{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T12:10:03Z","timestamp":1749557403387,"version":"3.41.0"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319455068"},{"type":"electronic","value":"9783319455075"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45507-5_7","type":"book-chapter","created":{"date-parts":[[2016,8,22]],"date-time":"2016-08-22T11:11:04Z","timestamp":1471864264000},"page":"96-105","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Threat to Friendship Privacy in Facebook"],"prefix":"10.1007","author":[{"given":"Francesco","family":"Buccafurri","sequence":"first","affiliation":[]},{"given":"Gianluca","family":"Lax","sequence":"additional","affiliation":[]},{"given":"Serena","family":"Nicolazzo","sequence":"additional","affiliation":[]},{"given":"Antonino","family":"Nocera","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,23]]},"reference":[{"key":"7_CR1","unstructured":"Facebook Graph API Documentation (2016). https:\/\/developers.facebook.com\/docs\/graph-api"},{"key":"7_CR2","unstructured":"Twitter4J (2016). http:\/\/twitter4j.org\/"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/11957454_3","volume-title":"Privacy Enhancing Technologies","author":"A Acquisti","year":"2006","unstructured":"Acquisti, A., Gross, R.: Imagined communities: awareness, information sharing, and privacy on the facebook. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 36\u201358. Springer, Heidelberg (2006)"},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.chb.2015.11.022","volume":"56","author":"M Bartsch","year":"2016","unstructured":"Bartsch, M., Dienlin, T.: Control your facebook: an analysis of online privacy literacy. Comput. Hum. Behav. 56, 147\u2013154 (2016)","journal-title":"Comput. Hum. Behav."},{"issue":"1","key":"7_CR5","doi-asserted-by":"publisher","first-page":"21","DOI":"10.4018\/IJTHI.2016010102","volume":"12","author":"A Beldad","year":"2016","unstructured":"Beldad, A.: Sealing one\u2019s online wall off from outsiders: determinants of the use of facebook\u2019s privacy settings among young dutch users. Int. J. Technol. Hum. Interact. (IJTHI) 12(1), 21\u201334 (2016)","journal-title":"Int. J. Technol. Hum. Interact. (IJTHI)"},{"issue":"1","key":"7_CR6","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1177\/1354856507084416","volume":"14","author":"D Boyd","year":"2008","unstructured":"Boyd, D.: Facebook$$\\backslash $$\u2019s privacy trainwreck. Convergence: Int. J. Res. New Media Technol. 14(1), 13\u201320 (2008)","journal-title":"Convergence: Int. J. Res. New Media Technol."},{"issue":"3","key":"7_CR7","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/s10660-011-9078-0","volume":"11","author":"F Buccafurri","year":"2011","unstructured":"Buccafurri, F., Lax, G.: Implementing disposable credit card numbers by mobile phones. Electron. Commer. Res. 11(3), 271\u2013296 (2011)","journal-title":"Electron. Commer. Res."},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.chb.2015.05.045","volume":"52","author":"F Buccafurri","year":"2015","unstructured":"Buccafurri, F., Lax, G., Nicolazzo, S., Nocera, A.: Comparing twitter and facebook user behavior: privacy and other aspects. Comput. Hum. Behav. 52, 87\u201395 (2015)","journal-title":"Comput. Hum. Behav."},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Buccafurri, F., Lax, G., Nicolazzo, S., Nocera. A.: Interest assortativity in twitter. In Proceedings of the 13th International Conference on Web Information Systems and Technologies (WEBIST), WEBIST (2016)","DOI":"10.5220\/0005790602390246"},{"key":"7_CR10","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.ins.2015.10.042","volume":"331","author":"F Buccafurri","year":"2016","unstructured":"Buccafurri, F., Lax, G., Nicolazzo, S., Nocera, A.: A model to support design and development of multiple-social-network applications. Inf. Sci. 331, 99\u2013119 (2016)","journal-title":"Inf. Sci."