{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:53:21Z","timestamp":1743105201516,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":23,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461461692"},{"type":"electronic","value":"9781461461708"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-6170-8_346","type":"book-chapter","created":{"date-parts":[[2014,10,4]],"date-time":"2014-10-04T14:49:44Z","timestamp":1412434184000},"page":"1345-1352","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Preservation and Location-Based Online Social Networking"],"prefix":"10.1007","author":[{"given":"Theodoros","family":"Tzouramanis","sequence":"first","affiliation":[]},{"given":"Konstantia","family":"Barbatsalou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,5]]},"reference":[{"key":"346_CR16347","volume-title":"Proceedings of the workshop on mobile devices and urban sensing","author":"M Annavaram","year":"2008","unstructured":"Annavaram M, Jacobson Q (2008) HangOut: a privacy preserving location-based social networking service. In: Proceedings of the workshop on mobile devices and urban sensing, St. Louis, USA"},{"key":"346_CR16348","first-page":"1036","volume-title":"International conference on computational science and engineering","author":"A Beach","year":"2009","unstructured":"Beach A, Gartrell M, Han R (2009) Solutions to security and privacy issues in mobile social networking. In: International conference on computational science and engineering, Vancouver, pp 1036\u20131042"},{"key":"346_CR16349","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/11552338_13","volume-title":"Proceedings of the secure data management","author":"C Bettini","year":"2005","unstructured":"Bettini C, Wang SX, Jajodia S (2005) Protecting privacy against location-based personal identification. In: Proceedings of the secure data management, Trondheim, pp 185\u2013199"},{"key":"346_CR16350","first-page":"202","volume-title":"21st Australian software engineering conference (ASWEC)","author":"D Brooker","year":"2010","unstructured":"Brooker D, Carey T, Warren I (2010) Middleware for social networking on mobile devices. In: 21st Australian software engineering conference (ASWEC), Auckland, pp 202\u2013211"},{"unstructured":"Butler J, Silberman P (2013) RAIDE: rootkit analysis identification and elimination. Address to download: \n                  http:\/\/www.blackhat.com\/presentations\/bh-usa-06\/BH-US-06-Silberman.pdf\n                  \n                . Retrieved 18 Apr 2013","key":"346_CR16351"},{"key":"346_CR16352","first-page":"336","volume":"7","author":"C Cuddy","year":"2010","unstructured":"Cuddy C, Glassman NR (2010) Location-Based services: Foursquare and Gowalla, should libraries play? J Electron Res Med Libr 7:336\u2013343, 2010","journal-title":"J Electron Res Med Libr"},{"unstructured":"Facebook (2013) Fact Sheet. Address to download: \n                  http:\/\/newsroom.fb.com\/content\/default.aspx?NewsAreaId=22\n                  \n                . Retrieved 18 Apr 2013","key":"346_CR16353"},{"unstructured":"Foursquare (2013). \n                  https:\/\/foursquare.com\/\n                  \n                . Retrieved 18 Apr 2013","key":"346_CR16354"},{"key":"346_CR16355","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1109\/ISTAS.2010.5514641","volume-title":"Proceedings of the IEEE international symposium on technology and society (ISTAS10), Wollongong","author":"SJ Fusco","year":"2010","unstructured":"Fusco SJ, Michael K, Michael MG (2010a) Using a social informatics framework to study the effects of location-based social networking on relationships between people: a review of literature. In: Michael K (ed) Proceedings of the IEEE international symposium on technology and society (ISTAS10), Wollongong. IEEE, Wollongong, pp 157\u2013171"},{"key":"346_CR16356","volume-title":"Proceedings of the 9th IEEE international conference on mobile business, Athens","author":"SJ Fusco","year":"2010","unstructured":"Fusco SJ, Michael K, Michael MG (2010b) Exploring the social implications of location based social networking: an inquiry into the perceived positive and negative impacts of using LBSN between friends. In: Giaglis G (ed) Proceedings of the 9th IEEE international conference on mobile business, Athens. IEEE, Athens"},{"key":"346_CR16357","volume-title":"Proceedings of the IEEE symposium on technology and society 2011 (ISTAS11), Chicago","author":"SJ Fusco","year":"2011","unstructured":"Fusco SJ, Michael K, Aloudat A, Abbas R (2011) Monitoring people using location-based social networking and its negative impact on trust: an exploratory contextual analysis of five types of \u201cFriend\u201d