{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T15:57:34Z","timestamp":1774195054379,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,12,5]],"date-time":"2011-12-05T00:00:00Z","timestamp":1323043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004482","name":"Kuwait University","doi-asserted-by":"publisher","award":["EO03\/11"],"award-info":[{"award-number":["EO03\/11"]}],"id":[{"id":"10.13039\/501100004482","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,12,5]]},"DOI":"10.1145\/2095536.2095620","type":"proceedings-article","created":{"date-parts":[[2012,1,17]],"date-time":"2012-01-17T17:20:41Z","timestamp":1326820841000},"page":"416-419","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Social network privacy and trust concerns"],"prefix":"10.1145","author":[{"given":"Maha","family":"Faisal","sequence":"first","affiliation":[{"name":"Kuwait University, Safat, Kuwait"}]},{"given":"Asmaa","family":"Alsumait","sequence":"additional","affiliation":[{"name":"Kuwait University, Safat, Kuwait"}]}],"member":"320","published-online":{"date-parts":[[2011,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_3"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1953563.1953568"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 30th IEEE International Conference on Computer Communications (Infocom 2011","author":"Dong W.","year":"2011","unstructured":"Dong , W. , Dave , V. , Qiu , L. and Zhang , Y . 2011. Secure Friend Discovery in Mobile Social Networks , In Proceedings of the 30th IEEE International Conference on Computer Communications (Infocom 2011 ), Shanghai, China , April 2011 . Dong, W., Dave, V., Qiu, L. and Zhang, Y. 2011. Secure Friend Discovery in Mobile Social Networks, In Proceedings of the 30th IEEE International Conference on Computer Communications (Infocom 2011), Shanghai, China, April 2011."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.68"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the Thirteenth Americas Conference on Information Systems","author":"Dwyer C.","year":"2007","unstructured":"Dwyer C. , Hiltz S. R. , Passerini K. , 2007 , Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace , In Proceedings of the Thirteenth Americas Conference on Information Systems , Keystone, Colorado. Dwyer C., Hiltz S. R., Passerini K., 2007, Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace, In Proceedings of the Thirteenth Americas Conference on Information Systems, Keystone, Colorado."},{"key":"e_1_3_2_1_6_1","article-title":"An Evaluation of Students' Identity-Sharing Behavior in Social Network Communities as Preparation for Knowledge Sharing","volume":"2010","author":"Ismail S.","year":"2010","unstructured":"Ismail S. , 2010 , An Evaluation of Students' Identity-Sharing Behavior in Social Network Communities as Preparation for Knowledge Sharing , International Journal for the Advancement of Science & Arts , 2010 , 1(1), 14--21. Ismail S., 2010, An Evaluation of Students' Identity-Sharing Behavior in Social Network Communities as Preparation for Knowledge Sharing, International Journal for the Advancement of Science & Arts, 2010, 1(1), 14--21.","journal-title":"International Journal for the Advancement of Science & Arts"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1672308.1672328"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the IADIS International Conference e-Society","author":"Lazzari M.","year":"2010","unstructured":"Lazzari , M. 2010 . An experiment on the weakness of reputation algorithms used in professional social networks: the case of Naymz \", Proceedings of the IADIS International Conference e-Society 2010, Porto, Portugal, March 18--21, 519--522. Lazzari, M. 2010. An experiment on the weakness of reputation algorithms used in professional social networks: the case of Naymz\", Proceedings of the IADIS International Conference e-Society 2010, Porto, Portugal, March 18--21, 519--522."},{"issue":"4","key":"e_1_3_2_1_10_1","first-page":"74","article-title":"Online Privacy Concerns Among Social Networks","volume":"6","author":"Mohamed A.","year":"2010","unstructured":"Mohamed . A. 2010 . Online Privacy Concerns Among Social Networks ' Users. Cross-Cultural Communication. , 6 ( 4 ), 74 -- 89 . Mohamed. A. 2010. Online Privacy Concerns Among Social Networks' Users. Cross-Cultural Communication., 6(4), 74--89.","journal-title":"Users. Cross-Cultural Communication."},{"key":"e_1_3_2_1_11_1","volume-title":"The Future of Reputation: Gossip, Rumor, and Privacy on the Internet","author":"Solove D. J.","year":"2007","unstructured":"Solove , D. J. 2007. The Future of Reputation: Gossip, Rumor, and Privacy on the Internet . 2007 . Solove, D. J. 2007. The Future of Reputation: Gossip, Rumor, and Privacy on the Internet. 2007."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1177\/0270467607311484"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 4th international conference on Social computing, behavioral-cultural modeling and prediction SBP'11","author":"Zhan J.","unstructured":"Zhan , J. and Fang X . 2011. Trust maximization in social networks . In Proceedings of the 4th international conference on Social computing, behavioral-cultural modeling and prediction SBP'11 . 205--211. Zhan, J. and Fang X. 2011. Trust maximization in social networks. In Proceedings of the 4th international conference on Social computing, behavioral-cultural modeling and prediction SBP'11. 205--211."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1021"}],"event":{"name":"MoMM '11: The 9th International Conference on Advances in Mobile Computing & Multimedia","location":"Ho Chi Minh City Vietnam","acronym":"MoMM '11"},"container-title":["Proceedings of the 13th International Conference on Information Integration and Web-based Applications and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2095536.2095620","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2095536.2095620","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:40Z","timestamp":1750240480000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2095536.2095620"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12,5]]},"references-count":14,"alternative-id":["10.1145\/2095536.2095620","10.1145\/2095536"],"URL":"https:\/\/doi.org\/10.1145\/2095536.2095620","relation":{},"subject":[],"published":{"date-parts":[[2011,12,5]]},"assertion":[{"value":"2011-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}