{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T12:37:21Z","timestamp":1774528641211,"version":"3.50.1"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319942674","type":"print"},{"value":"9783319942681","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-94268-1_81","type":"book-chapter","created":{"date-parts":[[2018,6,12]],"date-time":"2018-06-12T12:49:21Z","timestamp":1528807761000},"page":"883-892","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Understanding Data Breach: A Visualization Aspect"],"prefix":"10.1007","author":[{"given":"Liyuan","family":"Liu","sequence":"first","affiliation":[]},{"given":"Meng","family":"Han","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yiyun","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,13]]},"reference":[{"key":"81_CR1","unstructured":"Interstate Technology & Regulatory Council: ITRC sponsors and supporters (2018). https:\/\/www.idtheftcenter.org\/data-breaches.html"},{"key":"81_CR2","unstructured":"Cadwalladr, C., Graham-Harrison, E.: Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach (2018)"},{"key":"81_CR3","unstructured":"Shen, L.: Here\u2019s who is winning after Mark Zuckerberg\u2019s response to the Facebook data breach (2018). https:\/\/www.yahoo.com\/news\/winning-mark-zuckerberg-response-facebook-180549803.html"},{"key":"81_CR4","unstructured":"Armerding, T.: The 17 biggest data breaches of the 21st century (2018). https:\/\/www.csoonline.com\/article\/2130877\/data-breach\/the-biggest-data-breaches-of-the-21st-century.html"},{"key":"81_CR5","unstructured":"Ponemon Institute: 2017 Ponemon Cost of Data Breach Study (2018)"},{"key":"81_CR6","unstructured":"Baker, W., et al.: 2011 data breach investigations report. Verizon RISK Team, pp. 1\u201372 (2011)"},{"issue":"2","key":"81_CR7","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1080\/07421222.2015.1063315","volume":"32","author":"R Sen","year":"2015","unstructured":"Sen, R., Borle, S.: Estimating the contextual risk of data breach: an empirical approach. J. Manage. Inf. Syst. 32(2), 314\u2013341 (2015)","journal-title":"J. Manage. Inf. Syst."},{"issue":"16","key":"81_CR8","doi-asserted-by":"publisher","first-page":"3833","DOI":"10.1002\/sec.1522","volume":"9","author":"W Li","year":"2016","unstructured":"Li, W., et al.: Secure multi-unit sealed first-price auction mechanisms. Secur. Commun. Netw. 9(16), 3833\u20133843 (2016). SI on cyber security, crime, and forensics of wireless networks and applications","journal-title":"Secur. Commun. Netw."},{"key":"81_CR9","unstructured":"Quick, M., et al.: World\u2019s biggest data breaches. Informationisbeautiful 16 (2017). http:\/\/www.informationisbeautiful.net\/visualizations\/worlds-biggest-data-breaches-hacks\/"},{"key":"81_CR10","doi-asserted-by":"crossref","unstructured":"Tayan, O.: Concepts and tools for protecting sensitive data in the it industry: a review of trends, challenges and mechanisms for data-protection. Int. J. Adv. Comput. Sci. Appl. 8(2) (2017)","DOI":"10.14569\/IJACSA.2017.080207"},{"key":"81_CR11","doi-asserted-by":"crossref","unstructured":"Han, M., et al.: Privacy reserved influence maximization in GPS-enabled cyber-physicaland online social networks. In: 2016 IEEE International Conferences on Social Computing and Networking (SocialCom), pp. 284\u2013292. IEEE (2016)","DOI":"10.1109\/BDCloud-SocialCom-SustainCom.2016.51"},{"issue":"4","key":"81_CR12","first-page":"42","volume":"47","author":"JM Delgado","year":"2012","unstructured":"Delgado, J.M., Beranek, A.J.: The dangers of data breach. Multi Hous. News 47(4), 42 (2012)","journal-title":"Multi Hous. News"},{"issue":"1","key":"81_CR13","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1111\/j.1540-6296.2010.01178.x","volume":"13","author":"KM Gatzlaff","year":"2010","unstructured":"Gatzlaff, K.M., McCullough, K.A.: The effect of data breaches on shareholder wealth. Risk Manage. Insur. Rev. 13(1), 61\u201383 (2010)","journal-title":"Risk Manage. Insur. Rev."},{"key":"81_CR14","unstructured":"Acquisti, A., Friedman, A., Telang, R.: Is there a cost to privacy breaches? An event study. In: ICIS 2006 Proceedings, p. 94 (2006)"},{"issue":"1","key":"81_CR15","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1093\/cybsec\/tyw003","volume":"2","author":"B Edwards","year":"2016","unstructured":"Edwards, B., Hofmeyr, S., Forrest, S.: Hype and heavy tails: a closer look at data breaches. J. Cybersecur. 2(1), 3\u201314 (2016)","journal-title":"J. Cybersecur."