{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:43:56Z","timestamp":1743003836679,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319765860"},{"type":"electronic","value":"9783319765877"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-76587-7_12","type":"book-chapter","created":{"date-parts":[[2018,3,2]],"date-time":"2018-03-02T04:46:15Z","timestamp":1519965975000},"page":"178-190","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Trust and Privacy Challenges in Social Participatory Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1447-8086","authenticated-orcid":false,"given":"Haleh","family":"Amintoosi","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Allahbakhsh","sequence":"additional","affiliation":[]},{"given":"Salil S.","family":"Kanhere","sequence":"additional","affiliation":[]},{"given":"Aleksandar","family":"Ignjatovic","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,3]]},"reference":[{"issue":"2","key":"12_CR1","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MIC.2013.20","volume":"17","author":"M Allahbakhsh","year":"2013","unstructured":"Allahbakhsh, M., Benatallah, B., Ignjatovic, A., Motahari-Nezhad, H.R., Bertino, E., Dustdar, S.: Quality control in crowdsourcing systems: issues and directions. IEEE Internet Comput. 17(2), 76\u201381 (2013)","journal-title":"IEEE Internet Comput."},{"key":"12_CR2","unstructured":"Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank citation ranking: bringing order to the web. Stanford InfoLab, Technical report (1999)"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Amintoosi, H., Kanhere, S.S.: A trust-based recruitment framework for multi-hop social participatory sensing. In: 2013 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), pp. 266\u2013273. IEEE (2013)","DOI":"10.1109\/DCOSS.2013.29"},{"key":"12_CR4","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-642-40238-8_20","volume-title":"Mobile and Ubiquitous Systems: Computing, Networking, and Services","author":"H Amintoosi","year":"2013","unstructured":"Amintoosi, H., Kanhere, S.S.: A trust framework for social participatory sensing systems. In: Zheng, K., Li, M., Jiang, H. (eds.) MobiQuitous 2012. LNICST, vol. 120, pp. 237\u2013249. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40238-8_20"},{"issue":"1","key":"12_CR5","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/s11036-013-0455-x","volume":"19","author":"H Amintoosi","year":"2014","unstructured":"Amintoosi, H., Kanhere, S.S.: A reputation framework for social participatory sensing systems. Mob. Netw. Appl. 19(1), 88\u2013100 (2014)","journal-title":"Mob. Netw. Appl."},{"key":"12_CR6","series-title":"Advances in Database Systems","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/978-1-4419-6045-0_14","volume-title":"Managing and Mining Graph Data","author":"X Wu","year":"2010","unstructured":"Wu, X., Ying, X., Liu, K., Chen, L.: A survey of privacy-preservation of graphs and social networks. In: Aggarwal, C., Wang, H. (eds.) Managing and Mining Graph Data. ADBS, vol. 40, pp. 421\u2013453. Springer, Boston (2010). https:\/\/doi.org\/10.1007\/978-1-4419-6045-0_14"},{"key":"12_CR7","unstructured":"Harmon, A.: Amazon glitch unmasks war of reviewers. N. Y. Times 14(8) (2004)"},{"key":"12_CR8","unstructured":"Levien, R., Aiken, A.: Attack-resistant trust metrics for public key certification. In: USENIX Security (1998)"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Allahbakhsh, M., Ignjatovic, A., Benatallah, B., Beheshti, S.-M.-R., Foo, N., Bertino, E.: An analytic approach to people evaluation in crowdsourcing systems. arXiv preprint arXiv:1211.3200 (2012)","DOI":"10.4108\/icst.collaboratecom.2012.250499"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Allahbakhsh, M., Ignjatovic, A., Benatallah, B., Beheshti, S.-M.-R., Foo, N., Bertino, E.: Detecting, representing and querying collusion in online rating systems. arXiv preprint arXiv:1211.0963 (2012)","DOI":"10.1007\/978-3-642-37401-2_21"},{"issue":"2","key":"12_CR11","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618\u2013644 (2007)","journal-title":"Decis. Support Syst."},{"key":"12_CR12","first-page":"11","volume":"20","author":"H Amintoosi","year":"2015","unstructured":"Amintoosi, H., Kanhere, S.S., Allahbakhsh, M.: Trust-based privacy-aware participant selection in social participatory sensing. J. Inf. Secur. Appl. 20, 11\u201325 (2015)","journal-title":"J. Inf. Secur. Appl."},{"issue":"02","key":"12_CR13","doi-asserted-by":"publisher","first-page":"1441004","DOI":"10.1142\/S0218843014410044","volume":"23","author":"C Dai","year":"2014","unstructured":"Dai, C., Rao, F.-Y., Truta, T.M., Bertino, E.: Privacy-preserving assessment of social network data trustworthiness. Int. J. Coop. Inf. Syst. 23(02), 1441004 (2014)","journal-title":"Int. J. Coop. Inf. Syst."},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Yan, Z.: A survey on trust evaluation in e-commerce. In: Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, MobiMedia 2016, pp. 130\u2013139. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), ICST, Brussels, Belgium (2016)","DOI":"10.4108\/eai.18-6-2016.2264177"},{"issue":"2","key":"12_CR15","doi-asserted-by":"publisher","first-page":"28:1","DOI":"10.1145\/2815595","volume":"48","author":"J-H Cho","year":"2015","unstructured":"Cho, J.