{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T23:48:25Z","timestamp":1773704905360,"version":"3.50.1"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030371098","type":"print"},{"value":"9783030371104","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-37110-4_14","type":"book-chapter","created":{"date-parts":[[2020,2,13]],"date-time":"2020-02-13T19:04:03Z","timestamp":1581620643000},"page":"201-216","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Smart Contract-Driven Mechanism Design to Mitigate Information Diffusion in Social Networks"],"prefix":"10.1007","author":[{"given":"Arinjita","family":"Paul","sequence":"first","affiliation":[]},{"given":"Vorapong","family":"Suppakitpaisarn","sequence":"additional","affiliation":[]},{"given":"C. Pandu","family":"Rangan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,14]]},"reference":[{"key":"14_CR1","unstructured":"Akasha: http:\/\/akasha.world\/ (2015)"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Azaria, A., Ekblaw, A., Vieira, T., Lippman, A.: Medrec: using blockchain for medical data access and permission management. In: 2nd International Conference on Open and Big Data, OBD 2016, Vienna, Austria, 22\u201324 August 2016, pp. 25\u201330 (2016)","DOI":"10.1109\/OBD.2016.11"},{"key":"14_CR3","unstructured":"Buterin, V., et\u00a0al.: A next-generation smart contract and decentralized application platform. White paper (2014)"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Casas-Roma, J., Rousseau, F.: Community-preserving generalization of social networks. In: Proceedings of the 2015 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015, Paris, France, 25\u201328 August 2015, pp. 1465\u20131472 (2015)","DOI":"10.1145\/2808797.2808854"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Cheng, J., Fu, A.W.-C. Liu, J.: K-isomorphism: privacy preserving network publication against structural attacks. In: Proceedings of the 2010 ACM SIGMOD International Conference on Management of data, pp. 459\u2013470. ACM, New York (2010)","DOI":"10.1145\/1807167.1807218"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Cohen, E., Megiddo, N.: Recognizing properties of periodic graphs. In: Applied Geometry and Discrete Mathematics, Proceedings of a DIMACS Workshop, Providence, Rhode Island, USA, 18 September 1990, vol.\u00a04, pp. 135\u2013146. DIMACS\/AMS (1990)","DOI":"10.1090\/dimacs\/004\/10"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Dagher, G.G., Mohler, J., Milojkovic, M., Marella, P.B.: Ancile: privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology. Sustain. Cities Soc. 39, 283\u2013297 (2018)","DOI":"10.1016\/j.scs.2018.02.014"},{"key":"14_CR8","unstructured":"Diaspora: https:\/\/diasporafoundation.org\/ (2010)"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Dwork, C.: The differential privacy frontier. In: Proceedings of Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, 15\u201317 March 2009, pp. 496\u2013502 (2009)","DOI":"10.1007\/978-3-642-00457-5_29"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.D.: Calibrating noise to sensitivity in private data analysis. In: Proceedings of Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, 4\u20137 March 2006, pp. 265\u2013284 (2006)","DOI":"10.1007\/11681878_14"},{"key":"14_CR11","unstructured":"Goel, V.: Facebook tinkers with users emotions in news feed experiment, stirring outcry. The New York Times (2014)"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Gradwohl, R.: Information sharing and privacy in networks. In: Proceedings of the 2017 ACM Conference on Economics and Computation, EC \u201917, Cambridge, MA, USA, 26\u201330 June 2017, pp. 349\u2013350 (2017)","DOI":"10.1145\/3033274.3085095"},{"key":"14_CR13","unstructured":"Hardekopf, B.:\u00a0The big data breaches of 2014. Forbes, 13 January 2015"},{"key":"14_CR14","unstructured":"Hay, M., Miklau, G., Jensen, D., Weis, P., Srivastava, S.: Anonymizing Social Networks. Computer Science Department Faculty Publication Series, p. 180 (2007)"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Henson, B., Reyns, B.W., Fisher, B.S.: Security in the 21st century: examining the link between online social network activity, privacy, and interpersonal victimization. Crim. Justice Rev. 36(3), 253\u2013268 (2011)","DOI":"10.1177\/0734016811399421"},{"key":"14_CR16","unstructured":"Hongfei, D., Zhang, E.: https:\/\/docs.neo.org\/en-us\/whitepaper.html (2014)"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Iwano, K., Steiglitz, K.: Testing for cycles in infinite graphs with periodic structure. In: Aho, A.V. (eds.) Proceedings of the 19th Annual ACM Symposium on Theory of Computing, pp. 