{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:10:38Z","timestamp":1743009038576,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319236322"},{"type":"electronic","value":"9783319236339"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23633-9_23","type":"book-chapter","created":{"date-parts":[[2015,11,26]],"date-time":"2015-11-26T06:47:58Z","timestamp":1448520478000},"page":"613-635","source":"Crossref","is-referenced-by-count":0,"title":["Strengthening Privacy in Healthcare Social Networks"],"prefix":"10.1007","author":[{"given":"Maria","family":"Bertsima","sequence":"first","affiliation":[]},{"given":"Iraklis","family":"Varlamis","sequence":"additional","affiliation":[]},{"given":"Panagiotis","family":"Rizomiliotis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"23_CR1","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1504\/IJEH.2012.049873","volume":"7","author":"I. Apostolakis","year":"2012","unstructured":"Apostolakis, I., Koulierakis, G., Berler, A., Chryssanthou, A., Varlamis, I.: Use of social media by healthcare professionals in greece: an exploratory study. Int. J. Electron. Healthc. 7(2), 105\u2013124 (2012)","journal-title":"Int. J. Electron. Healthc."},{"key":"23_CR2","volume-title":"Class and Committees in a Norwegian Island Parish","author":"J.A. Barnes","year":"1954","unstructured":"Barnes, J.A.: Class and Committees in a Norwegian Island Parish. Plenum, New York (1954)"},{"key":"23_CR3","first-page":"41","volume-title":"Reloading Data Protection","author":"Colin J. Bennett","year":"2013","unstructured":"Bennett, C.J., Parsons, C., Molnar, A.: Forgetting, non-forgetting and quasi-forgetting in social networking: Canadian policy and corporate practice. In: Reloading Data Protection, pp.\u00a041\u201359. Springer, New York (2014)"},{"issue":"2\u20134","key":"23_CR4","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1504\/IJEH.2011.044344","volume":"6","author":"A. Chryssanthou","year":"2011","unstructured":"Chryssanthou, A., Varlamis, I., Latsiou, C.: A risk management model for securing virtual healthcare communities. Int. J. Electron. Healthc. 6(2\u20134), 95\u2013116 (2011)","journal-title":"Int. J. Electron. Healthc."},{"key":"23_CR5","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1007\/978-1-4419-7142-5_23","volume-title":"Handbook of Social Network Technologies and Applications","author":"Leucio Antonio Cutillo","year":"2010","unstructured":"Cutillo, L.A., Manulis, M., Strufe, T.: Security and privacy in online social networks. In: Handbook of Social Network Technologies and Applications, pp.\u00a0497\u2013522. Springer, New York (2010)"},{"issue":"1","key":"23_CR6","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.socscimed.2006.08.045","volume":"64","author":"L.J. Damschroder","year":"2007","unstructured":"Damschroder, L.J., Pritts, J.L., Neblo, M.A., Kalarickal, R.J., Creswell, J.W., Hayward, R.A.: Patients, privacy and trust: patients\u2019 willingness to allow researchers to access their medical records. Soc. Sci. Med. 64(1), 223\u2013235 (2007)","journal-title":"Soc. Sci. Med."},{"key":"23_CR7","first-page":"1","volume-title":"Privacy Enhancing Technologies","author":"Peter Eckersley","year":"2010","unstructured":"Eckersley, P.: How unique is your web browser? In: Privacy Enhancing Technologies, pp.\u00a01\u201318. Springer, New York (2010)"},{"issue":"1","key":"23_CR8","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","volume":"13","author":"N.B. Ellison","year":"2007","unstructured":"Ellison, N.B., et al.: Social network sites: Definition, history, and scholarship. J. Comput.-Mediat. Commun. 13(1), 210\u2013230 (2007)","journal-title":"J. Comput.-Mediat. Commun."},{"issue":"5","key":"23_CR9","doi-asserted-by":"publisher","first-page":"S154","DOI":"10.1016\/j.amepre.2011.02.006","volume":"40","author":"G. Eysenbach","year":"2011","unstructured":"Eysenbach, G.: Infodemiology and infoveillance: tracking online health information and cyberbehavior for public health. Am. J. Prev. Med. 40(5), S154\u2013S158 (2011)","journal-title":"Am. J. Prev. Med."},{"key":"23_CR10","first-page":"3","volume-title":"European Data Protection: Coming of Age","author":"Rachel L. Finn","year":"2012","unstructured":"Finn, R.L., Wright, D., Friedewald, M.: Seven types of privacy. In: European Data Protection: Coming of Age, pp.