{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:02:48Z","timestamp":1743008568584,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319276670"},{"type":"electronic","value":"9783319276687"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27668-7_2","type":"book-chapter","created":{"date-parts":[[2015,12,31]],"date-time":"2015-12-31T01:37:45Z","timestamp":1451525865000},"page":"16-27","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy in Social Networks: Existing Challenges and Proposals for Solutions"],"prefix":"10.1007","author":[{"given":"Michael","family":"Netter","sequence":"first","affiliation":[]},{"given":"G\u00fcnther","family":"Pernul","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Richthammer","sequence":"additional","affiliation":[]},{"given":"Moritz","family":"Riesner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,1]]},"reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-642-22263-4_12","volume-title":"Privacy Enhancing Technologies","author":"F Beato","year":"2011","unstructured":"Beato, F., Kohlweiss, M., Wouters, K.: Scramble! your social network data. In: Fischer-H\u00fcbner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 211\u2013225. Springer, Heidelberg (2011)"},{"issue":"3","key":"2_CR2","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1504\/IJWBC.2011.041199","volume":"7","author":"S Bortoli","year":"2011","unstructured":"Bortoli, S., Palpanas, T., Bouquet, P.: Decentralised social network management. Int. J. Web Based Communities 7(3), 276\u2013297 (2011)","journal-title":"Int. J. Web Based Communities"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Schi\u00f6berg, D., Vu, L.H., Datta, A.: PeerSoN: P2P social networking - early experiences and insights. In: Proceedings of the 2nd ACM Workshop on Social Network Systems (SocialNets), pp. 46\u201352 (2009)","DOI":"10.1145\/1578002.1578010"},{"key":"2_CR4","unstructured":"Cetto, A., Netter, M., Pernul, G., Richthammer, C., Riesner, M., Roth, C., S\u00e4nger, J.: Friend inspector: a serious game to enhance privacy awareness in social networks. In: Proceedings of the 2nd International Workshop on Intelligent Games for Empowerment and Inclusion (IDGEI) (2014)"},{"key":"2_CR5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-33037-0","volume-title":"Handbook of Data Visualization","author":"CH Chen","year":"2008","unstructured":"Chen, C.H., H\u00e4rdle, W.K., Unwin, A.: Handbook of Data Visualization. Springer, Heidelberg (2008)"},{"issue":"6","key":"2_CR6","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1109\/TKDE.2011.37","volume":"24","author":"A Colantonio","year":"2012","unstructured":"Colantonio, A., Di Pietro, R., Ocello, A., Verde, N.V.: Visual role mining: a picture is worth a thousand roles. IEEE Trans. Knowl. Data Eng. 24(6), 1120\u20131133 (2012)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"2_CR7","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"DF Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3), 224\u2013274 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"8","key":"2_CR8","first-page":"1137","volume":"94","author":"J Grimmelmann","year":"2009","unstructured":"Grimmelmann, J.: Saving Facebook. Iowa Law Rev. 94(8), 1137\u20131206 (2009)","journal-title":"Iowa Law Rev."},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-642-23765-2_15","volume-title":"Human-Computer Interaction \u2013 INTERACT 2011","author":"PG Kelley","year":"2011","unstructured":"Kelley, P.G., Brewer, R., Mayer, Y., Cranor, L.F., Sadeh, N.: An investigation into Facebook friend grouping. In: Campos, P., Graham, N., Jorge, J., Nunes, N., Palanque, P., Winckler, M. (eds.) INTERACT 2011, Part III. LNCS, vol. 6948, pp. 216\u2013233. Springer, Heidelberg (2011)"},{"issue":"1","key":"2_CR10","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.iheduc.2004.12.001","volume":"8","author":"K Kiili","year":"2005","unstructured":"Kiili, K.: Digital game-based learning: towards an experiential gaming model. Internet High. Educ. 8(1), 13\u201324 (2005)","journal-title":"Internet High. Educ."