{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:51:02Z","timestamp":1743101462818,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319208091"},{"type":"electronic","value":"9783319208107"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20810-7_14","type":"book-chapter","created":{"date-parts":[[2015,6,21]],"date-time":"2015-06-21T23:47:00Z","timestamp":1434930420000},"page":"215-222","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["FamilyID: A Hybrid Approach to Identify Family Information from Microblogs"],"prefix":"10.1007","author":[{"given":"Jamuna","family":"Gopal","sequence":"first","affiliation":[]},{"given":"Shu","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,23]]},"reference":[{"key":"14_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1007\/978-3-642-15512-3_22","volume-title":"Recent Advances in Intrusion Detection","author":"M Balduzzi","year":"2010","unstructured":"Balduzzi, M., Platzer, C., Holz, T., Kirda, E., Balzarotti, D., Kruegel, C.: Abusing social networks for automated user profiling. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 422\u2013441. Springer, Heidelberg (2010)"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All your contacts are belong to us: automated identity theft attacks on social networks. In: WWW (2009)","DOI":"10.1145\/1526709.1526784"},{"key":"14_CR3","unstructured":"Bollen, J., Mao, H., Zeng, X.-J.: Twitter mood predicts the stock market. In: CoRR, abs\/1010.3003 (2010)"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Dey, R., Tang, C., Ross, K., Saxena, N.: Estimating age privacy leakage in online social networks (2012)","DOI":"10.1109\/INFCOM.2012.6195711"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/11760146_14","volume-title":"Intelligence and Security Informatics","author":"J He","year":"2006","unstructured":"He, J., Chu, W.W., Liu, Z.V.: Inferring privacy information from social networks. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol. 3975, pp. 154\u2013165. Springer, Heidelberg (2006)"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Huang, S., Chen, M., Luo, B., Lee, D.: Predicting aggregate social activities using continuous-time stochastic process. In: Proceedings ACM International Conference on Information and knowledge management (2012)","DOI":"10.1145\/2396761.2396885"},{"issue":"5","key":"14_CR7","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MSP.2005.137","volume":"3","author":"BA Huberman","year":"2005","unstructured":"Huberman, B.A., Adar, E., Fine, L.R.: Valuating privacy. IEEE Secur. Priv. 3(5), 22\u201325 (2005)","journal-title":"IEEE Secur. Priv."},{"key":"14_CR8","unstructured":"Li, F., Chen, J.Y., Zou, X., Liu, P.: New privacy threats in healthcare informatics: when medical records join the web. In: BIOKDD (2010)"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Liu, H., Luo, B., Lee, D.: Location type classification using tweet content. In: ICMLA, vol. 1, pp. 232\u2013237. IEEE (2012)","DOI":"10.1109\/ICMLA.2012.47"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Luo, B., Lee, D.: On protecting private information in social networks: a proposal. In: M3SN Workshop (2009)","DOI":"10.1109\/ICDE.2009.158"},{"key":"14_CR11","unstructured":"Madejski, M., Johnson, M., Bellovin, S.M.: The failure of online social network privacy settings. Technical report CUCS-010-11, Columbia University (2011)"},{"issue":"3","key":"14_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2528548","volume":"5","author":"J Mahmud","year":"2014","unstructured":"Mahmud, J., Nichols, J., Drews, C.: Home location identification of twitter users. ACM Trans. Intell. Syst. Technol. 5(3), 1\u201347 (2014)","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Mao, H., Shuai, X., Kapadia, A.: Loose tweets: an analysis of privacy leaks on twitter. In: WPES (2011)","DOI":"10.1145\/2046556.2046558"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Mislove, A., Viswanath, B., Gummadi, K.P., Druschel, P.: You are who you know: inferring user profiles in online social networks. In: WSDM (2010)","DOI":"10.1145\/1718487.1718519"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Quercia, D., Kosinski, M., Stillwell, D., Crowcroft, J.: Our twitter profiles, our selves: predicting personality with twitter. In: IEEE PASSAT (2011)","DOI":"10.1109\/PASSAT\/SocialCom.2011.26"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Wondracek, G., Holz, T., Kirda, E., Kruegel, C.: A practical attack to de-anonymize social network users. In: IEEE Security and Privacy (2010)","DOI":"10.1109\/SP.2010.21"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Yang, Y., Lutes, J., Li, F., Luo, B., Liu, P.: Stalking online: on user privacy in social networks. In: ACM CODASPY (2012)","DOI":"10.1145\/2133601.2133607"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Zheleva, E., Getoor, L.: To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In: WWW (2009)","DOI":"10.1145\/1526709.1526781"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIX"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20810-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T20:15:10Z","timestamp":1561148110000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20810-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319208091","9783319208107"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20810-7_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"23 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}