{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T07:53:56Z","timestamp":1726041236932},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030278120"},{"type":"electronic","value":"9783030278137"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-27813-7_1","type":"book-chapter","created":{"date-parts":[[2019,8,18]],"date-time":"2019-08-18T23:02:41Z","timestamp":1566169361000},"page":"3-16","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Do Identity and Location Data Interrelate? New Affiliations and Privacy Concerns in Social-Driven Sharing"],"prefix":"10.1007","author":[{"given":"Katerina","family":"Vgena","sequence":"first","affiliation":[]},{"given":"Angeliki","family":"Kitsiou","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Kalloniatis","sequence":"additional","affiliation":[]},{"given":"Dimitris","family":"Kavroudakis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,2]]},"reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/11957454_3","volume-title":"Privacy Enhancing Technologies","author":"A Acquisti","year":"2006","unstructured":"Acquisti, A., Gross, R.: Imagined communities: awareness, information sharing, and privacy on the Facebook. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 36\u201358. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11957454_3"},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/11428572_10","volume-title":"Pervasive Computing","author":"M Duckham","year":"2005","unstructured":"Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) Pervasive 2005. LNCS, vol. 3468, pp. 152\u2013170. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11428572_10"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Tang, K.P., Lin, J., Hong, J.I., Siewiorek, D.P., Sadeh, N.: Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing. In: Proceedings of the 12th ACM International Conference on Ubiquitous Computing, pp. 85\u201394. ACM (2010)","DOI":"10.1145\/1864349.1864363"},{"key":"1_CR4","unstructured":"Herrmann, M.: Privacy in Location-Based Services, p. 284 (2016)"},{"issue":"1","key":"1_CR5","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MPRV.2003.1186726","volume":"2","author":"G Myles","year":"2003","unstructured":"Myles, G., Friday, A., Davies, N.: Preserving privacy in environments with location-based applications. IEEE Pervasive Comput. 2(1), 56\u201364 (2003)","journal-title":"IEEE Pervasive Comput."},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Birnholtz, J., Fitzpatrick, C., Handel, M., Brubaker, J.R.: Identity, identification and identifiability: the language of self-presentation on a location-based mobile dating app. In: Proceedings of the 16th International Conference on Human-Computer Interaction with Mobile Devices & Services, pp. 3\u201312. ACM (2014)","DOI":"10.1145\/2628363.2628406"},{"key":"1_CR7","first-page":"35","volume":"3","author":"M Duckham","year":"2006","unstructured":"Duckham, M., Kulik, L.: Location privacy and location-aware computing. Dyn. Mob. GIS: Invest. Change Space Time 3, 35\u201351 (2006)","journal-title":"Dyn. Mob. GIS: Invest. Change Space Time"},{"issue":"3","key":"1_CR8","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1177\/0539018408092575","volume":"47","author":"S Lahlou","year":"2008","unstructured":"Lahlou, S.: Identity, social status, privacy and face-keeping in digital society. Soc. Sci. Inf. 47(3), 299\u2013330 (2008)","journal-title":"Soc. Sci. Inf."},{"key":"1_CR9","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.jss.2015.04.084","volume":"107","author":"P Lenberg","year":"2015","unstructured":"Lenberg, P., Feldt, R., Wallgren, L.G.: Behavioral software engineering: a definition and systematic literature review. J. Syst. Softw. 107, 15\u201337 (2015)","journal-title":"J. Syst. Softw."},{"key":"1_CR10","doi-asserted-by":"publisher","first-page":"17606","DOI":"10.1109\/ACCESS.2018.2822260","volume":"6","author":"B Liu","year":"2018","unstructured":"Liu, B., Zhou, W., Zhu, T., Gao, L., Xiang, Y.: Location privacy and its applications: a systematic study. IEEE Access 6, 17606\u201317624 (2018)","journal-title":"IEEE Access"},{"issue":"1","key":"1_CR11","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1109\/TMC.2012.247","volume":"13","author":"KPN Puttaswamy","year":"2014","unstructured":"Puttaswamy, K.P.N., Wang, S., Steinbauer, T., Agrawal, D., Abbadi, A.E., Kruegel, C., et al.: Preserving location privacy in geosocial applications. IEEE Trans. Mob. Comput. 13(1), 159\u2013173 (2014)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Mascetti, S., Freni, D., Bettini, C., Wang, X.S., Jajodia, S.: Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. arXiv:10070408 [cs] (2010)","DOI":"10.1007\/s00778-010-0213-7"},{"key":"1_CR13","unstructured":"Marwick, A.: The Public Domain: Surveillance in Everyday Life. https:\/\/www.researchgate.net\/publication\/279673507_The_Public_Domain_Surveillance_in_Everyday_Life"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Snekkenes, E.: Concepts for personal location privacy policies. In: Proceedings of the 3rd ACM Conference on Electronic Commerce, pp. 48\u201357. ACM, New York (2001)","DOI":"10.1145\/501158.501164"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Consolvo, S., Smith, I.E., Matthews, T., LaMarca, A., Tabert, J., Powledge, P.: Location disclosure to social relations: why, when, & what people want to share. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 81\u201390. ACM (2005)","DOI":"10.1145\/1054972.1054985"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Grice, H.P.: Logic and Conversation, p. 10 (1975)","DOI":"10.1163\/9789004368811_003"},{"issue":"7","key":"1_CR17","doi-asserted-by":"publisher","first-page":"1051","DOI":"10.1177\/1461444814543995","volume":"16","author":"AE Marwick","year":"2014","unstructured":"Marwick, A.E., Boyd, D.: Networked privacy: how teenagers negotiate context in social media. New Media Soc. 16(7), 1051\u20131067 (2014)","journal-title":"New Media Soc."},{"key":"1_CR18","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.cose.2015.07.002","volume":"64","author":"S Kokolakis","year":"2017","unstructured":"Kokolakis, S.: Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122\u2013134 (2017)","journal-title":"Comput. Secur."},{"key":"1_CR19","unstructured":"Miguel, C., Medina, P.: The Transformation of Identity and Privacy through Online Social Networks (The CouchSurfing Case) (2011)"},{"key":"1_CR20","unstructured":"Liu, L.: From data privacy to location privacy: models and algorithms. In: Proceedings of the 33rd International Conference on Very Large Data Bases. VLDB Endowment, pp. 1429\u20131430 (2007)"},{"issue":"3","key":"1_CR21","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MIC.2011.29","volume":"15","author":"C Ruiz Vicente","year":"2011","unstructured":"Ruiz Vicente, C., Freni, D., Bettini, C., Jensen, C.S.: Location-related privacy in geo-social networks. IEEE Internet Comput. 15(3), 20\u201327 (2011)","journal-title":"IEEE Internet Comput."},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Bao, J., Zheng, Y., Mokbel, M.F.: Location-based and preference-aware recommendation using sparse geo-social networking data. In: Proceedings of the 20th International Conference on Advances in Geographic Information Systems - SIGSPATIAL 2012, p. 199. ACM Press, Redondo Beach (2012)","DOI":"10.1145\/2424321.2424348"},{"issue":"1","key":"1_CR23","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1146\/annurev.so.12.080186.000435","volume":"12","author":"B. Biddle","year":"1986","unstructured":"Biddle, B.J.: Recent Developments in Role Theory, p. 26 (1986)","journal-title":"Annual Review of Sociology"},{"key":"1_CR24","unstructured":"Bernstein, G., Zvi, H.T.: Over-Parenting. https:\/\/lawreview.law.ucdavis.edu\/issues\/44\/4\/articles\/Bernstein.pdf"},{"issue":"7","key":"1_CR25","doi-asserted-by":"publisher","first-page":"2296","DOI":"10.1177\/1461444817714790","volume":"20","author":"MA Beam","year":"2018","unstructured":"Beam, M.A., Child, J.T., Hutchens, M.J., Hmielowski, J.D.: Context collapse and privacy management: diversity in Facebook friends increases online news reading and sharing. New Media Soc. 20(7), 2296\u20132314 (2018)","journal-title":"New Media Soc."},{"issue":"1","key":"1_CR26","doi-asserted-by":"publisher","first-page":"205630511876334","DOI":"10.1177\/2056305118763349","volume":"4","author":"Petter Bae Brandtzaeg","year":"2018","unstructured":"Brandtzaeg, P.B., L\u00fcders, M.: Time collapse in social media: extending the context collapse. Soc. Media\u2009+\u2009Soc. 4(1), 205630511876334 (2018)","journal-title":"Social Media + Society"},{"issue":"10","key":"1_CR27","doi-asserted-by":"publisher","first-page":"1643","DOI":"10.1177\/1461444814531364","volume":"17","author":"R Schwartz","year":"2015","unstructured":"Schwartz, R., Halegoua, G.R.: The spatial self: location-based identity performance on social media. New Media Soc. 17(10), 1643\u20131660 (2015)","journal-title":"New Media Soc."},{"key":"1_CR28","volume-title":"Social Identity","author":"R Jenkins","year":"2008","unstructured":"Jenkins, R.: Social Identity. Routledge, London and New York (2008)"},{"key":"1_CR29","doi-asserted-by":"crossref","unstructured":"Storey, M.-A., Treude, C., van Deursen, A., Cheng, L.-T.: The impact of social media on software engineering practices and tools. In: Proceedings of the FSE\/SDP Workshop on Future of Software Engineering Research, pp. 359\u2013364. ACM (2010)","DOI":"10.1145\/1882362.1882435"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-27813-7_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,19]],"date-time":"2023-09-19T06:32:11Z","timestamp":1695105131000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-27813-7_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030278120","9783030278137"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-27813-7_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"2 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"TrustBus","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Trust and Privacy in Digital Business","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Linz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"trustbus2019a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dexa.org\/trustbus2019","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mixed (single-blind and double-blind)","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"ConfDriver","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2-3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}