{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:24:25Z","timestamp":1743125065666,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":22,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781493971305"},{"type":"electronic","value":"9781493971312"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-1-4939-7131-2_346","type":"book-chapter","created":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T19:21:24Z","timestamp":1528744884000},"page":"1859-1866","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Preservation and Location-Based Online Social Networking"],"prefix":"10.1007","author":[{"given":"Theodoros","family":"Tzouramanis","sequence":"first","affiliation":[]},{"given":"Konstantia","family":"Barbatsalou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,12]]},"reference":[{"key":"346_CR16460","unstructured":"Annavaram M, Jacobson Q (2008) HangOut: a privacy preserving location-based social networking service. In: Proceedings of the workshop on mobile devices and urban sensing, St. Louis"},{"key":"346_CR16461","doi-asserted-by":"crossref","unstructured":"Beach A, Gartrell M, Han R (2009) Solutions to security and privacy issues in mobile social networking. In: International conference on computational science and engineering, Vancouver, pp 1036\u20131042","DOI":"10.1109\/CSE.2009.243"},{"key":"346_CR16462","first-page":"185","volume-title":"Lecture Notes in Computer Science","author":"Claudio Bettini","year":"2005","unstructured":"Bettini C, Wang SX, Jajodia S (2005) Protecting privacy against location-based personal identification. In: Proceedings of the secure data management, Trondheim, pp 185\u2013199"},{"key":"346_CR16463","doi-asserted-by":"crossref","unstructured":"Brooker D, Carey T, Warren I (2010) Middleware for social networking on mobile devices. In: 21st Australian software engineering conference (ASWEC), Auckland, pp 202\u2013211","DOI":"10.1109\/ASWEC.2010.13"},{"key":"346_CR16464","unstructured":"Butler J, Silberman P (2013) RAIDE: rootkit analysis identification and elimination. Address to download: http:\/\/www.blackhat.com\/presentations\/bh-usa-06\/BH-US-06-Silberman.pdf. Retrieved 18 Apr 2013"},{"key":"346_CR16465","first-page":"336","volume":"7","author":"C Cuddy","year":"2010","unstructured":"Cuddy C, Glassman NR (2010) Location-based services: Foursquare and Gowalla, should libraries play? J Electron Res Med Libr 7:336\u2013343. 2010","journal-title":"J Electron Res Med Libr"},{"key":"346_CR16466","unstructured":"Facebook (2013) Fact sheet. Address to download: http:\/\/newsroom.fb.com\/content\/default.aspx?NewsAreaId=22. Retrieved 18 Apr 2013"},{"key":"346_CR16467","unstructured":"Foursquare (2013) https:\/\/foursquare.com\/. Retrieved 18 Apr 2013"},{"key":"346_CR16468","doi-asserted-by":"crossref","unstructured":"Fusco SJ, Michael K, Michael MG (2010) Using a social informatics framework to study the effects of location-based social networking on relationships between people: a review of literature. In: Michael K (ed) Proceedings of the IEEE international symposium on technology and society (ISTAS10), Wollongong. IEEE, Wollongong, pp 157\u2013171","DOI":"10.1109\/ISTAS.2010.5514641"},{"key":"346_CR16469","doi-asserted-by":"crossref","unstructured":"Fusco SJ, Michael K, Aloudat A, Abbas R (2011) Monitoring people using location-based social networking and its negative impact on trust: an exploratory contextual analysis of five types of \u201cFriend\u201d relationships. In: Miller K (ed) Proceedings of the IEEE symposium on technology and society 2011 (ISTAS11), Chicago. IEEE, Chicago","DOI":"10.1109\/ISTAS.2011.7160597"},{"key":"346_CR16470","doi-asserted-by":"crossref","unstructured":"Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st international conference on mobile systems, applications and services \u2013 MobiSys, San Francisco, pp 31\u201342","DOI":"10.1145\/1066116.1189037"},{"issue":"1","key":"346_CR16471","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1111\/j.1083-6101.2007.00399.x","volume":"13","author":"L Humphreys","year":"2007","unstructured":"Humphreys L (2007) Mobile social networks and social practice: a case study of Dodgeball. J Comput-Mediat Commun 13(1):341\u2013360","journal-title":"J Comput-Mediat Commun"},{"key":"346_CR16472","doi-asserted-by":"crossref","unstructured":"Li N (2009) Analysis of a location-based social network. In: International conference on computational science and engineering (CSE \u201809), Vancouver, pp 263\u2013270","DOI":"10.1109\/CSE.2009.98"},{"key":"346_CR16473","unstructured":"Loopt (2012) https:\/\/www.loopt.com\/. Retrieved 1 Oct 2012"},{"key":"346_CR16474","unstructured":"PleaseRobMe (2013) http:\/\/pleaserobme.com. Retrieved 18 Apr 2013"},{"key":"346_CR16475","unstructured":"Reese W, Beckland J (2011) Lost in geolocation \u2013 why consumers haven\u2019t bought it and how marketers can fix it. Mobile Marketing Report, White Horse \u2013 Digital Future Group. Address to download: http:\/\/www.whitehorse.com\/uploadedFiles\/World\/Reports\/Lost%20in%20Geolocation%20Report%281%29.pdf. Retrieved 1 Oct 2012"},{"issue":"6","key":"346_CR16476","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/s00779-008-0214-3","volume":"13","author":"N Sadeh","year":"2008","unstructured":"Sadeh N, Hong J, Cranor L, Fette I, Kelley P, Prabaker M, Rao J (2008) Understanding and capturing people\u2019s privacy policies in a mobile social networking application. Pers Ubiquitous Comput 13(6):401\u2013412","journal-title":"Pers Ubiquitous Comput"},{"issue":"6","key":"346_CR16477","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati P (2001) Protecting respondents\u2019 identities in microdata release. IEEE Trans Knowl Data Eng 13(6):1010\u20131027","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"346_CR16478","unstructured":"Scellato S, Lambiote R, Noulas A, Mascolo C (2011) Socio-spatial properties of online location-based social networks. In: Proceedings of ICWSM, association for the advancement of artificial intelligence, Barcelona, pp 329\u2013336"},{"issue":"5","key":"346_CR16479","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L (2002) k-Anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl-Based Syst 10(5):557\u2013570","journal-title":"Int J Uncertain Fuzziness Knowl-Based Syst"},{"key":"346_CR16480","unstructured":"The Search Agency (2010) Comprehensive guide to location-based social media. White paper. Address to download: http:\/\/www.thesearchagency.com\/sites\/default\/files\/tsa_whitepaper_location_based_social.media.pdf. Retrieved 18 Apr 2013"},{"key":"346_CR16481","unstructured":"Zalalichin Z, Efrati R, Cohen T (2010) The social networking corporate threat. Technical report, COMSEC consulting \u2013 information security. Address to download: http:\/\/www.comsecglobal.com\/FrameWork\/Upload\/The20Social%20Networking%20Corporate%20Threat%20-%20Comsec.pdf. Retrieved 18 Apr 2013"}],"container-title":["Encyclopedia of Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4939-7131-2_346","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,3]],"date-time":"2020-06-03T03:42:06Z","timestamp":1591155726000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4939-7131-2_346"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9781493971305","9781493971312"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-1-4939-7131-2_346","relation":{},"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"12 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}