{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:42:20Z","timestamp":1743140540978,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031547119"},{"type":"electronic","value":"9783031547126"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-54712-6_10","type":"book-chapter","created":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T06:03:10Z","timestamp":1709272990000},"page":"158-171","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["From Digital Tracks to\u00a0Digital Twins: On the\u00a0Path to\u00a0Cross-Platform Profile Linking"],"prefix":"10.1007","author":[{"given":"Sergej","family":"Schultenk\u00e4mper","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Frederik S.","family":"B\u00e4umer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Benjamin","family":"Bellgrau","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yeong Su","family":"Lee","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michaela","family":"Geierhos","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,3,2]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.comnet.2019.04.015","volume":"158","author":"A Agarwal","year":"2019","unstructured":"Agarwal, A., Toshniwal, D.: SmPFT: social media based profile fusion technique for data enrichment. Comput. Netw. 158, 123\u2013131 (2019). https:\/\/doi.org\/10.1016\/j.comnet.2019.04.015","journal-title":"Comput. Netw."},{"key":"10_CR2","doi-asserted-by":"publisher","unstructured":"Ahmad, W., Ali, R.: User identification across multiple online social networks using cross link attribute and network relationship. J. Interdiscip. Math. 23 (2020). https:\/\/doi.org\/10.1080\/09720502.2020.1721713","DOI":"10.1080\/09720502.2020.1721713"},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"167653","DOI":"10.1109\/ACCESS.2019.2953499","volume":"7","author":"BR Barricelli","year":"2019","unstructured":"Barricelli, B.R., Casiraghi, E., Fogli, D.: A survey on digital twin: definitions, characteristics, applications, and design implications. IEEE Access 7, 167653\u2013167671 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2953499","journal-title":"IEEE Access"},{"key":"10_CR4","doi-asserted-by":"publisher","unstructured":"B\u00e4umer, F.S., Grote, N., Kersting, J., Geierhos, M.: Privacy matters: detecting nocuous patient data exposure in online physician reviews. In: Damasevicius, R., Mikasyte, V. (eds.) Information and Software Technologies. ICIST 2017. CCIS, vol. 756, pp. 77\u201389. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-67642-5_7","DOI":"10.1007\/978-3-319-67642-5_7"},{"key":"10_CR5","unstructured":"B\u00e4umer, F.S., Kersting, J., Orlikowski, M., Geierhos, M.: Towards a multi-stage approach to detect privacy breaches in physician reviews. In: SEMANTICS Posters & Demos (2018)"},{"key":"10_CR6","doi-asserted-by":"publisher","unstructured":"Bennacer, N., Nana Jipmo, C., Penta, A., Quercini, G.: Matching user profiles across social networks. In: Jarke, M., et al. (eds.) Advanced Information Systems Engineering. CAiSE 2014. LNCS, vol. 8484, pp. 424\u2013438. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07881-6_29","DOI":"10.1007\/978-3-319-07881-6_29"},{"key":"10_CR7","unstructured":"B\u00e4umer, F.S., Denisov, S., Su Lee, Y., Geierhos, M.: Towards authority-dependent risk identification and analysis in online networks. In: Halimi, A., Ayday, E. (eds.) Proceedings of the IST-190 Research Symposium (RSY) on AI, ML and BD for Hybrid Military Operations (AI4HMO) (2021)"},{"key":"10_CR8","doi-asserted-by":"publisher","unstructured":"Cai, C., Li, L., Chen, W., Zeng, D.D.: Capturing deep dynamic information for mapping users across social networks. In: 2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019 (2019). https:\/\/doi.org\/10.1109\/ISI.2019.8823341","DOI":"10.1109\/ISI.2019.8823341"},{"key":"10_CR9","unstructured":"Data Portal: (October 2023). https:\/\/datareportal.com\/reports\/digital-2023-october-global-statshot. Accessed 18 Nov 2023"},{"key":"10_CR10","doi-asserted-by":"publisher","unstructured":"Denisov, S., B\u00e4umer, F.S.: The only link you will ever need: how social media reference landing pages speed up profile matching. In: Lopata, A., Gudoniene, D., Butkiene, R. (eds.) Information and Software Technologies. ICIST 2022. CCIS, vol. 1665, pp. 136\u2013147. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-16302-9-10","DOI":"10.1007\/978-3-031-16302-9-10"},{"key":"10_CR11","doi-asserted-by":"publisher","unstructured":"Engels, G.: Der digitale Fu\u00dfabdruck, Schatten oder Zwilling von Maschinen und Menschen. Gruppe. Interaktion. Organisation. Zeitschrift f\u00fcr Angewandte Organisationspsychologie (GIO) 51(3), 363\u2013370 (2020). https:\/\/doi.org\/10.1007\/s11612-020-00527-9","DOI":"10.1007\/s11612-020-00527-9"},{"issue":"2","key":"10_CR12","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1177\/0165551519879702","volume":"47","author":"K Feher","year":"2019","unstructured":"Feher, K.: Digital identity and the online self: footprint strategies \u2013 an exploratory and comparative research study. J. Inf. Sci. 47(2), 192\u2013205 (2019). https:\/\/doi.org\/10.1177\/0165551519879702","journal-title":"J. Inf. Sci."},{"issue":"1","key":"10_CR13","doi-asserted-by":"publisher","first-page":"67","DOI":"10.3390\/fi7010067","volume":"7","author":"D Gan","year":"2015","unstructured":"Gan, D., Jenkins, L.R.: Social networking privacy-Who\u2019s stalking you? Future Internet 7(1), 67\u201393 (2015)","journal-title":"Future Internet"},{"key":"10_CR14","doi-asserted-by":"publisher","unstructured":"Goga, O., Lei, H., Parthasarathi, S.H.K., Friedland, G., Sommer, R., Teixeira, R.: Exploiting innocuous activity for correlating users across sites. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 447\u2013458. WWW \u201913, Association for Computing Machinery, New York, NY, USA (2013). https:\/\/doi.org\/10.1145\/2488388.2488428","DOI":"10.1145\/2488388.2488428"},{"key":"10_CR15","doi-asserted-by":"publisher","unstructured":"Halimi, A., Ayday, E.: Efficient quantification of profile matching risk in social networks using belief propagation. In: Chen, L., Li, N., Liang, K., Schneider, S. (eds.) Computer Security \u2013 ESORICS 2020. ESORICS 2020. LNCS, vol. 12308, pp. 110\u2013130. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58951-6_6","DOI":"10.1007\/978-3-030-58951-6_6"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Huber, M., Kowalski, S., Nohlberg, M., Tjoa, S.: Towards automating social engineering using social networking sites. In: 2009 International Conference on Computational Science and Engineering, vol. 3, pp. 117\u2013124. IEEE (2009)","DOI":"10.1109\/CSE.2009.205"},{"key":"10_CR17","doi-asserted-by":"publisher","unstructured":"Kasbekar, P., Potika, K., Pollett, C.: Find me if you can: aligning users in different social networks. In: Proceedings - 2020 IEEE 6th International Conference on Big Data Computing Service and Applications, BigDataService 2020, pp. 46\u201353 (2020). https:\/\/doi.org\/10.1109\/BigDataService49289.2020.00015","DOI":"10.1109\/BigDataService49289.2020.00015"},{"key":"10_CR18","doi-asserted-by":"publisher","unstructured":"Labuschagne, A., Eloff, M., Veerasamy, N.: The dark side of web 2.0. In: Hercheui, M.D., Whitehouse, D., McIver, W., Phahlamohlaka, J. (eds.) ICT Critical Infrastructures and Society. HCC 2012. IFIPAICT, LNCS, vol. 386, pp. 237\u2013249. Springer, Berlin, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33332-3_22","DOI":"10.1007\/978-3-642-33332-3_22"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Li, Y., Ji, W., Gao, X., Deng, Y., Dong, W., Li, D.: Matching user accounts with spatio-temporal awareness across social networks. Inf. Sci. 570 (2021)","DOI":"10.1016\/j.ins.2021.04.030"},{"issue":"3","key":"10_CR20","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1007\/s11280-018-0571-4","volume":"22","author":"Y