{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T16:09:33Z","timestamp":1759939773590,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319584683"},{"type":"electronic","value":"9783319584690"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58469-0_8","type":"book-chapter","created":{"date-parts":[[2017,5,3]],"date-time":"2017-05-03T11:34:53Z","timestamp":1493811293000},"page":"108-123","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["3LP: Three Layers of Protection for Individual Privacy in Facebook"],"prefix":"10.1007","author":[{"given":"Khondker Jahid","family":"Reza","sequence":"first","affiliation":[]},{"given":"Md Zahidul","family":"Islam","sequence":"additional","affiliation":[]},{"given":"Vladimir","family":"Estivill-Castro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,4]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Estivill-Castro, V., Hough, P., Islam, M.Z.: Empowering users of social networks to assess their privacy risks. In: 2014 IEEE International Conference on Big Data, pp. 644\u2013649 (2014)","DOI":"10.1109\/BigData.2014.7004287"},{"key":"8_CR2","unstructured":"Facebook stats. newsroom.fb.com\/company-info\/. Accessed 03 June 2016"},{"key":"8_CR3","unstructured":"The top 500 sites on the web. \/\/www.alexa.com\/topsites. Accessed 03 June 2016"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Ho, A., Maiga, A., Aimeur, E.: Privacy protection issues in social networking sites. In: IEEE\/ACS International Conference on Computer Systems and Applications, pp. 271\u2013278 (2009)","DOI":"10.1109\/AICCSA.2009.5069336"},{"key":"8_CR5","volume-title":"Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing","author":"HT Tavani","year":"2011","unstructured":"Tavani, H.T.: Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing, 3rd edn. Wiley Publishing, Hoboken (2011)","edition":"3"},{"issue":"4","key":"8_CR6","first-page":"323","volume":"4","author":"J Rachels","year":"1975","unstructured":"Rachels, J.: Why privacy is important. Philos. Publ. Affairs 4(4), 323\u2013333 (1975)","journal-title":"Philos. Publ. Affairs"},{"issue":"8","key":"8_CR7","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1109\/TKDE.2012.120","volume":"25","author":"R Heatherly","year":"2013","unstructured":"Heatherly, R., Kantarcioglu, M., Thuraisingham, B.M.: Preventing private information inference attacks on social networks. IEEE Trans. Knowl. Data Eng. 25(8), 1849\u20131862 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Ryu, E., Rong, Y., Li, J., Machanavajjhala, A.: Curso: protect yourself from curse of attribute inference: a social network privacy-analyzer. In: SIGMOD Workshop on Databases and Social Networks (DBSocial 2013), pp. 13\u201318, NY. ACM (2013)","DOI":"10.1145\/2484702.2484706"},{"issue":"4","key":"8_CR9","first-page":"32","volume":"9","author":"Y Al-Saggaf","year":"2012","unstructured":"Al-Saggaf, Y., Islam, M.Z.: Privacy in social network sites (SNS): the threats from data mining. Ethical Space Int. J. Commun. Ethics 9(4), 32\u201340 (2012)","journal-title":"Ethical Space Int. J. Commun. Ethics"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Guha, S., Tang, K., Francis, P.: NOYB: privacy in online social networks. In: First Workshop on Online Social Networks (WOSN 2008), pp. 49\u201354, NY, USA. ACM (2008)","DOI":"10.1145\/1397735.1397747"},{"issue":"2","key":"8_CR11","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/2594455","volume":"5","author":"NZ Gong","year":"2014","unstructured":"Gong, N.Z., Talwalkar, A., Mackey, L.W., Huang, L., Shin, E.C.R., Stefanov, E., Shi, E., Song, D.: Joint link prediction and attribute inference using a social-attribute network. ACM Trans. Intell. Syst. Technol. 5(2), 27 (2014)","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Estivill-Castro, V., Nettleton, D.F.: Can on-line social network users trust that what they designated as confidential data remains so? In: 2015 IEEE Trustcom\/BigDataSE\/ISPA, pp. 966\u2013973, Washington. IEEE Computer Society (2015)","DOI":"10.1109\/Trustcom.2015.471"},{"issue":"3","key":"8_CR13","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/S0378-8733(03)00009-1","volume":"25","author":"L Adamic","year":"2003","unstructured":"Adamic, L., Adar, E.: Friends and neighbors on the web. Soc. Netw. 25(3), 211\u2013230 (2003)","journal-title":"Soc. Netw."},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"La Fond, T., Neville, J.: Randomization tests for distinguishing social influence and homophily effects. In: 19th International Conference on World Wide Web (WWW 2010), pp. 601\u2013610, NY. ACM (2010)","DOI":"10.1145\/1772690.1772752"},{"key":"8_CR15","unstructured":"Nettleton, D.F.: Generating synthetic online social network graph data and topologies. In: 3rd Workshop on Graph-Based Technologies and Applications (Graph-TA 2015). UPC, Barcelona (2015)"},{"key":"8_CR16","unstructured":"Islam, Z., Giggins, H.: Knowledge discovery through SysFor: a systematically developed forest of multiple decision trees. In: 9th Australasian Data Mining Conference, vol. 121, pp. 195\u2013204, Darlinghurst. Australian Computer Society (2011)"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58469-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,22]],"date-time":"2021-05-22T00:04:39Z","timestamp":1621641879000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58469-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584683","9783319584690"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58469-0_8","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"4 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 May 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 May 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ifipsec.org\/2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}