{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T20:16:13Z","timestamp":1764792973790,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T00:00:00Z","timestamp":1472428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,29]]},"DOI":"10.1145\/2970030.2970035","type":"proceedings-article","created":{"date-parts":[[2016,8,31]],"date-time":"2016-08-31T12:32:08Z","timestamp":1472646728000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Strategies for Privacy Negotiation in Online Social Networks"],"prefix":"10.1145","author":[{"given":"Dilara","family":"Kek\u00fcll\u00fco\u011flu","sequence":"first","affiliation":[{"name":"Bogazici University, Istanbul, Turkey"}]},{"given":"Nadin","family":"K\u00f6kciyan","sequence":"additional","affiliation":[{"name":"Bogazici University, Istanbul, Turkey"}]},{"given":"P\u0131nar","family":"Yolum","sequence":"additional","affiliation":[{"name":"Bogazici University, Istanbul, Turkey"}]}],"member":"320","published-online":{"date-parts":[[2016,8,29]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"161","volume-title":"The norm of reciprocity: A preliminary statement. American sociological review","author":"Gouldner A. W.","year":"1960","unstructured":"A. W. Gouldner . The norm of reciprocity: A preliminary statement. American sociological review , pages 161 -- 178 , 1960 . A. W. Gouldner. The norm of reciprocity: A preliminary statement. American sociological review, pages 161--178, 1960."},{"key":"e_1_3_2_1_2_1","first-page":"79","article-title":"SWRL: A semantic web rule language combining OWL and RuleML","volume":"21","author":"Horrocks I.","year":"2004","unstructured":"I. Horrocks , P. F. Patel-Schneider , H. Boley , S. Tabet , B. Grosof , M. Dean , SWRL: A semantic web rule language combining OWL and RuleML . World Wide Web Consortium Member submission , 21 : 79 , 2004 . I. Horrocks, P. F. Patel-Schneider, H. Boley, S. Tabet, B. Grosof, M. Dean, et al. SWRL: A semantic web rule language combining OWL and RuleML. World Wide Web Consortium Member submission, 21:79, 2004.","journal-title":"World Wide Web Consortium Member submission"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1016\/0049-089X(76)90003-X"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/1978942.1979420"},{"key":"e_1_3_2_1_5_1","series-title":"Communications in Computer and Information Science","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/978-3-319-24804-2_8","volume-title":"Advances in Social Computing and Multiagent Systems","author":"Mester Y.","year":"2015","unstructured":"Y. Mester , N. K\u00f6kciyan , and P. Yolum . Negotiating privacy constraints in online social networks . In F. Koch, C. Guttmann, and D. Busquets, editors, Advances in Social Computing and Multiagent Systems , volume 541 of Communications in Computer and Information Science , pages 112 -- 129 . Springer International Publishing , 2015 . Y. Mester, N. K\u00f6kciyan, and P. Yolum. Negotiating privacy constraints in online social networks. In F. Koch, C. Guttmann, and D. Busquets, editors, Advances in Social Computing and Multiagent Systems, volume 541 of Communications in Computer and Information Science, pages 112--129. Springer International Publishing, 2015."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1016\/S0097-8493(99)00120-X"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/1526709.1526780"},{"key":"e_1_3_2_1_8_1","volume-title":"How giant websites design for you (and a billion others, too). https:\/\/www.ted.com\/talks\/margaret_gould_stewart_how_giant_websites_design_for_you_and_a_billion_others_too?language=en","author":"Stewart M. G.","year":"2014","unstructured":"M. G. Stewart . How giant websites design for you (and a billion others, too). https:\/\/www.ted.com\/talks\/margaret_gould_stewart_how_giant_websites_design_for_you_and_a_billion_others_too?language=en , 2014 . M. G. Stewart. How giant websites design for you (and a billion others, too). https:\/\/www.ted.com\/talks\/margaret_gould_stewart_how_giant_websites_design_for_you_and_a_billion_others_too?language=en, 2014."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/2821512"}],"event":{"acronym":"PrAISe '16","name":"PrAISe '16: International Workshop on AI for Privacy and Security","location":"The Hague Netherlands"},"container-title":["Proceedings of the 1st International Workshop on AI for Privacy and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970030.2970035","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2970030.2970035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:00Z","timestamp":1750218600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970030.2970035"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,29]]},"references-count":9,"alternative-id":["10.1145\/2970030.2970035","10.1145\/2970030"],"URL":"https:\/\/doi.org\/10.1145\/2970030.2970035","relation":{},"subject":[],"published":{"date-parts":[[2016,8,29]]},"assertion":[{"value":"2016-08-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}