{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:32:51Z","timestamp":1762867971716,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":86,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1801663"],"award-info":[{"award-number":["1801663"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3354202","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"991-1008","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media"],"prefix":"10.1145","author":[{"given":"Mainack","family":"Mondal","sequence":"first","affiliation":[{"name":"IIT Kharagpur &amp; University of Chicago, Kharagpur, India"}]},{"given":"G\u00fcnce Su","family":"Yilmaz","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"given":"Noah","family":"Hirsch","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"given":"Mohammad Taha","family":"Khan","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago, Chicago, IL, USA"}]},{"given":"Michael","family":"Tang","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"given":"Christopher","family":"Tran","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago, Chicago, IL, USA"}]},{"given":"Chris","family":"Kanich","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago, Chicago, IL, USA"}]},{"given":"Blase","family":"Ur","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"given":"Elena","family":"Zheleva","sequence":"additional","affiliation":[{"name":"University of Illinois at Chicago, Chicago, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_3"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441878"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501608"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/07370024.2016.1203791"},{"key":"e_1_3_2_2_5_1","volume-title":"Proc. ICWSM.","author":"Backstrom Lars","year":"2011","unstructured":"Lars Backstrom , Eytan Bakshy , Jon Kleinberg , Thomas Lento , and Itamar Rosenn . 2011 . Center of Attention: How Facebook Users Allocate Attention across Friends . In Proc. ICWSM. Lars Backstrom, Eytan Bakshy, Jon Kleinberg, Thomas Lento, and Itamar Rosenn. 2011. Center of Attention: How Facebook Users Allocate Attention across Friends. In Proc. ICWSM."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517859"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518838"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501606"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470658"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772803"},{"key":"e_1_3_2_2_11_1","volume-title":"Franklin","author":"Brackenbury Will","year":"2019","unstructured":"Will Brackenbury , Rui Liu , Mainack Mondal , Aaron Elmore , Blase Ur , Kyle Chard , and Michael J . Franklin . 2019 . Draining the Data Swamp : A Similarity-based Approach. In Proc. HILDA. Will Brackenbury, Rui Liu, Mainack Mondal, Aaron Elmore, Blase Ur, Kyle Chard, and Michael J. Franklin. 2019. Draining the Data Swamp: A Similarity-based Approach. In Proc. HILDA."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1177\/1948550612455931"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"Petter Bae Brandtzaeg and Marika L\u00fcders. 2018. Time Collapse in Social Media: Extending the Context Collapse. Social Media  Petter Bae Brandtzaeg and Marika L\u00fcders. 2018. Time Collapse in Social Media: Extending the Context Collapse. Social Media","DOI":"10.1177\/2056305118763349"},{"key":"e_1_3_2_2_14_1","unstructured":"Society Vol. 4 1 (2018).  Society Vol. 4 1 (2018)."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143124"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2009.01494.x"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979280"},{"key":"e_1_3_2_2_18_1","volume-title":"https:\/\/developers.facebook.com\/docs\/apps\/faq#app-scoped-ids. (Last accessed","author":"Ds App-Scoped","year":"2019","unstructured":"Facebook. 2018a. App-Scoped I Ds . https:\/\/developers.facebook.com\/docs\/apps\/faq#app-scoped-ids. (Last accessed in August 2019 ). Facebook. 2018a. App-Scoped IDs. https:\/\/developers.facebook.com\/docs\/apps\/faq#app-scoped-ids. (Last accessed in August 2019)."},{"volume-title":"How do I choose who can see previous posts on my timeline? https:\/\/www.facebook.com\/help\/236898969688346. (Last accessed","year":"2019","key":"e_1_3_2_2_19_1","unstructured":"Facebook. 2018b. How do I choose who can see previous posts on my timeline? https:\/\/www.facebook.com\/help\/236898969688346. (Last accessed in August 2019 ). Facebook. 