{"id":"https://openalex.org/W4401408977","doi":"https://doi.org/10.1145/3674912.3674942","title":"Security and privacy enhancing framework for Social Media Influencers and Content Creators","display_name":"Security and privacy enhancing framework for Social Media Influencers and Content Creators","publication_year":2024,"publication_date":"2024-06-14","ids":{"openalex":"https://openalex.org/W4401408977","doi":"https://doi.org/10.1145/3674912.3674942"},"language":"en","primary_location":{"id":"doi:10.1145/3674912.3674942","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3674912.3674942","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3674912.3674942?download=true","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Computer Systems and Technologies 2024","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3674912.3674942?download=true","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5106355599","display_name":"Kia Finska","orcid":null},"institutions":[{"id":"https://openalex.org/I155660961","display_name":"University of Turku","ror":"https://ror.org/05vghhr25","country_code":"FI","type":"education","lineage":["https://openalex.org/I155660961"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Kia Finska","raw_affiliation_strings":["University of Turku, Finland"],"raw_orcid":"https://orcid.org/0009-0009-8332-5890","affiliations":[{"raw_affiliation_string":"University of Turku, Finland","institution_ids":["https://openalex.org/I155660961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004931949","display_name":"Antti Hakkala","orcid":"https://orcid.org/0000-0002-0932-7814"},"institutions":[{"id":"https://openalex.org/I155660961","display_name":"University of Turku","ror":"https://ror.org/05vghhr25","country_code":"FI","type":"education","lineage":["https://openalex.org/I155660961"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Antti Hakkala","raw_affiliation_strings":["University of Turku, Finland"],"raw_orcid":"https://orcid.org/0000-0002-0932-7814","affiliations":[{"raw_affiliation_string":"University of Turku, Finland","institution_ids":["https://openalex.org/I155660961"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045568751","display_name":"Anne-Maarit Majanoja","orcid":"https://orcid.org/0000-0002-0340-775X"},"institutions":[{"id":"https://openalex.org/I155660961","display_name":"University of Turku","ror":"https://ror.org/05vghhr25","country_code":"FI","type":"education","lineage":["https://openalex.org/I155660961"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Anne-Maarit Majanoja","raw_affiliation_strings":["University of Turku, Finland"],"raw_orcid":"https://orcid.org/0000-0002-0340-775X","affiliations":[{"raw_affiliation_string":"University of Turku, Finland","institution_ids":["https://openalex.org/I155660961"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5106355599"],"corresponding_institution_ids":["https://openalex.org/I155660961"],"apc_list":null,"apc_paid":null,"fwci":1.0744,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.81945726,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"37","last_page":"42"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10355","display_name":"Impact of Technology on Adolescents","score":0.9803000092506409,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/influencer-marketing","display_name":"Influencer marketing","score":0.9316266179084778},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.7090135812759399},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6175364851951599},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.5872296690940857},{"id":"https://openalex.org/keywords/content","display_name":"Content (measure theory)","score":0.505850076675415},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4614066183567047},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2914292812347412},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.282662957906723}],"concepts":[{"id":"https://openalex.org/C26011011","wikidata":"https://www.wikidata.org/wiki/Q6030243","display_name":"Influencer marketing","level":4,"score":0.9316266179084778},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.7090135812759399},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6175364851951599},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.5872296690940857},{"id":"https://openalex.org/C2778152352","wikidata":"https://www.wikidata.org/wiki/Q5165061","display_name":"Content (measure theory)","level":2,"score":0.505850076675415},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4614066183567047},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2914292812347412},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.282662957906723},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C192975520","wikidata":"https://www.wikidata.org/wiki/Q1143466","display_name":"Marketing management","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C54649085","wikidata":"https://www.wikidata.org/wiki/Q574424","display_name":"Relationship marketing","level":3,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3674912.3674942","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3674912.3674942","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3674912.3674942?download=true","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Computer Systems and Technologies 2024","raw_type":"proceedings-article"},{"id":"pmh:oai:www.utupub.fi:10024/191267","is_oa":true,"landing_page_url":"https://www.utupub.fi/handle/10024/191267","pdf_url":"https://www.utupub.fi/bitstream/10024/191267/1/3674912.3674942.pdf","source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":null}],"best_oa_location":{"id":"doi:10.1145/3674912.3674942","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3674912.3674942","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3674912.3674942?download=true","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Computer Systems and Technologies 2024","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.47999998927116394,"display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4401408977.pdf","grobid_xml":"https://content.openalex.org/works/W4401408977.grobid-xml"},"referenced_works_count":9,"referenced_works":["https://openalex.org/W2072388344","https://openalex.org/W2950433970","https://openalex.org/W3017054376","https://openalex.org/W3152629880","https://openalex.org/W3199647962","https://openalex.org/W3214268776","https://openalex.org/W4312924973","https://openalex.org/W4379800398","https://openalex.org/W4392247083"],"related_works":["https://openalex.org/W3018020935","https://openalex.org/W2584827882","https://openalex.org/W2538581760","https://openalex.org/W3195097297","https://openalex.org/W4225340788","https://openalex.org/W3038106605","https://openalex.org/W2513267613","https://openalex.org/W3049084372","https://openalex.org/W2528109871","https://openalex.org/W2940702331"],"abstract_inverted_index":{"In":[0],"a":[1,11,55,71,92,116],"relatively":[2],"short":[3],"period":[4],"of":[5,41,70,131,138,157],"time,":[6],"social":[7,19,57,72],"media":[8,20,58,73],"has":[9,106],"become":[10],"multi-billion":[12],"dollar":[13],"industry.":[14],"One":[15],"key":[16],"demographic":[17,141],"for":[18,64,87,95,113,152],"are":[21,27,83],"Social":[22],"Medea":[23],"Influencers":[24],"(SMIs),":[25],"who":[26],"entrepreneurs":[28],"that":[29,97,118],"work":[30],"as":[31,78],"independent":[32],"marketers":[33],"between":[34],"companies":[35],"and":[36,49,60,81,142,149],"consumers.":[37],"A":[38],"significant":[39],"amount":[40],"marketing":[42],"revenue":[43],"goes":[44],"through":[45],"SMIs,":[46],"making":[47],"them":[48],"their":[50,102],"enterprises,":[51],"often":[52,76],"tied":[53],"to":[54,144],"single":[56],"platform":[59],"account,":[61],"lucrative":[62],"targets":[63],"malicious":[65],"actors.":[66],"The":[67,104,124],"cybersecurity":[68,79,93],"posture":[69,156],"entrepreneur":[74],"is":[75,119],"inadequate,":[77],"knowledge":[80],"expertise":[82],"not":[84],"core":[85],"competencies":[86],"SMIs.":[88,123,158],"This":[89],"paper":[90],"presents":[91],"framework":[94,105,112,117,125],"SMIs":[96],"can":[98],"be":[99],"implemented":[100],"in":[101],"business.":[103],"been":[107],"adapted":[108],"from":[109],"an":[110,146],"existing":[111],"organisations":[114],"into":[115,127],"directed":[120],"specifically":[121],"towards":[122],"takes":[126],"account":[128],"the":[129,134,139,154],"nature":[130],"SMI":[132],"work,":[133],"general":[135],"technical":[136],"aptitude":[137],"target":[140],"aims":[143],"provide":[145],"easily":[147],"adaptable":[148],"implementable":[150],"solution":[151],"improving":[153],"security":[155]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
