{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T11:19:16Z","timestamp":1773141556154,"version":"3.50.1"},"publisher-location":"London","reference-count":39,"publisher":"Springer London","isbn-type":[{"value":"9781447145547","type":"print"},{"value":"9781447145554","type":"electronic"}],"license":[{"start":{"date-parts":[[2012,10,13]],"date-time":"2012-10-13T00:00:00Z","timestamp":1350086400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-1-4471-4555-4_12","type":"book-chapter","created":{"date-parts":[[2012,12,4]],"date-time":"2012-12-04T17:45:52Z","timestamp":1354643152000},"page":"263-281","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":87,"title":["Privacy in Recommender Systems"],"prefix":"10.1007","author":[{"given":"Arjan J. P.","family":"Jeckmans","sequence":"first","affiliation":[]},{"given":"Michael","family":"Beye","sequence":"additional","affiliation":[]},{"given":"Zekeriya","family":"Erkin","sequence":"additional","affiliation":[]},{"given":"Pieter","family":"Hartel","sequence":"additional","affiliation":[]},{"given":"Reginald L.","family":"Lagendijk","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,10,13]]},"reference":[{"issue":"6","key":"12_CR1","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1109\/TKDE.2005.99","volume":"17","author":"G Adomavicius","year":"2005","unstructured":"Adomavicius, G., Tuzhilin, A.: Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions. IEEE Trans. Knowl. Data Eng. 17(6), 734\u2013749 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"12_CR2","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-0-387-85820-3_7","volume-title":"Recommender Systems Handbook","author":"G Adomavicius","year":"2011","unstructured":"Adomavicius, G., Tuzhilin, A.: Context-aware recommender systems. In: Ricci, F., Rokach, L., Shapira, B., Kantor, P.B. (eds.) Recommender Systems Handbook, pp. 217\u2013253. Springer, New York (2011)"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"A\u00efmeur, E., Brassard, G., Fernandez, J., Mani\u00a0Onana, F.: Alambic: a privacy-preserving recommender system for electronic commerce. Int. J. Inf. Secur. 7(5), 307\u2013334 (2008)","DOI":"10.1007\/s10207-007-0049-3"},{"key":"12_CR4","volume-title":"Privacy-preserving weighted slope one predictor for item-based collaborative filtering","author":"A Basu","year":"2011","unstructured":"Basu, A., Kikuchi, H., Vaidya, J.: Privacy-preserving weighted slope one predictor for item-based collaborative filtering. In: Proceedings of the International Workshop on Trust and Privacy in Distributed Information Processing (2011)"},{"issue":"4","key":"12_CR5","first-page":"26","volume":"1","author":"A. Basu","year":"2011","unstructured":"Basu, A., Vaidya, J., Kikuchi, H.: Efficient privacy-preserving collaborative filtering based on the weighted slope one predictor. J. Internet Serv. Inf. Secur. (JISIS) 1(4), 26\u201346 (2011)","journal-title":"J. Internet Serv. Inf. Secur. (JISIS)"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Berkovsky, S., Eytani, Y., Kuflik, T., Ricci, F.: Enhancing privacy and preserving accuracy of a distributed collaborative filtering. In: Proceedings of the 2007 ACM Conference on Recommender Systems, Minneapolis, pp. 9\u201316 (2007)","DOI":"10.1145\/1297231.1297234"},{"key":"12_CR7","first-page":"180","volume":"69","author":"R Burke","year":"2000","unstructured":"Burke, R.: Knowledge-based recommender systems. In: Encyclopedia of Library and Information Systems, vol. 69, pp. 180\u2013200 (2000)","journal-title":"In: Encyclopedia of Library and Information Systems"},{"key":"12_CR8","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1023\/A:1021240730564","volume":"12","author":"R Burke","year":"2002","unstructured":"Burke, R.: Hybrid recommender systems: survey and experiments. User Model. User Adapt. Interact. 12, 331\u2013370 (2002)","journal-title":"User Model. User Adapt. Interact."},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Canny, J.: Collaborative filtering with privacy. In: IEEE Symposium on Security and Privacy, Oakland, pp. 45\u201357 (2002)","DOI":"10.1145\/564376.564419"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Canny, J.: Collaborative filtering with privacy via factor analysis. In: Proceedings of the 25th Annual International Conference on Research and Development in Information Retrieval, Tampere, pp. 238\u2013245 (2002)","DOI":"10.1145\/564376.564419"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Ciss\u00e9e, R., Albayrak, S.: An agent-based approach for privacy-preserving recommender systems. In: Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS \u201907, pp. 