},{"key":"2_CR11","unstructured":"Netter, M.: Privacy-preserving Infrastructure for Social Identity Management. Ph.D. thesis, University of Regensburg (2013)"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-642-32287-7_6","volume-title":"Trust, Privacy and Security in Digital Business","author":"M Netter","year":"2012","unstructured":"Netter, M., Hassan, S., Pernul, G.: An autonomous social web privacy infrastructure with context-aware access control. In: Fischer-H\u00fcbner, S., Katsikas, S., Quirchmayr, G. (eds.) TrustBus 2012. LNCS, vol. 7449, pp. 65\u201378. Springer, Heidelberg (2012)"},{"key":"2_CR13","unstructured":"Netter, M., Riesner, M., Pernul, G.: Assisted social identity management - enhancing privacy in the social web. In: Proceedings of the 10th International Conference on Wirtschaftsinformatik (WI) (2011)"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Netter, M., Riesner, M., Weber, M., Pernul, G.: Privacy settings in online social networks - preferences, perception, and reality. In: Proceedings of the 46th Hawaii International Conference on System Sciences (HICSS), pp. 3219\u20133228 (2013)","DOI":"10.1109\/HICSS.2013.455"},{"key":"2_CR15","unstructured":"Netter, M., Weber, M., Diener, M., Pernul, G.: Visualizing social roles - design and evaluation of a bird\u2019s-eye view of social network privacy settings. In: Proceedings of the 22nd European Conference on Information Systems (ECIS), pp. 1\u201316 (2014)"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Peterson, C.: Losing face: an environmental analysis of privacy on Facebook. SSRN eLibrary (2010)","DOI":"10.2139\/ssrn.1550211"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Reeder, R.W., Bauer, L., Cranor, L.F., Reiter, M.K., Bacon, K., How, K., Strong, H.: Expandable grids for visualizing and authoring computer security policies. In: Proceedings of the 26th SIGCHI Conference on Human Factors in Computing Systems (CHI), pp. 1473\u20131482 (2008)","DOI":"10.1145\/1357054.1357285"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Richthammer, C., Netter, M., Riesner, M., Pernul, G.: Taxonomy for social network data types from the viewpoint of privacy and user control. In: Proceedings of the 8th International Conference on Availability, Reliability and Security (ARES 2013). IEEE (2013, accepted)","DOI":"10.1109\/ARES.2013.18"},{"issue":"11","key":"2_CR19","first-page":"1","volume":"2014","author":"C Richthammer","year":"2014","unstructured":"Richthammer, C., Netter, M., Riesner, M., S\u00e4nger, J., Pernul, G.: Taxonomy of social network data types. EURASIP J. Inf. Sec. 2014(11), 1\u201317 (2014)","journal-title":"EURASIP J. Inf. Sec."},{"key":"2_CR20","unstructured":"Riesner, M.: Provider-Independent Social Identity Management for Personal and Professional Applications. Ph.D. thesis, University of Regensburg (2013)"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Riesner, M., Netter, M., Pernul, G.: An analysis of implemented and desirable settings for identity management on social networking sites. In: Proceedings of the 7th International Conference on Availability, Reliability and Security (ARES), pp. 103\u2013112 (2012)","DOI":"10.1109\/ARES.2012.20"},{"issue":"4","key":"2_CR22","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.istr.2013.02.005","volume":"17","author":"M Riesner","year":"2013","unstructured":"Riesner, M., Netter, M., Pernul, G.: Analyzing settings for social identity management on social networking sites: classification, current state, and proposed developments. Inf. Sec. Tech. Rep. 17(4), 185\u2013198 (2013)","journal-title":"Inf. Sec. Tech. Rep."},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Riesner, M., Pernul, G.: Maintaining a consistent representation of self across multiple social networking sites - a data-centric perspective. In: Proceedings of the Workshop on Security and Privacy in Social Networks (SPSN), pp. 860\u2013867. IEEE (2012)","DOI":"10.1109\/SocialCom-PASSAT.2012.15"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Riesner, M., Pernul, G.: Provider-independent online social identity management - enhancing privacy consistently across multiple social networking sites. In: Proceedings of the 45th Hawaii International Conference on System Sciences (HICSS), pp. 800\u2013809 (2012)","DOI":"10.1109\/HICSS.2012.490"}],"container-title":["Communications in Computer and Information Science","Information Systems Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27668-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T03:41:17Z","timestamp":1559360477000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27668-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319276670","9783319276687"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27668-7_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"1 January 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}