46\u201355. ACM, New York (1987)","DOI":"10.1145\/28395.28401"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J.M., Kumar, A.: Connectivity and inference problems for temporal networks. In: Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, Portland, OR, USA, 21\u201323 May 2000, pp. 504\u2013513. ACM, New York (2000)","DOI":"10.1145\/335305.335364"},{"key":"14_CR19","unstructured":"Kleinberg, J.M., Raghavan, P.: Query incentive networks. In: Proceedings of 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2005), 23\u201325 October 2005, Pittsburgh, PA, USA, pp. 132\u2013141. IEEE Computer Society (2005)"},{"key":"14_CR20","unstructured":"Li, B., Hao, D., Zhao, D., Zhou, T.: Mechanism design in social networks. In: Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, San Francisco, California, USA, 4\u20139 February 2017, pp. 586\u2013592 (2017)"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: IEEE 23rd International Conference on Data Engineering. ICDE 2007, pp. 106\u2013115. IEEE (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Luo, W., Liu, J., Liu, J., Fan, C.: An analysis of security in social networks. In: Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 648\u2013651. IEEE (2009)","DOI":"10.1109\/DASC.2009.100"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. In: Proceedings of the 22nd International Conference on Data Engineering. ICDE\u201906, pp. 24\u201324. IEEE (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"14_CR24","series-title":"Econometric Society Monographs","volume-title":"Axioms of Cooperative Decision Making","author":"H Moulin","year":"1991","unstructured":"Moulin, H.: Axioms of Cooperative Decision Making. Econometric Society Monographs, vol. 15. Cambridge University Press, Cambridge (1991)"},{"key":"14_CR25","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Nisan, N., Roughgarden, T., Tardos, E., Vazirani, V.V.: Algorithmic Game Theory, vol.\u00a01. Cambridge University Press, Cambridge (2007)","DOI":"10.1017\/CBO9780511800481"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Nissim, K., Smorodinsky, R., Tennenholtz, M.: Approximately optimal mechanism design via differential privacy. In: Innovations in Theoretical Computer Science, Cambridge, MA, USA, 8\u201310 January 2012, pp. 203\u2013213 (2012)","DOI":"10.1145\/2090236.2090254"},{"issue":"1","key":"14_CR28","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/2509013.2509016","volume":"12","author":"MM Pai","year":"2013","unstructured":"Pai, M.M., Roth, A.: Privacy and mechanism design. SIGecom Exch. 12(1), 8\u201329 (2013)","journal-title":"SIGecom Exch."},{"key":"14_CR29","unstructured":"Rajagopalan, K.: Interacting with users in social networks: the follow-back problem. Technical report, MIT Lincoln Laboratory Lexington United States (2016)"},{"key":"14_CR30","unstructured":"Steemit social network: https:\/\/steemit.com\/ (2016)"},{"issue":"05","key":"14_CR31","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"14_CR32","unstructured":"Szabo, N.: Smart contracts (1994)"},{"issue":"1","key":"14_CR33","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1111\/j.1540-6261.1961.tb02789.x","volume":"16","author":"W Vickrey","year":"1961","unstructured":"Vickrey, W.: Counterspeculation, auctions, and competitive sealed tenders. J. Financ. 16(1), 8\u201337 (1961)","journal-title":"J. Financ."},{"key":"14_CR34","doi-asserted-by":"crossref","unstructured":"Williams, J.: Social networking applications in health care: threats to the privacy and security of health information. In: Proceedings of the 2010 ICSE Workshop on Software Engineering in Health Care, pp. 39\u201349. ACM, New York (2010)","DOI":"10.1145\/1809085.1809091"},{"key":"14_CR35","doi-asserted-by":"crossref","unstructured":"Zyskind, G., Nathan, O., Pentland, A.: Decentralizing privacy: using blockchain to protect personal data. In: 2015 IEEE Symposium on Security and Privacy Workshops, SPW 2015, San Jose, CA, USA, 21\u201322 May 2015, pp. 180\u2013184 (2015)","DOI":"10.1109\/SPW.2015.27"}],"container-title":["Springer Proceedings in Business and Economics","Mathematical Research for Blockchain Economy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37110-4_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T21:13:18Z","timestamp":1695762798000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-37110-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030371098","9783030371104"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37110-4_14","relation":{},"ISSN":["2198-7246","2198-7254"],"issn-type":[{"value":"2198-7246","type":"print"},{"value":"2198-7254","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}