{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T12:22:07Z","timestamp":1772886127913,"version":"3.50.1"},"reference-count":85,"publisher":"Walter de Gruyter GmbH","issue":"2","license":[{"start":{"date-parts":[[2022,5,19]],"date-time":"2022-05-19T00:00:00Z","timestamp":1652918400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>COVID-19, mobility, socio-social changes have transferred to the world of social media communication, purchasing activities, the use of services. Corporate social media has been created to support clients in using various services, give them the possibility of easy communication without time and local barriers. Unfortunately, they still very rarely take into account the security and privacy of customers. Considering that the purpose of this article is to investigate the impact of social media on the company\u2019s image, it should be remembered that this image also works for the security and privacy of customer data. Data leaks or their sale are not welcomed by customers. The results of empirical research show that the safety, simplicity and variety of services offered on social media have a significant impact on the perceived quality, which in turn positively affects the reputation. The authors proposed a methodology based on the Kano model and customer satisfaction in order to examine the declared needs and undefined desires and divide them into different groups with different impacts on consumer satisfaction. The interview participants were employees of 10 randomly selected companies using social media to conduct sales or service activities. 5,000 people from Poland, Portugal and Germany participated in the study. 4,894 correctly completed questionnaires were received.<\/jats:p>","DOI":"10.2478\/mspe-2022-0019","type":"journal-article","created":{"date-parts":[[2022,5,19]],"date-time":"2022-05-19T08:10:34Z","timestamp":1652947834000},"page":"156-162","source":"Crossref","is-referenced-by-count":3,"title":["Security and Privacy of Customer Data as an Element Creating the Image of the Company"],"prefix":"10.2478","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0407-0826","authenticated-orcid":false,"given":"Justyna","family":"\u017bywio\u0142ek","sequence":"first","affiliation":[{"name":"Czestochowa University of Technology"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0506-4284","authenticated-orcid":false,"given":"Antonio","family":"Trigo","sequence":"additional","affiliation":[{"name":"Polytechnic Institute of Coimbra"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5548-6787","authenticated-orcid":false,"given":"Joanna","family":"Rosak-Szyrocka","sequence":"additional","affiliation":[{"name":"Czestochowa University of Technology"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1351-898X","authenticated-orcid":false,"given":"Muhammad Asghar","family":"Khan","sequence":"additional","affiliation":[{"name":"Hamdard University"}]}],"member":"374","published-online":{"date-parts":[[2022,5,19]]},"reference":[{"key":"2024042804005314029_j_mspe-2022-0019_ref_001","unstructured":"[1] D.C. Edelman, \u201cBranding in the digital age\u201d, Harvard Business Review, vol. 88, no. 12, p. 62, 2010."},{"key":"2024042804005314029_j_mspe-2022-0019_ref_002","doi-asserted-by":"crossref","unstructured":"[2] M. Bruhn, V. Schoenmueller, and D. B. Sch\u00e4fer, \u201cAre social media replacing traditional media in terms of brand equity creation?\u201d, Management Research Review, vol. 35, no. 9, pp. 770-790, 2012, doi: 10.1108\/01409171211255948.10.1108\/01409171211255948","DOI":"10.1108\/01409171211255948"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_003","unstructured":"[3] As Social Media Matures, Branded Communities Will Make A Comeback in 2015. (2014). Forrester."