{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T16:58:07Z","timestamp":1763225887122,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":18,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441971418"},{"type":"electronic","value":"9781441971425"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-1-4419-7142-5_23","type":"book-chapter","created":{"date-parts":[[2010,11,3]],"date-time":"2010-11-03T17:20:17Z","timestamp":1288804817000},"page":"497-522","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Security and Privacy in Online Social Networks"],"prefix":"10.1007","author":[{"given":"Leucio Antonio","family":"Cutillo","sequence":"first","affiliation":[]},{"given":"Mark","family":"Manulis","sequence":"additional","affiliation":[]},{"given":"Thorsten","family":"Strufe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,10,15]]},"reference":[{"key":"23_CR1","unstructured":"Modelling the Real Market Value of Social Networks. http:\/\/www.techcrunch.com\/2008\/06\/23\/modeling-the-real-market-value-of-social-networks\/, 2008."},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"danah m. boyd. Facebook\u2019s privacy trainwreck. Convergence: The International Journal of Research into New Media Technologies, 14(1):13\u201320, 2008.","DOI":"10.1177\/1354856507084416"},{"issue":"1","key":"23_CR3","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 1(1):11\u201333, 2004.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"M. Balduzzi, C. Platzer, T. Holz, E. Kirda, D. Balzarotti, and C. Kruegel. Abusing Social Networks for Automated User Profiling. Research Report RR-10-233, EURECOM, 2010. http:\/\/www.iseclab.org\/papers\/socialabuse-TR.pdf.","DOI":"10.1007\/978-3-642-15512-3_22"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In 18th Intl. World Wide Web Conference, 2009.","DOI":"10.1145\/1526709.1526784"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"d. m. boyd and N. B. Ellison. Social network sites: definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), 2007.","DOI":"10.1111\/j.1083-6101.2007.00393.x"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"D. Florencio and C. Herley. A Large-Scale Study of Web Password Habits. In 16th International Conference on World Wide Web (WWW 2007), pages 657\u2013666. ACM, 2007.","DOI":"10.1145\/1242572.1242661"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"R. Gross and A. Acquisti. Information Revelation and Privacy in Online Social Networks. In ACM Workshop on Privacy in the Electronic Society, pages 71\u201380, 2005.","DOI":"10.1145\/1102199.1102214"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer. Social phishing. Communications of the ACM, 94\u2013100, 2007.","DOI":"10.1145\/1290958.1290968"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"A. Mislove, B. Viswanath, K. P. Gummadi, and P. Druschel. You Are Who You Know: Inferring User Profiles in Online Social Networks. In ACM International Conference on Web Search and Data Mining (WSDM 2010), pages 251\u2013260. ACM, 2010.","DOI":"10.1145\/1718487.1718519"},{"key":"23_CR11","unstructured":"T. J. Nathaniel, N. Johnson, and M. Jakobsson. Social phishing. Communications of the ACM. Retrieved March, 7, 2006."},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"J. Park and R. Sandhu. Towards Usage Control Models: Beyond Traditional Access Control. In SACMAT \u201902: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, pages 57\u201364. ACM, New York, NY, USA, 2002.","DOI":"10.1145\/507711.507722"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"F. Schneider, A. Feldmann, B. Krishnamurthy, and W. Willinger. Understanding Online Social Network Usage from a Network Perspective. In ACM SIGCOMM conference on Internet measurement, 2009.","DOI":"10.1145\/1644893.1644899"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"L. von Ahn, M. Blum, N. J. Hopper, and J. Langford. CAPTCHA: Using Hard AI Problems for Security. In EUROCRYPT 2003. LNCS, vol 2656, pages 294\u2013311. Springer, Heidelberg, 2003.","DOI":"10.1007\/3-540-39200-9_18"},{"issue":"5","key":"23_CR15","doi-asserted-by":"publisher","first-page":"193","DOI":"10.2307\/1321160","volume":"4","author":"SD Warren","year":"1890","unstructured":"S. D. Warren and L. D. Brandeis. The right to privacy. Harward Law Review, 4(5):193\u2013220, December 1890.","journal-title":"Harward Law Review"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"G. Wondracek, T. Holz, E. Kirda, and C. Kruegel. A Practical Attack to De-Anonymize Social Network Users. In IEEE Symposium on Security and Privacy. IEEE CS, 2010. http:\/\/www.iseclab.org\/papers\/sonda.pdf.","DOI":"10.1109\/SP.2010.21"},{"issue":"4","key":"23_CR17","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1145\/954339.954342","volume":"35","author":"W Zhao","year":"2003","unstructured":"W. Zhao, R. Chellappa, P. J. Phillips, and A. Rosenfeld. Face recognition: a literature survey. ACM Computing Surveys, 35(4):399\u2013458, 2003.","journal-title":"ACM Computing Surveys"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"E. Zheleva and L. Getoor. To Join or Not to Join: The Illusion of Privacy in Social Networks with Mixed Public and Private User Profiles. In WWW 2009, pages 531\u2013540. ACM, 2009.","DOI":"10.1145\/1526709.1526781"}],"container-title":["Handbook of Social Network Technologies and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-7142-5_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,11]],"date-time":"2023-04-11T11:09:12Z","timestamp":1681211352000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4419-7142-5_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9781441971418","9781441971425"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-7142-5_23","relation":{},"subject":[],"published":{"date-parts":[[2010]]},"assertion":[{"value":"15 October 2010","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}