},{"key":"7_CR11","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.ijhcs.2015.03.006","volume":"80","author":"F Buccafurri","year":"2015","unstructured":"Buccafurri, F., Lax, G., Nocera, A.: A new form of assortativity in online social networks. Int. J. Hum. Comput. Stud. 80, 56\u201365 (2015)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/978-3-642-33486-3_30","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"F Buccafurri","year":"2012","unstructured":"Buccafurri, F., Lax, G., Nocera, A., Ursino, D.: Discovering links among social networks. In: Flach, P.A., De Bie, T., Cristianini, N. (eds.) ECML PKDD 2012, Part II. LNCS, vol. 7524, pp. 467\u2013482. Springer, Heidelberg (2012)"},{"key":"7_CR13","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.ins.2013.08.046","volume":"256","author":"F Buccafurri","year":"2014","unstructured":"Buccafurri, F., Lax, G., Nocera, A., Ursino, D.: Moving from social networks to social internetworking scenarios: the crawling perspective. Inform. Sci. 256, 126\u2013137 (2014)","journal-title":"Inform. Sci."},{"issue":"9","key":"7_CR14","doi-asserted-by":"publisher","first-page":"1251","DOI":"10.1002\/spe.2280","volume":"45","author":"F Buccafurri","year":"2015","unstructured":"Buccafurri, F., Lax, G., Nocera, A., Ursino, D.: A system for extracting structural information from social network accounts. Softw. Pract. Experience 45(9), 1251\u20131275 (2015)","journal-title":"Softw. Pract. Experience"},{"issue":"10\u201317","key":"7_CR15","first-page":"30","volume":"10","author":"M Cha","year":"2010","unstructured":"Cha, M., Haddadi, H., Benevenuto, F., Gummadi, P.K.: Measuring user influence in twitter: the million follower fallacy. ICWSM 10(10\u201317), 30 (2010)","journal-title":"ICWSM"},{"key":"7_CR16","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1016\/j.chb.2015.08.035","volume":"54","author":"JT Child","year":"2016","unstructured":"Child, J.T., Starcher, S.C.: Fuzzy facebook privacy boundaries: exploring mediated lurking, vague-booking, and facebook privacy management. Comput. Hum. Behav. 54, 483\u2013490 (2016)","journal-title":"Comput. Hum. Behav."},{"issue":"6","key":"7_CR17","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1177\/0743558411432635","volume":"27","author":"E Christofides","year":"2012","unstructured":"Christofides, E., Muise, A., Desmarais, S.: Risky disclosures on facebook the effect of having a bad experience on online behavior. J. Adolesc. Res. 27(6), 714\u2013731 (2012)","journal-title":"J. Adolesc. Res."},{"issue":"1","key":"7_CR18","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1111\/j.1083-6101.2009.01494.x","volume":"15","author":"B Debatin","year":"2009","unstructured":"Debatin, B., Lovejoy, J.P., Horn, A.-K., Hughes, B.N.: Facebook and online privacy: attitudes, behaviors, and unintended consequences. J. Comput. Mediated Commun. 15(1), 83\u2013108 (2009)","journal-title":"J. Comput. Mediated Commun."},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Gani, K., Hacid, H., Skraba, R.: Towards multiple identity detection in social networks. In: Proceedings of the International Conference Companion on World Wide Web (WWW 2012 Companion), Lyon, France, pp. 503\u2013504. ACM (2012)","DOI":"10.1145\/2187980.2188098"},{"key":"7_CR20","unstructured":"Ghazinour, K., Matwin, S., Sokolova, M.: Yourprivacyprotector, a recommender system for privacy settings in social networks (2016). arXiv preprint arXiv:1602.01937"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 71\u201380. ACM (2005)","DOI":"10.1145\/1102199.1102214"},{"key":"7_CR22","unstructured":"Gyongyi, Z.I.: Social affinity on the web, 15 October 2013. US Patent 8,560,605"},{"key":"7_CR23","unstructured":"Hargittai, E., et al.: Facebook privacy settings: who cares? First Monday 15(8) (2010)"},{"key":"7_CR24","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1016\/j.chb.2016.02.091","volume":"60","author":"B Hofstra","year":"2016","unstructured":"Hofstra, B., Corten, R., van Tubergen, F.: Understanding the privacy behavior of adolescents on facebook: the role of peers, popularity and trust. Comput. Hum. Behav. 