},{"key":"2024042804005314029_j_mspe-2022-0019_ref_004","doi-asserted-by":"crossref","unstructured":"[4] T.R. Cosenza, M.R. Solomon, and W. Kwon, \u201cCredibility in the blogosphere: A study of measurement and influence of wine blogs as an information source\u201d, J. Consumer Behav., vol. 14, no. 2, pp. 71-91, 2015, doi: 10.1002\/cb.1496.10.1002\/cb.1496","DOI":"10.1002\/cb.1496"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_005","unstructured":"[5] M.T. Adjei, \u201cEnhancing relationships with customers through online brand communities\u201d, MIT Sloan Management Review, vol. 53, no. 4, p. 22, 2012."},{"key":"2024042804005314029_j_mspe-2022-0019_ref_006","doi-asserted-by":"crossref","unstructured":"[6] A. Marmor, \u201cPrivacy in Social Media\u201d, in The Oxford Handbook of Digital Ethics, C. V\u00e9liz and A. Marmor, Eds.: Oxford University Press, 2021.10.1093\/oxfordhb\/9780198857815.013.31","DOI":"10.1093\/oxfordhb\/9780198857815.013.31"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_007","doi-asserted-by":"crossref","unstructured":"[7] M. Laroche, M.R. Habibi, M.-O. Richard, and R. Sankaranarayanan, \u201cThe effects of social media based brand communities on brand community markers, value creation practices, brand trust and brand loyalty\u201d, Computers in Human Behavior, vol. 28, no. 5, pp. 1755-1767, 2012, doi: 10.1016\/j.chb.2012.04.016.10.1016\/j.chb.2012.04.016","DOI":"10.1016\/j.chb.2012.04.016"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_008","doi-asserted-by":"crossref","unstructured":"[8] I.R. Management Association, Ed., Brand Culture and Identity: IGI Global, 2019.10.4018\/978-1-5225-7116-2","DOI":"10.4018\/978-1-5225-7116-2"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_009","doi-asserted-by":"crossref","unstructured":"[9] L.L.E. Muinonen and A. Kumar, \u201cBuilding City Brand Through Social Media\u201d, in Brand Culture and Identity, I. R. Management Association, Ed.: IGI Global, 2019, pp. 674-694.10.4018\/978-1-5225-7116-2.ch037","DOI":"10.4018\/978-1-5225-7116-2.ch037"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_010","doi-asserted-by":"crossref","unstructured":"[10] M. Phan, R. Thomas, and K. Heine, \u201cSocial Media and Luxury Brand Management: The Case of Burberry\u201d, Journal of Global Fashion Marketing, vol. 2, no. 4, pp. 213-222, 2011, doi: 10.1080\/20932685.2011.10593099.10.1080\/20932685.2011.10593099","DOI":"10.1080\/20932685.2011.10593099"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_011","doi-asserted-by":"crossref","unstructured":"[11] B. Rishi and S. Bandyopadhyay, Eds., Contemporary Issues in Social Media Marketing. 1 Edition. New York: Routledge, 2017.: Routledge, 2017.","DOI":"10.4324\/9781315563312"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_012","doi-asserted-by":"crossref","unstructured":"[12] D. Rosen, Ed., The Social Media Debate. New York: Routledge, 2022.10.4324\/9781003171270","DOI":"10.4324\/9781003171270"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_013","doi-asserted-by":"crossref","unstructured":"[13] R. Rishika, A. Kumar, R. Janakiraman, and R. Bezawada, \u201cThe Effect of Customers\u2019 Social Media Participation on Customer Visit Frequency and Profitability: An Empirical Investigation\u201d, Information Systems Research, vol. 24, no. 1, pp. 108-127, 2013, doi: 10.1287\/isre.1120.0460.10.1287\/isre.1120.0460","DOI":"10.1287\/isre.1120.0460"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_014","doi-asserted-by":"crossref","unstructured":"[14] A. Sadh, \u201cRole of Brand Jealousy in Brand Communities on Social Networking Media\u201d, IAJBM, vol. 06, no. 01, pp. 1-7, 2019, doi: 10.9756\/IAJBM\/V6I1\/1910001.10.9756\/IAJBM\/V6I1\/1910001","DOI":"10.9756\/IAJBM\/V6I1\/1910001"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_015","doi-asserted-by":"crossref","unstructured":"[15] F. Simon and V. Tossan, \u201cDoes brand-consumer social sharing matter? A relational framework of customer engagement to brand-hosted social media\u201d, Journal of Business Research, vol. 