{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:17:01Z","timestamp":1725567421181},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642165665"},{"type":"electronic","value":"9783642165672"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16567-2_2","type":"book-chapter","created":{"date-parts":[[2010,10,13]],"date-time":"2010-10-13T11:51:38Z","timestamp":1286970698000},"page":"19-34","source":"Crossref","is-referenced-by-count":5,"title":["Toward a Behavioral Approach to Privacy for Online Social Networks"],"prefix":"10.1007","author":[{"given":"Lerone D.","family":"Banks","sequence":"first","affiliation":[]},{"given":"S. Felix","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/11957454_3","volume-title":"Privacy Enhancing Technologies","author":"A. Acquisti","year":"2006","unstructured":"Acquisti, A., Gross, R.: Imagined communities: Awareness, information sharing, and privacy on the facebook. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol.\u00a04258, pp. 36\u201358. Springer, Heidelberg (2006)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Anthony, D., Henderson, T., Kotz, D.: Privacy in location-aware computing environments. In: IEEE Pervasive Computing, pp. 64\u201372 (2007)","DOI":"10.1109\/MPRV.2007.83"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Banks, L., Wu, S.F.: All friends are not created equal: An interaction intensity based approach to privacy in online social networks. In: IEEE International Conference on Computational Science and Engineering, vol.\u00a04, pp. 970\u2013974 (2009)","DOI":"10.1109\/CSE.2009.429"},{"key":"2_CR4","unstructured":"Barbaro, M., Zeller Jr., T.: A face is exposed for aol searcher no.4417749. The New York Times (2006)"},{"key":"2_CR5","unstructured":"CNN.com. Forced to quit over facebook? (2009)"},{"key":"2_CR6","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1145\/1054972.1054985","volume-title":"Proceedings of the SIGCHI conference on Human factors in computing systems","author":"S. Consolvo","year":"2005","unstructured":"Consolvo, S., Smith, I.E., Matthews, T., LaMarca, A., Tabert, J., Powledge, P.: Location disclosure to social relations: why, when, & what people want to share. In: Proceedings of the SIGCHI conference on Human factors in computing systems, pp. 81\u201390. ACM, New York (2005)"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Cummings, J.N., Butler, B., Kraut, R.: The quality of online social relationships. Communications of the ACM, 103\u2013108 (2002)","DOI":"10.1145\/514236.514242"},{"key":"2_CR8","unstructured":"Facebook.com. Facebook press room statistics (July 2010), http:\/\/www.facebook.com\/press\/info.php?statistics"},{"key":"2_CR9","first-page":"22","volume-title":"NSDI 2006: Proceedings of the 3rd conference on Networked Systems Design & Implementation","author":"S. Garriss","year":"2006","unstructured":"Garriss, S., Kaminsky, M., Freedman, M.J., Karp, B., Mazi\u00e8res, D., Yu, H.: Re: reliable email. In: NSDI 2006: Proceedings of the 3rd conference on Networked Systems Design & Implementation, p. 22. USENIX Association, Berkeley (2006)"},{"key":"2_CR10","first-page":"211","volume-title":"CHI 2009","author":"E. Gilbert","year":"2009","unstructured":"Gilbert, E., Karahalios, K.: Predicting tie strength with social media. In: CHI 2009, pp. 211\u2013220. ACM, New York (2009)"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Granovetter, M.S.: The strength of weak ties. The American Journal of Sociology (1973)","DOI":"10.1086\/225469"},{"key":"2_CR12","first-page":"71","volume-title":"WEPS 2005","author":"R. Gross","year":"2005","unstructured":"Gross, R., Acquisti, A., Heinz, J.H.: Information revelation and privacy in online social networks. In: WEPS 2005, pp. 71\u201380. ACM Press, New York (2005)"},{"key":"2_CR13","unstructured":"Kincaid, J.: Facebook rewrites privacy policy, foreshadows location based services (October 2009), http:\/\/techcrunch.com\/2009\/10\/29\/facebook-rewrites-privacy-policy-foreshadows-location-based-services\/"},{"key":"2_CR14","unstructured":"Manor, D.: Eff proposes new bill of rights for facebook users (May 2010), http:\/\/www.allfacebook.com\/2010\/05\/eff-proposes-new-bill-of-rights-for-facebook-users\/"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Marti, S., Ganesan, P., Garcia-Molina, H.: Dht routing using social links. In: International Workshop on Peer-to-Peer Systems 2004 (2004)","DOI":"10.1007\/978-3-540-30183-7_10"},{"key":"2_CR16","unstructured":"Matyszczyk, C.: Wife exposes chief spy\u2019s personal life on facebook (July 2009), http:\/\/news.cnet.com\/8301-17852_3-10279317-71.html"},{"key":"2_CR17","first-page":"1985","volume-title":"CHI 2005: extended abstracts on Human factors in computing systems","author":"J.S. Olson","year":"2005","unstructured":"Olson, J.S., Grudin, J., Horvitz, E.: A study of preferences for sharing and privacy. In: CHI 2005: extended abstracts on Human factors in computing systems, pp. 1985\u20131988. ACM, New York (2005)"},{"key":"2_CR18","unstructured":"O\u2019Neill, N.: Infographic: The history of facebook\u2019s default privacy settings (May 2010), http:\/\/www.allfacebook.com\/2010\/05\/infographic-the-history-of-facebooks-default-privacy-settings\/"},{"key":"2_CR19","first-page":"38","volume-title":"EC 2001: Proceedings of the 3rd ACM conference on Electronic Commerce","author":"S. Spiekermann","year":"2001","unstructured":"Spiekermann, S., Grossklags, J., Berendt, B.: E-privacy in 2nd generation e-commerce: privacy preferences versus actual behavior. In: EC 2001: Proceedings of the 3rd ACM conference on Electronic Commerce, pp. 38\u201347. ACM, New York (2001)"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Tsai, J., Cranor, L., Acquisti, A., Fong, C.: What\u2019s it to you? a survey of online privacy concerns and risks. Working Papers 06-29, NET Institute (2006)","DOI":"10.2139\/ssrn.941708"},{"key":"2_CR21","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1145\/1519065.1519089","volume-title":"Proceedings of the Fourth ACM European conference on Computer Systems (EuroSys)","author":"C. Wilson","year":"2009","unstructured":"Wilson, C., Boe, B., Sala, A., Puttaswamy, K.P.N., Zhao, B.Y.: User interactions in social networks and their implications. In: Proceedings of the Fourth ACM European conference on Computer Systems (EuroSys), pp. 205\u2013218. ACM, New York (2009)"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: Sybillimit: A near-optimal social network defense against sybil attacks. In: IEEE Symposium on In Security and Privacy, pp. 3\u201317 (2008)","DOI":"10.1109\/SP.2008.13"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Zinoviev, D., Duong, V.: Toward understanding friendship in online social networks. International Journal of Technology, Knowledge, and Society (2009)","DOI":"10.18848\/1832-3669\/CGP\/v05i02\/55977"},{"key":"2_CR24","unstructured":"Zuckerberg, M.: An open letter from facebook founder mark zuckerberg (December 2009), http:\/\/blog.facebook.com\/blog.php?post=190423927130&ref=share"}],"container-title":["Lecture Notes in Computer Science","Social Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16567-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,11]],"date-time":"2021-11-11T19:33:22Z","timestamp":1636659202000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16567-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642165665","9783642165672"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16567-2_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}