\u00a03\u201332. Springer, New York (2013)"},{"key":"23_CR11","first-page":"1","volume":"D2","author":"L. Fritsch","year":"2007","unstructured":"Fritsch, L.: State of the art of privacy-enhancing technology (pet). Deliverable D2 1 (2007)","journal-title":"Deliverable"},{"issue":"4","key":"23_CR12","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/1749603.1749605","volume":"42","author":"B. Fung","year":"2010","unstructured":"Fung, B., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42(4), 14 (2010)","journal-title":"ACM Comput. Surv."},{"key":"23_CR13","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.jbi.2014.06.002","volume":"50","author":"A. Gkoulalas-Divanis","year":"2014","unstructured":"Gkoulalas-Divanis, A., Loukides, G., Sun, J.: Publishing data from electronic health records while preserving privacy: a survey of algorithms. J. Biomed. Inform. 50, 4\u201319 (2014)","journal-title":"J. Biomed. Inform."},{"issue":"3","key":"23_CR14","doi-asserted-by":"crossref","first-page":"e59139","DOI":"10.1371\/journal.pone.0059139","volume":"8","author":"Nicholas Glozier","year":"2013","unstructured":"Glozier, N., Christensen, H., Naismith, S., Cockayne, N., Donkin, L., Neal, B., Mackinnon, A., Hickie, I.: Internet-delivered cognitive behavioural therapy for adults with mild to moderate depression and high cardiovascular disease risks: a randomised attention-controlled trial. PLoS ONE 8(3) (2013)","journal-title":"PLoS ONE"},{"issue":"2","key":"23_CR15","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.2912","volume":"16","author":"F.J. Grajales III","year":"2014","unstructured":"Grajales III, F.J., Sheps, S., Ho, K., Novak-Lauscher, H., Eysenbach, G.: Social media: a review and tutorial of applications in medicine and health care. J. Med. Internet Res. 16(2), e13 (2014)","journal-title":"J. Med. Internet Res."},{"key":"23_CR16","first-page":"1","volume":"1","author":"G. Hogben","year":"2007","unstructured":"Hogben, G.: Security issues and recommendations for online social networks. ENISA Position Paper 1, 1\u201336 (2007)","journal-title":"ENISA Position Paper"},{"key":"23_CR17","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/978-3-642-03315-5_2","volume-title":"The Future of Identity in the Information Society","author":"Jan Holvast","year":"2009","unstructured":"Holvast, J.: History of privacy. In: Matyas, V., Fischer-Hubner, S., Cvrcek, D., Svenda, P. (eds.) The Future of Identity in the Information Society. IFIP Advances in Information and Communication Technology, vol.\u00a0298, pp.\u00a013\u201342. Springer, Heidelberg (2009). doi:10.1007\/978-3-642-03315-5_2. http:\/\/dx.doi.org\/10.1007\/978-3-642-03315-5_2"},{"issue":"4","key":"23_CR18","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1016\/j.csi.2013.12.010","volume":"36","author":"C. Kalloniatis","year":"2014","unstructured":"Kalloniatis, C., Mouratidis, H., Vassilis, M., Islam, S., Gritzalis, S., Kavakli, E.: Towards the design of secure and privacy-oriented information systems in the cloud: identifying the major concepts. Comput. Stand. Interfaces 36(4), 759\u2013775 (2014)","journal-title":"Comput. Stand. Interfaces"},{"key":"23_CR19","unstructured":"Koorn, R., van Gils, H., ter Hart, J., Overbeek, P., Tellegen, R., Borking, J.: Privacy enhancing technologies, white paper for decision makers. Ministry of the Interior and Kingdom Relations, the Netherlands (2004)"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Krishnamurthy, B., Wills, C.E.: On the leakage of personally identifiable information via online social networks. In: Proceedings of the 2nd ACM Workshop on Online Social Networks, pp.\u00a07\u201312. ACM, New York (2009)","DOI":"10.1145\/1592665.1592668"},{"key":"23_CR21","unstructured":"Mitrou, L.: Privacy challenges and perspectives in europe. In: An Information Law for the 21st Century, pp.\u00a0704\u2013718. Nomiki Vivliothiki, Athens (2011)"},{"key":"23_CR22","unstructured":"Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, unlinkability, unobservability, pseudonymity, and identity management-version v0. 