85, pp. 175-184, 2018, doi: 10.1016\/j.jbusres.2017.12.050.10.1016\/j.jbusres.2017.12.050","DOI":"10.1016\/j.jbusres.2017.12.050"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_016","doi-asserted-by":"crossref","unstructured":"[16] H. J. Schau, A. M. Mu\u00f1iz, and E. J. Arnould, \u201cHow Brand Community Practices Create Value\u201d, Journal of Marketing, vol. 73, no. 5, pp. 30-51, 2009, doi: 10.1509\/jmkg.73.5.30.10.1509\/jmkg.73.5.30","DOI":"10.1509\/jmkg.73.5.30"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_017","doi-asserted-by":"crossref","unstructured":"[17] S. Nandan, \u201cAn exploration of the brand identity\u2013brand image linkage: A communications perspective\u201d, J Brand Manag, vol. 12, no. 4, pp. 264-278, 2005, doi: 10.1057\/palgrave.bm.2540222.10.1057\/palgrave.bm.2540222","DOI":"10.1057\/palgrave.bm.2540222"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_018","unstructured":"[18] S. Fournier, \u201cGetting brand communities right\u201d, Harvard Business Review, vol. 87, no. 4, p. 105, 2009."},{"key":"2024042804005314029_j_mspe-2022-0019_ref_019","doi-asserted-by":"crossref","unstructured":"[19] S. Papathanassopoulos, \u201cPrivacy 2.0\u201d, Social Media + Society, vol. 1, no. 1, 205630511557814, 2015, doi: 10.1177\/2056305115578141.10.1177\/2056305115578141","DOI":"10.1177\/2056305115578141"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_020","doi-asserted-by":"crossref","unstructured":"[20] S. Singh and S. Sonnenburg, \u201cBrand Performances in Social Media\u201d, Journal of Interactive Marketing, vol. 26, no. 4, pp. 189-197, 2012, doi: 10.1016\/j.intmar.2012.04.001.10.1016\/j.intmar.2012.04.001","DOI":"10.1016\/j.intmar.2012.04.001"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_021","doi-asserted-by":"crossref","unstructured":"[21] L. de Vries, S. Gensler, and P.S. Leeflang, \u201cPopularity of Brand Posts on Brand Fan Pages: An Investigation of the Effects of Social Media Marketing\u201d, Journal of Interactive Marketing, vol. 26, no. 2, pp. 83-91, 2012, doi: 10.1016\/j.intmar.2012.01.003.10.1016\/j.intmar.2012.01.003","DOI":"10.1016\/j.intmar.2012.01.003"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_022","doi-asserted-by":"crossref","unstructured":"[22] S.M. West, \u201cSocial Media as Social Infrastructures\u201d, in The Social Media Debate, D. Rosen, Ed., New York: Routledge, 2022, pp. 5-19.10.4324\/9781003171270-2","DOI":"10.4324\/9781003171270-2"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_023","doi-asserted-by":"crossref","unstructured":"[23] J. \u017bywio\u0142ek, J. Rosak-Szyrocka, and B. Jereb, \u201cBarriers to Knowledge Sharing in the Field of Information Security\u201d, Management Systems in Production Engineering, vol. 29, no. 2, pp. 114-119, 2021, doi: 10.2478\/mspe-2021-0015.10.2478\/mspe-2021-0015","DOI":"10.2478\/mspe-2021-0015"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_024","doi-asserted-by":"crossref","unstructured":"[24] D. Godes et al., \u201cThe Firm\u2019s Management of Social Interactions\u201d, Market Lett, vol. 16, 3-4, pp. 415-428, 2005, doi: 10.1007\/s11002-005-5902-4.10.1007\/s11002-005-5902-4","DOI":"10.1007\/s11002-005-5902-4"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_025","doi-asserted-by":"crossref","unstructured":"[25] S.K. N, S.K, and D.K, \u201cOn Privacy and Security in Social Media \u2013 A Comprehensive Study\u201d, Procedia Computer Science, vol. 78, pp. 114-119, 2016, doi: 10.1016\/j.procs.2016.02.019.10.1016\/j.procs.2016.02.019","DOI":"10.1016\/j.procs.2016.02.019"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_026","doi-asserted-by":"crossref","unstructured":"[26] S. Narayanan and A. Richa, \u201cPrivacy and information trading on social media applications\u201d, in Contemporary Issues in Social Media Marketing, B. Rishi and S. Bandyopadhyay, Eds., 1 Edition. New York: Routledge, 2017.: Routledge, 2017, pp. 308-319.","DOI":"10.4324\/9781315563312-23"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_027","doi-asserted-by":"crossref","unstructured":"[27] K. L. Keller and D. R. Lehmann, \u201cBrands and Branding: Research Findings and Future Priorities\u201d, Marketing Science, vol. 25, no. 6, pp. 740-759, 2006, doi: 10.1287\/mksc.1050.0153.10.1287\/mksc.1050.0153","DOI":"10.1287\/mksc.1050.0153"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_028","doi-asserted-by":"crossref","unstructured":"[28] H. Fussell Sisco and T. McCorkindale, \u201cCommunicating pink\u201d: an analysis of the communication strategies, transparency, and credibility of breast cancer social media sites\u201d, Int. J. Nonprofit Volunt. Sect. Mark., vol. 18, no. 4, pp. 287-301, 2013, doi: 10.1002\/nvsm.1474.10.1002\/nvsm.1474","DOI":"10.1002\/nvsm.1474"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_029","doi-asserted-by":"crossref","unstructured":"[29] N. Ind, O. Iglesias, and M. Schultz, \u201cBuilding Brands Together: Emergence and Outcomes of Co-Creation\u201d, California Management Review, vol. 55, no. 3, pp. 5-26, 2013, doi: 10.1525\/cmr.2013.55.3.5.10.1525\/cmr.2013.55.3.5","DOI":"10.1525\/cmr.2013.55.3.5"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_030","doi-asserted-by":"crossref","unstructured":"[30] M.Z. Iqbal, \u201cUnhiding the Effect of Social Media Marketing Activities & Benefits and Brand Experience on Consumer Based Brand Equity\u201d, IJSSE, vol. 2, no. 1, 2021, doi: 10.46745\/ilma.ijsse.2021.02.01.03.10.46745\/ilma.ijsse.2021.02.01.03","DOI":"10.46745\/ilma.ijsse.2021.02.01.03"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_031","doi-asserted-by":"crossref","unstructured":"[31] A. Seetharaman, Azlan Bin Mohd Nadzir, Zainal, and S. Gunalan, \u201cA conceptual study on brand valuation\u201d, Journal of Product & Brand Management, vol. 10, no. 4, pp. 243-256, 2001, doi: 10.1108\/EUM0000000005674.10.1108\/EUM0000000005674","DOI":"10.1108\/EUM0000000005674"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_032","doi-asserted-by":"crossref","unstructured":"[32] J. \u017bywio\u0142ek, J. Rosak-Szyrocka, and M. Mrowiec, \u201cKnowledge Management in Households about Energy Saving as Part of the Awareness of Sustainable Development\u201d, Energies, vol. 14, no. 24, p. 8207, 2021, doi: 10.3390\/en14248207.10.3390\/en14248207","DOI":"10.3390\/en14248207"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_033","doi-asserted-by":"crossref","unstructured":"[33] T. Sakaki, M. Okazaki, and Y. Matsuo, \u201cEarthquake shakes Twitter users\u201d, in 2010.10.1145\/1772690.1772777","DOI":"10.1145\/1772690.1772777"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_034","doi-asserted-by":"crossref","unstructured":"[34] N. Park, K.F. Kee, and S. Valenzuela, \u201cBeing immersed in social networking environment: Facebook groups, uses and gratifications, and social outcomes\u201d, CyberPsychology & Behavior, vol. 12, no. 6, pp. 729-733, 2009, doi: 10.1089\/cpb.2009.0003.10.1089\/cpb.2009.000319619037","DOI":"10.1089\/cpb.2009.0003"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_035","doi-asserted-by":"crossref","unstructured":"[35] M. Trusov, R.E. Bucklin, and K. Pauwels, \u201cEffects of Word-of-Mouth versus Traditional Marketing: Findings from an Internet Social Networking Site\u201d, Journal of Marketing, vol. 73, no. 5, pp. 90-102, 2009, doi: 10.1509\/jmkg.73.5.90.10.1509\/jmkg.73.5.90","DOI":"10.1509\/jmkg.73.5.90"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_036","doi-asserted-by":"crossref","unstructured":"[36] J. Westwood, Ed., Social Media in Social Work Practice. 