{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:32:29Z","timestamp":1761676349734},"publisher-location":"Cham","reference-count":48,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319261867"},{"type":"electronic","value":"9783319261874"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26187-4_44","type":"book-chapter","created":{"date-parts":[[2015,10,26]],"date-time":"2015-10-26T09:05:24Z","timestamp":1445850324000},"page":"488-502","source":"Crossref","is-referenced-by-count":5,"title":["Social Network Privacy: Issues and Measurement"],"prefix":"10.1007","author":[{"given":"Isabel","family":"Casas","sequence":"first","affiliation":[]},{"given":"Jose","family":"Hurtado","sequence":"additional","affiliation":[]},{"given":"Xingquan","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,18]]},"reference":[{"key":"44_CR1","doi-asserted-by":"crossref","unstructured":"Bilge, M., Strufe, T., Balzarotti, D., Kirda, E.: All your contacts are belong to us: automated identity theft attacks on social netorking. In: Proceedings of the 18th International World Wide Web Conference, Madrid, Spain. ACM (2009)","DOI":"10.1145\/1526709.1526784"},{"key":"44_CR2","doi-asserted-by":"crossref","unstructured":"Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of ACM Workshop on Privacy in the Electronic Society, pp. 71\u201380, November 2005","DOI":"10.1145\/1102199.1102214"},{"key":"44_CR3","unstructured":"Kumar, R.N., Wang, Y.: SONET: a SOcial NETwork model for privacy monitoring and ranking. In: Proceedings of the 2nd International Workshop on Network Forensics, Security and Privacy (2013)"},{"key":"44_CR4","doi-asserted-by":"crossref","unstructured":"Wang, Y., Nepali, R.K.: Privacy measurement for social network actor model. In: Proceedings of the International Conference on Social Computing, pp. 659\u2013664 (2013)","DOI":"10.1109\/SocialCom.2013.99"},{"key":"44_CR5","doi-asserted-by":"publisher","unstructured":"Wang, Y., Nepali, R.K., Nikolai, J.: Social network privacy measurement and simulation. In: Proceedings of the International Conference on Computing, Networking and Communications (ICNC) pp. 802\u2013806 (2014). doi:\n                    10.1109\/ICCNC.2014.6785440","DOI":"10.1109\/ICCNC.2014.6785440"},{"key":"44_CR6","doi-asserted-by":"crossref","unstructured":"Ghazinour, K., Matwin, S., Sokolova, M.: Monitoring and recommending privacy settings in social networks. In: Proceedings of the Joint EDBT\/ICDT 2013 Workshops, pp. 164\u2013168. ACM (2013)","DOI":"10.1145\/2457317.2457344"},{"key":"44_CR7","doi-asserted-by":"crossref","unstructured":"Mackay, W.: Triggers and barriers to customizing software. In: Proceedings of CHI 1991, pp. 153\u2013160. ACM Press (1991)","DOI":"10.1145\/108844.108867"},{"key":"44_CR8","unstructured":"Duffany, J., Galban, O.: Hacking Facebook Privacy and Security. Polytechnic Univ. of Puerto Rico San Juan (2012)"},{"key":"44_CR9","unstructured":"Shimel, A.: Reclaim your privacy from facebook. PCWorld. Network World, 19 May 2010"},{"key":"44_CR10","unstructured":"Perez, S.: New App Helps Keep Facebook\u2019s Hands Off Your Data. Readwrite. N.p., 10 May 2010"},{"key":"44_CR11","unstructured":"Becker, J.L.: Measuring privacy risk in online social networks. ProQuest, UMI Dissertations Publishing (2009)"},{"key":"44_CR12","doi-asserted-by":"crossref","unstructured":"Talukder, N., Ouzzani, M., Elmagarmid, A., Elmeleegy, H., Yakout, M.: Privometer: privacy protection in social networks. In: 2010 IEEE 26th International Conference on Data Engineering Workshops (ICDEW), Long Beach, CA (2010)","DOI":"10.1109\/ICDEW.2010.5452715"},{"key":"44_CR13","unstructured":"Kumaraguru, P., Cranor, L.F.: Privacy indexes: a survey of westins studies. Technical report CMU-ISRI-5-138, Carnegie Mellon University, CMU, Pittsburgh, PA, USA, December 2005"},{"key":"44_CR14","unstructured":"Staddon, J., Golle, P., Zimny, B.: Web-based inference detection. In: SS 2007: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, pp. 1\u201316. USENIX Association, Berkeley (2007)"},{"key":"44_CR15","first-page":"935","volume":"8","author":"SA Macskassy","year":"2007","unstructured":"Macskassy, S.A., Provost, F.: Classification in networked data: a toolkit and a univariate case study. J. Mach. Learn. Res. 8, 935\u2013983 (2007)","journal-title":"J. Mach. Learn. Res."