Li","year":"2019","unstructured":"Li, Y., Peng, Y., Zhang, Z., Yin, H., Xu, Q.: Matching user accounts across social networks based on username and display name. World Wide Web 22(3), 1075\u20131097 (2019). https:\/\/doi.org\/10.1007\/s11280-018-0571-4","journal-title":"World Wide Web"},{"key":"10_CR21","doi-asserted-by":"publisher","unstructured":"Mbarek, A., Jamoussi, S., BenHamadou, A.: Tuser3: a profile matching based algorithm across three heterogeneous social networks. In: Yang, X., Wang, C.D., Islam, M.S., Zhang, Z. (eds.) Advanced Data Mining and Applications. ADMA 2020. LNCS, vol.12447, pp. 191\u2013206. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-65390-3_16","DOI":"10.1007\/978-3-030-65390-3_16"},{"issue":"1","key":"10_CR22","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s13278-021-00736-0","volume":"11","author":"AA M\u00fcngen","year":"2021","unstructured":"M\u00fcngen, A.A., G\u00fcndo\u011fan, E., Kaya, M.: Identifying multiple social network accounts belonging to the same users. Soc. Netw. Anal. Min. 11(1), 29 (2021)","journal-title":"Soc. Netw. Anal. Min."},{"key":"10_CR23","unstructured":"Ryan, T., Mauch, G.: Getting in bed with Robin Sage. In: Black Hat Conference, pp. 1\u20138 (2010)"},{"key":"10_CR24","first-page":"1","volume":"37","author":"J Seymour","year":"2016","unstructured":"Seymour, J., Tully, P.: Weaponizing data science for social engineering: automated E2E spear phishing on Twitter. Black Hat USA 37, 1\u201339 (2016)","journal-title":"Black Hat USA"},{"key":"10_CR25","doi-asserted-by":"publisher","unstructured":"Sokhin, T., Butakov, N., Nasonov, D.: User profiles matching for different social networks based on faces identification. Hybrid Artif. Intell. Syst. 551\u2013562 (2019). https:\/\/doi.org\/10.1007\/978-3-030-29859-3_47","DOI":"10.1007\/978-3-030-29859-3_47"},{"key":"10_CR26","unstructured":"Soltani, R., Abhari, A.: Identity matching in social media platforms. In: SPECTS, pp. 64\u201370. IEEE (2013)"},{"key":"10_CR27","doi-asserted-by":"publisher","first-page":"152429","DOI":"10.1109\/ACCESS.2019.2948073","volume":"7","author":"L Wang","year":"2019","unstructured":"Wang, L., Hu, K., Zhang, Y., Cao, S.: Factor graph model based user profile matching across social networks. IEEE Access 7, 152429\u2013152442 (2019)","journal-title":"IEEE Access"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Xing, L., Deng, K., Wu, H., Xie, P., Gao, J.: Behavioral habits-based user identification across social networks. Symmetry 11, 1134 (2019)","DOI":"10.3390\/sym11091134"},{"key":"10_CR29","first-page":"1","volume":"2021","author":"L Xing","year":"2021","unstructured":"Xing, L., Deng, K., Wu, H., Xie, P., Zhang, M., Wu, Q.: Exploiting two-level information entropy across social networks for user identification. Wirel. Commun. Mob. Comput. 2021, 1\u201315 (2021)","journal-title":"Wirel. Commun. Mob. Comput."}],"container-title":["Lecture Notes in Business Information Processing","Enterprise Design, Operations, and Computing. EDOC 2023 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-54712-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T06:26:40Z","timestamp":1709274400000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-54712-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031547119","9783031547126"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-54712-6_10","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EDOC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Enterprise Design, Operations, and Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Groningen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"edoc2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.rug.nl\/research\/bernoulli\/conf\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"49% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"For the Workshops 18 full and 7 short papers have been accepted from 37 submissions.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}