relationships. In: Miller K (ed) Proceedings of the IEEE symposium on technology and society 2011 (ISTAS11), Chicago. IEEE, Chicago"},{"key":"346_CR16358","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/1066116.1189037","volume-title":"Proceedings of the 1st international conference on mobile systems, applications and services -MobiSys","author":"M Gruteser","year":"2003","unstructured":"Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st international conference on mobile systems, applications and services -MobiSys, San Francisco, pp 31\u201342"},{"issue":"1","key":"346_CR16359","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1111\/j.1083-6101.2007.00399.x","volume":"13","author":"L Humphreys","year":"2007","unstructured":"Humphreys L (2007) Mobile social networks and social practice: a case study of Dodgeball. J Comput-Mediat Commun 13(1):341\u2013360","journal-title":"J Comput-Mediat Commun"},{"key":"346_CR16360","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1109\/CSE.2009.98","volume-title":"International conference on computational science and engineering (CSE \u201809)","author":"N Li","year":"2009","unstructured":"Li N (2009) Analysis of a location-based social network. In: International conference on computational science and engineering (CSE \u201809), Vancouver, pp 263\u2013270"},{"unstructured":"Loopt (2012). \n                  https:\/\/www.loopt.com\/\n                  \n                . Retrieved 1 Oct 2012","key":"346_CR16361"},{"unstructured":"PleaseRobMe (2013). \n                  http:\/\/pleaserobme.com\n                  \n                . Retrieved 18 Apr 2013","key":"346_CR16362"},{"unstructured":"Reese W, Beckland J (2011) Lost in geolocation \u2013 why consumers haven\u2019t bought it and how marketers can fix it. Mobile Marketing Report, White Horse \u2013 Digital Future Group. Address to download: \n                  http:\/\/www.whitehorse.com\/uploadedFiles\/World\/Reports\/Lost%20in%20Geolocation%20Report%281%29.pdf.\n                  \n                . Retrieved 1 Oct 2012","key":"346_CR16363"},{"issue":"6","key":"346_CR16364","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1007\/s00779-008-0214-3","volume":"13","author":"N Sadeh","year":"2008","unstructured":"Sadeh N, Hong J, Cranor L, Fette I, Kelley P, Prabaker M, Rao J (2008) Understanding and capturing people\u2019s privacy policies in a mobile social networking application. Pers Ubiquitous Comput 13(6):401\u2013412","journal-title":"Pers Ubiquitous Comput"},{"issue":"6","key":"346_CR16365","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati P (2001) Protecting respondents\u2019 identities in microdata release. IEEE Trans Knowl Data Eng 13(6):1010\u20131027","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"346_CR16366","first-page":"329","volume-title":"Proceedings of ICWSM, association for the advancement of artificial intelligence","author":"S Scellato","year":"2011","unstructured":"Scellato S, Lambiote R, Noulas A, Mascolo C (2011) Socio-spatial properties of online location-based social networks. In: Proceedings of ICWSM, association for the advancement of artificial intelligence, Barcelona, pp 329\u2013336"},{"issue":"5","key":"346_CR16367","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L (2002) k-Anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl-Based Syst 10(5):557\u2013570","journal-title":"Int J Uncertain Fuzziness Knowl-Based Syst"},{"unstructured":"The Search Agency (2010) Comprehensive guide to location-based social media. White Paper. Address to download: \n                  http:\/\/www.thesearchagency.com\/sites\/default\/files\/tsa_whitepaper_location_based_social.media.pdf\n                  \n                . Retrieved 18 Apr 2013","key":"346_CR16368"},{"unstructured":"Zalalichin Z, Efrati R, Cohen T (2010) The social networking corporate threat. Technical report, COMSEC Consulting \u2013 Information Security. Address to download: \n                  http:\/\/www.comsecglobal.com\/FrameWork\/Upload\/The20Social%20Networking%20Corporate%20Threat%20-%20Comsec.pdf\n                  \n                . Retrieved 18 Apr 2013","key":"346_CR16369"}],"container-title":["Encyclopedia of Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-6170-8_346","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T22:24:13Z","timestamp":1591050253000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4614-6170-8_346"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9781461461692","9781461461708"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-6170-8_346","relation":{},"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"5 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}