{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T07:25:41Z","timestamp":1772781941335,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,4,20]],"date-time":"2009-04-20T00:00:00Z","timestamp":1240185600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,4,20]]},"DOI":"10.1145\/1526709.1526780","type":"proceedings-article","created":{"date-parts":[[2009,4,21]],"date-time":"2009-04-21T14:17:17Z","timestamp":1240323437000},"page":"521-530","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":148,"title":["Collective privacy management in social networks"],"prefix":"10.1145","author":[{"given":"Anna Cinzia","family":"Squicciarini","sequence":"first","affiliation":[{"name":"The Pennsylvania State University, University Park, PA, USA"}]},{"given":"Mohamed","family":"Shehab","sequence":"additional","affiliation":[{"name":"University of North Carolina at Charlotte, Charlotte, NC, USA"}]},{"given":"Federica","family":"Paci","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,4,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_3"},{"key":"e_1_3_2_1_2_1","unstructured":"D. Beaver. 10 billion photos. http:\/\/www.facebook.com\/note.php?note_id=30695603919 October 2008.  D. Beaver. 10 billion photos. http:\/\/www.facebook.com\/note.php?note_id=30695603919 October 2008."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2005.11.005"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70567-3_7"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11915072_80"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-005-2258-3"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01726210"},{"key":"e_1_3_2_1_8_1","volume-title":"Urban Inst.","author":"Clarke E. H.","year":"1972","unstructured":"E. H. Clarke . Multipart Pricing of Public Goods: An example. In Public Price for Public Products , Urban Inst. , 1972 . E. H. Clarke. Multipart Pricing of Public Goods: An example. In Public Price for Public Products, Urban Inst., 1972."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101149.1101257"},{"key":"e_1_3_2_1_10_1","first-page":"173","volume-title":"National Conference on Artificial Intelligence","author":"Ephrati E.","year":"1991","unstructured":"E. Ephrati and J. S. Rosenschein . The Clarke-tax as a consensus mechanism among automated agents . In National Conference on Artificial Intelligence , pages 173 -- 178 , 1991 . E. Ephrati and J. S. Rosenschein. The Clarke-tax as a consensus mechanism among automated agents. In National Conference on Artificial Intelligence, pages 173--178, 1991."},{"key":"e_1_3_2_1_11_1","volume-title":"Voting and multi-agent consensus","author":"Ephrati E.","year":"1991","unstructured":"E. Ephrati and J. S. Rosenschein . Voting and multi-agent consensus . 1991 . E. Ephrati and J. S. Rosenschein. Voting and multi-agent consensus. 1991."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(95)00105-0"},{"key":"e_1_3_2_1_13_1","unstructured":"Facebook. Facebook web site. http:\/\/www.facebook.com\/.  Facebook. Facebook web site. http:\/\/www.facebook.com\/."},{"key":"e_1_3_2_1_14_1","unstructured":"A. Felt. Defacing Facebook: A security case study.  A. Felt. Defacing Facebook: A security case study."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of Web 2.0 Security and Privacy 2008 (in conjunction with 2008 IEEE Symposium on Security and Privacy)","author":"Felt A.","year":"2008","unstructured":"A. Felt and D. Evans . Privacy protection for social networking platforms . In Proceedings of Web 2.0 Security and Privacy 2008 (in conjunction with 2008 IEEE Symposium on Security and Privacy) , 2008 . A. Felt and D. Evans. Privacy protection for social networking platforms. In Proceedings of Web 2.0 Security and Privacy 2008 (in conjunction with 2008 IEEE Symposium on Security and Privacy), 2008."},{"key":"e_1_3_2_1_16_1","volume-title":"Access control requirements for Web 2.0 Security and Privacy","author":"Gates C.","year":"2007","unstructured":"C. Gates . Access control requirements for Web 2.0 Security and Privacy . In IEEE Web 2.0 Privacy and Security Workshop , 2007 . C. Gates. Access control requirements for Web 2.0 Security and Privacy. In IEEE Web 2.0 Privacy and Security Workshop, 2007."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247508"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP '07)","author":"Gollu K. K.","year":"2007","unstructured":"K. K. Gollu , S. Saroiu , and A. Wolman . A social networking-based access control scheme for personal content . In Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP '07) -- Work-in-Progress Session , 2007 . K. K. Gollu, S. Saroiu, and A. Wolman. A social networking-based access control scheme for personal content. In Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP '07)-- Work-in-Progress Session, 2007."