2018b. How do I choose who can see previous posts on my timeline? https:\/\/www.facebook.com\/help\/236898969688346. (Last accessed in August 2019)."},{"volume-title":"What audiences can I choose from when I share? https:\/\/www.facebook.com\/help\/211513702214269. (Last accessed","year":"2019","key":"e_1_3_2_2_20_1","unstructured":"Facebook. 2018c. What audiences can I choose from when I share? https:\/\/www.facebook.com\/help\/211513702214269. (Last accessed in August 2019 ). Facebook. 2018c. What audiences can I choose from when I share? https:\/\/www.facebook.com\/help\/211513702214269. (Last accessed in August 2019)."},{"volume-title":"2018 d. What is public information? https:\/\/www.facebook.com\/help\/203805466323736. (Last accessed","year":"2019","key":"e_1_3_2_2_21_1","unstructured":"Facebook. 2018 d. What is public information? https:\/\/www.facebook.com\/help\/203805466323736. (Last accessed in August 2019 ). Facebook. 2018 d. What is public information? https:\/\/www.facebook.com\/help\/203805466323736. (Last accessed in August 2019)."},{"volume-title":"2018 e. What's Privacy Checkup and how can I find it? https:\/\/www.facebook.com\/help\/443357099140264\/. (Last accessed","year":"2019","key":"e_1_3_2_2_22_1","unstructured":"Facebook. 2018 e. What's Privacy Checkup and how can I find it? https:\/\/www.facebook.com\/help\/443357099140264\/. (Last accessed in August 2019 ). Facebook. 2018 e. What's Privacy Checkup and how can I find it? https:\/\/www.facebook.com\/help\/443357099140264\/. (Last accessed in August 2019)."},{"volume-title":"2018 f. When I post something, how do I choose who can see it? https:\/\/www.facebook.com\/help\/120939471321735. (Last accessed","year":"2019","key":"e_1_3_2_2_23_1","unstructured":"Facebook. 2018 f. When I post something, how do I choose who can see it? https:\/\/www.facebook.com\/help\/120939471321735. (Last accessed in August 2019 ). Facebook. 2018 f. When I post something, how do I choose who can see it? https:\/\/www.facebook.com\/help\/120939471321735. (Last accessed in August 2019)."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772727"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998223"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.2307\/2340521"},{"key":"e_1_3_2_2_27_1","volume-title":"Science Advances","volume":"3","author":"Garcia David","year":"2017","unstructured":"David Garcia . 2017 . Leaking Privacy and Shadow Profiles in Online Social Networks . Science Advances , Vol. 3 , 8 (2017). David Garcia. 2017. Leaking Privacy and Shadow Profiles in Online Social Networks. Science Advances, Vol. 3, 8 (2017)."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2457317.2457344"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518736"},{"key":"e_1_3_2_2_30_1","volume-title":"Proc. USENIX Security.","author":"Gong Neil Zhenqiang","year":"2016","unstructured":"Neil Zhenqiang Gong and Bin Liu . 2016 . You Are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors . In Proc. USENIX Security. Neil Zhenqiang Gong and Bin Liu. 2016. You Are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors. In Proc. USENIX Security."},{"volume-title":"Google Cloud Natural Language. https:\/\/cloud.google.com\/natural-language\/. (Last accessed","year":"2019","key":"e_1_3_2_2_31_1","unstructured":"Google. 2019. Google Cloud Natural Language. https:\/\/cloud.google.com\/natural-language\/. (Last accessed in August 2019 ). Google. 2019. Google Cloud Natural Language. https:\/\/cloud.google.com\/natural-language\/. (Last accessed in August 2019)."},{"key":"e_1_3_2_2_32_1","volume-title":"How to Use Facebook's New Timeline Feature (and Hide Your Embarrassing Old Posts). https:\/\/lifehacker.com\/how-to-use-facebooks-new-timeline-feature-and-hide-you-5868411. (Last accessed","author":"Gordon Whitson","year":"2019","unstructured":"Whitson Gordon . 2011. How to Use Facebook's New Timeline Feature (and Hide Your Embarrassing Old Posts). https:\/\/lifehacker.com\/how-to-use-facebooks-new-timeline-feature-and-hide-you-5868411. (Last accessed in August 2019 ). Whitson Gordon. 2011. How to Use Facebook's New Timeline Feature (and Hide Your Embarrassing Old Posts). https:\/\/lifehacker.com\/how-to-use-facebooks-new-timeline-feature-and-hide-you-5868411. (Last accessed in August 2019)."