{"id":"https://openalex.org/W3183636969","doi":"https://doi.org/10.1108/ics-08-2019-0108","title":"A look into user privacy andthird-party applications in Facebook.","display_name":"A look into user privacy andthird-party applications in Facebook.","publication_year":2021,"publication_date":"2021-07-26","ids":{"openalex":"https://openalex.org/W3183636969","doi":"https://doi.org/10.1108/ics-08-2019-0108","mag":"3183636969"},"language":"en","primary_location":{"id":"pmh:oai:digitalcommons.usu.edu:computer_science_facpubs-1024","is_oa":true,"landing_page_url":"https://digitalcommons.usu.edu/computer_science_facpubs/24","pdf_url":"https://digitalcommons.usu.edu/cgi/viewcontent.cgi?article=1024&context=computer_science_facpubs","source":{"id":"https://openalex.org/S4377196327","display_name":"Digital Commons - USU (Utah State University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I121980950","host_organization_name":"Utah State University","host_organization_lineage":["https://openalex.org/I121980950"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computer Science Faculty and Staff Publications","raw_type":"text"},"type":"article","indexed_in":[],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://digitalcommons.usu.edu/cgi/viewcontent.cgi?article=1024&context=computer_science_facpubs","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050225699","display_name":"Sovantharith Seng","orcid":"https://orcid.org/0000-0002-4548-637X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Sovantharith Seng","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041581450","display_name":"Mahdi Nasrullah Al-Ameen","orcid":"https://orcid.org/0000-0002-5764-2253"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mahdi Nasrullah Al-Ameen","raw_affiliation_strings":[],"raw_orcid":"https://orcid.org/0000-0002-5764-2253","affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5035719182","display_name":"Matthew Wright","orcid":"https://orcid.org/0000-0002-8489-6347"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Matthew Wright","raw_affiliation_strings":[],"raw_orcid":"https://orcid.org/0000-0002-8489-6347","affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5050225699"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.8985,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.88871974,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"29","issue":"2","first_page":"283","last_page":"313"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.8001285791397095},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.6586019396781921},{"id":"https://openalex.org/keywords/privacy-policy","display_name":"Privacy policy","score":0.6012161374092102},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.525439441204071},{"id":"https://openalex.org/keywords/cyberpsychology","display_name":"Cyberpsychology","score":0.5125610828399658},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.5018043518066406},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4873269498348236},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.464125394821167},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4473888576030731},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4242822229862213},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.4127039909362793},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3667870759963989},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.26528266072273254},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2291906476020813}],"concepts":[{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.8001285791397095},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.6586019396781921},{"id":"https://openalex.org/C102938260","wikidata":"https://www.wikidata.org/wiki/Q1999831","display_name":"Privacy policy","level":3,"score":0.6012161374092102},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.525439441204071},{"id":"https://openalex.org/C156571341","wikidata":"https://www.wikidata.org/wiki/Q2905785","display_name":"Cyberpsychology","level":3,"score":0.5125610828399658},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.5018043518066406},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4873269498348236},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.464125394821167},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4473888576030731},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4242822229862213},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.4127039909362793},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3667870759963989},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.26528266072273254},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2291906476020813},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:digitalcommons.usu.edu:computer_science_facpubs-1024","is_oa":true,"landing_page_url":"https://digitalcommons.usu.edu/computer_science_facpubs/24","pdf_url":"https://digitalcommons.usu.edu/cgi/viewcontent.cgi?article=1024&context=computer_science_facpubs","source":{"id":"https://openalex.org/S4377196327","display_name":"Digital Commons - USU (Utah State University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I121980950","host_organization_name":"Utah State University","host_organization_lineage":["https://openalex.org/I121980950"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computer Science Faculty and Staff Publications","raw_type":"text"},{"id":"mag:3183636969","is_oa":false,"landing_page_url":"https://dblp.uni-trier.de/db/journals/imcs/imcs29.html#SengAW21","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"Information and Computer Security","raw_type":null}],"best_oa_location":{"id":"pmh:oai:digitalcommons.usu.edu:computer_science_facpubs-1024","is_oa":true,"landing_page_url":"https://digitalcommons.usu.edu/computer_science_facpubs/24","pdf_url":"https://digitalcommons.usu.edu/cgi/viewcontent.cgi?article=1024&context=computer_science_facpubs","source":{"id":"https://openalex.org/S4377196327","display_name":"Digital