{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T02:11:37Z","timestamp":1725761497976},"reference-count":64,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/sp.2014.38","type":"proceedings-article","created":{"date-parts":[[2014,11,26]],"date-time":"2014-11-26T14:57:47Z","timestamp":1417013867000},"page":"493-508","source":"Crossref","is-referenced-by-count":15,"title":["Cloak and Swagger: Understanding Data Sensitivity through the Lens of User Anonymity"],"prefix":"10.1109","author":[{"given":"Sai Teja","family":"Peddinti","sequence":"first","affiliation":[]},{"given":"Aleksandra","family":"Korolova","sequence":"additional","affiliation":[]},{"given":"Elie","family":"Bursztein","sequence":"additional","affiliation":[]},{"given":"Geetanjali","family":"Sampemane","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"35","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481368"},{"journal-title":"Yahoo! Answer","year":"0","key":"36"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.2307\/248893"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1177\/01461672012710001"},{"journal-title":"Quora and Search Engines What Does Enabling \"Search Engine Privacy\" under Account Settings Do?","year":"2013","key":"39"},{"journal-title":"Quora Policies and Guidelines Do I Have to Use My Real Name on Quora? What is Quora's Real Names Policy?","year":"2013","key":"37"},{"journal-title":"How Many Anonymous Answers Have You Posted on Quora","year":"2014","key":"38"},{"journal-title":"Selecting Statistical Techniques for Social Science Data A Guide for SAS Users","year":"1998","author":"andrews","key":"43"},{"key":"42","doi-asserted-by":"crossref","DOI":"10.1145\/2488388.2488506","article-title":"Wisdom in the social crowd: An analysis of Quora","author":"wang","year":"2013","journal-title":"Proceedings of the 12th International World Wide Web Conference (WWW"},{"journal-title":"Collective Intelligence","article-title":"Who is authoritative? Understanding reputation mechanisms in Quora","year":"2012","author":"paul","key":"41"},{"journal-title":"What Drives People to Contribute Anonymous Answers on Quora?","year":"2013","key":"40"},{"journal-title":"Beware Potential Employers Are Watching You","year":"2013","author":"kwoh","key":"22"},{"journal-title":"Facebook Graph Search Will Find You the Perfect Date","year":"2013","author":"miller","key":"23"},{"journal-title":"Why I Left Facebook","year":"2013","author":"breen","key":"24"},{"journal-title":"Why Teens Are Tiring of Facebook","year":"2013","author":"grove","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208552"},{"key":"27","first-page":"79","article-title":"An analysis of private browsing modes in modern browsers","author":"aggarwal","year":"2010","journal-title":"Proceedings of the 19th USENIX Conference on Security"},{"journal-title":"Tor Anonymity Online","year":"0","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/s10707-009-0099-y"},{"journal-title":"When the Self-Published Authors Take Over What Will Publishers Do?","year":"0","key":"3"},{"journal-title":"Kony Video Proves Social Media's Role As Youth News Source Pew","year":"2014","author":"choney","key":"2"},{"journal-title":"Harlem Shake Baauer Cashes in on Viral Video's Massive YouTube Success","year":"2013","key":"1"},{"journal-title":"Quora","year":"0","key":"7"},{"journal-title":"ICWSM","article-title":"4chan and\/b: An analysis of anonymity and ephemerality in a large online community","year":"2011","author":"bernstein","key":"30"},{"journal-title":"First Issue of CNIL IP Reports \"Privacy Towards 2020\" - 42 Experts Share Their Visions of the Future of Privacy with the French Regulation Authority","year":"2013","key":"6"},{"journal-title":"The Red Cross' Rogue Tweet #Gettngslizzerd on Dogfish Head's Midas Touch","year":"2013","key":"5"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2012.07.002"},{"journal-title":"Facebook and Twitter Postings Cost CFO His Job","year":"2013","key":"4"},{"journal-title":"Snapchat is Thriving and That's A Great Sign for Your Privacy","year":"2013","author":"mcfarland","key":"31"},{"journal-title":"Microsoft Advertising Creative Acceptance Policy Guide","year":"2013","key":"9"},{"journal-title":"Google Policies and Principles","year":"2013","key":"8"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068823"},{"key":"58","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517859"},{"key":"57","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335363"},{"key":"56","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493485"},{"journal-title":"Oops Mark Zuckerberg's Sister Has A Private Facebook Photo Go Public","year":"2013","author":"hill","key":"19"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493436"},{"journal-title":"Twitter Your Way to Getting Robbed","year":"2013","author":"grove","key":"17"},{"journal-title":"When the Most Personal Secrets Get Outed on Facebook","year":"2013","author":"fowler","key":"18"},{"journal-title":"CNIL","year":"0","key":"15"},{"journal-title":"Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data","year":"2013","key":"16"},{"journal-title":"Google Privacy Policy","year":"2013","key":"13"},{"journal-title":"Removing Feed Stories about Views","year":"2013","author":"huang","key":"14"},{"journal-title":"CNIL Questionnaire to Google","year":"2013","key":"11"},{"journal-title":"Google Consumer Surveys","year":"2013","key":"12"},{"journal-title":"They Loved Your G P A Then They Saw Your Tweets","year":"2013","author":"singer","key":"21"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078841"},{"key":"64","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772727"},{"journal-title":"How Much is Too Much? Privacy Issues on Twitter","first-page":"1","year":"2010","author":"humphreys","key":"62"},{"key":"63","first-page":"697","article-title":"An examination of regret in bullying tweets","author":"xu","year":"2013","journal-title":"HLT-NAACL"},{"journal-title":"Anonymity Privacy and Security Online Part 4 How Users Feel about the Sensitivity of Certain Kinds of Data","year":"2013","author":"rainie","key":"60"},{"key":"61","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441878"},{"journal-title":"Alexa - How Popular is Quora com?","year":"2014","key":"49"},{"journal-title":"Quora Grew More Than 3X Across All Metrics in the Past Year","year":"0","author":"tsotsis","key":"48"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1145\/108844.108867"},{"journal-title":"Premier by Mobileworks","year":"0","key":"44"},{"key":"47","first-page":"30","article-title":"Sentiment analysis of Twitter data","author":"agarwal","year":"2011","journal-title":"Proceedings of the Workshop on Languages in Social Media"},{"journal-title":"Foundations of Statistical Natural Language Processing","year":"1999","author":"manning","key":"46"},{"journal-title":"Facebook Advertising Guidelines","year":"2013","key":"10"},{"journal-title":"Trafficestimate - Quora com Website Traffic and Information","year":"2014","key":"51"},{"key":"52","doi-asserted-by":"crossref","DOI":"10.1145\/2491055.2491084","article-title":"Automated decision support for human tasks in a collaborative system: The case of deletion in Wikipedia","author":"gelley","year":"2013","journal-title":"WikiSym"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1145\/336992.336995"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.01.010"},{"journal-title":"Compete - Quora Site Info","year":"2014","key":"50"}],"event":{"name":"2014 IEEE Symposium on Security and Privacy (SP)","start":{"date-parts":[[2014,5,18]]},"location":"San Jose, CA","end":{"date-parts":[[2014,5,21]]}},"container-title":["2014 IEEE Symposium on Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/iel7\/6954656\/6956545\/06956583.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6954656\/6956545\/06956583.pdf?arnumber=6956583","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,17]],"date-time":"2019-08-17T21:11:36Z","timestamp":1566076296000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6956583\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":64,"URL":"https:\/\/doi.org\/10.1109\/sp.2014.38","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}