1 Oliver\u2019s Yard, 55 City Road London EC1Y 1SP: SAGE Publications, Inc, 2019.10.4135\/9781529714555","DOI":"10.4135\/9781529714555"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_037","doi-asserted-by":"crossref","unstructured":"[37] M. Zimdars, \u201cMis\/Disinformation and Social Media\u201d, in The Social Media Debate, D. Rosen, Ed., New York: Routledge, 2022, pp. 120-136.10.4324\/9781003171270-8","DOI":"10.4324\/9781003171270-8"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_038","doi-asserted-by":"crossref","unstructured":"[38] S.L. Vargo and R.F. Lusch, \u201cEvolving to a New Dominant Logic for Marketing\u201d, Journal of Marketing, vol. 68, no. 1, pp. 1-17, 2004, doi: 10.1509\/jmkg.68.1.1.24036.10.1509\/jmkg.68.1.1.24036","DOI":"10.1509\/jmkg.68.1.1.24036"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_039","doi-asserted-by":"crossref","unstructured":"[39] M. E. Zaglia, \u201cBrand communities embedded in social networks\u201d, Journal of Business Research, vol. 66, 2-2, pp. 216-223, 2013, doi: 10.1016\/j.jbusres.2012.07.015.10.1016\/j.jbusres.2012.07.015361760223564989","DOI":"10.1016\/j.jbusres.2012.07.015"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_040","unstructured":"[40] Social Media Security: Elsevier, 2014."},{"key":"2024042804005314029_j_mspe-2022-0019_ref_041","doi-asserted-by":"crossref","unstructured":"[41] S. Aral, C. Dellarocas, and D. Godes, \u201cIntroduction to the Special Issue \u2013 Social Media and Business Transformation: A Framework for Research\u201d, Information Systems Research, vol. 24, no. 1, pp. 3-13, 2013, doi: 10.1287\/isre.1120.0470.10.1287\/isre.1120.0470","DOI":"10.1287\/isre.1120.0470"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_042","doi-asserted-by":"crossref","unstructured":"[42] B.D. Carlson, T.A. Suter, and T.J. Brown, \u201cSocial versus psychological brand community: The role of psychological sense of brand community\u201d, Journal of Business Research, vol. 61, no. 4, pp. 284-291, 2008, doi: 10.1016\/j.jbusres.2007.06.022.10.1016\/j.jbusres.2007.06.022","DOI":"10.1016\/j.jbusres.2007.06.022"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_043","doi-asserted-by":"crossref","unstructured":"[43] \u201cThe Role of Social Media to Gain Social Security among Citizens in Sulaimani City\u201d, JALHSS, vol. 38, pp. 77-101, 2019, doi: 10.33193\/JALHSS.38.5.10.33193\/JALHSS.38.5","DOI":"10.33193\/JALHSS.38.5"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_044","unstructured":"[44] Knowledge Management, Trust and Communication in the Era of Social Media: MDPI, 2020."},{"key":"2024042804005314029_j_mspe-2022-0019_ref_045","unstructured":"[45] P. Borzymek and M. Sydow, Trust and Distrust Prediction in Social Network with Combined Graphical and Review-Based Attributes, Agent and Multi-Agent Systems: Technologies and Applications: Springer Berlin Heidelberg, vol. 6070."},{"key":"2024042804005314029_j_mspe-2022-0019_ref_046","doi-asserted-by":"crossref","unstructured":"[46] C. Au Yeung and T. Iwata, \u201cStrength of social influence in trust networks in product review sites\u201d, in 2011.10.1145\/1935826.1935899","DOI":"10.1145\/1935826.1935899"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_047","unstructured":"[47] P. Agrawal, Proceedings of the Twenty-ird International Joint Conference on Artificial Intelligence, 2013."},{"key":"2024042804005314029_j_mspe-2022-0019_ref_048","doi-asserted-by":"crossref","unstructured":"[48] Boshrooyeh, \u201cPPAD: Privacy preserving group-based advertising in online social networks\u201d, p. 1, 2018.10.23919\/IFIPNetworking.2018.8696817","DOI":"10.23919\/IFIPNetworking.2018.8696817"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_049","doi-asserted-by":"crossref","unstructured":"[49] S.T. Boshrooyeh, A. K\u00fcp\u00e7\u00fc, and \u00d6. \u00d6zkasap, \u201cPrivado\u201d, ACM Trans. Priv. Secur., vol. 23, no. 3, pp. 1-36, 2020, doi: 10.1145\/3386154.10.1145\/3386154","DOI":"10.1145\/3386154"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_050","doi-asserted-by":"crossref","unstructured":"[50] J. Leskovec, D. Huttenlocher, and J. Kleinberg, \u201cPredicting positive and negative