{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:43:25Z","timestamp":1742967805510,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030233808"},{"type":"electronic","value":"9783030233815"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-23381-5_3","type":"book-chapter","created":{"date-parts":[[2019,6,17]],"date-time":"2019-06-17T23:09:30Z","timestamp":1560812970000},"page":"31-45","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Investigating Personally Identifiable Information Posted on Twitter Before and After Disasters"],"prefix":"10.1007","author":[{"given":"Pezhman","family":"Sheinidashtegol","sequence":"first","affiliation":[]},{"given":"Aibek","family":"Musaev","sequence":"additional","affiliation":[]},{"given":"Travis","family":"Atkison","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,18]]},"reference":[{"key":"3_CR1","unstructured":"EMarketer: number of social media users worldwide from 2010 to 2021 (in billions). Technical report (2017)"},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"19912","DOI":"10.1109\/ACCESS.2018.2822693","volume":"6","author":"M Siddula","year":"2018","unstructured":"Siddula, M., Li, L., Li, Y.: An empirical study on the privacy preservation of online social networks. IEEE Access 6, 19912\u201319922 (2018)","journal-title":"IEEE Access"},{"key":"3_CR3","doi-asserted-by":"publisher","first-page":"25295","DOI":"10.1109\/ACCESS.2017.2769090","volume":"5","author":"D Yin","year":"2017","unstructured":"Yin, D., Shen, Y., Liu, C.: Attribute couplet attacks and privacy preservation in social networks. IEEE Access 5, 25295\u201325305 (2017)","journal-title":"IEEE Access"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"McCallister, E., Grance, T., Scarfone, K.A.: Guide to protecting the confidentiality of Personally Identifiable Information (PII) (2010)","DOI":"10.6028\/NIST.SP.800-122"},{"key":"3_CR5","unstructured":"Murphy, K.: Web Photos That Reveal Secrets. Like Where You Live, NYTimes (2010)"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Brunty, J., Helenek, K.: Chapter 3 - investigative uses of social media. In: Brunty, J., Helenek, K. (eds.) Social Media Investigation for Law Enforcement, pp. 41\u201370. Anderson Publishing, Ltd. (2013)","DOI":"10.4324\/9781315721323"},{"key":"3_CR7","unstructured":"US Bureau of Justice Statistics: Prevalence rate of violent crime in the United States from 2005 to 2016, by age. https:\/\/www.statista.com\/statistics\/424137\/prevalence-rate-of-violent-crime-in-the-us-by-age\/. Accessed 01 July 2018"},{"issue":"3","key":"3_CR8","doi-asserted-by":"publisher","first-page":"e1500779","DOI":"10.1126\/sciadv.1500779","volume":"2","author":"Y Kryvasheyeu","year":"2016","unstructured":"Kryvasheyeu, Y., et al.: Rapid assessment of disaster damage using social media activity. Sci. Adv. 2(3), e1500779\u2013e1500779 (2016)","journal-title":"Sci. Adv."},{"issue":"6","key":"3_CR9","doi-asserted-by":"publisher","first-page":"935","DOI":"10.1016\/j.patcog.2004.11.013","volume":"38","author":"M Boutell","year":"2005","unstructured":"Boutell, M., Luo, J.: Beyond pixels: exploiting camera metadata for photo classification. Pattern Recogn. 38(6), 935\u2013946 (2005)","journal-title":"Pattern Recogn."},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Faiz bin Jeffry, M.A., Mammi, H.K.: A study on image security in social media using digital watermarking with metadata. In: 2017 IEEE Conference on Application, Information and Network Security (AINS), pp. 118\u2013123 (2017)","DOI":"10.1109\/AINS.2017.8270435"},{"key":"3_CR11","unstructured":"Pew Research Center: Who uses each social media platform. http:\/\/www.pewinternet.org\/fact-sheet\/social-media\/. Accessed 01 July 2018"},{"issue":"3","key":"3_CR12","doi-asserted-by":"publisher","first-page":"205316801772000","DOI":"10.1177\/2053168017720008","volume":"4","author":"J Mellon","year":"2017","unstructured":"Mellon, J., Prosser, C.: Twitter and Facebook are not representative of the general population: political attitudes and demographics of British social media users. Res. Polit. 4(3), 205316801772000 (2017)","journal-title":"Res. Polit."},{"issue":"6","key":"3_CR13","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/1743546.1743558","volume":"53","author":"A Narayanan","year":"2010","unstructured":"Narayanan, A., Shmatikov, V.: Myths and fallacies of \u201cpersonally identifiable information\u201d. Commun. ACM 53(6), 24 (2010)","journal-title":"Commun. ACM"},{"issue":"2","key":"3_CR14","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MIC.2014.107","volume":"19","author":"K Liang","year":"2015","unstructured":"Liang, K., Liu, J.K., Lu, R., Wong, D.S.: Privacy concerns for photo sharing in online social networks. IEEE Internet Comput. 19(2), 58\u201363 (2015)","journal-title":"IEEE Internet Comput."},{"issue":"3","key":"3_CR15","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MSP.2017.74","volume":"15","author":"ST Peddinti","year":"2017","unstructured":"Peddinti, S.T., Ross, K.W., Cappos, J.: User anonymity on Twitter. IEEE Secur. Privacy 15(3), 84\u201387 (2017)","journal-title":"IEEE Secur. Privacy"},{"issue":"2","key":"3_CR16","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MIC.2013.128","volume":"18","author":"P Wang","year":"2014","unstructured":"Wang, P., He, W., Zhao, J.: A tale of three social networks: user activity comparisons across Facebook, Twitter, and foursquare. IEEE Internet Comput. 18(2), 10\u201315 (2014)","journal-title":"IEEE Internet Comput."