},{"volume-title":"https:\/\/help.instagram.com\/1660923094227526. (Last accessed","year":"2019","key":"e_1_3_2_2_33_1","unstructured":"Instagram. 2019. Stories. https:\/\/help.instagram.com\/1660923094227526. (Last accessed in August 2019 ). Instagram. 2019. Stories. https:\/\/help.instagram.com\/1660923094227526. (Last accessed in August 2019)."},{"key":"e_1_3_2_2_34_1","volume-title":"Bellovin","author":"Johnson Maritza","year":"2012","unstructured":"Maritza Johnson , Serge Egelman , and Steven M . Bellovin . 2012 . Facebook and Privacy: It's Complicated . In Proc. SOUPS. Maritza Johnson, Serge Egelman, and Steven M. Bellovin. 2012. Facebook and Privacy: It's Complicated. In Proc. SOUPS."},{"key":"e_1_3_2_2_35_1","unstructured":"Jonathan Gheller. 2015. Introducing On This Day: A New Way to Look Back at Photos and Memories on Facebook. https:\/\/newsroom.fb.com\/news\/2015\/03\/introducing-on-this-day-a-new-way-to-look-back-at-photos-and-memories-on-facebook\/. (Last accessed in August 2019).  Jonathan Gheller. 2015. Introducing On This Day: A New Way to Look Back at Photos and Memories on Facebook. https:\/\/newsroom.fb.com\/news\/2015\/03\/introducing-on-this-day-a-new-way-to-look-back-at-photos-and-memories-on-facebook\/. (Last accessed in August 2019)."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23765-2_15"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456377.1456380"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174117"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207728"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1218772110"},{"key":"e_1_3_2_2_41_1","volume-title":"Wills","author":"Krishnamurthy Balachander","year":"2008","unstructured":"Balachander Krishnamurthy and Craig E . Wills . 2008 . Characterizing Privacy in Online Social Networks. In Proc. WOSN. Balachander Krishnamurthy and Craig E. Wills. 2008. Characterizing Privacy in Online Social Networks. In Proc. WOSN."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377854"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.2307\/2529310"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526899"},{"key":"e_1_3_2_2_45_1","volume-title":"Proc. UPSEC.","author":"Lipford Heather Richter","year":"2008","unstructured":"Heather Richter Lipford , Andrew Besmer , and Jason Watson . 2008 . Understanding Privacy Settings in Facebook with an Audience View . In Proc. UPSEC. Heather Richter Lipford, Andrew Besmer, and Jason Watson. 2008. Understanding Privacy Settings in Facebook with an Audience View. In Proc. UPSEC."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"crossref","unstructured":"Eden Litt and Eszter Hargittai. 2016. The Imagined Audience on Social Network Sites. Social Media  Eden Litt and Eszter Hargittai. 2016. The Imagined Audience on Social Network Sites. Social Media","DOI":"10.1177\/2056305116633482"},{"key":"e_1_3_2_2_47_1","unstructured":"Society (2016).  Society (2016)."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1870096.1870102"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068823"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2325616.2325655"},{"key":"e_1_3_2_2_51_1","volume-title":"Bellovin","author":"Madejski Michelle","year":"2012","unstructured":"Michelle Madejski , Maritza Johnson , and Steven M . Bellovin . 2012 . A Study of Privacy Settings Errors in an Online Social Network. In Proc. PerCom . Michelle Madejski, Maritza Johnson, and Steven M. Bellovin. 2012. A Study of Privacy Settings Errors in an Online Social Network. In Proc. PerCom."},{"key":"e_1_3_2_2_52_1","unstructured":"Larry Magid. 2014. Facebook Changes New User Default Privacy Setting To Friends Only -- Adds Privacy Checkup. Forbes https:\/\/www.forbes.com\/sites\/larrymagid\/2014\/05\/22\/facebook-changes-default-privacy-setting-for-new-users\/. (Last accessed in August 2019).  Larry Magid. 2014. Facebook Changes New User Default Privacy Setting To Friends Only -- Adds Privacy Checkup. Forbes https:\/\/www.forbes.com\/sites\/larrymagid\/2014\/05\/22\/facebook-changes-default-privacy-setting-for-new-users\/. (Last accessed in August 2019)."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979245"},{"key":"e_1_3_2_2_54_1","volume-title":"Reiter","author":"Mazurek Michelle L.","year":"2014","unstructured":"Michelle L. Mazurek , Yuan Liang , William Melicher , Manya Sleeper , Lujo Bauer , Gregory R. Ganger , Nitin Gupta , and Michael K . Reiter . 