},{"key":"44_CR16","doi-asserted-by":"crossref","unstructured":"Neville, J., Jensen, D.: Leveraging relational autocorrelation with latent group models. In: Proceedings of International Workshop on Multirelational Mining, pp. 49\u201355 (2005)","DOI":"10.1145\/1090193.1090201"},{"key":"44_CR17","unstructured":"Maximilien, E.M., Grandison, T., Sun, T., Richardson, D., Guo, S., Liu, K.: Privacy-as-a-Service?: models, algorithms, and results on the facebook platform. In: Web 2.0 Security and Privacy Workshop (2009)"},{"issue":"1","key":"44_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1870096.1870102","volume":"5","author":"KUN Liu","year":"2010","unstructured":"Liu, K.U.N.: A framework for computing the privacy scores of users in online social networks. ACM Trans. Knowl. Disc. 5(1), 1\u201330 (2010)","journal-title":"ACM Trans. Knowl. Disc."},{"key":"44_CR19","unstructured":"Sweeney, L.: Uniqueness of simple demographics in the U. S. population. Data privacy Lab white paper series LIDAP-WP4 (2000)"},{"key":"44_CR20","doi-asserted-by":"crossref","unstructured":"Golle, P.: Revisiting the uniqueness of simple demographics in the US population. In: Proceedings of the 5th ACM Workshop on Privacy in Electronic Society. ACM (2006)","DOI":"10.1145\/1179601.1179615"},{"issue":"1","key":"44_CR21","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","volume":"13","author":"D Boyd","year":"2008","unstructured":"Boyd, D., Ellison, N.: Social network sites: definition, history, and scholarship. J. Comput. Med. Commun. 13(1), 210\u2013230 (2008)","journal-title":"J. Comput. Med. Commun."},{"issue":"5","key":"44_CR22","doi-asserted-by":"publisher","first-page":"193","DOI":"10.2307\/1321160","volume":"4","author":"S Warren","year":"1890","unstructured":"Warren, S., Brandeis, L.: The right to privacy. Harvard Law Rev. 4(5), 193\u2013220 (1890)","journal-title":"Harvard Law Rev."},{"key":"44_CR23","volume-title":"Privacy and Freedom","author":"A Westin","year":"1967","unstructured":"Westin, A.: Privacy and Freedom. Athenaeum, New York (1967)"},{"key":"44_CR24","doi-asserted-by":"publisher","unstructured":"Yang, Y., Lutes, J., Li, F., Luo, B., Liu, P.: 26 Stalking online: On user privacy in social networks. Paper presented at the 37-48 (2012). doi:\n                    10.1145\/2133601.2133607","DOI":"10.1145\/2133601.2133607"},{"key":"44_CR25","doi-asserted-by":"crossref","unstructured":"Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In: Proceedings of ACM International Conference on World Wide Web, pp. 181\u2013190 (2007)","DOI":"10.1145\/1242572.1242598"},{"issue":"1","key":"44_CR26","doi-asserted-by":"publisher","first-page":"102","DOI":"10.14778\/1453856.1453873","volume":"1","author":"M Hay","year":"2008","unstructured":"Hay, M., Miklau, G., Jensen, D., Towsley, D., Weis, P.: Resisting structural re-identification in anonymized social networks. Proc. of VLDB Endow. 1(1), 102\u2013114 (2008)","journal-title":"Proc. of VLDB Endow."},{"key":"44_CR27","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-540-69209-6_14","volume-title":"Intelligence and Security Informatics","author":"J He","year":"2008","unstructured":"He, J., Chu, W.W.: Protecting private information in online social networks. In: Chen, H., Yang, C.C. (eds.) Intelligence and Security Informatics, vol. 135, pp. 249\u2013273. Springer, Heidelberg (2008)"},{"key":"44_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/11760146_14","volume-title":"Intelligence and Security Informatics","author":"J He","year":"2006","unstructured":"He, J., Chu, W.W., Liu, Z.V.: Inferring privacy information from social networks. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol. 3975, pp. 154\u2013165. Springer, Heidelberg (2006)"},{"key":"44_CR29","doi-asserted-by":"crossref","unstructured":"Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: Proceedings of the 2008 ACM SIGMOD, pp. 93\u2013106 (2008)","DOI":"10.1145\/1376616.1376629"},{"issue":"4","key":"44_CR30","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/MTS.2012.2225674","volume":"31","author":"X Chen","year":"2012","unstructured":"Chen, X., Michael, K.: Privacy issues and solutions in social network sites. IEEE Technol. Soc. Mag. 31(4), 43\u201353 (2012). doi:\n                    10.1109\/MTS.2012.2225674","journal-title":"IEEE Technol. Soc. Mag."},{"key":"44_CR31","first-page":"119","volume":"22","author":"L Austin","year":"2003","unstructured":"Austin, L.: Privacy and the question of technology. Law Philos. 22, 119\u2013166 (2003)","journal-title":"Law Philos."},{"key":"44_CR32","doi-asserted-by":"crossref","unstructured":"Tierney, M., Subramanian, L.: Realizing privacy by definition in social networks. In: Proceedings of 5th Asia-Pacific Workshop on Systems (APSys 2014) (2014)","DOI":"10.1145\/2637166.2637232"},{"key":"44_CR33","doi-asserted-by":"crossref","unstructured":"Chen, X., Shi, S.: A literature review of privacy research on social network sites. In: Proceedings of International Conference on Multimedia Information Networking and Security (MINES), vol. 1, pp. 93\u201397, November 2009","DOI":"10.1109\/MINES.2009.268"},{"key":"44_CR34","doi-asserted-by":"crossref","unstructured":"Joshi, P., Kuo, C.