{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:39:54Z","timestamp":1742913594312,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":38,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461461692"},{"type":"electronic","value":"9781461461708"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-6170-8_402","type":"book-chapter","created":{"date-parts":[[2014,10,4]],"date-time":"2014-10-04T14:48:29Z","timestamp":1412434109000},"page":"1936-1946","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Socio-Graph Representations, Concepts, Data, and Analysis"],"prefix":"10.1007","author":[{"given":"Elie","family":"Raad","sequence":"first","affiliation":[]},{"given":"Richard","family":"Chbeir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,5]]},"reference":[{"issue":"3","key":"402_CR191028","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/j.socnet.2005.01.007","volume":"27","author":"L Adamic","year":"2005","unstructured":"Adamic L, Adar E (2005) How to search a social network. Soc Netw 27(3): 187\u2013203","journal-title":"Soc Netw"},{"key":"402_CR191029","first-page":"552","volume-title":"International conference on privacy, security, risk and trust (PASSAT), and social computing (SocialCom)","author":"G Bachi","year":"2012","unstructured":"Bachi G, Coscia M, Monreale A, Giannotti F (2012) Classifying trust\/distrust relationships in online social networks. In: International conference on privacy, security, risk and trust (PASSAT), and social computing (SocialCom), Amsterdam, pp 552\u2013557"},{"issue":"4\u20135","key":"402_CR191030","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.physrep.2005.10.009","volume":"424","author":"S Boccaletti","year":"2006","unstructured":"Boccaletti S, Latora V, Moreno Y, Chavez M, Hwang D-U (2006) Complex networks: structure and dynamics. Phys Rep 424(4\u20135): 175\u2013308","journal-title":"Phys Rep"},{"issue":"5916","key":"402_CR191031","doi-asserted-by":"crossref","first-page":"892","DOI":"10.1126\/science.1165821","volume":"323","author":"S Borgatti","year":"2009","unstructured":"Borgatti S, Mehra A, Brass D, Labianca G (2009) Network analysis in the social sciences. Science 323(5916):892\u2013895","journal-title":"Science"},{"issue":"1","key":"402_CR191032","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","volume":"13","author":"D Boyd","year":"2007","unstructured":"Boyd D, Ellison N (2007) Social network sites: definition, history, and scholarship. J Comput Mediat Commun 13(1):210\u2013230","journal-title":"J Comput Mediat Commun"},{"issue":"7","key":"402_CR191033","doi-asserted-by":"crossref","first-page":"703","DOI":"10.1080\/10576100600701982","volume":"29","author":"S Brams","year":"2006","unstructured":"Brams S, Mutlu H, Ramirez S (2006) Influence in terrorist networks: from undirected to directed graphs. Stud Confl Terror 29(7):703\u2013718","journal-title":"Stud Confl Terror"},{"issue":"38","key":"402_CR191034","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1609956.1609962","volume":"6","author":"B Carminati","year":"2009","unstructured":"Carminati B, Ferrari E, Perego A (2009) Enforcing access control in web-based social networks. ACM Trans Inf Syst Secur 6(38): 1\u20136","journal-title":"ACM Trans Inf Syst Secur"},{"key":"402_CR191035","first-page":"119","volume-title":"UbiComp'10 \u2014 proceedings of the 2010 ACM conference on ubiquitous computing","author":"J Cranshaw","year":"2010","unstructured":"Cranshaw J, Toch E, Hong J, Kittur A, Sadeh N (2010) Bridging the gap between physical location and online social networks. In: UbiComp'10 \u2014 proceedings of the 2010 ACM conference on ubiquitous computing, Copenhagen, pp 119\u2013128"},{"issue":"3","key":"402_CR191036","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s10588-005-5377-0","volume":"11","author":"J Diesner","year":"2005","unstructured":"Diesner J, Frantz T, Carley K (2005) Communication networks from the enron e-mail corpus \u201cit's always about the people. enron is no different\u201d. Comput Math Organ Theory 11(3):201\u2013228","journal-title":"Comput Math Organ Theory"},{"issue":"1599","key":"402_CR191037","doi-asserted-by":"crossref","first-page":"2192","DOI":"10.1098\/rstb.2012.0121","volume":"367","author":"RIM Dunbar","year":"2012","unstructured":"Dunbar RIM (2012) Social cognition on the internet: testing constraints on social network size. Philos Trans R Soc B Biolog Sci 367(1599):2192\u20132201","journal-title":"Philos Trans R Soc B Biolog Sci"},{"issue":"6","key":"402_CR191038","doi-asserted-by":"crossref","first-page":"873","DOI":"10.1177\/1461444810385389","volume":"13","author":"N Ellison","year":"2011","unstructured":"Ellison N, Steinfield C, Lampe C (2011) Connection strategies: social capital implications of Facebook-enabled communication practices. New Media Soci 13(6):873\u2013892","journal-title":"New Media Soci"},{"issue":"3\u20135","key":"402_CR191039","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.physrep.2009.11.002","volume":"486","author":"S Fortunato","year":"2010","unstructured":"Fortunato S (2010) Community