{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:15Z","timestamp":1750220895652,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,22]],"date-time":"2019-10-22T00:00:00Z","timestamp":1571702400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,22]]},"DOI":"10.1145\/3357155.3358457","type":"proceedings-article","created":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T12:21:06Z","timestamp":1570450866000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Evaluating PIT-OSN 1 in inspecting the privacy levels of an online social network"],"prefix":"10.1145","author":[{"given":"Andrey","family":"Rodrigues","sequence":"first","affiliation":[{"name":"Universidade Federal do Amazonas, Manaus, Amazonas"}]},{"given":"Eduardo","family":"Feitosa","sequence":"additional","affiliation":[{"name":"Universidade Federal do Amazonas, Manaus, Amazonas"}]},{"given":"Maria L\u00facia","family":"Villela","sequence":"additional","affiliation":[{"name":"Universidade Federal dos Vales do Jequitinhonha e Mucuri, Diamantina, Minas Gerais"}]},{"given":"Natasha","family":"Valentim","sequence":"additional","affiliation":[{"name":"Universidade Federal do Paran\u00e1, Curitiba, Paran\u00e1"}]}],"member":"320","published-online":{"date-parts":[[2019,10,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Privacy and human behavior in the age of information. Science 347, 6221","author":"Acquisti Alessandro","year":"2015","unstructured":"Alessandro Acquisti , Laura Brandimarte , and George Loewenstein . 2015. Privacy and human behavior in the age of information. Science 347, 6221 ( 2015 ), 509--514. Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2015. Privacy and human behavior in the age of information. Science 347, 6221 (2015), 509--514."},{"key":"e_1_3_2_1_2_1","volume-title":"Personal Space, Territory, and Crowding.","author":"Altman Irwin","year":"1975","unstructured":"Irwin Altman . 1975. The Environment and Social Behavior: Privacy , Personal Space, Territory, and Crowding. ( 1975 ). Irwin Altman. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. (1975)."},{"volume-title":"Annual Privacy Forum","author":"Anthonysamy Pauline","key":"e_1_3_2_1_3_1","unstructured":"Pauline Anthonysamy , Phil Greenwood , and Awais Rashid . 2012. A method for analysing traceability between privacy policies and privacy controls of online social networks . In Annual Privacy Forum . Springer , 187--202. Pauline Anthonysamy, Phil Greenwood, and Awais Rashid. 2012. A method for analysing traceability between privacy policies and privacy controls of online social networks. In Annual Privacy Forum. Springer, 187--202."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77010-7_47"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings. 5th International Workshop on Enterprise Networking and Computing in Healthcare Industry (IEEE Cat. No. 03EX717)","author":"Carver Jeffrey","year":"2004","unstructured":"Jeffrey Carver , Letizia Jaccheri , Sandro Morasca , and Forrest Shull . 2004 . Issues in using students in empirical studies in software engineering education . In Proceedings. 5th International Workshop on Enterprise Networking and Computing in Healthcare Industry (IEEE Cat. No. 03EX717) . IEEE, 239--249. Jeffrey Carver, Letizia Jaccheri, Sandro Morasca, and Forrest Shull. 2004. Issues in using students in empirical studies in software engineering education. In Proceedings. 5th International Workshop on Enterprise Networking and Computing in Healthcare Industry (IEEE Cat. No. 03EX717). IEEE, 239--249."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2002.1173126"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","DOI":"10.4135\/9781452230153","volume-title":"Techniques and procedures for developing grounded theory. Basics of Qualitative Research","author":"Corbin J","year":"2008","unstructured":"J Corbin and A Strauss . 2008. Techniques and procedures for developing grounded theory. Basics of Qualitative Research , 3 rd ed.; Sage : Thousand Oaks, CA, USA ( 2008 ). J Corbin and A Strauss. 2008. Techniques and procedures for developing grounded theory. Basics of Qualitative Research, 3rd ed.; Sage: Thousand Oaks, CA, USA (2008).","edition":"3"},{"key":"e_1_3_2_1_8_1","volume-title":"Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly","author":"Davis Fred D","year":"1989","unstructured":"Fred D Davis . 1989. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly ( 1989 ), 319--340. Fred D Davis. 1989. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly (1989), 319--340."