Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 104 matches
- 2023
- Marc Löchner:
Preserving user privacy in social media data processing. Dresden University of Technology, Germany, 2023 - Ma Zirui, Gu Bin:
A Privacy-Preserved and User Self-Governance Blockchain-Based Framework to Combat COVID-19 Depression in Social Media. IEEE Access 11: 35255-35280 (2023) - Wietske van Osch, Burcu Bulgurcu, Yuyang Liang:
Living in a Fishbowl or Not: The Role of Transparency and Privacy in Creative Dialogues on Enterprise Social Media. J. Assoc. Inf. Syst. 24(3): 3 (2023) - Jih-Hsuan Tammy Lin, Christine Linda Cook, Ji-Wei Yang:
I wanna share this, but...: explicating invested costs and privacy concerns of social grooming behaviors in Facebook and users' well-being and social capital. J. Comput. Mediat. Commun. 29(1) (2023) - Xinlin Yao, Yuxiang (Chris) Zhao, Shijie Song, Xiaolun Wang:
Beyond disclosure: the role of self-identity and context collapse in privacy management on identified social media for LGBTQ+ people. J. Documentation 79(3): 718-742 (2023) - Aaron Necaise, Tangila Islam Tanni, Aneka Williams, Yan Solihin, Apu Kapadia, Mary Jean Amon:
User Preferences for Interdependent Privacy Preservation Strategies in Social Media. Proc. ACM Hum. Comput. Interact. 7(CSCW2): 1-30 (2023) - Xiangyu Hu, Tianqing Zhu, Xuemeng Zhai, Wanlei Zhou, Wei Zhao:
Privacy Data Propagation and Preservation in Social Media: A Real-World Case Study. IEEE Trans. Knowl. Data Eng. 35(4): 4137-4150 (2023) - Giovanni Livraga, Artjoms Olzojevs, Marco Viviani:
Unveiling the Privacy Risk: A Trade-Off Between User Behavior and Information Propagation in Social Media. COMPLEX NETWORKS (4) 2023: 277-290 - Yage Liu:
AI Chatbots in Social Media: Ethical Responsibilities and Privacy Challenges of Information and Communication Technology. IMMS 2023: 96-99 - Andrea Franco, Adrian Holzer:
Fostering Privacy Literacy among High School Students by Leveraging Social Media Interaction and Learning Traces in the Classroom. LAK 2023: 538-544 - Vera Schmitt, Paul Michel dit Ferrer, Arooj Anwar Khan, Ina Kern, Sebastian Möller:
How Much is Your Instagram Data Worth? Economic Perspective of Privacy in the Social Media Context. Privacy and Identity Management 2023: 292-308 - Federico Peiretti, Ruggero G. Pensa:
Detection of Privacy-Harming Social Media Posts in Italian. SocialSec 2023: 203-223 - 2022
- Salih Erdem Erol:
Sosyal medya ortamlarında veri mahremiyeti duyarlı farkındalık modelleri geliştirme (Developing data privacy sensitive awareness models in social media enviroments). Gazi University, Turkey, 2022 - Aras Alkis, Tekin Kose:
Privacy concerns in consumer E-commerce activities and response to social media advertising: Empirical evidence from Europe. Comput. Hum. Behav. 137: 107412 (2022) - Livio Bioglio, Ruggero G. Pensa:
Analysis and classification of privacy-sensitive content in social media posts. EPJ Data Sci. 11(1): 12 (2022) - Katerina Vgena, Angeliki Kitsiou, Christos Kalloniatis, Stefanos Gritzalis:
Determining the Role of Social Identity Attributes to the Protection of Users' Privacy in Social Media. Future Internet 14(9): 249 (2022) - Jingyu Li, Fu Guo, Qing-Xing Qu, Deming Hao:
How Does Perceived Overload in Mobile Social Media Influence Users' Passive Usage Intentions? Considering the Mediating Roles of Privacy Concerns and Social Media Fatigue. Int. J. Hum. Comput. Interact. 38(10): 983-992 (2022) - Mary Jean Amon, Nika Kartvelishvili, Bennett I. Bertenthal, Kurt Hugenberg, Apu Kapadia:
Sharenting and Children's Privacy in the United States: Parenting Style, Practices, and Perspectives on Sharing Young Children's Photos on Social Media. Proc. ACM Hum. Comput. Interact. 6(CSCW1): 116:1-116:30 (2022) - Bethany Sumner, Gokila Dorai, John Heslen:
Preliminary Analysis of Privacy Implications Observed in Social-Media Posts Across Shopping Platforms. ARES 2022: 111:1-111:10 - Ektor Arzoglou, Yki Kortesniemi, Sampsa Ruutu, Tommi Elo:
Privacy Paradox in Social Media: A System Dynamics Analysis. ICCS (1) 2022: 651-666 - Robert Cantaragiu, Antonis Michalas, Eugene Frimpong, Alexandros Bakas:
MetaPriv: Acting in Favor of Privacy on Social Media Platforms. SecureComm 2022: 692-709 - Xinru Page, Sara Berrios, Daricia Wilkinson, Pamela J. Wisniewski:
Social Media and Privacy. Modern Socio-Technical Perspectives on Privacy 2022: 113-147 - Robert Cantaragiu, Antonis Michalas, Eugene Frimpong, Alexandros Bakas:
MetaPriv: Acting in Favor of Privacy on Social Media Platforms. CoRR abs/2209.03679 (2022) - 2021
- Mirna Gilman Ranogajec, Boris Badurina:
Measuring user confidence in social media security and privacy. Educ. Inf. 37(4): 427-442 (2021) - Sarah Young:
Not too deep: Privacy, resistance, and the incorporation of social media in background checks. First Monday 26(9) (2021) - Yu-Qian Zhu, Kritsapas Kanjanamekanant:
No trespassing: exploring privacy boundaries in personalized advertisement and its effects on ad attitude and purchase intentions on social media. Inf. Manag. 58(2): 103314 (2021) - P. Jayaprabha, K. Paulose Jacob, K. Preetha Mathew:
Fuzzy-based multiparty privacy management in social media using modified elliptic curve cryptography. Soft Comput. 25(8): 6083-6100 (2021) - Noreddine Belhadj Cheikh, Abdessamad Imine, Michaël Rusinowitch:
FOX: Fooling with Explanations : Privacy Protection with Adversarial Reactions in Social Media. PST 2021: 1-10 - 2020
- Nania Nuzulita, Apol Pribadi Subriadi:
The role of risk-benefit and privacy analysis to understand different uses of social media by Generations X, Y, and Z in Indonesia. Electron. J. Inf. Syst. Dev. Ctries. 86(3) (2020) - Marc Löchner, Ramian Fathi, David Schmid, Alexander Dunkel, Dirk Burghardt, Frank Fiedrich, Steffen Koch:
Case Study on Privacy-Aware Social Media Data Processing in Disaster Management. ISPRS Int. J. Geo Inf. 9(12): 709 (2020)
skipping 74 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-01 09:26 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint