018) Facebook versus Twitter: differences in self-disclosure and trait prediction. In: Proceedings of ICWSM 2018. AAAI Press, Menlo Park, pp\u00a0141\u2013150"},{"issue":"5","key":"324_CR39","doi-asserted-by":"crossref","DOI":"10.2196\/jmir.9267","volume":"20","author":"EM Seabrook","year":"2018","unstructured":"Seabrook EM, Kern ML, Fulcher BD, Predicting RNS (2018) Depression from language-based emotion dynamics: longitudinal analysis of Facebook and Twitter status updates. J Med Internet Res 20(5):e168","journal-title":"J Med Internet Res"},{"key":"324_CR40","volume-title":"Proceedings of ICWSM 2013","author":"F Celli","year":"2013","unstructured":"Celli F, Pianesi F, Stillwell D, Kosinski M (2013) Workshop on computational personality recognition: shared task. In: Proceedings of ICWSM 2013"},{"issue":"15","key":"324_CR41","doi-asserted-by":"crossref","first-page":"5802","DOI":"10.1073\/pnas.1218772110","volume":"110","author":"M Kosinski","year":"2013","unstructured":"Kosinski M, Stillwell D, Graepel T (2013) Private traits and attributes are predictable from digital records of human behavior. Proc Natl Acad Sci USA 110(15):5802\u20135805","journal-title":"Proc Natl Acad Sci USA"},{"issue":"5","key":"324_CR42","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1037\/h0031619","volume":"76","author":"JL Fleiss","year":"1971","unstructured":"Fleiss JL (1971) Measuring nominal scale agreement among many raters. Psychol Bull 76(5):378\u2013382","journal-title":"Psychol Bull"},{"key":"324_CR43","first-page":"759","volume-title":"Proceedings of ACM CIKM 2010","author":"Z Cheng","year":"2010","unstructured":"Cheng Z, Caverlee J, Lee K (2010) You are where you tweet: a content-based approach to geo-locating Twitter users. In: Huang J, Koudas N, Jones GJF, Wu X, Collins-Thompson K, An A (eds) Proceedings of ACM CIKM 2010, Toronto, Ontario, Canada, October 26-30, 2010. ACM, New York, pp\u00a0759\u2013768"},{"key":"324_CR44","series-title":"Short papers. Association for computational linguistics","first-page":"427","volume-title":"Proceedings of EACL 2017","author":"A Joulin","year":"2017","unstructured":"Joulin A, Grave E, Bojanowski P, Mikolov T (2017) Bag of tricks for efficient text classification. In: Lapata M, Blunsom P, Koller A (eds) Proceedings of EACL 2017, Valencia, Spain, April 3\u20137, 2017. Short papers. Association for computational linguistics, vol\u00a02, pp\u00a0427\u2013431"},{"issue":"1","key":"324_CR45","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1177\/0261927X09351676","volume":"29","author":"YR Tausczik","year":"2010","unstructured":"Tausczik YR, Pennebaker JW (2010) The psychological meaning of words: LIWC and computerized text analysis methods. J Lang Soc Psychol 29(1):24\u201354","journal-title":"J Lang Soc Psychol"},{"key":"324_CR46","first-page":"4171","volume-title":"Proceedings of NAACL-HLT 2019","author":"J Devlin","year":"2019","unstructured":"Devlin J, Chang M, Lee K, Toutanova K (2019) BERT: pre-training of deep bidirectional transformers for language understanding. In: Burstein J, Doran C, Solorio T (eds) Proceedings of NAACL-HLT 2019, Minneapolis, MN, USA, June 2-7, 2019. Association for Computational Linguistics, pp\u00a04171\u20134186"},{"key":"324_CR47","first-page":"1532","volume-title":"Proceedings of EMNLP 2014","author":"J Pennington","year":"2014","unstructured":"Pennington J, Socher R, Glove MCD (2014) Global vectors for word representation. In: Moschitti A, Pang B, Daelemans W (eds) Proceedings of EMNLP 2014. ACL, pp\u00a01532\u20131543"},{"key":"324_CR48","unstructured":"Maiya AS (2020) ktrain: a Low-Code Library for Augmented Machine Learning. CoRR, 2020. Available from: https:\/\/arxiv.org\/abs\/2004.10703"},{"issue":"6","key":"324_CR49","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/MIS.2018.2882362","volume":"33","author":"S Poria","year":"2018","unstructured":"Poria S, Majumder N, Hazarika D, Cambria E, Gelbukh AF, Hussain A (2018) Multimodal sentiment analysis: addressing key issues and setting up the baselines. IEEE Intell Syst 33(6):17\u201325","journal-title":"IEEE Intell Syst"}],"container-title":["EPJ Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1140\/epjds\/s13688-022-00324-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1140\/epjds\/s13688-022-00324-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1140\/epjds\/s13688-022-00324-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,3]],"date-time":"2022-03-03T13:06:52Z","timestamp":1646312812000},"score":1,"resource":{"primary":{"URL":"https:\/\/epjdatascience.springeropen.com\/articles\/10.1140\/epjds\/s13688-022-00324-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,3]]},"references-count":49,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["324"],"URL":"https:\/\/doi.org\/10.1140\/epjds\/s13688-022-00324-y","relation":{},"ISSN":["2193-1127"],"issn-type":[{"value":"2193-1127","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,3]]},"assertion":[{"value":"14 July 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 February 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 March 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"12"}}