{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:25Z","timestamp":1750220245749,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,6]],"date-time":"2022-07-06T00:00:00Z","timestamp":1657065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Engineering and Physical Sciences Research Council (EPSRC)","award":["EP\/R033889\/1, EP\/R033889\/2, EP\/R033897\/1, EP\/R033854\/1, EP\/R033870\/1"],"award-info":[{"award-number":["EP\/R033889\/1, EP\/R033889\/2, EP\/R033897\/1, EP\/R033854\/1, EP\/R033870\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,6]]},"DOI":"10.1145\/3477495.3531659","type":"proceedings-article","created":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T15:12:13Z","timestamp":1657206733000},"page":"3295-3299","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Are Taylor's Posts Risky? Evaluating Cumulative Revelations in Online Personal Data"],"prefix":"10.1145","author":[{"given":"Leif","family":"Azzopardi","sequence":"first","affiliation":[{"name":"University of Strathclyde, Glasgow, United Kingdom"}]},{"given":"Jo","family":"Briggs","sequence":"additional","affiliation":[{"name":"Northumbria University, Newcastle-upon-Tyne, United Kingdom"}]},{"given":"Melissa","family":"Duheric","sequence":"additional","affiliation":[{"name":"Northumbria University, Newcastle-upon-Tyne, United Kingdom"}]},{"given":"Callum","family":"Nash","sequence":"additional","affiliation":[{"name":"Northumbria University, Newcastle-upon-Tyne, United Kingdom"}]},{"given":"Emma","family":"Nicol","sequence":"additional","affiliation":[{"name":"University of Strathclyde, Glasgow, United Kingdom"}]},{"given":"Wendy","family":"Moncur","sequence":"additional","affiliation":[{"name":"University of Strathclyde, Glasgoww, United Kingdom"}]},{"given":"Burkhard","family":"Schafer","sequence":"additional","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2022,7,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0904891106"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3137616.3137617"},{"key":"e_1_3_2_1_4_1","volume-title":"Why youth (heart) social network sites: The role of networked publics in teenage social life. papers.ssrn.com","author":"Boyd Danah","year":"2009","unstructured":"Danah Boyd . 2009. Why youth (heart) social network sites: The role of networked publics in teenage social life. papers.ssrn.com ( 2009 ). https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1518924 Danah Boyd. 2009. Why youth (heart) social network sites: The role of networked publics in teenage social life. papers.ssrn.com (2009). https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1518924"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-019-09936-8"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077699016640224"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2016.01341"},{"key":"e_1_3_2_1_8_1","volume-title":"Overview of the TREC 2005 Enterprise Track.. In Trec","volume":"5","author":"Craswell Nick","year":"2005","unstructured":"Nick Craswell , Arjen P De Vries , and Ian Soboroff . 2005 . Overview of the TREC 2005 Enterprise Track.. In Trec , Vol. 5 . 1--7. Nick Craswell, Arjen P De Vries, and Ian Soboroff. 2005. Overview of the TREC 2005 Enterprise Track.. In Trec, Vol. 5. 1--7."},{"key":"e_1_3_2_1_9_1","volume-title":"et almbox","author":"Daelemans Walter","year":"2019","unstructured":"Walter Daelemans , Mike Kestemont , Enrique Manjavacas , Martin Potthast , Francisco Rangel , Paolo Rosso , G\u00fcnther Specht , Efstathios Stamatatos , Benno Stein , Michael Tschuggnall , et almbox . 2019 . Overview of PAN 2019: bots and gender profiling, celebrity profiling, cross-domain authorship attribution and style change detection. In International conference of the cross-language evaluation forum for european languages. Springer, 402--416. Walter Daelemans, Mike Kestemont, Enrique Manjavacas, Martin Potthast, Francisco Rangel, Paolo Rosso, G\u00fcnther Specht, Efstathios Stamatatos, Benno Stein, Michael Tschuggnall, et almbox. 2019. Overview of PAN 2019: bots and gender profiling, celebrity profiling, cross-domain authorship attribution and style change detection. In International conference of the cross-language evaluation forum for european languages. Springer, 402--416."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2015.7357484"},{"volume-title":"Conference on Human Factors in Computing Systems - Proceedings. Association for Computing Machinery, 2895--2907","author":"Haimson Oliver L.","key":"e_1_3_2_1_11_1","unstructured":"Oliver L. Haimson , Jed R. Brubaker , Lynn Dombrowski , and Gillian R. Hayes . 2016. Digital footprints and changing networks during online identity transitions . In Conference on Human Factors in Computing Systems - Proceedings. Association for Computing Machinery, 2895--2907 . Oliver L. Haimson, Jed R. Brubaker, Lynn Dombrowski, and Gillian R. Hayes. 2016. Digital footprints and changing networks during online identity transitions. In Conference on Human Factors in Computing Systems - Proceedings. Association for Computing Machinery, 2895--2907."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719050"},{"volume-title":"DataMirror: Reflecting on One's Data Self: A Tool for Social Media Users to Explore Their Digital Footprints","author":"Htait Amal","key":"e_1_3_2_1_13_1","unstructured":"Amal Htait , Leif Azzopardi , Emma Nicol , and Wendy Moncur . 