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2468356.2468499"},{"key":"e_1_3_2_1_10_1","volume-title":"International journal of endocrinology and metabolism 10, 2","author":"Ghasemi Asghar","year":"2012","unstructured":"Asghar Ghasemi and Saleh Zahediasl . 2012. Normality tests for statistical analysis: a guide for non-statisticians . International journal of endocrinology and metabolism 10, 2 ( 2012 ), 486. Asghar Ghasemi and Saleh Zahediasl. 2012. Normality tests for statistical analysis: a guide for non-statisticians. International journal of endocrinology and metabolism 10, 2 (2012), 486."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Giovanni Iachello Jason Hong etal 2007. End-user privacy in human-computer interaction. Foundations and Trends\u00ae in Human-Computer Interaction 1 1 (2007) 1--137.  Giovanni Iachello Jason Hong et al. 2007. End-user privacy in human-computer interaction. Foundations and Trends \u00ae in Human-Computer Interaction 1 1 (2007) 1--137.","DOI":"10.1561\/1100000004"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.01.004"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019813"},{"key":"e_1_3_2_1_14_1","volume-title":"privacy and the Internet. Oxford handbook of Internet psychology 3","author":"Joinson Adam N","year":"2007","unstructured":"Adam N Joinson and Carina B Paine . 2007. Self-disclosure , privacy and the Internet. Oxford handbook of Internet psychology 3 ( 2007 ), 237--252. Adam N Joinson and Carina B Paine. 2007. Self-disclosure, privacy and the Internet. Oxford handbook of Internet psychology 3 (2007), 237--252."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.922713"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/spip.184"},{"key":"e_1_3_2_1_17_1","volume-title":"Jinjuan Heidi Feng, and Harry Hochheiser","author":"Lazar Jonathan","year":"2017","unstructured":"Jonathan Lazar , Jinjuan Heidi Feng, and Harry Hochheiser . 2017 . Research methods in human-computer interaction. Morgan Kaufmann . Jonathan Lazar, Jinjuan Heidi Feng, and Harry Hochheiser. 2017. Research methods in human-computer interaction. Morgan Kaufmann."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.01.005"},{"key":"e_1_3_2_1_19_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum . 2004 . Privacy as contextual integrity . Wash. L. Rev. 79 (2004), 119 . Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev. 79 (2004), 119.","journal-title":"Wash. L. Rev."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274192.3274195"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.825763"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.799955"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:EMSE.0000013516.80487.33"},{"volume-title":"Retrieved","year":"2019","key":"e_1_3_2_1_25_1","unstructured":"Statista. 2019 . Most popular social networks worldwide as of April 2019 ,. Retrieved April, 2019 from https:\/\/www.statista.com\/statistics\/272014\/global-social-networks-ranked-by-number-of-users\/ Statista. 2019. Most popular social networks worldwide as of April 2019,. Retrieved April, 2019 from https:\/\/www.statista.com\/statistics\/272014\/global-social-networks-ranked-by-number-of-users\/"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.04.003"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488037"},{"key":"e_1_3_2_1_29_1","volume-title":"Technology acceptance model 3 and a research agenda on interventions. Decision sciences 39, 2","author":"Venkatesh Viswanath","year":"2008","unstructured":"Viswanath Venkatesh and Hillol Bala . 2008. Technology acceptance model 3 and a research agenda on interventions. Decision sciences 39, 2 ( 2008 ), 273--315. Viswanath Venkatesh and Hillol Bala. 2008. Technology acceptance model 3 and a research agenda on interventions. Decision sciences 39, 2 (2008), 273--315."}],"event":{"name":"IHC '19: XVIII Brazilian Symposium on Human Factors in Computing Systems","sponsor":["SBC Brazilian Computer Society"],"location":"Vit\u00f3ria Esp\u00edrito Santo Brazil","acronym":"IHC '19"},"container-title":["Proceedings of the 18th Brazilian Symposium on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357155.3358457","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357155.3358457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:38Z","timestamp":1750203878000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357155.3358457"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,22]]},"references-count":27,"alternative-id":["10.1145\/3357155.3358457","10.1145\/3357155"],"URL":"https:\/\/doi.org\/10.1145\/3357155.3358457","relation":{},"subject":[],"published":{"date-parts":[[2019,10,22]]},"assertion":[{"value":"2019-10-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}