{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:24:06Z","timestamp":1751495046254,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319942131"},{"type":"electronic","value":"9783319942148"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-94214-8_21","type":"book-chapter","created":{"date-parts":[[2018,6,29]],"date-time":"2018-06-29T02:07:31Z","timestamp":1530238051000},"page":"298-307","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Presence Patterns and Privacy Analysis"],"prefix":"10.1007","author":[{"given":"Ella","family":"Roubtsova","sequence":"first","affiliation":[]},{"given":"Serguei","family":"Roubtsov","sequence":"additional","affiliation":[]},{"given":"Greg","family":"Alp\u00e1r","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,30]]},"reference":[{"key":"21_CR1","first-page":"236","volume":"10","author":"NLA Aziz","year":"2016","unstructured":"Aziz, N.L.A., Aizam, N.A.H.: A survey on the requirements of university course timetabling. World Acad. Sci. Eng. Technol. Int. J. Math. Comput. Phys. Electr. Comput. Eng. 10, 236\u2013241 (2016)","journal-title":"World Acad. Sci. Eng. Technol. Int. J. Math. Comput. Phys. Electr. Comput. Eng."},{"key":"21_CR2","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s12394-010-0062-y","volume":"3","author":"A Cavoukian","year":"2010","unstructured":"Cavoukian, A.: Privacy by design: the definitive workshop. A foreword by Ann Cavoukian, Ph.D. Identity Inf. Soc. 3, 247\u2013251 (2010)","journal-title":"Identity Inf. Soc."},{"key":"21_CR3","unstructured":"Chew, M., Balfanz, D., Laurie, B.: (Under) mining privacy in social networks. Citeseer (2008)"},{"key":"21_CR4","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.comnet.2014.10.033","volume":"78","author":"F Ganji","year":"2015","unstructured":"Ganji, F., Budzisz, \u0141., Debele, F.G., Li, N., Meo, M., Ricca, M., Zhang, Y., Wolisz, A.: Greening campus WLANs: energy-relevant usage and mobility patterns. Comput. Netw. 78, 164\u2013181 (2015)","journal-title":"Comput. Netw."},{"key":"21_CR5","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1123\/jtpe.4.1.30","volume":"4","author":"PS Griffin","year":"1985","unstructured":"Griffin, P.S.: Girls\u2019 participation patterns in a middle school team sports unit. J. Teach. Phys. Educ. 4, 30\u201338 (1985)","journal-title":"J. Teach. Phys. Educ."},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 71\u201380 (2005)","DOI":"10.1145\/1102199.1102214"},{"key":"21_CR7","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1007\/978-3-642-55415-5_38","volume-title":"ICT Systems Security and Privacy Protection","author":"J-H Hoepman","year":"2014","unstructured":"Hoepman, J.-H.: Privacy design strategies. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds.) SEC 2014. IAICT, vol. 428, pp. 446\u2013459. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-55415-5_38"},{"key":"21_CR8","doi-asserted-by":"publisher","first-page":"1366","DOI":"10.1016\/j.tourman.2006.09.023","volume":"28","author":"H Kim","year":"2007","unstructured":"Kim, H., Cheng, C.-K., O\u2019Leary, J.T.: Understanding participation patterns and trends in tourism cultural attractions. Tour. manage. 28, 1366\u20131371 (2007)","journal-title":"Tour. manage."},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Korolova, A., Motwani, R., Nabar, S.U., Xu, Y.: Link privacy in social networks. In: Proceedings of the 17th ACM Conference on Information and Knowledge Management, pp. 289\u2013298 (2008)","DOI":"10.1145\/1458082.1458123"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Mislove, A., Marcon, M., Gummadi, K.P., Druschel, P., Bhattacharjee, B.: Measurement and analysis of online social networks. In: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, pp. 29\u201342 (2007)","DOI":"10.1145\/1298306.1298311"},{"key":"21_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1007\/978-3-642-22875-9_35","volume-title":"Smart Spaces and Next Generation Wired\/Wireless Networking","author":"MM Mulhanga","year":"2011","unstructured":"Mulhanga, M.M., Lima, S.R., Carvalho, P.: Characterising university WLANs within eduroam context. In: Balandin, S., Koucheryavy, Y., Hu, H. (eds.) NEW2AN\/ruSMART -2011. LNCS, vol. 6869, pp. 382\u2013394. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22875-9_35"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 173\u2013187 (2009)","DOI":"10.1109\/SP.2009.22"},{"key":"21_CR13","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/69.109108","volume":"3","author":"T-A Su","year":"1991","unstructured":"Su, T.-A., Ozsoyoglu, G.: Controlling FD and MVD inferences in multilevel relational database systems. IEEE Trans. Knowl. Data Eng. 3, 474\u2013485 (1991)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"21_CR14","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10, 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."}],"container-title":["Lecture Notes in Business Information Processing","Business Modeling and Software Design"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-94214-8_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T15:02:44Z","timestamp":1709823764000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-94214-8_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319942131","9783319942148"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-94214-8_21","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"30 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BMSD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Business Modeling and Software Design","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vienna","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bmsd2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.is-bmsd.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}