{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T19:57:21Z","timestamp":1725825441060},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203669"},{"type":"electronic","value":"9783319203676"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20367-6_24","type":"book-chapter","created":{"date-parts":[[2015,7,18]],"date-time":"2015-07-18T15:40:20Z","timestamp":1437234020000},"page":"242-252","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Inter-Social-Networking: Accounting for Multiple Identities"],"prefix":"10.1007","author":[{"given":"Dominic","family":"Price","sequence":"first","affiliation":[]},{"given":"Derek","family":"McAuley","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Mortier","sequence":"additional","affiliation":[]},{"given":"Chris","family":"Greenhalgh","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Brown","sequence":"additional","affiliation":[]},{"given":"Spyros","family":"Angelopoulos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","unstructured":"H\u00fcrsch, W.L., Lopes, C.V.: Separation of concerns. Technical report. North Eastern University (1995)"},{"issue":"1","key":"24_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1146\/annurev.soc.24.1.1","volume":"24","author":"A Portes","year":"1998","unstructured":"Portes, A.: Social capital: its origins and applications in modern sociology. Ann. Rev. Sociol. 24(1), 1\u201324 (1998)","journal-title":"Ann. Rev. Sociol."},{"key":"24_CR3","unstructured":"Edwards, L., McAuley, D.: What\u2019s in a name? Real name policies and social networks. In: Proceedings of 1st International Workshop on Internet Science and Web Science Synergies (INETWEBSCI), Paris, France, 1 May 2013"},{"key":"24_CR4","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1136\/amiajnl-2012-000949","volume":"20","author":"M van der Velden","year":"2012","unstructured":"van der Velden, M., El Emam, K.: \u201cNot all my friends need to know\u201d: a qualitative study of teenage patients, privacy, and social media. J. Am. Med. Inform. Assoc. 20, 16\u201324 (2012)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"24_CR5","unstructured":"O\u2019Brien, C.N.: The top ten NLRB cases on Facebook firings and employer social media policies. Oregon Law Rev. 92(2) (2014). \nhttp:\/\/ssrn.com\/abstract=2277900"},{"issue":"4","key":"24_CR6","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1016\/j.elerap.2011.05.003","volume":"10","author":"AM Attia","year":"2011","unstructured":"Attia, A.M., Aziz, N., Friedman, B., Elhusseiny, M.F.: Commentary: the impact of social networking tools on political change in Egypt\u2019s \u201crevolution 2.0\u201d. Electron. Commer. Res. Appl. 10(4), 369\u2013374 (2011)","journal-title":"Electron. Commer. Res. Appl."},{"key":"24_CR7","unstructured":"Madejski, M., Johnson, M.L., Bellovin, S.M.: The failure of online social network privacy settings. Technical Report CUCS-010-11, Columbia University Computer Science, Columbia University, New York, USA (2011)"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Ozenc, F.K., Farnham, S.D.: Life \u201cmodes\u201d in social media. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2011, Vancouver, BC, Canada, pp. 561\u2013570 (2011)","DOI":"10.1145\/1978942.1979022"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Zheleva, E., Getoor, L.: To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In: Proceedings of the 18th International Conference on World Wide Web, WWW 2009, Madrid, Spain, pp. 531\u2013540 (2009)","DOI":"10.1145\/1526709.1526781"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Le Blond, S., Zhang, C., Legout, A., Ross, K., Dabbous, W.: I know where you are and what you are sharing: exploiting p2p communications to invade users\u2019 privacy. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC 2011, Berlin, Germany, pp. 45\u201360 (2011)","DOI":"10.1145\/2068816.2068822"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Pesce, J.P., Casas, D.L., Rauber, G., Almeida, V.: Privacy attacks in social media using photo tagging networks: a case study with Facebook. In: Proceedings of the 1st Workshop on Privacy and Security in Online Social Media, PSOSM 2012, Lyon, France, pp. 4:1\u20134:8 (2012)","DOI":"10.1145\/2185354.2185358"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Hu, H., Ahn, G.-J., Jorgensen, J.: Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. In: Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011, Orlando, Florida, pp. 103\u2013112. ACM (2011)","DOI":"10.1145\/2076732.2076747"},{"key":"24_CR13","unstructured":"Gates, C.E.: Access control requirements for web 2.0 security and privacy. In: Proceedings of Workshop on Web 2.0 Security & Privacy (W2SP 2007) (2007). [15] Halasz, F., Moran, T.P.: Analogy considered"},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"Halasz, F., Moran, T.P.: Analogy considered harmful. In: Proceedings of the 1982 Conference on Human Factors in Computing Systems, CHI 1982, Gaithersburg, Maryland, USA, pp. 383\u2013386 (1982)","DOI":"10.1145\/800049.801816"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Crocker, S.: Protocol Notes. RFC 36, IETF, March 1970","DOI":"10.17487\/rfc0036"},{"issue":"5","key":"24_CR16","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/TCOM.1974.1092259","volume":"22","author":"VG Cerf","year":"1974","unstructured":"Cerf, V.G., Kahn, R.E.: A protocol for packet network interconnection. IEEE Trans. Commun. 22(5), 637\u2013648 (1974)","journal-title":"IEEE Trans. Commun."},{"key":"24_CR17","unstructured":"Postel, J.: 2.3.3.2 Comments on Internet Protocol and TCP. IEN 2, ISI, 15 August 1977"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Postel, J.: NCP\/TCP transition plan. RFC 801, IETF, November 1981","DOI":"10.17487\/rfc0801"},{"key":"24_CR19","unstructured":"Pouzin, L.: A proposal for interconnecting packet switching networks. In: Proceedings of EUROCOMP, Bronel University, pp. 1023\u20131036, May 1974"},{"key":"24_CR20","unstructured":"Cerf, V.: The catenet model for internetworking. IEN 48, DARPA\/IPTO, July 1978"},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"Clark, D.: The design philosophy of the DARPA Internet protocols. In: Proceedings of ACM SIGCOMM 1988, Stanford, California, USA, pp. 106\u2013114 (1988)","DOI":"10.1145\/52325.52336"},{"key":"24_CR22","doi-asserted-by":"crossref","unstructured":"Waitzman, D.: Standard for the transmission of IP datagrams on avian carriers. RFC 1149, IETF, April 1990","DOI":"10.17487\/rfc1149"},{"key":"24_CR23","doi-asserted-by":"crossref","unstructured":"Resnick, P. (ed.): Internet Message Format. RFC 2822, IETF, April 2001","DOI":"10.17487\/rfc2822"},{"key":"24_CR24","doi-asserted-by":"crossref","unstructured":"Freed, N., Borenstein, N.: Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies. RFC 2045, IETF, November 1996","DOI":"10.17487\/rfc2045"}],"container-title":["Lecture Notes in Computer Science","Social Computing and Social Media"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20367-6_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,2]],"date-time":"2020-05-02T19:06:00Z","timestamp":1588446360000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20367-6_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203669","9783319203676"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20367-6_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}