60, 611\u2013621 (2016)","journal-title":"Comput. Hum. Behav."},{"issue":"10","key":"7_CR25","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"TN Jagatic","year":"2007","unstructured":"Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Commun. ACM 50(10), 94\u2013100 (2007)","journal-title":"Commun. ACM"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Jain, P., Kumaraguru, P., Joshi, A.: @ i seek\u2018fb. me\u2019: Identifying users across multiple online social networks. In: Proceedings of the 22nd International Conference on World Wide Web Companion, pp. 1259\u20131268. International World Wide Web Conferences Steering Committee (2013)","DOI":"10.1145\/2487788.2488160"},{"issue":"5","key":"7_CR27","doi-asserted-by":"crossref","first-page":"377","DOI":"10.14778\/2732269.2732274","volume":"7","author":"Nitish Korula","year":"2014","unstructured":"Korula, N., Lattanzi, S.: An efficient reconciliation algorithm for social networks. In: Proceedings of the International Conference on Very Large Data Bases (VLDB 2014), pp. 377\u2013388, Hangzhou, Cina. VLDB Endowment (2014)","journal-title":"Proceedings of the VLDB Endowment"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove, A.: Analyzing facebook privacy settings: user expectations vs. reality. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, pp. 61\u201370. ACM (2011)","DOI":"10.1145\/2068816.2068823"},{"issue":"20","key":"7_CR29","doi-asserted-by":"publisher","first-page":"208701","DOI":"10.1103\/PhysRevLett.89.208701","volume":"89","author":"ME Newman","year":"2002","unstructured":"Newman, M.E.: Assortative mixing in networks. Phys. Rev. Lett. 89(20), 208701 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"7_CR30","doi-asserted-by":"crossref","unstructured":"Rao, N., Iyengar, S., DeSaussure, G.: The visit problem: visibility graph-based solution. In: Proceedings of the 1988 IEEE International Conference on Robotics and Automation, pp. 1650\u20131655. IEEE (1988)","DOI":"10.1109\/ROBOT.1988.12303"},{"issue":"8","key":"7_CR31","doi-asserted-by":"publisher","first-page":"1258","DOI":"10.1080\/1369118X.2011.606327","volume":"15","author":"K Van Cleemput","year":"2012","unstructured":"Van Cleemput, K.: Friendship type, clique formation and the everyday use of communication technologies in a peer group: a social network analysis. Inf. Commun. Soc. 15(8), 1258\u20131277 (2012)","journal-title":"Inf. Commun. Soc."},{"issue":"4","key":"7_CR32","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1080\/1369118X.2013.777757","volume":"16","author":"AL Young","year":"2013","unstructured":"Young, A.L., Quan-Haase, A.: Privacy protection strategies on facebook: the internet privacy paradox revisited. Inf. Commun. Soc. 16(4), 479\u2013500 (2013)","journal-title":"Inf. Commun. Soc."},{"key":"7_CR33","doi-asserted-by":"crossref","unstructured":"Zafarani, R., Liu, H.: Connecting users across social media sites: a behavioral-modeling approach. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Chicago, IL, USA, pp. 41\u201349 (2013)","DOI":"10.1145\/2487575.2487648"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability, and Security in Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45507-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T11:34:16Z","timestamp":1749555256000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45507-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319455068","9783319455075"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45507-5_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"23 August 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CD-ARES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Availability, Reliability, and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salzburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ieeeares2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}