links in online social networks\u201d, in 2010.10.1145\/1772690.1772756","DOI":"10.1145\/1772690.1772756"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_051","doi-asserted-by":"crossref","unstructured":"[51] R.N. Lichtenwalter, J.T. Lussier, and N.V. Chawla, \u201cNew perspectives and methods in link prediction\u201d, in 2010.10.1145\/1835804.1835837","DOI":"10.1145\/1835804.1835837"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_052","doi-asserted-by":"crossref","unstructured":"[52] D. Marquardt, B. Filipczyk, J. Go\u0142uchowski, and J. Paliszkiewicz, \u201cBuilding Public Trust in Social Media\u201d, in Managing Public Trust, B. Ko\u017cuch, S. J. Magala, and J. Paliszkiewicz, Eds., Cham: Springer International Publishing, 2018, pp. 135-152.10.1007\/978-3-319-70485-2_9","DOI":"10.1007\/978-3-319-70485-2_9"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_053","doi-asserted-by":"crossref","unstructured":"[53] Cohen, \u201cEarly detection of spamming accounts in large-Scale service provider networks\u201d, Knowledge-Based Systems, 2017.10.1016\/j.knosys.2017.11.040","DOI":"10.1016\/j.knosys.2017.11.040"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_054","doi-asserted-by":"crossref","unstructured":"[54] C. Castillo, M. Mendoza, and B. Poblete, \u201cInformation credibility on twitter\u201d, in 2011.10.1145\/1963405.1963500","DOI":"10.1145\/1963405.1963500"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_055","unstructured":"[55] G. Cai, J. Tang, and Y. Wen, Trust Prediction with Temporal Dynamics, Web-Age Information Management: Springer International Publishing, vol. 8485."},{"key":"2024042804005314029_j_mspe-2022-0019_ref_056","doi-asserted-by":"crossref","unstructured":"[56] Das, \u201cAnonymizing weighted social network graphs\u201d, p. 904, 2010.10.1109\/ICDE.2010.5447915","DOI":"10.1109\/ICDE.2010.5447915"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_057","unstructured":"[57] M. de Cock and P.P. Da Silva, A Many Valued Representation and Propagation of Trust and Distrust, Fuzzy Logic and Applications: Springer Berlin Heidelberg, vol. 3849."},{"key":"2024042804005314029_j_mspe-2022-0019_ref_058","doi-asserted-by":"crossref","unstructured":"[58] R.I.M. Dunbar, \u201cDo online social media cut through the constraints that limit the size of offline social networks?\u201d, Royal Society Open Science, vol. 3, no. 1, p. 150292, 2016, doi: 10.1098\/rsos.150292.10.1098\/rsos.150292473691826909163","DOI":"10.1098\/rsos.150292"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_059","doi-asserted-by":"crossref","unstructured":"[59] C.-J. Hsieh, K.-Y. Chiang, and I. S. Dhillon, \u201cLow rank modeling of signed networks\u201d, in 2012.10.1145\/2339530.2339612","DOI":"10.1145\/2339530.2339612"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_060","doi-asserted-by":"crossref","unstructured":"[60] Hirschprung, \u201cAnalyzing and optimizing access control choice architectures in online social networks\u201d, ACM Transactions on Intelligent Systems and Technology (TIST), vol. 8, no. 4, p. 57, 2017.10.1145\/3046676","DOI":"10.1145\/3046676"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_061","doi-asserted-by":"crossref","unstructured":"[61] Gudes, \u201cAn Information-Flow Control Model for Online Social Networks Based on User-Attribute Credibility and Connection-Strength Factors\u201d, p. 55, 2018.10.1007\/978-3-319-94147-9_5","DOI":"10.1007\/978-3-319-94147-9_5"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_062","unstructured":"[62] G.V. Johar, \u201cHow to save your brand in the face of crisis\u201d, Image, 2012."