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367526"},{"key":"e_1_3_2_1_21_1","volume-title":"More content -- less control: Access control in the Web 2.0","author":"Hart M.","year":"2007","unstructured":"M. Hart , R. Johnson , and A. Stent . More content -- less control: Access control in the Web 2.0 . In IEEE Web 2.0 Privacy and Security Workshop , 2007 . M. Hart, R. Johnson, and A. Stent. More content -- less control: Access control in the Web 2.0. In IEEE Web 2.0 Privacy and Security Workshop, 2007."},{"key":"e_1_3_2_1_22_1","first-page":"1","article-title":"Security issues and recommendations for online social networks","author":"Hobgen G.","year":"2007","unstructured":"G. Hobgen . Security issues and recommendations for online social networks . ENISA Position Paper N. 1 , 2007 . G. Hobgen. Security issues and recommendations for online social networks. ENISA Position Paper N. 1, 2007.","journal-title":"ENISA Position Paper N."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of ROCLING X","author":"Jiang J.","year":"1997","unstructured":"J. Jiang and D. Conrath . Semantic similarity based on corpus statistics and lexical taxonomy . In Proceedings of ROCLING X , Sep 1997 . J. Jiang and D. Conrath. Semantic similarity based on corpus statistics and lexical taxonomy. In Proceedings of ROCLING X, Sep 1997."},{"key":"e_1_3_2_1_24_1","volume-title":"Pew Internet & American Life Project","author":"Lenhart A.","year":"2007","unstructured":"A. Lenhart and M. Madden . Teens, privacy & online social networks . Pew Internet & American Life Project , 18 April 2007 . A. Lenhart and M. Madden. Teens, privacy & online social networks. Pew Internet & American Life Project, 18 April 2007."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367564"},{"key":"e_1_3_2_1_26_1","volume-title":"Micro-Economic Theory","author":"Mas-Colell A.","year":"1998","unstructured":"A. Mas-Colell and M. D. Whinston . Micro-Economic Theory . Chapter 23. Oxford University Press , fourth edition, 1998 . A. Mas-Colell and M. D. Whinston. Micro-Economic Theory. Chapter 23. Oxford University Press, fourth edition, 1998."},{"key":"e_1_3_2_1_27_1","unstructured":"A. Mathes. Folksonomies: Cooperative classification and communication through shared metadata. http:\/\/www.adammathes.com\/academic\/computer-mediated-communication\/folk%sonomies.html 2004.  A. Mathes. Folksonomies: Cooperative classification and communication through shared metadata. http:\/\/www.adammathes.com\/academic\/computer-mediated-communication\/folk%sonomies.html 2004."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219748"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065385.1065430"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00367.x"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.64.016132"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88873-4_25"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.2307\/1913820"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.75"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/501158.501163"},{"key":"e_1_3_2_1_36_1","first-page":"1","volume-title":"System Reliability and Free Riding. In in Economics of Information Security","author":"Varian H. R.","year":"2002","unstructured":"H. R. Varian . System Reliability and Free Riding. In in Economics of Information Security , pages 1 -- 15 . Kluwer Academic Publishers , 2002 . H. R. Varian. System Reliability and Free Riding. In in Economics of Information Security, pages 1--15. Kluwer Academic Publishers, 2002."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1052220.1052290"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135839"}],"event":{"name":"WWW '09: The 18th International World Wide Web Conference","location":"Madrid Spain","acronym":"WWW '09","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 18th international conference on World wide web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1526709.1526780","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1526709.1526780","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:30:29Z","timestamp":1750253429000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1526709.1526780"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4,20]]},"references-count":38,"alternative-id":["10.1145\/1526709.1526780","10.1145\/1526709"],"URL":"https:\/\/doi.org\/10.1145\/1526709.1526780","relation":{},"subject":[],"published":{"date-parts":[[2009,4,20]]},"assertion":[{"value":"2009-04-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}