Commons - USU (Utah State University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I121980950","host_organization_name":"Utah State University","host_organization_lineage":["https://openalex.org/I121980950"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computer Science Faculty and Staff Publications","raw_type":"text"},"sustainable_development_goals":[{"score":0.6000000238418579,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3183636969.pdf","grobid_xml":"https://content.openalex.org/works/W3183636969.grobid-xml"},"referenced_works_count":41,"referenced_works":["https://openalex.org/W1221875365","https://openalex.org/W1463518955","https://openalex.org/W1466389411","https://openalex.org/W1788967622","https://openalex.org/W1968380849","https://openalex.org/W1993637905","https://openalex.org/W1999683085","https://openalex.org/W2046653306","https://openalex.org/W2071869991","https://openalex.org/W2076245464","https://openalex.org/W2077711629","https://openalex.org/W2096305793","https://openalex.org/W2104910279","https://openalex.org/W2108554506","https://openalex.org/W2110157102","https://openalex.org/W2113936660","https://openalex.org/W2118994807","https://openalex.org/W2120439777","https://openalex.org/W2126453598","https://openalex.org/W2131906261","https://openalex.org/W2132577882","https://openalex.org/W2133824719","https://openalex.org/W2163006719","https://openalex.org/W2167841397","https://openalex.org/W2168182026","https://openalex.org/W2171263140","https://openalex.org/W2179428050","https://openalex.org/W2211757780","https://openalex.org/W2221203134","https://openalex.org/W2394619600","https://openalex.org/W2412350177","https://openalex.org/W2413281502","https://openalex.org/W2486130601","https://openalex.org/W2751060387","https://openalex.org/W2759177743","https://openalex.org/W2760077926","https://openalex.org/W2796030167","https://openalex.org/W2796071975","https://openalex.org/W2886130191","https://openalex.org/W2940588539","https://openalex.org/W2965288462"],"related_works":["https://openalex.org/W2075223493","https://openalex.org/W2583370909","https://openalex.org/W2096305793","https://openalex.org/W2884540051","https://openalex.org/W2613249471","https://openalex.org/W87310083","https://openalex.org/W2028616373","https://openalex.org/W831318638","https://openalex.org/W2183819363","https://openalex.org/W1547646394","https://openalex.org/W3060214786","https://openalex.org/W85712154","https://openalex.org/W1507084919","https://openalex.org/W3168648933","https://openalex.org/W2974304201","https://openalex.org/W3003903389","https://openalex.org/W2188484492","https://openalex.org/W2778127455","https://openalex.org/W3210016959","https://openalex.org/W3126003299"],"abstract_inverted_index":{"Purpose\\nA":[0],"huge":[1],"amount":[2],"of":[3,43,50,75,122,129,145,157,184,197,221],"personal":[4,39],"and":[5,45,71,112,115,133,179,239,259],"sensitive":[6],"data":[7,101,130],"are":[8],"shared":[9,165],"on":[10,102,107,118,229],"Facebook,":[11,108],"which":[12],"makes":[13],"it":[14],"a":[15,27,91],"prime":[16],"target":[17],"for":[18,248],"attackers.":[19],"Adversaries":[20],"can":[21],"exploit":[22],"third-party":[23],"applications":[24],"connected":[25],"to":[26,34,37,57,65,81,251,263,266],"user\u2019s":[28],"Facebook":[29,32,76,125,168,185,210,237,272],"profiles":[30],"(i.e.":[31,181],"apps)":[33],"gain":[35],"access":[36],"this":[38,83,224,244],"information.":[40],"Users\u2019":[41],"lack":[42],"knowledge":[44],"the":[46,72,86,98,119,142,155,188,216,219,222,226,230],"varying":[47],"privacy":[48,73,113,120,143,177,182,234,261],"policies":[49,74,183],"these":[51],"apps":[52,126,238],"make":[53,267],"them":[54],"further":[55],"vulnerable":[56],"information":[58,106,158,198,208],"leakage.":[59],"However,":[60],"little":[61],"has":[62],"been":[63],"done":[64],"identify":[66],"mismatches":[67,174],"between":[68,175,232],"users\u2019":[69,176,195,233],"perceptions":[70,117,140,178,196,235],"apps.":[77,273],"This":[78],"paper":[79],"aims":[80],"address":[82,252],"challenge":[84],"in":[85,127,194,202,205,209,215],"work.":[87],"Design/methodology/approach\\nThe":[88],"authors":[89,99,136,189],"conducted":[90],"lab":[92],"study":[93,228,245],"with":[94,141],"31":[95],"participants,":[96],"where":[97,187],"received":[100],"how":[103],"they":[104],"share":[105],"their":[109,116,152,203,207],"Facebook-related":[110],"security":[111],"practices":[114],"aspects":[121],"65":[123],"frequently-used":[124],"terms":[128],"collection,":[131],"sharing":[132],"deletion.":[134],"The":[135,241],"then":[137],"compared":[138],"participants\u2019":[139],"policy":[144],"each":[146],"reported":[147,151],"app.":[148,169],"Participants":[149],"also":[150,201],"expectations":[153],"about":[154,270],"types":[156],"that":[159,253],"should":[160],"not":[161,192],"be":[162],"collected":[163],"or":[164],"by":[166],"any":[167],"Findings\\nThe":[170],"analysis":[171],"reveals":[172],"significant":[173],"reality":[180],"apps),":[186],"identified":[190],"over-optimism":[191],"only":[193],"collection":[199],"but":[200],"self-efficacy":[204],"protecting":[206],"despite":[211],"experiencing":[212],"negative":[213],"incidents":[214],"past.":[217],"Originality/value\\nTo":[218],"best":[220],"knowledge,":[223],"is":[225],"first":[227],"gap":[231,254],"around":[236],"reality.":[240],"findings":[242],"from":[243],"offer":[246],"direction":[247],"future":[249],"research":[250],"through":[255],"designing":[256],"usable,":[257],"effective":[258],"personalized":[260],"notices":[262],"help":[264],"users":[265],"informed":[268],"decisions":[269],"using":[271]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2}],"updated_date":"2026-04-28T14:05:53.105641","created_date":"2025-10-10T00:00:00"}