},{"key":"2024042804005314029_j_mspe-2022-0019_ref_063","doi-asserted-by":"crossref","unstructured":"[63] R. Forsati, M. Mahdavi, M. Shamsfard, and M. Sarwat, \u201cMatrix Factorization with Explicit Trust and Distrust Side Information for Improved Social Recommendation\u201d, ACM Trans. Inf. Syst., vol. 32, no. 4, pp. 1-38, 2014, doi: 10.1145\/2641564.10.1145\/2641564","DOI":"10.1145\/2641564"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_064","doi-asserted-by":"crossref","unstructured":"[64] I. Kayes and A. Iamnitchi, \u201cPrivacy and security in online social networks: A survey\u201d, Online Social Networks and Media, 3-4, pp. 1-21, 2017, doi: 10.1016\/j.osnem.2017.09.001.10.1016\/j.osnem.2017.09.001","DOI":"10.1016\/j.osnem.2017.09.001"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_065","doi-asserted-by":"crossref","unstructured":"[65] C. E. Kampf, \u201cConnecting Corporate and Consumer Social Responsibility Through Social Media Activism\u201d, Social Media + Society, vol. 4, no. 1, 205630511774635, 2018, doi: 10.1177\/2056305117746357.10.1177\/2056305117746357","DOI":"10.1177\/2056305117746357"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_066","doi-asserted-by":"crossref","unstructured":"[66] I. Khajuria \u201cSocial Media Marketing in Creating Brand Awareness and Brand Trust\u201d, Manthan, no. 1, 2019, doi: 10.17492\/manthan.spl19.1.10.17492\/manthan.spl19.1","DOI":"10.17492\/manthan.spl19.1"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_067","doi-asserted-by":"crossref","unstructured":"[67] Kumar, \u201cRelationship Strength Based Access Control in Online Social Networks\u201d, p. 197, 2016.10.1007\/978-3-319-30927-9_20","DOI":"10.1007\/978-3-319-30927-9_20"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_068","doi-asserted-by":"crossref","unstructured":"[68] K.M. Khan and Q. Malluhi, \u201cEstablishing Trust in Cloud Computing\u201d, IT Prof., vol. 12, no. 5, pp. 20-27, 2010, doi: 10.1109\/MITP.2010.128.10.1109\/MITP.2010.128","DOI":"10.1109\/MITP.2010.128"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_069","doi-asserted-by":"crossref","unstructured":"[69] A.C. Squicciarini, F. Paci, and S. Sundareswaran, \u201cPriMa: a comprehensive approach to privacy protection in social network sites\u201d, Ann. Telecommun., vol. 69, 1-2, pp. 21-36, 2014, doi: 10.1007\/s12243-013-0371-x.10.1007\/s12243-013-0371-x","DOI":"10.1007\/s12243-013-0371-x"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_070","doi-asserted-by":"crossref","unstructured":"[70] A. Mukherjee, B. Liu, J. Wang, N. Glance, and N. Jindal, \u201cDetecting group review spam\u201d, in 2011.10.1145\/1963192.1963240","DOI":"10.1145\/1963192.1963240"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_071","doi-asserted-by":"crossref","unstructured":"[71] Misra, \u201cIMPROVE-Identifying Minimal PROfile VEctors for similarity-based access control\u201d, p. 868, 2016.10.1109\/TrustCom.2016.0150","DOI":"10.1109\/TrustCom.2016.0150"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_072","doi-asserted-by":"crossref","unstructured":"[72] A. Mishra and A. Bhattacharya, \u201cFinding the bias and prestige of nodes in networks based on trust scores\u201d, in 2011.10.1145\/1963405.1963485","DOI":"10.1145\/1963405.1963485"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_073","unstructured":"[73] Milo, \u201cBoosting SimRank with Semantics\u201d, p. 1, 2019."},{"key":"2024042804005314029_j_mspe-2022-0019_ref_074","doi-asserted-by":"crossref","unstructured":"[74] G. Misra and J. M. Such, \u201cHow Socially Aware Are Social Media Privacy Controls?\u201d, Computer, vol. 49, no. 3, pp. 96-99, 2016, doi: 10.1109\/MC.2016.83.10.1109\/MC.2016.83","DOI":"10.1109\/MC.2016.83"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_075","doi-asserted-by":"crossref","unstructured":"[75] A. Squicciarini, S. Karumanchi, D. Lin, and N. DeSisto, \u201cIdentifying hidden social circles for advanced privacy configuration\u201d, Computers & Security, vol. 41, pp. 40-51, 2014, doi: 10.1016\/j.cose.2013.07.007.10.1016\/j.cose.2013.07.007","DOI":"10.1016\/j.cose.2013.07.007"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_076","doi-asserted-by":"crossref","unstructured":"[76] H. Rahman and M. Ebrahimi, Eds., Information Manipulation and Its Impact Across All Industries: IGI Global, 2022.10.4018\/978-1-7998-8235-0","DOI":"10.4018\/978-1-7998-8235-0"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_077","doi-asserted-by":"crossref","unstructured":"[77] A. Oxley, \u201cSecurity threats to social media technologies\u201d, in Security Risks in Social Media Technologies: Elsevier, 2013, pp. 89-115.10.1016\/B978-1-84334-714-9.50003-6","DOI":"10.1016\/B978-1-84334-714-9.50003-6"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_078","doi-asserted-by":"crossref","unstructured":"[78] J. Tang, Y. Chang, and H. Liu, \u201cMining social media with social theories\u201d, SIGKDD Explor. Newsl., vol. 15, no. 2, pp. 20-29, 2014, doi: 10.1145\/2641190.2641195.10.1145\/2641190.2641195","DOI":"10.1145\/2641190.2641195"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_079","doi-asserted-by":"crossref","unstructured":"[79] Taheri-Boshrooyeh, \u201cSecurity and privacy of distributed online social networks\u201d, p. 112, 2015.10.1109\/ICDCSW.2015.30","DOI":"10.1109\/ICDCSW.2015.30"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_080","unstructured":"[80] H. Tennakoon, \u201cInformation Security and Privacy in Social Media\u201d, in Advances in Social Networking and Online Communities, Information Manipulation and Its Impact Across All Industries, H. Rahman and M. Ebrahimi, Eds.: IGI Global, 2022, pp. 73-101."},{"key":"2024042804005314029_j_mspe-2022-0019_ref_081","doi-asserted-by":"crossref","unstructured":"[81] J. Tang, X. Hu, and H. Liu, \u201cSocial recommendation: a review\u201d, Social Network Analysis and Mining, vol. 3, no. 4, pp. 1113-1133, 2013, doi: 10.1007\/s13278-013-0141-9.10.1007\/s13278-013-0141-9","DOI":"10.1007\/s13278-013-0141-9"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_082","doi-asserted-by":"crossref","unstructured":"[82] N. Voloch, N. Gal-Oz, and E. Gudes, \u201cA Trust based Privacy Providing Model for Online Social Networks\u201d, Online Social Networks and Media, vol. 24, p. 100138, 2021, doi: 10.1016\/j.osnem.2021.100138.10.1016\/j.osnem.2021.100138","DOI":"10.1016\/j.osnem.2021.100138"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_083","doi-asserted-by":"crossref","unstructured":"[83] Yu, \u201cMy friend leaks my privacy: Modeling and analyzing privacy in social networks\u201d, p. 93, 2018.10.1145\/3205977.3205981","DOI":"10.1145\/3205977.3205981"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_084","doi-asserted-by":"crossref","unstructured":"[84] M. Yarchi, \u201cSecurity issues as mirrored in the digital social media\u201d, in Routledge Handbook on Israeli Security, S. A. Cohen and A. Klieman, Eds., Milton Park, Abingdon, Oxon, New York, NY: Routledge, 2019.: Routledge, 2018, pp. 65-75.","DOI":"10.4324\/9781315165196-6"},{"key":"2024042804005314029_j_mspe-2022-0019_ref_085","doi-asserted-by":"crossref","unstructured":"[85] Voloch, \u201cAn MST-based information flow model for security in Online Social Networks\u201d, 2019.10.1109\/ICUFN.2019.8806160","DOI":"10.1109\/ICUFN.2019.8806160"}],"container-title":["Management Systems in Production Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.sciendo.com\/pdf\/10.2478\/mspe-2022-0019","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,28]],"date-time":"2024-04-28T04:02:03Z","timestamp":1714276923000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.sciendo.com\/article\/10.2478\/mspe-2022-0019"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,19]]},"references-count":85,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2022,5,19]]},"published-print":{"date-parts":[[2022,6,1]]}},"alternative-id":["10.2478\/mspe-2022-0019"],"URL":"https:\/\/doi.org\/10.2478\/mspe-2022-0019","relation":{},"ISSN":["2450-5781"],"issn-type":[{"value":"2450-5781","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,19]]}}}