detection in graphs. Phys Rep 486(3\u20135):75\u2013174","journal-title":"Phys Rep"},{"issue":"3","key":"402_CR191040","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","volume":"1","author":"L Freeman","year":"1978","unstructured":"Freeman L (1978) Centrality in social networks conceptual clarification. Soc Netw 1(3):215\u2013239","journal-title":"Soc Netw"},{"issue":"5","key":"402_CR191041","doi-asserted-by":"crossref","first-page":"1929","DOI":"10.1016\/j.chb.2012.05.012","volume":"28","author":"B Gentile","year":"2012","unstructured":"Gentile B, Twenge J, Freeman E, Campbell W (2012) The effect of social networking websites on positive self-views: an experimental investigation. Comput Hum Behav 28(5):1929\u20131933","journal-title":"Comput Hum Behav"},{"key":"402_CR191042","first-page":"1047","volume-title":"Proceedings of the ACM 2012 conference on computer supported cooperative work, CSCW'12, Seattle","author":"E Gilbert","year":"2012","unstructured":"Gilbert E (2012) Predicting tie strength in a new medium. In: Proceedings of the ACM 2012 conference on computer supported cooperative work, CSCW'12, Seattle. ACM, pp 1047\u20131056"},{"issue":"6","key":"402_CR191043","doi-asserted-by":"crossref","first-page":"1360","DOI":"10.1086\/225469","volume":"78","author":"MS Granovetter","year":"1973","unstructured":"Granovetter MS (1973) The strength of weak ties. Am J Sociol 78(6):1360\u20131380","journal-title":"Am J Sociol"},{"issue":"4","key":"402_CR191044","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/S0740-8188(96)90003-1","volume":"18","author":"C Haythornthwaite","year":"1996","unstructured":"Haythornthwaite C (1996) Social network analysis: an approach and technique for the study of information exchange. Libr Inf Sci Res 18(4):323\u2013342","journal-title":"Libr Inf Sci Res"},{"issue":"18","key":"402_CR191045","doi-asserted-by":"crossref","first-page":"3866","DOI":"10.1016\/j.comnet.2012.08.009","volume":"56","author":"J Heidemann","year":"2012","unstructured":"Heidemann J, Klier M, Probst F (2012) Online social networks: a survey of a global phenomenon. Comput Netw 56(18):3866\u20133878","journal-title":"Comput Netw"},{"issue":"8","key":"402_CR191046","doi-asserted-by":"crossref","first-page":"1148","DOI":"10.1177\/0002764209356247","volume":"53","author":"W Hua","year":"2010","unstructured":"Hua W, Wellman B (2010) Social connectivity in america: changes in adult friendship network size from 2002 to 2007. Am Behav Sci 53(8):1148\u20131169","journal-title":"Am Behav Sci"},{"key":"402_CR191047","first-page":"16","volume-title":"Network analysis. Volume 3418 of lecture notes in computer science","author":"D Kosch\u00fctzki","year":"2005","unstructured":"Kosch\u00fctzki D, Lehmann K, Peeters L, Richter S, Tenfelde-Podehl D, Zlotowski O (2005) Centrality indices. In: Brandes U, Erlebach T (eds) Network analysis. Volume 3418 of lecture notes in computer science. Springer, Berlin\/Heidelberg, pp 16\u201361"},{"key":"402_CR191048","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1146\/annurev.publhealth.28.021406.144132","volume":"28","author":"D Luke","year":"2007","unstructured":"Luke D, Harris J (2007) Network analysis in public health: history, methods, and applications. Ann Rev Public Health 28:69\u201393","journal-title":"Ann Rev Public Health"},{"key":"402_CR191049","first-page":"548","volume":"25","author":"J McAuley","year":"2012","unstructured":"McAuley J, Leskovec J (2012) Learning to discover social circles in ego networks. Adv Neural Inf Process Syst 25:548\u2013556","journal-title":"Adv Neural Inf Process Syst"},{"issue":"1","key":"402_CR191050","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.socnet.2006.05.001","volume":"29","author":"C Morselli","year":"2007","unstructured":"Morselli C, Gigu\u00e8re C, Petit K (2007) The efficiency\/security trade-off in criminal networks. Soc Netw 29(1):143\u2013153","journal-title":"Soc Netw"},{"issue":"1","key":"402_CR191051","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/s11280-011-0155-z","volume":"16","author":"K Musial","year":"2013","unstructured":"Musial K, Kazienko P (2013) Social networks on the internet. World Wide Web 16(1):31\u201372","journal-title":"World Wide Web"},{"issue":"2","key":"402_CR191052","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1137\/S003614450342480","volume":"45","author":"M Newman","year":"2003","unstructured":"Newman M (2003) The structure and function of complex networks. SIAM Rev 45(2):167\u2013256","journal-title":"SIAM Rev"},{"key":"402_CR191053","first-page":"297","volume-title":"Proceedings of the 13th international conference on network-based information systems","author":"E Raad","year":"2010","unstructured":"Raad E, Chbeir R, Dipanda A (2010) User profile matching in social networks. In: Proceedings of the 13th international conference on network-based information systems, NBiS 2010, Takayama, pp 297\u2013304"},{"issue":"1","key":"402_CR191054","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/s11042-011-0853-7","volume":"64","author":"E