},{"key":"81_CR16","first-page":"1","volume":"38","author":"C Hu","year":"2018","unstructured":"Hu, C., et al.: Privacy-preserving combinatorial auction without an auctioneer. EURASIP J. Wirel. Commun. Netw. 38, 1\u20138 (2018)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"81_CR17","unstructured":"Golden Oak Research Group Ltd.: U.S. Income Database Kaggle (2017). https:\/\/www.kaggle.com\/goldenoakresearch\/us-household-income-stats-geo-locations"},{"key":"81_CR18","unstructured":"MichaelStone: New York City Transport Statistics (2017)"},{"key":"81_CR19","doi-asserted-by":"publisher","first-page":"13466","DOI":"10.1109\/ACCESS.2018.2805464","volume":"6","author":"M Han","year":"2018","unstructured":"Han, M., et al.: Cognitive approach for location privacy protection. IEEE Access 6, 13466\u201313477 (2018)","journal-title":"IEEE Access"},{"key":"81_CR20","doi-asserted-by":"crossref","unstructured":"Sooksatra, K., et al.: Solving data trading dilemma with asymmetric incomplete information using zero-determinant strategy. In: International Conference on Wireless Algorithms, Systems and Applications (2018)","DOI":"10.1007\/978-3-319-94268-1_35"},{"key":"81_CR21","unstructured":"Harris, K.D., General, A.: California data breach report, 7 Aug 2016"},{"issue":"2","key":"81_CR22","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1109\/TNSM.2016.2559448","volume":"13","author":"L Zhang","year":"2016","unstructured":"Zhang, L., Cai, Z., Wang, X.: FakeMask: a novel privacy preserving approach for smartphones. IEEE Trans. Netw. Serv. Manage. 13(2), 335\u2013348 (2016)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"81_CR23","doi-asserted-by":"publisher","unstructured":"Cai, Z., et al.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secure Comput., 1 (2016). https:\/\/doi.org\/10.1109\/TDSC.2016.2613521","DOI":"10.1109\/TDSC.2016.2613521"},{"key":"81_CR24","doi-asserted-by":"publisher","unstructured":"Cai, Z., Zheng, X.: A private and efficient mechanism for data uploading in smart cyber-physical systems. IEEE Trans. Netw. Sci. Eng., 1 (2018). https:\/\/doi.org\/10.1109\/TNSE.2018.2830307","DOI":"10.1109\/TNSE.2018.2830307"},{"key":"81_CR25","doi-asserted-by":"crossref","unstructured":"Liang, Y., Cai, Z., Yu, J., Han, Q., Li, Y.: Deep learning based inference of private information using embedded sensors in smart devices. IEEE Netw. Mag. (2018)","DOI":"10.1109\/MNET.2018.1700349"},{"key":"81_CR26","doi-asserted-by":"crossref","unstructured":"Zheng, X., Cai, Z., Li, Y.: Data linkage in smart IoT systems: a consideration from privacy perspective. IEEE Commun. Mag. (2018)","DOI":"10.1109\/MCOM.2018.1701245"},{"key":"81_CR27","doi-asserted-by":"crossref","unstructured":"Han, M., et al.: Mining public business knowledge: a case study in SEC\u2019s EDGAR. In: 2016 IEEE International Conferences on Social Computing and Networking (SocialCom), pp. 393\u2013400. IEEE (2016)","DOI":"10.1109\/BDCloud-SocialCom-SustainCom.2016.65"},{"key":"81_CR28","first-page":"85","volume":"11","author":"R Ayyagari","year":"2012","unstructured":"Ayyagari, R., Tyks, J.: Disaster at a university: a case study in information security. J. Inf. Technol. Educ. 11, 85\u201396 (2012)","journal-title":"J. Inf. Technol. Educ."},{"key":"81_CR29","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1109\/TCSS.2018.2797225","volume":"5","author":"J Li","year":"2018","unstructured":"Li, J., Cai, Z., Wang, J., Han, M., Li, Y.: Truthful incentive mechanisms for geographical position conflicting mobile crowdsensing systems. IEEE Trans. Comput. Soc. Syst. 5, 324\u2013334 (2018). https:\/\/doi.org\/10.1109\/TCSS.2018.2797225","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"81_CR30","series-title":"SpringerBriefs in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-981-10-3892-1_4","volume-title":"Secure and Trustworthy Transportation Cyber-Physical Systems","author":"M Han","year":"2017","unstructured":"Han, M., Duan, Z., Li, Y.: Privacy issues for transportation cyber physical systems. In: Sun, Y., Song, H. (eds.) Secure and Trustworthy Transportation Cyber-Physical Systems. SCS, pp. 67\u201386. Springer, Singapore (2017). https:\/\/doi.org\/10.1007\/978-981-10-3892-1_4"},{"issue":"2","key":"81_CR31","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/BF02985802","volume":"27","author":"J Franklin","year":"2005","unstructured":"Franklin, J.: The elements of statistical learning: data mining, inference and prediction. Math. Intell. 27(2), 83\u201385 (2005)","journal-title":"Math. Intell."},{"key":"81_CR32","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: Advances in neural information processing systems, pp. 1097\u20131105 (2012)"},{"key":"81_CR33","unstructured":"Kinga, D., Adam, J.B.: A method for stochastic optimization. In: International Conference on Learning Representations (ICLR) (2015)"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-94268-1_81","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,19]],"date-time":"2019-10-19T10:19:02Z","timestamp":1571480342000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-94268-1_81"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319942674","9783319942681"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-94268-1_81","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}