2014 . Toward Strong, Usable Access Control for Shared Distributed Data. In Proc. FAST. Michelle L. Mazurek, Yuan Liang, William Melicher, Manya Sleeper, Lujo Bauer, Gregory R. Ganger, Nitin Gupta, and Michael K. Reiter. 2014. Toward Strong, Usable Access Control for Shared Distributed Data. In Proc. FAST."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335374"},{"key":"e_1_3_2_2_56_1","unstructured":"Matt Mckeon. 2010. The Evolution of Privacy on Facebook. http:\/\/mattmckeon.com\/facebook-privacy\/. (Last accessed in August 2019).  Matt Mckeon. 2010. The Evolution of Privacy on Facebook. http:\/\/mattmckeon.com\/facebook-privacy\/. (Last accessed in August 2019)."},{"key":"e_1_3_2_2_57_1","volume-title":"Proc. NIPS.","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov , Ilya Sutskever , Kai Chen , Greg S. Corrado , and Jeff Dean . 2013 . Distributed Representations of Words and Phrases and their Compositionality . In Proc. NIPS. Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S. Corrado, and Jeff Dean. 2013. Distributed Representations of Words and Phrases and their Compositionality. In Proc. NIPS."},{"key":"e_1_3_2_2_58_1","unstructured":"Brett Molina. May 9 2017. Your snaps can now last to 'infinity' with Snapchat's latest update. USA Today.  Brett Molina. May 9 2017. Your snaps can now last to 'infinity' with Snapchat's latest update. USA Today."},{"key":"e_1_3_2_2_59_1","volume-title":"Proc. SOUPS.","author":"Mondal Mainack","year":"2014","unstructured":"Mainack Mondal , Yabing Liu , Bimal Viswanath , Krishna P. Gummadi , and Alan Mislove . 2014 . Understanding and Specifying Social Access Control Lists . In Proc. SOUPS. Mainack Mondal, Yabing Liu, Bimal Viswanath, Krishna P. Gummadi, and Alan Mislove. 2014. Understanding and Specifying Social Access Control Lists. In Proc. SOUPS."},{"key":"e_1_3_2_2_60_1","volume-title":"Proc. SOUPS.","author":"Mondal Mainack","year":"2016","unstructured":"Mainack Mondal , Johnnatan Messias , Saptarshi Ghosh , Krishna P. Gummadi , and Aniket Kate . 2016 . Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data . In Proc. SOUPS. Mainack Mondal, Johnnatan Messias, Saptarshi Ghosh, Krishna P. Gummadi, and Aniket Kate. 2016. Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data. In Proc. SOUPS."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.76"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1080\/14786440009463897"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357285"},{"key":"e_1_3_2_2_65_1","volume-title":"Reuters Poll Data. https:\/\/fingfx.thomsonreuters.com\/gfx\/rngs\/FACEBOOK-PRIVACY-POLL\/010062SJ4QF\/2018%20Reuters%20Tracking%20-%20Social%20Media%20Usage%205%203%202018.pdf. (Last accessed","author":"Reuters Thomson","year":"2019","unstructured":"Thomson Reuters . 2018. Reuters Poll Data. https:\/\/fingfx.thomsonreuters.com\/gfx\/rngs\/FACEBOOK-PRIVACY-POLL\/010062SJ4QF\/2018%20Reuters%20Tracking%20-%20Social%20Media%20Usage%205%203%202018.pdf. (Last accessed in August 2019 ). Thomson Reuters. 2018. Reuters Poll Data. https:\/\/fingfx.thomsonreuters.com\/gfx\/rngs\/FACEBOOK-PRIVACY-POLL\/010062SJ4QF\/2018%20Reuters%20Tracking%20-%20Social%20Media%20Usage%205%203%202018.pdf. (Last accessed in August 2019)."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"volume-title":"Selenium browser automation. https:\/\/www.seleniumhq.org\/. (Last accessed","year":"2019","key":"e_1_3_2_2_67_1","unstructured":"Selenium. 2018. Selenium browser automation. https:\/\/www.seleniumhq.org\/. (Last accessed in August 2019 ). Selenium. 2018. Selenium browser automation. https:\/\/www.seleniumhq.org\/. (Last accessed in August 2019)."},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1177\/1747016115579531"},{"key":"e_1_3_2_2_69_1","volume-title":"Simon and Mary Ellen Zurko","author":"Richard","year":"1997","unstructured":"Richard T. Simon and Mary Ellen Zurko . 1997 . Separation of Duty in Role-based Environments. In Proc. CSF. Richard T. Simon and Mary Ellen Zurko. 1997. Separation of Duty in Role-based Environments. In Proc. CSF."},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441865"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466448"},{"key":"e_1_3_2_2_72_1","volume-title":"Smetters and Nathan Good","author":"Diana","year":"2009","unstructured":"Diana K. Smetters and Nathan Good . 