{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:15:15Z","timestamp":1725578115223},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642196553"},{"type":"electronic","value":"9783642196560"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19656-0_12","type":"book-chapter","created":{"date-parts":[[2011,2,21]],"date-time":"2011-02-21T19:05:08Z","timestamp":1298315108000},"page":"78-85","source":"Crossref","is-referenced-by-count":3,"title":["Location Privacy Protection on Social Networks"],"prefix":"10.1007","author":[{"given":"Justin","family":"Zhan","sequence":"first","affiliation":[]},{"given":"Xing","family":"Fang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Abrol, S., Khan, L.: TweetHood: Agglomerative Clustering on Fuzzy k-Closest Friends with Variable Depth for Location Mining. In: Proceedings of the IEEE International Conference on Privacy, Security, Risk and Trust, Minneapolis, MN, USA, pp. 153\u2013160 (August 2010)","DOI":"10.1109\/SocialCom.2010.30"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Amoli, A., Kharrazi, M., Jalili, R.: 2Ploc: Preserving Privacy in Location-Based Services. In: Proceedings of the IEEE International Conference on Privacy, Security, Risk and Trust, Minneapolis, MN, USA, pp. 707\u2013712 (August 2010)","DOI":"10.1109\/SocialCom.2010.110"},{"key":"12_CR3","unstructured":"Blakely, R.: Does Facebook\u2019s Privacy Policy Stack Up?, http:\/\/business.timesonline.co.uk\/tol\/business\/industry_sectors\/technology\/article2430927.ece"},{"key":"12_CR4","unstructured":"Facebook Statistics, http:\/\/www.facebook.com\/press\/info.php?statistics"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Freni, D., Vicente, C., Mascetti, S., Bettini, C., Jensen, C.: Preserving Location and Absence Privacy in Geo-Social Networks. In: Proceedings of the 19th ACM International Conference on Information and Knowledge Management, Toronto, Ontario, Canada (October 2010)","DOI":"10.1145\/1871437.1871480"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Gross, R., Acquisti, A.: Information Revelation and Privacy in Online Social Networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, Alexandria, Virginia, USA, pp. 71\u201380 (November 2005)","DOI":"10.1145\/1102199.1102214"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Ho, A., Maiga, A., Aimeur, E.: Privacy Protection Issues in Social Networking Sites. In: Proceedings of IEEE\/ACS International Conference on Computer Systems and Applications, Rabat, Morocco, pp. 271\u2013278 (May 2009)","DOI":"10.1109\/AICCSA.2009.5069336"},{"key":"12_CR8","unstructured":"Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing Source-Location Privacy in Sensor Network Routing. In: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, Columbus, Ohio, USA (June 2005)"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Kong, J., Hong, X.: ANODR: Anonymous on Demand Routing with Untraceable Routes for Mobile ad-hoc Networks. In: Proceedings of the 4th ACM International Symposium on Mobile ad hoc Networking and Computing, New York, NY, USA, June 2003, pp. 291\u2013302 (2003)","DOI":"10.1145\/778415.778449"},{"key":"12_CR10","unstructured":"Lipford, H., Besmer, A., Watson, J.: Understanding Privacy Settings in Facebook with an Audience View. In: Proceedings of the 1st Conference on Usability, Psychology, and Security, San Francisco, USA, pp. 1\u20138 (April 2008)"},{"issue":"3","key":"12_CR11","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2007.75","volume":"5","author":"D. Rosenblum","year":"2007","unstructured":"Rosenblum, D.: What Anyone Can Know: The Privacy Risks of Social Networking Sites. IEEE Security and Privacy\u00a05(3), 40\u201349 (2007)","journal-title":"IEEE Security and Privacy"},{"issue":"12","key":"12_CR12","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1109\/MC.2003.1250896","volume":"36","author":"B. Schilit","year":"2003","unstructured":"Schilit, B., Hong, J., Gruteser, M.: Wireless Location Privacy Protection. Computer\u00a036(12), 135\u2013137 (2003)","journal-title":"Computer"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Seys, S., Preneel, B.: ARM: Anonymous Routing Protocol for Mobile ad hoc Networks. International Journal of Wireless and Mobile Computing\u00a03(3) (October 2009)","DOI":"10.1504\/IJWMC.2009.028896"},{"key":"12_CR14","unstructured":"Sogholan, C.: The Next Facebook Privacy Scandal, http:\/\/news.cnet.com\/8301-13739_3-9854409-46.html"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Strater, K., Lipford, H.: Strategies and Struggles with Privacy in an Online Social Networking Community. In: Proceedings of the 22nd British HCI Group Annual Conference, Liverpool, UK, pp. 111\u2013119 (September 2008)","DOI":"10.14236\/ewic\/HCI2008.11"},{"key":"12_CR16","unstructured":"Stross, R.: When Everyone\u2019s a Friend, Is Anything Private?, http:\/\/www.nytimes.com\/2009\/03\/09\/business\/worldbusiness\/09iht-08digi.20688637.html"},{"issue":"5","key":"12_CR17","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: A Model for Protecting Privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Taheri, S., Hartung, S., Hogrefe, D.: Achieving Receiver Location Privacy in Mobile ad hoc Networks. In: Proceedings of the IEEE International Conference on Privacy, Security, Risk and Trust, Minneapolis, MN, USA, pp. 800\u2013807 (August 2010)","DOI":"10.1109\/SocialCom.2010.122"}],"container-title":["Lecture Notes in Computer Science","Social Computing, Behavioral-Cultural Modeling and Prediction"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19656-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,16]],"date-time":"2020-06-16T19:30:46Z","timestamp":1592335846000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19656-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642196553","9783642196560"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19656-0_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}