{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T22:31:51Z","timestamp":1778193111362,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540687900","type":"print"},{"value":"9783540687931","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11957454_3","type":"book-chapter","created":{"date-parts":[[2006,12,11]],"date-time":"2006-12-11T09:15:43Z","timestamp":1165828543000},"page":"36-58","source":"Crossref","is-referenced-by-count":977,"title":["Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook"],"prefix":"10.1007","author":[{"given":"Alessandro","family":"Acquisti","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ralph","family":"Gross","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Parker, R.: Alcohol policy violated. Kansan.com (February 28, 2006)"},{"key":"3_CR2","unstructured":"Youngwood, S.: Networking by the \u2018book\u2019. The Times Argus (February 26, 2006)"},{"key":"3_CR3","unstructured":"Kharif, O.: Big brother is reading your blog. BusinessWeek online (February 28, 2006)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Gross, R., Acquisti, A.: Privacy and information revelation in online social networks. In: Proceedings of the ACM CCS Workshop on Privacy in the Electronic Society (WPES 2005) (2005)","DOI":"10.1145\/1102199.1102214"},{"key":"3_CR5","unstructured":"Boyd, D.: Reflections on friendster, trust and intimacy. In: Intimate (Ubiquitous) Computing Workshop - Ubicomp 2003, Seattle, Washington, USA, October 12-15 (2003)"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Boyd, D.: Friendster and publicly articulated social networking. In: Conference on Human Factors and Computing Systems (CHI 2004), Vienna, Austria, April 24-29 (2004)","DOI":"10.1145\/985921.986043"},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1023\/B:BTTJ.0000047585.06264.cc","volume":"22","author":"J. Donath","year":"2004","unstructured":"Donath, J., Boyd, D.: Public displays of connection. BT Technology Journal\u00a022, 71\u201382 (2004)","journal-title":"BT Technology Journal"},{"key":"3_CR8","unstructured":"Liu, H., Maes, P.: Interestmap: Harvesting social network profiles for recommendations. In: Beyond Personalization - IUI 2005, San Diego, California, USA (January 9, 2005)"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Jagatic, T., Johnson, N., Jakobsson, M., Menczer, F.: Social phishing. Communications of the ACM (2006) (forthcoming)","DOI":"10.1145\/1290958.1290968"},{"key":"3_CR10","unstructured":"Stutzman, F.: An evaluation of identity-sharing behavior in social network communities. In: Proceedings of the 2006 iDMAa and IMS Code Conference, Oxford, Ohio (2006)"},{"key":"3_CR11","unstructured":"Sege, I.: Where everybody knows your name. Boston.com (April 27, 2005)"},{"key":"3_CR12","unstructured":"Anderson, B.: Imagined Communities: Reflections on the Origin and Spread of Nationalism, Verso, Revised edn., London and New York (1991)"},{"key":"3_CR13","volume-title":"Programming Perl","author":"L. Wall","year":"2000","unstructured":"Wall, L., Christiansen, T., Orwant, J.: Programming Perl, 3rd edn. O\u2019Reilly, Sebastopol (2000)","edition":"3"},{"key":"3_CR14","volume-title":"Perl & LWP","author":"S. Burke","year":"2002","unstructured":"Burke, S.: Perl & LWP. O\u2019Reilly, Sebastopol (2002)"},{"key":"3_CR15","unstructured":"Westin, A.F.: Harris-equifax consumer privacy survey (1991). Technical report, Equifax, Inc., Atlanta, GA (1991)"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Acquisti, A., Grossklags, J.: Privacy and rationality in decision making. IEEE Security & Privacy, 24\u201330 (January-February, 2005)","DOI":"10.1109\/MSP.2005.22"},{"key":"3_CR17","volume-title":"Data Mining Techniques for Marketing, Sales and Customer Support","author":"M. Berry","year":"1997","unstructured":"Berry, M., Linoff, G.: Data Mining Techniques for Marketing, Sales and Customer Support. Wiley, New York (1997)"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Acquisti, A.: Privacy in electronic commerce and the economics of immediate gratification. In: Proceedings of the ACM Conference on Electronic Commerce (EC 2004), pp. 21\u201329 (2004)","DOI":"10.1145\/988772.988777"},{"key":"3_CR19","unstructured":"Kornblum, J., Marklein, M.B.: What you say online could haunt you. USA Today (March 8, 2006)"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11957454_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:21:39Z","timestamp":1619508099000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11957454_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540687900","9783540687931"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11957454_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}