2020. DataMirror: Reflecting on One's Data Self: A Tool for Social Media Users to Explore Their Digital Footprints . Association for Computing Machinery , New York, NY, USA , 2125--2128. https:\/\/doi.org\/10.1145\/3397271.3401398 10.1145\/3397271.3401398 Amal Htait, Leif Azzopardi, Emma Nicol, and Wendy Moncur. 2020. DataMirror: Reflecting on One's Data Self: A Tool for Social Media Users to Explore Their Digital Footprints. Association for Computing Machinery, New York, NY, USA, 2125--2128. https:\/\/doi.org\/10.1145\/3397271.3401398"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.25"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2020.120426"},{"key":"e_1_3_2_1_16_1","unstructured":"Johannes Kiesel Arjen P de Vries Matthias Hagen Benno Stein and Martin Potthast. 2018. WASP: web archiving and search personalized. (2018).  Johannes Kiesel Arjen P de Vries Matthias Hagen Benno Stein and Martin Potthast. 2018. WASP: web archiving and search personalized. (2018)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2010.6"},{"key":"e_1_3_2_1_18_1","volume-title":"My Rules. In Proceedings of the 2021 Conference on Human Information Interaction and Retrieval. ACM. https:\/\/doi.org\/10","author":"Leiva Luis A.","year":"2021","unstructured":"Luis A. Leiva , Ioannis Arapakis , and Costas Iordanou . 2021 . My Mouse , My Rules. In Proceedings of the 2021 Conference on Human Information Interaction and Retrieval. ACM. https:\/\/doi.org\/10 .1145\/3406522.3446011 10.1145\/3406522.3446011 Luis A. Leiva, Ioannis Arapakis, and Costas Iordanou. 2021. My Mouse, My Rules. In Proceedings of the 2021 Conference on Human Information Interaction and Retrieval. ACM. https:\/\/doi.org\/10.1145\/3406522.3446011"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.38023\/e77f5f7d-98c2-4759-a036-b1539bc4a8ae"},{"key":"e_1_3_2_1_20_1","volume-title":"Revealing Cumulative Risks in Online Personal Information: A Data Narrative Study. PACM HCI","author":"Nicol Emma","year":"2022","unstructured":"Emma Nicol , Jo Briggs , Wendy Moncur , Amal Htait , Daniel Carey , Leif Azzopardi , and Burkhard Schafer . 2022. Revealing Cumulative Risks in Online Personal Information: A Data Narrative Study. PACM HCI ( 2022 ). Emma Nicol, Jo Briggs, Wendy Moncur, Amal Htait, Daniel Carey, Leif Azzopardi, and Burkhard Schafer. 2022. Revealing Cumulative Risks in Online Personal Information: A Data Narrative Study. PACM HCI (2022)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/pra2.566"},{"key":"e_1_3_2_1_23_1","volume-title":"Yong Liao, Marios Iliofotou, Antonio Nucci, Zhi-Li Zhang, and Aleksandar Kuzmanovic.","author":"Xia Ning","year":"2013","unstructured":"Ning Xia , Han Hee Song , Yong Liao, Marios Iliofotou, Antonio Nucci, Zhi-Li Zhang, and Aleksandar Kuzmanovic. 2013 . Mosaic : Quantifying Privacy Leakage in Mobile Networks . 564 pages. Ning Xia, Han Hee Song, Yong Liao, Marios Iliofotou, Antonio Nucci, Zhi-Li Zhang, and Aleksandar Kuzmanovic. 2013. Mosaic: Quantifying Privacy Leakage in Mobile Networks. 564 pages."},{"volume-title":"Acm sigir forum","author":"Zhai ChengXiang","key":"e_1_3_2_1_24_1","unstructured":"ChengXiang Zhai , William W Cohen , and John Lafferty . 2015. Beyond independent relevance: methods and evaluation metrics for subtopic retrieval . In Acm sigir forum , Vol. 49 . ACM New York, NY , USA , 2--9. ChengXiang Zhai, William W Cohen, and John Lafferty. 2015. Beyond independent relevance: methods and evaluation metrics for subtopic retrieval. In Acm sigir forum, Vol. 49. ACM New York, NY, USA, 2--9."},{"volume-title":"Towards Search Strategies for Better Privacy and Information","author":"Zimmerman Steven","key":"e_1_3_2_1_25_1","unstructured":"Steven Zimmerman , Alistair Thorpe , Jon Chamberlain , and Udo Kruschwitz . 2020. Towards Search Strategies for Better Privacy and Information . Association for Computing Machinery , New York, NY, USA , 124--134. https:\/\/doi.org\/10.1145\/3343413.3377958 10.1145\/3343413.3377958 Steven Zimmerman, Alistair Thorpe, Jon Chamberlain, and Udo Kruschwitz. 2020. Towards Search Strategies for Better Privacy and Information. Association for Computing Machinery, New York, NY, USA, 124--134. https:\/\/doi.org\/10.1145\/3343413.3377958"}],"event":{"name":"SIGIR '22: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Madrid Spain","acronym":"SIGIR '22"},"container-title":["Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477495.3531659","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3477495.3531659","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:33Z","timestamp":1750188633000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477495.3531659"}},"subtitle":["A persona-based tool for evaluating awareness of online risks and harms"],"short-title":[],"issued":{"date-parts":[[2022,7,6]]},"references-count":23,"alternative-id":["10.1145\/3477495.3531659","10.1145\/3477495"],"URL":"https:\/\/doi.org\/10.1145\/3477495.3531659","relation":{},"subject":[],"published":{"date-parts":[[2022,7,6]]},"assertion":[{"value":"2022-07-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}