182:1\u2013182:8. ACM, New York (2007)","DOI":"10.1145\/1329125.1329345"},{"key":"12_CR12","unstructured":"Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall, M., Reagle, J.: The platform for privacy preferences 1.0 (p3p1.0) specification. http:\/\/www.w3.org\/TR\/P3P\/"},{"key":"12_CR13","unstructured":"Dwork, C.: Differential privacy. In: Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, 10\u201314 July 2006, Proceedings, Part II, pp. 1\u201312 (2006)"},{"key":"12_CR14","unstructured":"Erkin, Z., Beye, M., Veugen, T., Lagendijk, R.L.: Privacy enhanced recommender system. In: Thirty-First Symposium on Information Theory in the Benelux, Rotterdam, pp. 35\u201342 (2010)"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Erkin, Z., Beye, M., Veugen, T., Lagendijk, R.L.: Efficiently computing private recommendations. In: International Conference on Acoustic, Speech and Signal Processing-ICASSP, Prague, pp. 5864\u20135867 (2011)","DOI":"10.1109\/ICASSP.2011.5947695"},{"key":"12_CR16","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/138859.138867","volume":"35","author":"D Goldberg","year":"1992","unstructured":"Goldberg, D., Nichols, D., Oki, B.M., Terry, D.: Using collaborative filtering to weave an information tapestry. Commun. ACM 35, 61\u201370 (1992)","journal-title":"Commun. ACM"},{"key":"12_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/0400000001","volume":"1","author":"O Goldreich","year":"2005","unstructured":"Goldreich, O.: Foundations of cryptography: a primer. Found. Trend Theor. Comput. Sci. 1, 1\u2013116 (2005)","journal-title":"Found. Trend Theor. Comput. Sci."},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: WPES \u201905: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 71\u201380. ACM, New York (2005)","DOI":"10.1145\/1102199.1102214"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Hoens, T.R., Blanton, M., Chawla, N.V.: A private and reliable recommendation system for social networks. In: 2010 IEEE Second International Conference on Social Computing (SocialCom), Minneapolis, pp. 816\u2013825 (2010)","DOI":"10.1109\/SocialCom.2010.124"},{"issue":"4","key":"12_CR20","doi-asserted-by":"crossref","first-page":"1193","DOI":"10.2307\/1229286","volume":"50","author":"J. Kang","year":"1998","unstructured":"Kang. J.: Information privacy in cyberspace transactions. Stanf. Law Rev. 50(4), 1193\u20131294 (1998)","journal-title":"Stanf. Law Rev."},{"key":"12_CR21","unstructured":"Kohnstamm, J.: Opinion 2\/2010 on online behavioural advertising. Technical report 00909\/10\/EN WP 171, article 29 data protection working party, 6 2010. http:\/\/ec.europa.eu\/justice\/policies\/privacy\/docs\/wpdocs\/2010\/wp171_en.pdf"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Konstas, I., Stathopoulos, V., Jose, J.M.: On social networks and collaborative recommendation. In: Proceedings of the 32nd International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR \u201909, pp. 195\u2013202. ACM, New York (2009)","DOI":"10.1145\/1571941.1571977"},{"key":"12_CR23","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/11766155_2","volume-title":"Emerging Trends in Information and Communication Security. Lecture Notes in Computer Science","author":"S Lam","year":"2006","unstructured":"Lam, S., Frankowski, D., Riedl, J.: Do you trust your recommendations? An exploration of security and privacy issues in recommender systems. In: M\u00fcller, G. (ed.) Emerging Trends in Information and Communication Security. Lecture Notes in Computer Science, vol. 3995, pp. 14\u201329. Springer, Berlin\/Heidelberg (2006)"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Lang, K., Newsweeder: learning to filter netnews. In: Proceedings of the Twelfth International Conference on Machine Learning, pp. 331\u2013339. Morgan Kaufmann, San Francisco (1995)","DOI":"10.1016\/B978-1-55860-377-6.50048-7"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Lorenzi, F., Ricci, F.: Case-based recommender systems: a unifying view. In: Intelligent Techniques for Web Personalization. Lecture Notes in Computer Science, vol. 3169, pp. 89\u2013113. Springer, Berlin\/Heidelberg (2005)","DOI":"10.1007\/11577935_5"},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"McSherry, F., Mironov, I.: Differentially private recommender systems: building privacy into the netflix prize contenders. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, pp. 627\u2013636 (2009)","DOI":"10.1145\/1557019.1557090"},{"key":"12_CR27","unstructured":"Narayanan, A., Shmatikov, V.: How to break anonymity of the netflix prize dataset. In: CoRR: Computing Research Repository, pp. 1\u201324 (2006)"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"Palen, L., Dourish, P.: Unpacking \u201cprivacy\u201d for a networked world. In: CHI \u201903: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 129\u2013136. ACM, New\u00a0York (2003)","DOI":"10.1145\/642611.642635"},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"Polat, H., Du, W.: Svd-based collaborative filtering with privacy. In: Proceedings of the 2005 ACM Symposium on Applied Computing, Santa Fe, pp. 791\u2013795 (2005)","DOI":"10.1145\/1066677.1066860"},{"key":"12_CR30","doi-asserted-by":"publisher","first-page":"1093","DOI":"10.1002\/asi.20831","volume":"59","author":"H Polat","year":"2008","unstructured":"Polat, H., Du, W.: Privacy-preserving top-n recommendation on distributed data. J. Am. Soc. Inf. Sci. Technol. 59, 1093\u20131108 (2008)","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"issue":"6","key":"12_CR31","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/4236.968832","volume":"5","author":"N Ramakrishnan","year":"2001","unstructured":"Ramakrishnan, N., Keller, B.J., Mirza, B.J., Grama, A.Y., Karypis, G.: Privacy risks in recommender systems. IEEE Internet Comput. 5(6), 54\u201362 (2001)","journal-title":"IEEE Internet Comput."},{"issue":"4","key":"12_CR32","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1207\/s15516709cog0304_3","volume":"3","author":"E Rich","year":"1979","unstructured":"Rich, E.: User modeling via stereotypes. Cognit. Sci. 3(4), 329\u2013354 (1979)","journal-title":"Cognit. Sci."},{"issue":"3","key":"12_CR33","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2007.75","volume":"5","author":"D Rosenblum","year":"2007","unstructured":"Rosenblum, D.: What anyone can know: the privacy risks of social networking sites. IEEE Secur. Priv. 5(3), 40\u201349 (2007)","journal-title":"IEEE Secur. Priv."},{"key":"12_CR34","doi-asserted-by":"crossref","unstructured":"Schclar, A., Tsikinovsky, A., Rokach, L., Meisels, A., Antwarg, L.: Ensemble methods for improving the performance of neighborhood-based collaborative filtering. In: Proceedings of the Third ACM Conference on Recommender Systems, RecSys \u201909, pp. 261\u2013264. ACM, New\u00a0York (2009)","DOI":"10.1145\/1639714.1639763"},{"key":"12_CR35","doi-asserted-by":"crossref","unstructured":"Shokri, R., Pedarsani, P., Theodorakopoulos, G., Hubaux, J.-P.: Preserving privacy in collaborative filtering through distributed aggregation of offline profiles. In: Proceedings of the Third ACM Conference on Recommender Systems, RecSys \u201909, pp. 157\u2013164. ACM, New York (2009)","DOI":"10.1145\/1639714.1639741"},{"issue":"5","key":"12_CR36","first-page":"557","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: K-anonymity: a model for protecting privacy. IEEE Secur. Priv. 10(5), 557\u2013570 (2002)","journal-title":"IEEE Secur. Priv."},{"key":"12_CR37","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1287\/isre.1090.0260","volume":"22","author":"JY Tsai","year":"2011","unstructured":"Tsai, J.Y., Egelman, S., Cranor, L., Acquisti, A.: The effect of online privacy information on purchasing behavior: an experimental study. Inf. Syst. Res. 22, 254\u2013268 (2011)","journal-title":"Inf. Syst. Res."},{"issue":"1","key":"12_CR38","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1177\/0270467607311484","volume":"28","author":"Z Tufekci","year":"2008","unstructured":"Tufekci, Z.: Can you see me now? audience and disclosure regulation in online social network sites. Bull. Sci. Technol. Soc. 28(1), 20\u201336 (2008)","journal-title":"Bull. Sci. Technol. Soc."},{"key":"12_CR39","doi-asserted-by":"crossref","unstructured":"Weiss, S.: The need for a paradigm shift in addressing privacy risks in social networking applications. In: The Future of Identity in the Information Society, Brno, vol. 262, pp.\u00a0hbox161\u2013171. IFIP International Federation for Information Processing (2008)","DOI":"10.1007\/978-0-387-79026-8_12"}],"container-title":["Computer Communications and Networks","Social Media Retrieval"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4471-4555-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T07:18:23Z","timestamp":1676791103000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4471-4555-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,13]]},"ISBN":["9781447145547","9781447145554"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-1-4471-4555-4_12","relation":{},"ISSN":["1617-7975"],"issn-type":[{"value":"1617-7975","type":"print"}],"subject":[],"published":{"date-parts":[[2012,10,13]]},"assertion":[{"value":"13 October 2012","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}