2009 . How Users Use Access Control. In Proc. SOUPS. Diana K. Smetters and Nathan Good. 2009. How Users Use Access Control. In Proc. SOUPS."},{"volume-title":"Distribution of Facebook users in the United States as of","year":"2018","key":"e_1_3_2_2_73_1","unstructured":"Statista. 2018. Distribution of Facebook users in the United States as of January 2018 , by gender. https:\/\/web.archive.org\/web\/20181116070219\/https:\/\/www.statista.com\/statistics\/266879\/facebook-users-in-the-us-by-gender\/. ( Last accessed in August 2019). Statista. 2018. Distribution of Facebook users in the United States as of January 2018, by gender. https:\/\/web.archive.org\/web\/20181116070219\/https:\/\/www.statista.com\/statistics\/266879\/facebook-users-in-the-us-by-gender\/. (Last accessed in August 2019)."},{"volume-title":"Number of Facebook users by age in the U.S. as of","year":"2018","key":"e_1_3_2_2_74_1","unstructured":"Statista. 2018. Number of Facebook users by age in the U.S. as of January 2018 (in millions). https:\/\/www.statista.com\/statistics\/398136\/us-facebook-user-age-groups\/. ( Last accessed in August 2019). Statista. 2018. Number of Facebook users by age in the U.S. as of January 2018 (in millions). https:\/\/www.statista.com\/statistics\/398136\/us-facebook-user-age-groups\/. (Last accessed in August 2019)."},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v4i2.620"},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1177\/0261927X09351676"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557413"},{"key":"e_1_3_2_2_78_1","volume-title":"Pedro Giovanni Leon, and Lorrie Faith Cranor","author":"Wang Yang","year":"2011","unstructured":"Yang Wang , Gregory Norcie , Saranga Komanduri , Alessandro Acquisti , Pedro Giovanni Leon, and Lorrie Faith Cranor . 2011 . \"I Regretted the Minute I Pressed Share \": A Qualitative Study of Regrets on Facebook. In Proc. SOUPS. Yang Wang, Gregory Norcie, Saranga Komanduri, Alessandro Acquisti, Pedro Giovanni Leon, and Lorrie Faith Cranor. 2011. \"I Regretted the Minute I Pressed Share\": A Qualitative Study of Regrets on Facebook. In Proc. SOUPS."},{"key":"e_1_3_2_2_79_1","volume-title":"How do I set permissions for Moments? https:\/\/help.wechat.com\/cgi-bin\/micromsg-bin\/oshelpcenter?opcode=2&plat=android&lang=en&id=120813euEJVf141023RBfMjm. (Last accessed","author":"WeChat Help Center","year":"2019","unstructured":"WeChat Help Center . 2019. How do I set permissions for Moments? https:\/\/help.wechat.com\/cgi-bin\/micromsg-bin\/oshelpcenter?opcode=2&plat=android&lang=en&id=120813euEJVf141023RBfMjm. (Last accessed in August 2019 ). WeChat Help Center. 2019. How do I set permissions for Moments? https:\/\/help.wechat.com\/cgi-bin\/micromsg-bin\/oshelpcenter?opcode=2&plat=android&lang=en&id=120813euEJVf141023RBfMjm. (Last accessed in August 2019)."},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2016.09.006"},{"key":"e_1_3_2_2_81_1","unstructured":"XGBoost Developers. 2016. XGBoost. https:\/\/xgboost.readthedocs.io\/en\/latest\/.  XGBoost Developers. 2016. XGBoost. https:\/\/xgboost.readthedocs.io\/en\/latest\/."},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12844-3_17"},{"key":"e_1_3_2_2_83_1","volume-title":"Proc. PinKDD.","author":"Zheleva Elena","year":"2007","unstructured":"Elena Zheleva and Lise Getoor . 2007 . Preserving the Privacy of Sensitive Relationships in Graph Data . In Proc. PinKDD. Elena Zheleva and Lise Getoor. 2007. Preserving the Privacy of Sensitive Relationships in Graph Data. In Proc. PinKDD."},{"key":"e_1_3_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526781"},{"key":"e_1_3_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.2200\/S00408ED1V01Y201203DMK004"},{"key":"e_1_3_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766718"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"London United Kingdom","acronym":"CCS '19"},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354202","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3354202","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3354202","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:24:02Z","timestamp":1750202642000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354202"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":86,"alternative-id":["10.1145\/3319535.3354202","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3354202","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}