},{"key":"3_CR17","doi-asserted-by":"publisher","first-page":"17653","DOI":"10.1109\/ACCESS.2018.2818116","volume":"6","author":"S Du","year":"2018","unstructured":"Du, S., et al.: Modeling privacy leakage risks in large-scale social networks. IEEE Access 6, 17653\u201317665 (2018)","journal-title":"IEEE Access"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secure Comput. 5971(c), 1 (2016)","DOI":"10.1109\/TDSC.2016.2613521"},{"issue":"1","key":"3_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1111\/disa.12092","volume":"39","author":"JB Houston","year":"2015","unstructured":"Houston, J.B., et al.: Social media and disasters: a functional framework for social media use in disaster planning, response, and research. Disasters 39(1), 1\u201322 (2015)","journal-title":"Disasters"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Knuth, D., Szymczak, H., Kuecuekbalaban, P., Schmidt, S.: Social media in emergencies how useful can they be. In: Proceedings of the 2016 3rd International Conference on Information and Communication Technologies for Disaster Management, ICT-DM 2016 (2017)","DOI":"10.1109\/ICT-DM.2016.7857226"},{"key":"3_CR21","unstructured":"Honan: Watch the Virginia earthquake spread across Twitter (2014)"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Palen, L., et al.: A vision for technology-mediated support for public participation & assistance in mass emergencies & disasters. In: Proceedings of the 2010 ACMBCS Visions of Computer Science Conference, pp. 1\u201312 (2010)","DOI":"10.14236\/ewic\/VOCS2010.8"},{"key":"3_CR23","unstructured":"Liu, S.B., Palen, L., Sutton, J., Hughes, A.L., Vieweg, S.: In search of the bigger picture: the emergent role of on-line photo sharing in times of disaster. In: Proceedings of the 5th International ISCRAM Conference, vol. 8, no. May, pp. 140\u2013149 (2008)"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Hecht, B., Hong, L., Suh, B., Chi, E.H.: Tweets from Justin Bieber\u2019s heart: the dynamics of the location field in user profiles. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 237\u2013246. ACM (2011)","DOI":"10.1145\/1978942.1978976"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Mahmud, J., Nichols, J., Drews, C.: Where is this tweet from? Inferring home locations of Twitter users. In: Proceedings of the Sixth International AAAI Conference on Weblogs and Social Media (ICWSM 2012), pp. 511\u2013514 (2012)","DOI":"10.1609\/icwsm.v6i1.14299"},{"key":"3_CR26","unstructured":"Twitter Inc: Historical PowerTrack. http:\/\/support.gnip.com\/apis\/historicalapi\/. Accessed 01 July 2018"},{"key":"3_CR27","unstructured":"Twitter Inc: Get Tweet timelines. https:\/\/developer.twitter.com\/en\/docs\/tweets \/timelines\/api-reference\/get-statuses-usertimeline.html. Accessed 01 July 2018"},{"key":"3_CR28","unstructured":"USGS: Water resources of the united states-national water information system (NWIS) mapper. https:\/\/maps.waterdata.usgs.gov\/mapper\/index.html. Accessed 04 Apr 2019"},{"key":"3_CR29","unstructured":"Schmidt, S., Achenbach, J., Somashekhar, S.: Puerto Rico entirely without power as Hurricane Maria hammers island with devastating force (2017)"},{"issue":"2","key":"3_CR30","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1111\/j.1536-7150.2010.00720.x","volume":"69","author":"K Frailing","year":"2010","unstructured":"Frailing, K., Wood Harper, D.: School kids and oil rigs: two more pieces of the Post-Katrina Puzzle in New Orleans. Am. J. Econ. Sociol. 69(2), 717\u2013735 (2010)","journal-title":"Am. J. Econ. Sociol."},{"key":"3_CR31","volume-title":"The Sociology of Katrina: Perspectives on a Modern Catastrophe","author":"K Frailing","year":"2010","unstructured":"Frailing, K., Harper, D.W.: The Sociology of Katrina: Perspectives on a Modern Catastrophe. Rowman & Littlefield, Lanham (2010)"},{"key":"3_CR32","volume-title":"Crime and Criminal Justice in Disaster","author":"K Frailing","year":"2012","unstructured":"Frailing, K., Harper, D.W.: Crime and Criminal Justice in Disaster, 2nd edn. Carolina Academic Press, Durham (2012)","edition":"2"},{"issue":"10","key":"3_CR33","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1177\/0002764215591184","volume":"59","author":"K Frailing","year":"2015","unstructured":"Frailing, K., Harper, D.W., Serpas, R.: Changes and challenges in crime and criminal justice after disaster. Am. Behav. Sci. 59(10), 1278\u20131291 (2015)","journal-title":"Am. Behav. Sci."},{"key":"3_CR34","unstructured":"Twitter: Twitter media policy (2018). Accessed 01 July 2018"}],"container-title":["Lecture Notes in Computer Science","Services \u2013 SERVICES 2019"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-23381-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T10:15:34Z","timestamp":1710324934000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-23381-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030233808","9783030233815"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-23381-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"18 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SERVICES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"World Congress on Services","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"San Diego, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"services2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.servicescongress.org\/2019\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}