-H., Chan, K., Adali, S.: A survey on trust modeling. ACM Comput. Surv. 48(2), 28:1\u201328:40 (2015)","journal-title":"ACM Comput. Surv."},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 71\u201380. ACM (2005)","DOI":"10.1145\/1102199.1102214"},{"issue":"1","key":"12_CR17","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.chb.2008.08.006","volume":"25","author":"J Fogel","year":"2009","unstructured":"Fogel, J., Nehmad, E.: Internet social network communities: risk taking, trust, and privacy concerns. Comput. Hum. Behav. 25(1), 153\u2013160 (2009)","journal-title":"Comput. Hum. Behav."},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Zheleva, E., Getoor, L.: To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In: Proceedings of the 18th International Conference on World Wide Web, pp. 531\u2013540. ACM (2009)","DOI":"10.1145\/1526709.1526781"},{"issue":"1","key":"12_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.im.2015.08.001","volume":"53","author":"G Bansal","year":"2016","unstructured":"Bansal, G., Zahedi, F.M., Gefen, D.: Do context and personality matter? Trust and privacy concerns in disclosing private information online. Inf. Manag. 53(1), 1\u201321 (2016)","journal-title":"Inf. Manag."},{"key":"12_CR20","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari, S., Rizzardi, A., Grieco, L., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146\u2013164 (2015)","journal-title":"Comput. Netw."},{"issue":"1","key":"12_CR21","doi-asserted-by":"publisher","first-page":"205395171770467","DOI":"10.1177\/2053951717704673","volume":"4","author":"K Ostherr","year":"2017","unstructured":"Ostherr, K., Borodina, S., Bracken, R.C., Lotterman, C., Storer, E., Williams, B.: Trust and privacy in the context of user-generated health data. Big Data Soc. 4(1), 2053951717704673 (2017)","journal-title":"Big Data Soc."},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Ye, H., Cheng, X., Yuan, M., Xu, L., Gao, J., Cheng, C.: A survey of security and privacy in big data. In: 2016 16th International Symposium on Communications and Information Technologies (ISCIT), pp. 268\u2013272, September 2016","DOI":"10.1109\/ISCIT.2016.7751634"},{"issue":"1","key":"12_CR23","first-page":"6","volume":"5","author":"K Liu","year":"2010","unstructured":"Liu, K., Terzi, E.: A framework for computing the privacy scores of users in online social networks. ACM Trans. Knowl. Discov. Data (TKDD) 5(1), 6 (2010)","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"},{"issue":"1","key":"12_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/07370020903586662","volume":"25","author":"AN Joinson","year":"2010","unstructured":"Joinson, A.N., Reips, U.-D., Buchanan, T., Schofield, C.B.P.: Privacy, trust, and self-disclosure online. Hum. Comput. Interact. 25(1), 1\u201324 (2010)","journal-title":"Hum. Comput. Interact."},{"key":"12_CR25","unstructured":"Beheshti, S., Venugopal, S., Ryu, S.H., Benatallah, B., Wang, W.: Big data and cross-document coreference resolution: current state and future opportunities. CoRR, vol. abs\/1311.3987 (2013). http:\/\/arxiv.org\/abs\/1311.3987"},{"key":"12_CR26","unstructured":"Beheshti, S., Nezhad, H.R.M., Benatallah, B.: Temporal provenance model (TPM): model and query language. CoRR, vol. abs\/1211.5009 (2012)"},{"issue":"4","key":"12_CR27","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/s00607-016-0490-0","volume":"99","author":"S Beheshti","year":"2017","unstructured":"Beheshti, S., et al.: A systematic review and comparative analysis of cross-document coreference resolution methods and tools. Computing 99(4), 313\u2013349 (2017)","journal-title":"Computing"},{"key":"12_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25037-3","volume-title":"Process Analytics: Concepts and Techniques for Querying and Analyzing Process Data","author":"S-M-R Beheshti","year":"2016","unstructured":"Beheshti, S.-M.-R., Benatallah, B., Sakr, S., Grigori, D., Motahari-Nezhad, H.R., Barukh, M.C., Gater, A., Ryu, S.H.: Process Analytics: Concepts and Techniques for Querying and Analyzing Process Data. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-25037-3"},{"key":"12_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-642-23059-2_22","volume-title":"Business Process Management","author":"S-M-R Beheshti","year":"2011","unstructured":"Beheshti, S.-M.-R., Benatallah, B., Motahari-Nezhad, H.R., Sakr, S.: A query language for analyzing business processes execution. In: Rinderle-Ma, S., Toumani, F., Wolf, K. (eds.) BPM 2011. LNCS, vol. 6896, pp. 281\u2013297. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23059-2_22"},{"key":"12_CR30","unstructured":"Allahbakhsh, M., Arbabi, S., Motahari-Nezhad, H.R., Benatallah, B.: Big data analytics using cloud and crowd. CoRR, vol. abs\/1604.04749 (2016). http:\/\/arxiv.org\/abs\/1604.04749"}],"container-title":["Lecture Notes in Business Information Processing","Service Research and Innovation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-76587-7_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,12]],"date-time":"2019-10-12T00:27:34Z","timestamp":1570840054000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-76587-7_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319765860","9783319765877"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-76587-7_12","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2018]]}}}