{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:20:53Z","timestamp":1742952053934,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030120849"},{"type":"electronic","value":"9783030120856"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-12085-6_8","type":"book-chapter","created":{"date-parts":[[2019,1,29]],"date-time":"2019-01-29T17:17:55Z","timestamp":1548782275000},"page":"81-95","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Incognitus: Privacy-Preserving User Interests in Online Social Networks"],"prefix":"10.1007","author":[{"given":"Alexandros","family":"Kornilakis","sequence":"first","affiliation":[]},{"given":"Panagiotis","family":"Papadopoulos","sequence":"additional","affiliation":[]},{"given":"Evangelos","family":"Markatos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,30]]},"reference":[{"key":"8_CR1","unstructured":"What does the general data protection regulation (GDPR) govern? March 2016. https:\/\/ec.europa.eu\/info\/law\/law-topic\/data-protection\/reform\/what-does-general-data-protection-regulation-gdpr-govern_en"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Acar, G., Eubank, C., Englehardt, S., Juarez, M., Narayanan, A., Diaz, C.: The web never forgets: persistent tracking mechanisms in the wild. In: Proceedings of the 2014 ACM SIGSAC Conference on CCS (2014)","DOI":"10.1145\/2660267.2660347"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Balsa, E., Troncoso, C., Diaz, C.: OB-PWS: Obfuscation-based private web search. In: IEEE Symposium on S&P 2012 (2012)","DOI":"10.1109\/SP.2012.36"},{"key":"8_CR4","unstructured":"Brown, M.S.: When and where to buy consumer data (and 12 companies who sell it) (2015). http:\/\/www.forbes.com\/sites\/metabrown\/2015\/09\/30\/when-and-where-to-buy-consumer-data-and-12-companies-who-sell-it"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th Conference on USENIX Security Symposium, SSYM 2004, Berkeley, CA, USA, vol. 13, pp. 21. USENIX Association (2004)","DOI":"10.21236\/ADA465464"},{"key":"8_CR6","unstructured":"Drake, N.: Help, I\u2019m trapped in Facebook\u2019s absurd pseudonym purgatory (2015). http:\/\/www.wired.com\/2015\/06\/facebook-real-name-policy-problems"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-14527-8_1","volume-title":"Privacy Enhancing Technologies","author":"P Eckersley","year":"2010","unstructured":"Eckersley, P.: How unique is your web browser? In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 1\u201318. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14527-8_1"},{"issue":"6","key":"8_CR8","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1108\/14684520610716135","volume":"30","author":"Y Elovici","year":"2006","unstructured":"Elovici, Y., Shapira, B., Meshiach, A.: Cluster-analysis attack against a private web solution (PRAW). Online Inf. Rev. 30(6), 624\u2013643 (2006)","journal-title":"Online Inf. Rev."},{"key":"8_CR9","unstructured":"Facebook business. Facebook pages (2017). https:\/\/www.facebook.com\/business\/products\/pages"},{"key":"8_CR10","unstructured":"Facebook for developers. Facebook platform policy (2016). https:\/\/developers.facebook.com\/policy\/"},{"key":"8_CR11","unstructured":"Facebook for developers. Facebook developer documentation (2017). https:\/\/developers.facebook.com\/docs\/"},{"key":"8_CR12","unstructured":"Greenberg, A.: Why Facebook just launched its own \u201cdark web\u201d site (2014). https:\/\/www.wired.com\/2014\/10\/facebook-tor-dark-site\/"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Howe, D.C., Nissenbaum, H.: TrackMeNot: resisting surveillance in web search. In: Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society, vol. 23, pp. 417\u2013436 (2009)","DOI":"10.1093\/oso\/9780195372472.003.0023"},{"key":"8_CR14","unstructured":"Facebook Inc.: Facebook login (2018). https:\/\/developers.facebook.com\/docs\/facebook-login\/"},{"issue":"1","key":"8_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13388-015-0016-x","volume":"4","author":"F Johansson","year":"2015","unstructured":"Johansson, F., Kaati, L., Shrestha, A.: Timeprints for identifying social media users with multiple aliases. Secur. Inf. 4(1), 1 (2015)","journal-title":"Secur. Inf."},{"key":"8_CR16","unstructured":"Kamkar, S.: Evercookie - virtually irrevocable persistent cookies (2010). http:\/\/samy.pl\/evercookie\/"},{"issue":"5","key":"8_CR17","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/s10207-012-0173-6","volume":"11","author":"G Kontaxis","year":"2012","unstructured":"Kontaxis, G., Polychronakis, M., Markatos, E.P.: Minimizing information disclosure to third parties in social login platforms. Int. J. Inf. Secur. 11(5), 321\u2013332 (2012)","journal-title":"Int. J. Inf. Secur."},{"key":"8_CR18","unstructured":"Krug, S.: Reactions now available globally (2016). https:\/\/newsroom.fb.com\/news\/2016\/02\/reactions-now-available-globally\/"},{"key":"8_CR19","unstructured":"Kumar, M.: Why Facebook is buying Whatsapp for \\$19 billion? (2014). http:\/\/thehackernews.com\/2014\/02\/why-facebook-is-buying-whatsapp-for-19.html"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: 2007 IEEE 23rd International Conference on Data Engineering, pp. 106\u2013115. IEEE (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"issue":"1","key":"8_CR21","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data (TKDD) 1(1), 3 (2007)","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"},{"key":"8_CR22","unstructured":"Mander, J.: Why Facebook is tracking time spent on newsfeeds (2015). http:\/\/www.globalwebindex.net\/blog\/why-facebook-is-tracking-time-spent-on-newsfeeds"},{"key":"8_CR23","unstructured":"Mozilla developer network and individual contributors. Add-on SDK (2016). https:\/\/developer.mozilla.org\/en-US\/Add-ons\/SDK"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Papadopoulos, E.P., Diamantaris, M., Papadopoulos, P., Petsas, T., Ioannidis, S., Markatos, E.P.: The long-standing privacy debate: mobile websites vs mobile apps. In: Proceedings of the 26th International Conference on World Wide Web, WWW 2017, Republic and Canton of Geneva, Switzerland, pp. 153\u2013162. International World Wide Web Conferences Steering Committee (2017)","DOI":"10.1145\/3038912.3052691"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Papadopoulos, P., Chariton, A.A., Athanasopoulos, E., Markatos, E.P.: Where\u2019s Wally? How to privately discover your friends on the internet. In: Proceedings of the ASIACCS 2018 (2018)","DOI":"10.1145\/3196494.3196496"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Papadopoulos, P., Kourtellis, N., Markatos, E.P.: Cookie synchronization: everything you always wanted to know but were afraid to ask. arXiv preprint arXiv:1805.10505 (2018)","DOI":"10.1145\/3308558.3313542"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Papadopoulos, P., Kourtellis, N., Markatos, E.P.: Exclusive: how the (synced) cookie monster breached my encrypted VPN session. In: Proceedings of the 11th European Workshop on Systems Security, EuroSec 2018 (2018)","DOI":"10.1145\/3193111.3193117"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Papadopoulos, P., Papadogiannakis, A., Polychronakis, M., Zarras, A., Holz, T., Markatos, E.P.: K-subscription: privacy-preserving microblogging browsing through obfuscation. In: Proceedings of the ACSAC 2013 (2013)","DOI":"10.1145\/2523649.2523671"},{"key":"8_CR29","unstructured":"RT. Privacy betrayed: Twitter sells multi-billion tweet archive (2012). https:\/\/www.rt.com\/news\/twitter-sells-tweet-archive-529\/"},{"key":"8_CR30","unstructured":"Shearer, E., Gottfried, J.: News use across social media platforms (2017). http:\/\/www.journalism.org\/2017\/09\/07\/news-use-across-social-media-platforms-2017\/"},{"key":"8_CR31","unstructured":"Singer, N., Merrill, J.B.: When a company is put up for sale, in many cases, your personal data is, too (2015). http:\/\/www.nytimes.com\/2015\/06\/29\/technology\/when-a-company-goes-up-for-sale-in-many-cases-so-does-your-personal-data.html"},{"key":"8_CR32","unstructured":"Solon, O.: Facebook says Cambridge Analytica may have gained 37m more users\u2019 data (2018). https:\/\/www.theguardian.com\/technology\/2018\/apr\/04\/facebook-cambridge-analytica-user-data-latest-more-than-thought"},{"issue":"05","key":"8_CR33","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl. Based Syst."},{"key":"8_CR34","unstructured":"Wakefield, J.: Social media \u2018outstrips TV\u2019 as news source for young people, June 2016. https:\/\/www.bbc.com\/news\/uk-36528256"},{"key":"8_CR35","unstructured":"Weinstein, R.: Mutation summary (2015). https:\/\/github.com\/rafaelw\/mutation-summary"},{"issue":"4","key":"8_CR36","doi-asserted-by":"publisher","first-page":"1036","DOI":"10.1073\/pnas.1418680112","volume":"112","author":"W Youyou","year":"2015","unstructured":"Youyou, W., Kosinski, M., Stillwell, D.: Computer-based personality judgments are more accurate than those made by humans. Proc. Nat. Acad. Sci. 112(4), 1036\u20131040 (2015)","journal-title":"Proc. Nat. Acad. Sci."}],"container-title":["Lecture Notes in Computer Science","Information and Operational Technology Security Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-12085-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T11:51:20Z","timestamp":1720957880000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-12085-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030120849","9783030120856"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-12085-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"30 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IOSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Information and Operational Technology Security Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Heraklion","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iosec2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.raid2018.org\/cipsecworkshop.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"22","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}