34. TU Dresden and ULD Kiel, Tech. Rep (2011)"},{"key":"23_CR23","unstructured":"Robinson, N., Graux, H., Botterman, M., Valeri, L.: Review of eu data protection directive: summary. Information Commissioner\u2019s Office (2009)"},{"key":"23_CR24","volume-title":"The Social Impact of Computers","author":"R.S. Rosenberg","year":"2013","unstructured":"Rosenberg, R.S.: The Social Impact of Computers. Elsevier, Amsterdam (2013)"},{"key":"23_CR25","unstructured":"Rowe, M., Ciravegna, F.: Disambiguating identity through social circles and social data. In: 1st International Workshop on Collective Semantics: Collective Intelligence & the Semantic Web (CISWeb 2008) (2008). Proceedings of the CISWeb Workshop, located at the 5th European Semantic Web Conference ESWC 2008 Tenerife, Spain, 2 June 2008"},{"issue":"2","key":"23_CR26","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1504\/IJBHR.2013.057359","volume":"4","author":"N. Serenko","year":"2013","unstructured":"Serenko, N., Fan, L.: Patients\u2019 perceptions of privacy and their outcomes in healthcare. Int. J. Behav. Healthc. Res. 4(2), 101\u2013122 (2013)","journal-title":"Int. J. Behav. Healthc. Res."},{"issue":"3","key":"23_CR27","first-page":"587","volume":"111","author":"A.H. Stuart","year":"2007","unstructured":"Stuart, A.H.: Online privacy policies: contracting away control over personal information? Penn State Law Rev. 111(3), 587\u2013624 (2007)","journal-title":"Penn State Law Rev."},{"issue":"2","key":"23_CR28","doi-asserted-by":"publisher","first-page":"492","DOI":"10.3390\/ijerph6020492","volume":"6","author":"M. Swan","year":"2009","unstructured":"Swan, M.: Emerging patient-driven health care models: an examination of health social networks, consumer personalized medicine and quantified self-tracking. Int. J. Environ. Res. Public Health 6(2), 492\u2013525 (2009)","journal-title":"Int. J. Environ. Res. Public Health"},{"key":"23_CR29","unstructured":"Torabi, S., Beznosov, K.: Privacy aspects of health related information sharing in online social networks. In: Proceedings of the 2013 USENIX Conference on Safety, Security, Privacy and Interoperability of Health Information Technologies, pp.\u00a03\u20133. USENIX Association, Berkeley (2013)"},{"key":"23_CR30","volume-title":"Handbook of privacy and privacy-enhancing technologies","author":"G. Van Blarkom","year":"2003","unstructured":"Van Blarkom, G., Borking, J., Olk, J.: Handbook of privacy and privacy-enhancing technologies. Privacy Incorporated Software Agent (PISA) Consortium, The Hague (2003)"},{"key":"23_CR31","doi-asserted-by":"publisher","first-page":"193","DOI":"10.2307\/1321160","volume":"4","author":"S.D. Warren","year":"1890","unstructured":"Warren, S.D., Brandeis, L.D.: The right to privacy. Harv. Law Rev. 4, 193\u2013220 (1890)","journal-title":"Harv. Law Rev."},{"issue":"1","key":"23_CR32","first-page":"166","volume":"25","author":"A.F. Westin","year":"1968","unstructured":"Westin, A.F.: Privacy and freedom. Wash. Lee Law Rev. 25(1), 166 (1968)","journal-title":"Wash. Lee Law Rev."},{"issue":"2","key":"23_CR33","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.1549","volume":"12","author":"P. Wicks","year":"2010","unstructured":"Wicks, P., Massagli, M., Frost, J., Brownstein, C., Okun, S., Vaughan, T., Bradley, R., Heywood, J.: Sharing health data for better outcomes on patientslikeme. J. Med. Internet Res. 12(2), e19 (2010)","journal-title":"J. Med. Internet Res."},{"key":"23_CR34","doi-asserted-by":"crossref","unstructured":"Wondracek, G., Holz, T., Kirda, E., Kruegel, C.: A practical attack to de-anonymize social network users. In: 2010 IEEE Symposium on Security and Privacy (SP), pp.\u00a0223\u2013238. IEEE (2010)","DOI":"10.1109\/SP.2010.21"},{"key":"23_CR35","unstructured":"Yanes, A.: Privacy and anonymity. arXiv preprint (2014) [arXiv:1407.0423]"},{"key":"23_CR36","doi-asserted-by":"crossref","unstructured":"Yeratziotis, A., Van\u00a0Greunen, D., Pottas, D.: A framework for evaluating usable security: the case of online health social networks. In: HAISA, pp.\u00a097\u2013107 (2012)","DOI":"10.1109\/ICPCA.2011.6106508"},{"key":"23_CR37","unstructured":"Zilpelwar, R.A., Bedi, R.K., Wadhai, V.: An overview of privacy and security in SNS. International Journal of P2P Network Trends and Technology, 2(1), 23\u201326 (2012)"}],"container-title":["Medical Data Privacy Handbook"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23633-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T18:19:27Z","timestamp":1676485167000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-23633-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319236322","9783319236339"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23633-9_23","relation":{},"subject":[],"published":{"date-parts":[[2015]]}}}