{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T04:25:36Z","timestamp":1743135936347,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031163012"},{"type":"electronic","value":"9783031163029"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-16302-9_10","type":"book-chapter","created":{"date-parts":[[2022,10,5]],"date-time":"2022-10-05T23:03:52Z","timestamp":1665011032000},"page":"136-147","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Only\u00a0Link You\u2019ll Ever Need: How\u00a0Social Media Reference Landing Pages Speed Up\u00a0Profile Matching"],"prefix":"10.1007","author":[{"given":"Sergej","family":"Denisov","sequence":"first","affiliation":[]},{"given":"Frederik S.","family":"B\u00e4umer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,6]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.comnet.2019.04.015","volume":"158","author":"A Agarwal","year":"2019","unstructured":"Agarwal, A., Toshniwal, D.: SmPFT: social media based profile fusion technique for data enrichment. Comput. Netw. 158, 123\u2013131 (2019)","journal-title":"Comput. Netw."},{"key":"10_CR2","doi-asserted-by":"publisher","unstructured":"Ahmad, W., Ali, R.: User identification across multiple online social networks using cross link attribute and network relationship. J. Interdiscip. Math. 23 (2020). https:\/\/doi.org\/10.1080\/09720502.2020.1721713","DOI":"10.1080\/09720502.2020.1721713"},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"167653","DOI":"10.1109\/ACCESS.2019.2953499","volume":"7","author":"BR Barricelli","year":"2019","unstructured":"Barricelli, B.R., Casiraghi, E., Fogli, D.: A survey on digital twin: definitions, characteristics, applications, and design implications. IEEE Access 7, 167653\u2013167671 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2953499","journal-title":"IEEE Access"},{"key":"10_CR4","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-319-67642-5_7","volume-title":"Information and Software Technologies","author":"FS B\u00e4umer","year":"2017","unstructured":"B\u00e4umer, F.S., Grote, N., Kersting, J., Geierhos, M.: Privacy matters: detecting nocuous patient data exposure in online physician reviews. In: Dama\u0161evi\u010dius, R., Mika\u0161yt\u0117, V. (eds.) ICIST 2017. CCIS, vol. 756, pp. 77\u201389. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-67642-5_7"},{"key":"10_CR5","unstructured":"B\u00e4umer, F.S., Kersting, J., Orlikowski, M., Geierhos, M.: Towards a multi-stage approach to detect privacy breaches in physician reviews. In: SEMANTICS Posters & Demos (2018)"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1007\/978-3-319-07881-6_29","volume-title":"Advanced Information Systems Engineering","author":"N Bennacer","year":"2014","unstructured":"Bennacer, N., Nana Jipmo, C., Penta, A., Quercini, G.: Matching user profiles across social networks. In: Jarke, M., et al. (eds.) CAiSE 2014. LNCS, vol. 8484, pp. 424\u2013438. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07881-6_29"},{"key":"10_CR7","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-658-31484-2_14","volume-title":"Instagram-Journalismus f\u00fcr die Praxis","author":"S Bettendorf","year":"2020","unstructured":"Bettendorf, S.: Hilfreiche Programme. In: Instagram-Journalismus f\u00fcr die Praxis, pp. 97\u2013101. Springer, Wiesbaden (2020). https:\/\/doi.org\/10.1007\/978-3-658-31484-2_14"},{"key":"10_CR8","unstructured":"B\u00e4umer, F.S., Denisov, S., Su Lee, Y., Geierhos, M.: Towards authority-dependent risk identification and analysis in online networks. In: Halimi, A., Ayday, E. (eds.) Proceedings of the IST-190 Research Symposium (RSY) on AI, ML and BD for Hybrid Military Operations (AI4HMO), October 2021"},{"key":"10_CR9","doi-asserted-by":"publisher","unstructured":"Cai, C., Li, L., Chen, W., Zeng, D.D.: Capturing deep dynamic information for mapping users across social networks. In: 2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019, May 2019. https:\/\/doi.org\/10.1109\/ISI.2019.8823341","DOI":"10.1109\/ISI.2019.8823341"},{"key":"10_CR10","unstructured":"Data Portal, January 2022. https:\/\/datareportal.com\/reports\/digital-2022-global-overview-report"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Goga, O., Lei, H., Parthasarathi, S.H.K., Friedland, G., Sommer, R., Teixeira, R.: Exploiting innocuous activity for correlating users across sites. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 447\u2013458 (2013)","DOI":"10.1145\/2488388.2488428"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-030-58951-6_6","volume-title":"Computer Security \u2013 ESORICS 2020","author":"A Halimi","year":"2020","unstructured":"Halimi, A., Ayday, E.: Efficient quantification of profile matching risk in social networks using belief propagation. In: Chen, L., Li, N., Liang, K., Schneider, S. (eds.) ESORICS 2020. LNCS, vol. 12308, pp. 110\u2013130. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58951-6_6"},{"key":"10_CR13","unstructured":"Kammakomati, M., Battula, S.V.: MergeURL: an effective URL merging and shortening service (2020)"},{"key":"10_CR14","doi-asserted-by":"publisher","unstructured":"Kasbekar, P., Potika, K., Pollett, C.: Find me if you can: aligning users in different social networks. In: Proceedings of the 2020 IEEE 6th International Conference on Big Data Computing Service and Applications, BigDataService 2020, August 2020, pp. 46\u201353. https:\/\/doi.org\/10.1109\/BigDataService49289.2020.00015","DOI":"10.1109\/BigDataService49289.2020.00015"},{"key":"10_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2021.04.030","volume":"570","author":"Y Li","year":"2021","unstructured":"Li, Y., Ji, W., Gao, X., Deng, Y., Dong, W., Li, D.: Matching user accounts with spatio-temporal awareness across social networks. Inf. Sci. 570, 1\u201315 (2021)","journal-title":"Inf. Sci."},{"issue":"3","key":"10_CR16","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1007\/s11280-018-0571-4","volume":"22","author":"Y Li","year":"2018","unstructured":"Li, Y., Peng, Y., Zhang, Z., Yin, H., Xu, Q.: Matching user accounts across social networks based on username and display name. World Wide Web 22(3), 1075\u20131097 (2018). https:\/\/doi.org\/10.1007\/s11280-018-0571-4","journal-title":"World Wide Web"},{"key":"10_CR17","unstructured":"Linktree: Linktr.ee: About (2022). https:\/\/linktr.ee\/s\/about\/"},{"issue":"3","key":"10_CR18","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1177\/0093650206287076","volume":"33","author":"MJ Metzger","year":"2006","unstructured":"Metzger, M.J.: Effects of site, vendor, and consumer characteristics on web site trust and disclosure. Commun. Res. 33(3), 155\u2013179 (2006). https:\/\/doi.org\/10.1177\/0093650206287076","journal-title":"Commun. Res."},{"key":"10_CR19","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s13278-021-00736-0","volume":"11","author":"A M\u00fcngen","year":"2021","unstructured":"M\u00fcngen, A., G\u00fcndo\u011fan, E., Kaya, M.: Identifying multiple social network accounts belonging to the same users. Soc. Netw. Anal. Min. 11, 29 (2021)","journal-title":"Soc. Netw. Anal. Min."},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Sheehan, K.B., Hoy, M.G.: Dimensions of privacy concern among online consumers. J. Public Policy Mark. 19(1), 62\u201373 (2000). http:\/\/www.jstor.org\/stable\/30000488","DOI":"10.1509\/jppm.19.1.62.16949"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Shoeibi, N., Shoeibi, N., Chamoso, P., AlizadehSani, Z., Corchado, J.: Similarity approximation of twitter profiles (2021)","DOI":"10.20944\/preprints202106.0196.v1"},{"key":"10_CR22","doi-asserted-by":"publisher","unstructured":"Sokhin, T., Butakov, N., Nasonov, D.: User profiles matching for different social networks based on faces identification. Hybrid Artif. Intell. Syst. 551\u2013562 (2019). https:\/\/doi.org\/10.1007\/978-3-030-29859-3_47. http:\/\/dx.doi.org\/10.1007\/978-3-030-29859-3_47","DOI":"10.1007\/978-3-030-29859-3_47"},{"key":"10_CR23","unstructured":"Soltani, R., Abhari, A.: Identity matching in social media platforms. In: 2013 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS), pp. 64\u201370 (2013)"},{"key":"10_CR24","doi-asserted-by":"publisher","first-page":"1134","DOI":"10.3390\/sym11091134","volume":"11","author":"L Xing","year":"2019","unstructured":"Xing, L., Deng, K., Wu, H., Xie, P., Gao, J.: Behavioral habits-based user identification across social networks. Symmetry 11, 1134 (2019). https:\/\/doi.org\/10.3390\/sym11091134","journal-title":"Symmetry"},{"key":"10_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/1082391","volume":"2021","author":"L Xing","year":"2021","unstructured":"Xing, L., Deng, K., Wu, H., Xie, P., Zhang, M., Wu, Q.: Exploiting two-level information entropy across social networks for user identification. Wirel. Commun. Mob. Comput. 2021, 1\u201315 (2021). https:\/\/doi.org\/10.1155\/2021\/1082391","journal-title":"Wirel. Commun. Mob. Comput."}],"container-title":["Communications in Computer and Information Science","Information and Software Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-16302-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,5]],"date-time":"2022-10-05T23:24:11Z","timestamp":1665012251000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-16302-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031163012","9783031163029"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-16302-9_10","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"6 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Software Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kaunas","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lithuania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icist2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icist.ktu.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"66","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}