-C.: Security and privacy in online social networks: a survey. In: 2011 IEEE International Conference on Multimedia and Expo (ICME), pp. 1\u20136, July 2011","DOI":"10.1109\/ICME.2011.6012166"},{"issue":"4","key":"44_CR35","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/MNET.2010.5510913","volume":"24","author":"C Zhang","year":"2010","unstructured":"Zhang, C., Sun, J., Zhu, X., Fang, Y.: Privacy and security for online social networks: challenges and opportunities. IEEE Netw. 24(4), 13\u201318 (2010)","journal-title":"IEEE Netw."},{"key":"44_CR36","doi-asserted-by":"crossref","unstructured":"Bilge, L., et al.: All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings of the 18th International Conference World Wide Web (WWW 2009), pp. 551\u2013560. ACM Press (2009)","DOI":"10.1145\/1526709.1526784"},{"key":"44_CR37","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/S1353-4858(08)70127-2","volume":"11","author":"S Mansfield-Devine","year":"2008","unstructured":"Mansfield-Devine, S.: Anti-social networking: exploiting the trusting environment of Web 2.0. Netw. Secur. 11, 4\u20137 (2008)","journal-title":"Netw. Secur."},{"key":"44_CR38","unstructured":"King, R.: Facebook dials back on third-party app shares, 27 May 2014. \n                    http:\/\/www.zdnet.com\n                    \n                   (retrieved)"},{"issue":"4","key":"44_CR39","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MIC.2011.50","volume":"15","author":"H Gao","year":"2011","unstructured":"Gao, H., Hu, J., Huang, T., Wang, J., Chen, Y.: Security issues in online social networks. IEEE Internet Comput. 15(4), 56\u201363 (2011). doi:\n                    10.1109\/MIC.2011.50","journal-title":"IEEE Internet Comput."},{"issue":"10","key":"44_CR40","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"TN Jagatic","year":"2007","unstructured":"Jagatic, T.N., et al.: Social phishing. Commun. ACM 50(10), 94\u2013100 (2007)","journal-title":"Commun. ACM"},{"key":"44_CR41","unstructured":"Duell, M.: Mark Zuckerbergs private Facebook photos revealed: Security glitch allows web expert to access billionaires personal pictures. The Daily Mail (MailOnline), December 2011. \n                    http:\/\/www.dailymail.co.uk\/news\/article-2070749\/Facebook-security-glitch-reveals-Mark-Zuckerbergs-private-photos.html"},{"key":"44_CR42","unstructured":"Valdes, M., McFarland, S.: Employers Ask Job Seekers for Facebook Passwords. Associated Press, 20 March, 2012"},{"key":"44_CR43","unstructured":"Vijayan, J.: New laws keep employers out of worker social media accounts. Computer World, 4 January 2013. \n                    http:\/\/www.computerworld.com\/article\/2505609\/data-privacy\/ill-bans-firms-from-asking-workers-job-seekers-for-social-media-info.html"},{"key":"44_CR44","doi-asserted-by":"crossref","unstructured":"Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore Art Thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In: Proceedings of the 16th International Conference on World Wide Web (WWW 2007), pp. 181\u2013190. ACM Press (2007)","DOI":"10.1145\/1242572.1242598"},{"key":"44_CR45","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: Proceedings of the 20th IEEE Symposium on Security and Privacy (SP 2009), pp. 173\u2013187. IEEE CS Press (2009)","DOI":"10.1109\/SP.2009.22"},{"key":"44_CR46","doi-asserted-by":"crossref","unstructured":"Wondracek, G., et al.: A practical attack to de-anonymize social network users. In: Proceedings of IEEE Symposium on Security and Privacy (SP 2010), pp. 223\u2013238. IEEE CS Press (2010)","DOI":"10.1109\/SP.2010.21"},{"key":"44_CR47","unstructured":"Vijayan, J.: Ill. Bans firms from asking workers, job seekers for social media info. PCWorld. ComputerWorld, 7 August 2012"},{"key":"44_CR48","doi-asserted-by":"crossref","unstructured":"Barnes, S.B.: A privacy paradox: social networking in the United States. First Monday, 4 September 2006. \n                    http:\/\/firstmonday.org","DOI":"10.5210\/fm.v11i9.1394"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2015"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26187-4_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T05:33:20Z","timestamp":1559280800000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26187-4_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319261867","9783319261874"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26187-4_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}