{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:29:27Z","timestamp":1750220967695,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T00:00:00Z","timestamp":1559779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Deutsche Forschungsgemeinschaft (DFG)","award":["GRK 2167"],"award-info":[{"award-number":["GRK 2167"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,6]]},"DOI":"10.1145\/3314183.3323849","type":"proceedings-article","created":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T15:39:51Z","timestamp":1560353991000},"page":"117-125","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Learning from Online Regrets"],"prefix":"10.1145","author":[{"given":"Nicol\u00e1s Emilio","family":"D\u00edaz Ferreyra","sequence":"first","affiliation":[{"name":"University of Duisburg-Essen, Duisburg, Germany"}]},{"given":"Rene","family":"Meis","sequence":"additional","affiliation":[{"name":"University of Duisburg-Essen, Duisburg, Germany"}]},{"given":"Maritta","family":"Heisel","sequence":"additional","affiliation":[{"name":"University of Duisburg-Essen, Duisburg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,6,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1177\/0743558411432635"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00019"},{"key":"e_1_3_2_1_3_1","first-page":"58","article-title":"Understanding the landscape of privacy technologies (extended abstract)","volume":"2012","author":"Diaz Claudia","year":"2012","unstructured":"Claudia Diaz and Seda G\u00fcrses . 2012 . Understanding the landscape of privacy technologies (extended abstract) . In Proceedings of the Information Security Summit, ISS 2012. 58 -- 63 . Claudia Diaz and Seda G\u00fcrses. 2012. Understanding the landscape of privacy technologies (extended abstract). In Proceedings of the Information Security Summit, ISS 2012. 58--63.","journal-title":"Proceedings of the Information Security Summit, ISS"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66808-6_7"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006517302120216"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2018.8514186"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1257\/aer.99.2.159"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/qre.2254"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772727"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1136\/tobaccocontrol-2012-050541"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3124420"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 14th Australasian Language Technology Association Workshop. 123--127","author":"Joshi Aditya","year":"2016","unstructured":"Aditya Joshi , Vaibhav Tripathi , Pushpak Bhattacharyya , Mark Carman , Meghna Singh , Jaya Saraswati , and Rajita Shukla . 2016 . How Challenging is Sarcasm versus Irony Classification?: A Study With a Dataset from English Literature . In Proceedings of the 14th Australasian Language Technology Association Workshop. 123--127 . Aditya Joshi, Vaibhav Tripathi, Pushpak Bhattacharyya, Mark Carman, Meghna Singh, Jaya Saraswati, and Rajita Shukla. 2016. How Challenging is Sarcasm versus Irony Classification?: A Study With a Dataset from English Literature. In Proceedings of the 14th Australasian Language Technology Association Workshop. 123--127."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2209310.2209313"},{"volume-title":"Model-Driven Risk Analysis: The CORAS Approach","author":"Lund Mass Soldal","key":"e_1_3_2_1_14_1","unstructured":"Mass Soldal Lund , Bj\u00f8rnar Solhaug , and Ketil St\u00f8len . 2010. Model-Driven Risk Analysis: The CORAS Approach . Springer Science & Business Media . Mass Soldal Lund, Bj\u00f8rnar Solhaug, and Ketil St\u00f8len. 2010. Model-Driven Risk Analysis: The CORAS Approach. Springer Science & Business Media."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/3192424.3192434"},{"key":"e_1_3_2_1_16_1","first-page":"1","article-title":"Anonymizing Personal Text Messages Posted in Online Social Networks and Detecting Disclosures of Personal Information","volume":"98","author":"Nguyen-Son Hoang-Quoc","year":"2015","unstructured":"Hoang-Quoc Nguyen-Son , Minh-Triet Tran , Hiroshi Yoshiura , Noboru Sonehara , and Isao Echizen . 2015 . Anonymizing Personal Text Messages Posted in Online Social Networks and Detecting Disclosures of Personal Information . IEICE Transactions on Information and Systems , Vol. 98 , 1 (January 2015), 78--88. Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Hiroshi Yoshiura, Noboru Sonehara, and Isao Echizen. 2015. Anonymizing Personal Text Messages Posted in Online Social Networks and Detecting Disclosures of Personal Information . IEICE Transactions on Information and Systems, Vol. 98, 1 (January 2015), 78--88.","journal-title":"IEICE Transactions on Information and Systems"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2015.80"},{"key":"e_1_3_2_1_18_1","first-page":"1","article-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation)","volume":"59","author":"Protection Regulation General Data","year":"2016","unstructured":"General Data Protection Regulation . 2016 . Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation) . Official Journal of the European Union (OJ) , Vol. 59 (2016), 1 -- 88 . General Data Protection Regulation. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation) . Official Journal of the European Union (OJ), Vol. 59 (2016), 1--88.","journal-title":"Official Journal of the European Union (OJ)"},{"key":"e_1_3_2_1_19_1","volume-title":"Content: The Impact of Risk and Presentation on Disclosure Decisions. In Thirteenth Symposium on Usable Privacy and Security (SOUPS","author":"Samat Sonam","year":"2017","unstructured":"Sonam Samat and Alessandro Acquisti . 2017 . Format vs . Content: The Impact of Risk and Presentation on Disclosure Decisions. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, 377--384. Sonam Samat and Alessandro Acquisti. 2017. Format vs. Content: The Impact of Risk and Presentation on Disclosure Decisions. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, 377--384."},{"key":"e_1_3_2_1_20_1","volume-title":"The 67th Annual Conference of the International Communication Association .","author":"Johanna","year":"2017","unstructured":"Johanna Sch\"awel. 2017 . Paving the Way for Technical Privacy Support: A Qualitative Study on Users' Intentions to Engage in Privacy Protection . In The 67th Annual Conference of the International Communication Association . Johanna Sch\"awel. 2017. Paving the Way for Technical Privacy Support: A Qualitative Study on Users' Intentions to Engage in Privacy Protection. In The 67th Annual Conference of the International Communication Association ."},{"key":"e_1_3_2_1_21_1","unstructured":"Johanna Sch\"awel and Nicole Kr\"amer. 2018. Do You Really Want to Disclose?: Examining Psycological Variables that Influence the Effectsof Persuasive Prompts for Reducing Online Privacy Risks. (2018). Forschungsreferat beim 51. Kongress der Deutschen Gesellschaft f\u00fcr Psychologie (DGPs).  Johanna Sch\"awel and Nicole Kr\"amer. 2018. Do You Really Want to Disclose?: Examining Psycological Variables that Influence the Effectsof Persuasive Prompts for Reducing Online Privacy Risks. (2018). Forschungsreferat beim 51. Kongress der Deutschen Gesellschaft f\u00fcr Psychologie (DGPs)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2015.1107167"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078841"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29883-2_15"}],"event":{"name":"UMAP '19: 27th Conference on User Modeling, Adaptation and Personalization","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Larnaca Cyprus","acronym":"UMAP '19"},"container-title":["Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314183.3323849","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314183.3323849","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:24Z","timestamp":1750204464000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314183.3323849"}},"subtitle":["From Deleted Posts to Risk Awareness in Social Network Sites"],"short-title":[],"issued":{"date-parts":[[2019,6,6]]},"references-count":24,"alternative-id":["10.1145\/3314183.3323849","10.1145\/3314183"],"URL":"https:\/\/doi.org\/10.1145\/3314183.3323849","relation":{},"subject":[],"published":{"date-parts":[[2019,6,6]]},"assertion":[{"value":"2019-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}