{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T05:44:56Z","timestamp":1774158296859,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,7,3]],"date-time":"2018-07-03T00:00:00Z","timestamp":1530576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"MITACS Accelerate Program","award":["IT05283"],"award-info":[{"award-number":["IT05283"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,7,3]]},"DOI":"10.1145\/3209542.3209564","type":"proceedings-article","created":{"date-parts":[[2018,7,5]],"date-time":"2018-07-05T08:23:03Z","timestamp":1530778983000},"page":"156-164","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Understanding Privacy Dichotomy in Twitter"],"prefix":"10.1145","author":[{"given":"Taraneh","family":"Khazaei","sequence":"first","affiliation":[{"name":"Western University, London, Canada"}]},{"given":"Lu","family":"Xiao","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, NY, USA"}]},{"given":"Robert E.","family":"Mercer","sequence":"additional","affiliation":[{"name":"Western University, London, Canada"}]},{"given":"Atif","family":"Khan","sequence":"additional","affiliation":[{"name":"InfoTrellis Inc., Toronto, Canada"}]}],"member":"320","published-online":{"date-parts":[[2018,7,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_3"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the Symposium on Usable Privacy and Security.","author":"Adu-Oppong Fabeah","year":"2008","unstructured":"Fabeah Adu-Oppong, Casey Gardine, Apu Kapadia, and Patrick Tsang. 2008. Social Circles: Tracking Privacy in Social Networks. In Proceedings of the Symposium on Usable Privacy and Security."},{"key":"e_1_3_2_1_3_1","first-page":"2200","article-title":"SentiWordNet 3.0: An Enhanced Lexical Resource for Sentiment Analysis and Opinion Mining","volume":"10","author":"Baccianella Stefano","year":"2010","unstructured":"Stefano Baccianella, Andrea Esuli, and Fabrizio Sebastiani. 2010. SentiWordNet 3.0: An Enhanced Lexical Resource for Sentiment Analysis and Opinion Mining.. In LREC, Vol. 10. 2200--2204.","journal-title":"LREC"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665958"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1654988.1654991"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the AAAI Conference on Web and Social Media.","author":"Dong Cailing","year":"2015","unstructured":"Cailing Dong, Hongxia Jin, and Bart Knijnenburg. 2015. Predicting Privacy Behavior on Online Social Networks. In Proceedings of the AAAI Conference on Web and Social Media."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772727"},{"key":"e_1_3_2_1_8_1","volume-title":"Privacy Aspects of Recommender Systems","author":"Friedman Arik","unstructured":"Arik Friedman, Bart P. Knijnenburg, Kris Vanhecke, Luc Martens, and Shlomo Berkovsky. 2015. Privacy Aspects of Recommender Systems. Springer US, Boston, MA, 649--688."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2492654"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979421"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0307752101"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.9776\/16293"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2890088"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278201.1278202"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-1016"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1387649.1387651"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1870096.1870102"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068823"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the AAAI Conference on Web and Social Media. 241--249","author":"Malik Momin","year":"2016","unstructured":"Momin Malik and J\u00fcrgen Pfeffer. 2016. Identifying platform effects in social media data. In Proceedings of the AAAI Conference on Web and Social Media. 241--249."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335374"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.27.1.415"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2576939"},{"key":"e_1_3_2_1_23_1","series-title":"Lecture Notes in Computer Science","volume-title":"User Modeling, Adaptation and Personalization","author":"Djafari Kaweh Naini","unstructured":"Kaweh Naini Djafari, IsmailSengor Altingovde, Ricardo Kawase, Eelco Herder, and Claudia Niederee. 2015. Analyzing and Predicting Privacy Settings in the Social Web. In User Modeling, Adaptation and Personalization. Lecture Notes in Computer Science, Vol. 9146. Springer International Publishing, 104--117."},{"key":"e_1_3_2_1_24_1","volume-title":"Psychological aspects of natural language use: Our words, our selves. Annual review of psychology 54, 1","author":"Pennebaker James W","year":"2003","unstructured":"James W Pennebaker, Matthias R Mehl, and Kate G Niederhoffer. 2003. Psychological aspects of natural language use: Our words, our selves. Annual review of psychology 54, 1 (2003), 547--577."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2010.10"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2012.66"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2012.250490"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.07.007"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2320729"},{"key":"e_1_3_2_1_30_1","volume-title":"International Conference on Advances in Computing, Communications and Informatics. 2095--2100","author":"Srivastava A.","unstructured":"A. Srivastava and G. Geethakumari. 2013. Measuring privacy leaks in Online Social Networks. In International Conference on Advances in Computing, Communications and Informatics. 2095--2100."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1531514.1531530"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-011-9110-z"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718520"},{"key":"e_1_3_2_1_34_1","volume-title":"Profiling Facebook Users Privacy Behaviors. In Symposium on Usable Privacy and Security.","author":"Wisniewski Pamela","year":"2014","unstructured":"Pamela Wisniewski, Bart P Knijnenburg, and Heather Richter Lipford. 2014. Profiling Facebook Users Privacy Behaviors. In Symposium on Usable Privacy and Security."},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the AAAI Conference on Weblogs and Social Media.","author":"Zamal Faiyaz Al","year":"2012","unstructured":"Faiyaz Al Zamal, Wendy Liu, and Derek Ruths. 2012. Homophily and Latent Attribute Inference: Inferring Latent Attributes of Twitter Users from Neighbors.. In Proceedings of the AAAI Conference on Weblogs and Social Media."}],"event":{"name":"HT '18: 29th ACM Conference on Hypertext and Social Media","location":"Baltimore MD USA","acronym":"HT '18","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCHI Specialist Interest Group in Computer-Human Interaction of the ACM"]},"container-title":["Proceedings of the 29th on Hypertext and Social Media"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3209542.3209564","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3209542.3209564","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T03:10:49Z","timestamp":1774149049000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3209542.3209564"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,3]]},"references-count":35,"alternative-id":["10.1145\/3209542.3209564","10.1145\/3209542"],"URL":"https:\/\/doi.org\/10.1145\/3209542.3209564","relation":{},"subject":[],"published":{"date-parts":[[2018,7,3]]},"assertion":[{"value":"2018-07-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}