{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T15:55:29Z","timestamp":1774194929202,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,2,8]],"date-time":"2016-02-08T00:00:00Z","timestamp":1454889600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100008242","name":"National ICT Australia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100008242","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA2386-15-1-4018"],"award-info":[{"award-number":["FA2386-15-1-4018"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,2,8]]},"DOI":"10.1145\/2835776.2835798","type":"proceedings-article","created":{"date-parts":[[2016,2,4]],"date-time":"2016-02-04T11:26:02Z","timestamp":1454585162000},"page":"215-224","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Evolution of Privacy Loss in Wikipedia"],"prefix":"10.1145","author":[{"given":"Marian-Andrei","family":"Rizoiu","sequence":"first","affiliation":[{"name":"National ICT Australia &amp; Australian National University, Canberra, Australia"}]},{"given":"Lexing","family":"Xie","sequence":"additional","affiliation":[{"name":"Australian National University &amp; National ICT Australia, Canberra, Australia"}]},{"given":"Tiberio","family":"Caetano","sequence":"additional","affiliation":[{"name":"Ambiata &amp; Australian National University &amp; University of New South Wales, Sydney, Australia"}]},{"given":"Manuel","family":"Cebrian","sequence":"additional","affiliation":[{"name":"National ICT Australia, Melbourne, Australia"}]}],"member":"320","published-online":{"date-parts":[[2016,2,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Evolution of privacy loss in Wikipedia","year":"2015","unstructured":"Supplementary material: Evolution of privacy loss in Wikipedia, 2015. http:\/\/goo.gl\/JT6WK7."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1086\/671754"},{"key":"e_1_3_2_1_3_1","volume-title":"ICWSM '07","author":"Almeida R.","year":"2007","unstructured":"R. Almeida, B. Mozafari, and J. Cho. On the evolution of Wikipedia. In ICWSM '07, 2007."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.348.6231.194-b"},{"key":"e_1_3_2_1_5_1","volume-title":"boyd and A. E. Marwick. Social Privacy in Networked Publics: Teens' Attitudes, Practices, and Strategies. A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society, sep","year":"2011","unstructured":"d. boyd and A. E. Marwick. Social Privacy in Networked Publics: Teens' Attitudes, Practices, and Strategies. A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society, sep 2011."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187931"},{"key":"e_1_3_2_1_7_1","first-page":"3","article-title":"Unique in the crowd: The privacy bounds of human mobility","author":"de Montjoye Y.-A.","year":"2013","unstructured":"Y.-A. de Montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel. Unique in the crowd: The privacy bounds of human mobility. Scientific Reports, 3, 2013.","journal-title":"Scientific Reports"},{"key":"e_1_3_2_1_8_1","volume-title":"Standford","author":"Gibbons A.","year":"2012","unstructured":"A. Gibbons, D. Vetrano, and S. Biancani. Wikipedia: Nowhere to grow. Tech. report, Standford, 2012."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1177\/0002764212469365"},{"key":"e_1_3_2_1_10_1","volume-title":"Apr.","author":"Hoofnagle C. J.","year":"2010","unstructured":"C. J. Hoofnagle, J. King, S. Li, and J. Turow. How Different are Young Adults from Older Adults When it Comes to Information Privacy Attitudes and Policies? Ssrn scholarly paper, Apr. 2010."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2517747"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1218772110"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/971143"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.348.6231.194-a"},{"key":"e_1_3_2_1_15_1","volume-title":"R package 'infotheo","author":"Meyer P. E.","year":"2014","unstructured":"P. E. Meyer. R package 'infotheo', 2014."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.348.6231.195-a"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1256297"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2011.6033446"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1743546.1743558"},{"key":"e_1_3_2_1_20_1","first-page":"1","volume-title":"The Network Effect of Privacy Choices. In Workshop EcoNet","author":"Ramachandran A.","year":"2015","unstructured":"A. Ramachandran and A. Chaintreau. The Network Effect of Privacy Choices. In Workshop EcoNet, pages 1--4, 2015."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1308540110"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1641309.1641322"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187906"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1198\/jasa.2009.tm08651"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1940761.1940778"},{"key":"e_1_3_2_1_27_1","volume-title":"PNAS","author":"Youyou W.","year":"2014","unstructured":"W. Youyou, M. Kosinski, and D. Stillwell. Computer-based personality judgments are more accurate than those made by humans. PNAS, 2014."}],"event":{"name":"WSDM 2016: Ninth ACM International Conference on Web Search and Data Mining","location":"San Francisco California USA","acronym":"WSDM 2016","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the Ninth ACM International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2835776.2835798","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2835776.2835798","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2835776.2835798","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:41:01Z","timestamp":1763458861000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2835776.2835798"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,8]]},"references-count":27,"alternative-id":["10.1145\/2835776.2835798","10.1145\/2835776"],"URL":"https:\/\/doi.org\/10.1145\/2835776.2835798","relation":{},"subject":[],"published":{"date-parts":[[2016,2,8]]},"assertion":[{"value":"2016-02-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}