{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:48:14Z","timestamp":1772164094729,"version":"3.50.1"},"reference-count":40,"publisher":"Association for Computing Machinery (ACM)","issue":"8","license":[{"start":{"date-parts":[[2018,7,23]],"date-time":"2018-07-23T00:00:00Z","timestamp":1532304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000266","name":"EPSRC","doi-asserted-by":"crossref","award":["EP\/M027805\/1"],"award-info":[{"award-number":["EP\/M027805\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2018,7,23]]},"abstract":"<jats:p>Online privacy is not just about what you disclose about yourself, it is also about what others disclose about you.<\/jats:p>","DOI":"10.1145\/3208039","type":"journal-article","created":{"date-parts":[[2018,7,24]],"date-time":"2018-07-24T11:50:24Z","timestamp":1532433024000},"page":"74-81","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":73,"title":["Multiparty privacy in social media"],"prefix":"10.1145","volume":"61","author":[{"given":"Jose M.","family":"Such","sequence":"first","affiliation":[{"name":"King's College London, U.K."}]},{"given":"Natalia","family":"Criado","sequence":"additional","affiliation":[{"name":"King's College London, U.K."}]}],"member":"320","published-online":{"date-parts":[[2018,7,23]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_3"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753560"},{"key":"e_1_2_1_3_1","volume-title":"International Communication Association","author":"Boyd D.","year":"2011","unstructured":"Boyd, D. and Marwick, A. Social steganography: Privacy in networked publics. International Communication Association, 2011, Boston, MA."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897053.2897063"},{"key":"e_1_2_1_5_1","volume-title":"Collaborative access control in online social networks","author":"Carminati B.","year":"2011","unstructured":"Carminati, B. and Ferrari, E. Collaborative access control in online social networks. IEEE CollaborateCom, (2011), 231--240."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.07.013"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772727"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038920"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943539"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.37"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.97"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2613087.2613097"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813603"},{"key":"e_1_2_1_15_1","volume-title":"A focus on efficiency","author":"Internet","year":"2014","unstructured":"Internet.org. A focus on efficiency, 2014; http:\/\/internet.org\/efficiencypaper\/"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208552"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970030.2970035"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979420"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2014.107"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1387649.1387651"},{"key":"e_1_2_1_21_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum H","year":"2004","unstructured":"Nissenbaum, H. Privacy as contextual integrity. Wash. L. Rev. 79 (2004), 119.","journal-title":"Wash. L. Rev."},{"key":"e_1_2_1_22_1","volume-title":"Boundaries of Privacy: Dialectics of Disclosure","author":"Petronio S.","year":"2012","unstructured":"Petronio, S. Boundaries of Privacy: Dialectics of Disclosure. Suny Press, 2012."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660317"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/3235924.3235944"},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the 2017 International Conference on Decision and Game Theory for Security, 112--130","author":"Rajtmajer S.","unstructured":"Rajtmajer, S., Squicciarini, A., Such, J.M., Semonsen, J. and Belmonte, A. An ultimatum game model for the evolution of privacy in jointly managed content. In Proceedings of the 2017 International Conference on Decision and Game Theory for Security, 112--130."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1883749.1883771"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660460.2660470"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398356.2398381"},{"key":"e_1_2_1_29_1","first-page":"2","article-title":"Online social networks: Why we disclose","volume":"25","author":"Spiekermann S.","year":"2010","unstructured":"Spiekermann, S., Krasnova, H., Koroleva, K. and Hildebrand, T. Online social networks: Why we disclose. J. Information Technology 25, 2 2010), 109--125.","journal-title":"J. Information Technology"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526780"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2821512"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2539165"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025668"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.220"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881151.1881165"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078861.3078875"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078841"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2811257"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2010.13"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207761"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3208039","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3208039","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:26:01Z","timestamp":1764782761000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3208039"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,23]]},"references-count":40,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2018,7,23]]}},"alternative-id":["10.1145\/3208039"],"URL":"https:\/\/doi.org\/10.1145\/3208039","relation":{"has-review":[{"id-type":"doi","id":"10.3410\/f.733994471.793550562","asserted-by":"object"}]},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,23]]},"assertion":[{"value":"2018-07-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}