Raad","year":"2013","unstructured":"Raad E, Chbeir R, Dipanda A (2013) Discovering relationship types between users using profiles and shared photos in a social network. Multimed Tools Appl 64(1):141\u2013170","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"402_CR191055","doi-asserted-by":"crossref","first-page":"1658","DOI":"10.1016\/j.chb.2011.02.004","volume":"27","author":"T Ryan","year":"2011","unstructured":"Ryan T, Xenos S (2011) Who uses Facebook? An investigation into the relationship between the big five, shyness, narcissism, loneliness, and Facebook usage. Comput Hum Behav 27(5):1658\u20131664","journal-title":"Comput Hum Behav"},{"issue":"4","key":"402_CR191056","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/MSP.2010.118","volume":"8","author":"B Schneier","year":"2010","unstructured":"Schneier B (2010) A taxonomy of social networking data. IEEE Secur Priv 8(4):88","journal-title":"IEEE Secur Priv"},{"key":"402_CR191057","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/1644893.1644899","volume-title":"Proceedings of the 9th ACM SIGCOMM conference on internet measurement conference, IMC'09","author":"F Schneider","year":"2009","unstructured":"Schneider F, Feldmann A, Krishnamurthy B, Willinger W (2009) Understanding online social network usage from a network perspective. In: Proceedings of the 9th ACM SIGCOMM conference on internet measurement conference, IMC'09, Chicago. ACM, pp 35\u201348"},{"key":"402_CR191058","doi-asserted-by":"crossref","first-page":"1107","DOI":"10.1145\/1645953.1646094","volume-title":"Proceedings of the 18th ACM conference on information and knowledge management, CIKM'09","author":"L Tang","year":"2009","unstructured":"Tang L, Liu H (2009) Scalable learning of collective behavior based on sparse social dimensions. In: Proceedings of the 18th ACM conference on information and knowledge management, CIKM'09, Hong Kong. ACM, pp 1107\u20131116"},{"issue":"8","key":"402_CR191059","doi-asserted-by":"crossref","first-page":"1321","DOI":"10.1002\/asi.20835","volume":"59","author":"M Thelwall","year":"2008","unstructured":"Thelwall M (2008) Social networks, gender, and friending: an analysis of mySpace member profiles. J Am Soc Inf Sci Technol 59(8):1321\u20131330","journal-title":"J Am Soc Inf Sci Technol"},{"key":"402_CR191060","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511815478","volume-title":"Social network analysis: methods and applications","author":"S Wasserman","year":"1994","unstructured":"Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, Cambridge"},{"issue":"4","key":"402_CR191061","doi-asserted-by":"crossref","first-page":"17:1","DOI":"10.1145\/2382616.2382620","volume":"6","author":"C Wilson","year":"2012","unstructured":"Wilson C, Sala A, Puttaswamy KPN, Zhao BY (2012) Beyond social graphs: user interactions in online social networks and their implications. ACM Trans Web 6(4):17:1\u201317:31","journal-title":"ACM Trans Web"},{"key":"402_CR191062","doi-asserted-by":"crossref","first-page":"981","DOI":"10.1145\/1772690.1772790","volume-title":"Proceedings of the 19th international conference on World Wide Web, WWW'10","author":"R Xiang","year":"2010","unstructured":"Xiang R, Neville J, Rogati M (2010) Modeling relationship strength in online social networks. In: Proceedings of the 19th international conference on World Wide Web, WWW'10, Raleigh. ACM, pp 981\u2013990"},{"issue":"4","key":"402_CR191063","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1109\/MNET.2010.5510913","volume":"24","author":"C Zhang","year":"2010","unstructured":"Zhang C, Sun J, Zhu X, Fang Y (2010) Privacy and security for online social networks: challenges and opportunities. IEEE Netw 24(4):13\u201318","journal-title":"IEEE Netw"},{"key":"402_CR191064","first-page":"65","volume-title":"Advances in multimedia modeling. Volume 6524 of lecture notes in computer science","author":"T Zhang","year":"2011","unstructured":"Zhang T, Chao H, Tretter D (2011) Dynamic estimation of family relations from photos. In: Lee K-T, Tsai W-H, Liao H-Y, Chen T, Hsieh J-W, Tseng C-C (eds) Advances in multimedia modeling. Volume 6524 of lecture notes in computer science. Springer, Berlin\/Heidelberg, pp 65\u201376"},{"issue":"1","key":"402_CR191065","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2200\/S00408ED1V01Y201203DMK004","volume":"3","author":"E Zheleva","year":"2012","unstructured":"Zheleva E, Terzi E, Getoor L (2012) Privacy in social networks. Synth Lect Data Min Knowl Discov 3(1): 1\u201385","journal-title":"Synth Lect Data Min Knowl Discov"}],"container-title":["Encyclopedia of Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-6170-8_402","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T22:38:32Z","timestamp":1591051112000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4614-6170-8_402"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9781461461692","9781461461708"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-6170-8_402","relation":{},"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"5 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}