{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:33:33Z","timestamp":1725536013555},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642033537"},{"type":"electronic","value":"9783642033544"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03354-4_8","type":"book-chapter","created":{"date-parts":[[2009,7,23]],"date-time":"2009-07-23T06:46:56Z","timestamp":1248331616000},"page":"85-99","source":"Crossref","is-referenced-by-count":0,"title":["Collaborative Search and User Privacy:How Can They Be Reconciled?"],"prefix":"10.1007","author":[{"given":"Thorben","family":"Burghardt","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Erik","family":"Buchmann","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Klemens","family":"B\u00f6hm","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chris","family":"Clifton","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Smyth, B., Balfe, E., Boydell, O.: A Live-User Evaluation of Collaborative Web Search. In: IJCAI (2005)","DOI":"10.1007\/978-3-540-28631-8_36"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Reddy, M.C., Jansen, B.J., Krishnappa, R.: The Role of Communication in Collaborative Information Searching. In: ASTIS (2008)","DOI":"10.1002\/meet.2008.1450450259"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Morris, M.R., Horvitz, E.: SearchTogether: An Interface for Collaborative Web Search. In: UIST (2007)","DOI":"10.1145\/1294211.1294215"},{"key":"8_CR4","unstructured":"Fireball (2008), http:\/\/www.fireball.de\/"},{"key":"8_CR5","unstructured":"Morris, M.R.: Collaborating Alone and Together: Investigating Persistent and Multi-User Web Search Activities. Technical report, Microsoft Research (2007)"},{"key":"8_CR6","unstructured":"EU Data Protection Working Party. Opinion on Data Protection Issues Related to Search Engines (2008)"},{"key":"8_CR7","unstructured":"W3.org (2002), www.w3.org\/TR\/P3P-preferences\/"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Cvrcek, D., et al.: A study on the Value of Location Privacy. In: WPES (2006)","DOI":"10.1145\/1179601.1179621"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Burghardt, T., Buchmann, E., B\u00f6hm, K.: Discovering the Scope of Privacy Needs in Collaborative Search. In: Web Intelligence (2008)","DOI":"10.1109\/WIIAT.2008.165"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Olson, J.S., Grudin, J., Horvitz, E.: A Study of Preferences for Sharing and Privacy. In: CHI (2005)","DOI":"10.1145\/1056808.1057073"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Acquisti, A., Grossklags, J.: Privacy and Rationality in Individual Decision Making. IEEE Security and Privacy (2005)","DOI":"10.1109\/MSP.2005.22"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Consolvo, S., et al.: Location Disclosure to Social Relations: Why, When, & What PeopleWant to Share. In: SIGCHI (2005)","DOI":"10.1145\/1054972.1054985"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Large, A., Beheshti, J., Rahman, T.: Gender Differences in Collaborative Web Searching Behavior: An Elementary School Study. In: Information Processessing and Management (2002)","DOI":"10.1016\/S0306-4573(01)00034-6"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Twidale, M.B., Nichols, D.M., Paice, C.D.: Browsing is a Collaborative Process. In: Information Processing and Management (1997)","DOI":"10.1016\/S0306-4573(97)00040-X"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Glance, N.S.: Community Search Assistant. In: Workshop on AI for Web Search AAAI (2001)","DOI":"10.1145\/359784.360293"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-540-77094-7_31","volume-title":"Asian Digital Libraries. Looking Back 10 Years and Forging New Frontiers","author":"S. Kriewel","year":"2007","unstructured":"Kriewel, S., Fuhr, N.: Adaptive Search Suggestions for Digital Libraries. In: Goh, D.H.-L., Cao, T.H., S\u00f8lvberg, I.T., Rasmussen, E. (eds.) ICADL 2007. LNCS, vol.\u00a04822, pp. 220\u2013229. Springer, Heidelberg (2007)"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Teevan, J., et al.: Information Re-Retrieval: Repeat Queries in Yahoo\u2019s Logs. In: SIGIR (2007)","DOI":"10.1145\/1277741.1277770"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"White, R.W., Morris, D.: Investigating the Querying and Browsing Behavior of Advanced Search Engine Users. In: SIGIR (2007)","DOI":"10.1145\/1277741.1277787"},{"key":"8_CR19","volume-title":"The Practice of Social Research","author":"E.R. Babbie","year":"2007","unstructured":"Babbie, E.R.: The Practice of Social Research, 10th edn. Academic Internet Publ., London (2007)","edition":"10"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Salton, G., Wong, A., Yang, C.S.: A vector space model for automatic indexing. Commun. ACM (1975)","DOI":"10.1145\/361219.361220"},{"key":"8_CR21","unstructured":"Yu, T., Winslett, M.: A Unified Scheme for Resource Protection in Automated Trust Negotiation. In: SP (2003)"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Zou, D., Liao, Z.: A new Approach for Hiding Policy and Checking Policy Consistency. In: ISA (2008)","DOI":"10.1109\/ISA.2008.39"},{"key":"8_CR23","unstructured":"IPD Privacy Web Site (2008), http:\/\/privacy.ipd.uni-karlsruhe.de\/"},{"key":"8_CR24","unstructured":"Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (1995)"},{"volume-title":"WordNet: An Electronic Lexical Database (Language, Speech, and Communication)","year":"1998","key":"8_CR25","unstructured":"Fellbaum, C. (ed.): WordNet: An Electronic Lexical Database (Language, Speech, and Communication). The MIT Press, Cambridge (1998)"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Horvitz, E.: Planetary-Scale Views on a Large Instant-Messaging network. In: WWW (2008)","DOI":"10.1145\/1367497.1367620"},{"key":"8_CR27","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/1314333.1314351","volume-title":"WPES","author":"F. Saint-Jean","year":"2007","unstructured":"Saint-Jean, F., et al.: Private Web Search. In: WPES, Alexandria, Virginia, October 29, pp. 84\u201390. ACM Press, New York (2007)"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Bertino, E., Ferrari, E., Squicciarini, A.C.: Trust-x: A peer-to-peer framework for trust establishment. In: TKDE (2004)","DOI":"10.1109\/TKDE.2004.1318565"},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Clifton, C.: Secure set intersection cardinality with application to association rule mining. Journal of Computer Security (2005)","DOI":"10.3233\/JCS-2005-13401"},{"key":"8_CR30","unstructured":"Barbaro, M., Zeller Jr., T.: A Face Is Exposed for AOL Searcher No. 4417749 (2006)"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Samarati, P.: Protecting respondent\u2019s privacy in microdata release. In: TKDE (2001)","DOI":"10.1109\/69.971193"},{"key":"8_CR32","doi-asserted-by":"crossref","unstructured":"Sweeney, L.: K-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems (2002)","DOI":"10.1142\/S0218488502001648"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Collaborative Computing: Networking, Applications and Worksharing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03354-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T03:19:38Z","timestamp":1685071178000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03354-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642033537","9783642033544"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03354-4_8","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2009]]}}}