{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T08:37:42Z","timestamp":1743151062238,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":18,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781493971305"},{"type":"electronic","value":"9781493971312"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-1-4939-7131-2_197","type":"book-chapter","created":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T18:57:03Z","timestamp":1528743423000},"page":"777-785","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Ethics of Social Networks and Mining"],"prefix":"10.1007","author":[{"given":"Kevin","family":"Macnish","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,12]]},"reference":[{"key":"197_CR5389","doi-asserted-by":"crossref","unstructured":"Albrechtslund A (2008) Online social networking as participatory surveillance. First Monday 13(3). Available at: http:\/\/www.uic.edu\/htbin\/cgiwrap\/bin\/ojs\/index.php\/fm\/article\/view\/2142\/1949.) Accessed 24 Oct 2011","DOI":"10.5210\/fm.v13i3.2142"},{"key":"197_CR5390","unstructured":"Barbaro M, Zeller T Jr (2006) A face is exposed for AOL searcher No. 4417749. New York Times. Available at: http:\/\/query.nytimes.com\/gst\/fullpage.html?res=9E0CE3DD1F3FF93AA3575BC0A9609C8B63&pagewanted=all. Accessed 24 Oct 2011"},{"key":"197_CR5391","doi-asserted-by":"crossref","unstructured":"Barnes SB (2006) A privacy paradox: social networking in the United States. First Monday 11(9). Available at: http:\/\/www.firstmonday.org\/htbin\/cgiwrap\/bin\/ojs\/index.php\/fm\/article\/view\/1394\/1312. Accessed 24 Oct 2011","DOI":"10.5210\/fm.v11i9.1394"},{"key":"197_CR5392","unstructured":"Boyd D (2010) Making sense of privacy and publicity. In: SCSW, Austin. Available at: http:\/\/www.danah.org\/papers\/talks\/2010\/SXSW2010.html"},{"key":"197_CR5393","unstructured":"Emery D (2010) Facebook agrees to \u201cpanic button.\u201d BBC. Available at: http:\/\/www.bbc.co.uk\/news\/10572375. Accessed 1 Nov 2011"},{"issue":"2","key":"197_CR5394","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s10676-010-9220-z","volume":"12","author":"C Fuchs","year":"2010","unstructured":"Fuchs C (2010) studiVZ: social networking in the surveillance society. Ethics Inf Technol 12(2):171\u2013185","journal-title":"Ethics Inf Technol"},{"key":"197_CR5395","doi-asserted-by":"crossref","unstructured":"Haddadi H, Hui P (2010) To add or not to add: privacy and social honeypots. In: IEEE first international workshop on social networks, Cape Town","DOI":"10.1109\/ICCW.2010.5503929"},{"key":"197_CR5396","unstructured":"Hoofnagle CJ, King J (2008) What Californians understand about privacy online. SSRN eLibr. Available at: http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1262130. Accessed 24 Oct 2011"},{"key":"197_CR5397","doi-asserted-by":"crossref","unstructured":"Jernigan C, Mistree BFT (2009) Gaydar: facebook friendships expose sexual orientation. First Monday 14(10). Available at: http:\/\/firstmonday.org\/htbin\/cgiwrap\/bin\/ojs\/index.php\/fm\/article\/view\/2611\/2302. Accessed 24 Oct 2011","DOI":"10.5210\/fm.v14i10.2611"},{"key":"197_CR5398","unstructured":"Lenhart A, Madden M (2007) Teens, privacy & online social networks. Pew Internet. Available at: http:\/\/www.pewinternet.org\/Reports\/2007\/Teens-Privacy-and-Online-Social-Networks\/1-Summary-of-Findings.aspx. Accessed 24 Oct 2011"},{"key":"197_CR5399","doi-asserted-by":"crossref","DOI":"10.1515\/9781400838455","volume-title":"Delete: the virtue of forgetting in the digital age","author":"V Mayer-Schonberger","year":"2011","unstructured":"Mayer-Schonberger V (2011) Delete: the virtue of forgetting in the digital age. Princeton University Press, Princeton"},{"issue":"4","key":"197_CR5400","first-page":"365","volume":"4","author":"DO Nathan","year":"1990","unstructured":"Nathan DO (1990) Just looking: voyeurism and the grounds of privacy. Public Aff Q 4(4):365\u2013386","journal-title":"Public Aff Q"},{"issue":"4","key":"197_CR5401","first-page":"269","volume":"12","author":"WA Parent","year":"1983","unstructured":"Parent WA (1983) Privacy, morality and the law. Philos Public Aff 12(4):269\u2013288","journal-title":"Philos Public Aff"},{"issue":"4","key":"197_CR5402","first-page":"323","volume":"4","author":"J Rachels","year":"1975","unstructured":"Rachels J (1975) Why privacy is important. Philos Public Aff 4(4):323\u2013333","journal-title":"Philos Public Aff"},{"key":"197_CR5403","unstructured":"Roberts L (2010) Facebook status \u201crisks burglary.\u201d BBC. Available at: http:\/\/www.bbc.co.uk\/news\/uk-england-birmingham-12062331. Accessed 2 Nov 2011"},{"issue":"1","key":"197_CR5404","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/572277.572278","volume":"31","author":"HT Tavani","year":"2001","unstructured":"Tavani HT, Moor JH (2001) Privacy protection, control of information, and privacy-enhancing technologies. Comput Soc 31(1):6\u201311","journal-title":"Comput Soc"},{"key":"197_CR5405","unstructured":"Turow J, Feldman L, Meltzer K (2005) Open to exploitation: American shoppers online and offline. Annenberg Public Policy Center, University of Pennsylvania. Available at: http:\/\/www.annenbergpublicpolicycenter.org"},{"issue":"4","key":"197_CR5406","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/s10676-010-9227-5","volume":"12","author":"M Zimmer","year":"2010","unstructured":"Zimmer M (2010) \u201cBut the data is already public\u201d: on the ethics of research in facebook. Ethics Inf Technol 12(4):313\u2013325","journal-title":"Ethics Inf Technol"}],"container-title":["Encyclopedia of Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4939-7131-2_197","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,3]],"date-time":"2020-06-03T04:24:23Z","timestamp":1591158263000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4939-7131-2_197"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9781493971305","9781493971312"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-1-4939-7131-2_197","relation":{},"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"12 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}