{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T02:15:13Z","timestamp":1773368113072,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642198953","type":"print"},{"value":"9783642198960","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19896-0_11","type":"book-chapter","created":{"date-parts":[[2011,4,16]],"date-time":"2011-04-16T07:43:17Z","timestamp":1302939797000},"page":"127-140","source":"Crossref","is-referenced-by-count":21,"title":["Content-Based Filtering in On-Line Social Networks"],"prefix":"10.1007","author":[{"given":"Marco","family":"Vanetti","sequence":"first","affiliation":[]},{"given":"Elisabetta","family":"Binaghi","sequence":"additional","affiliation":[]},{"given":"Barbara","family":"Carminati","sequence":"additional","affiliation":[]},{"given":"Moreno","family":"Carullo","sequence":"additional","affiliation":[]},{"given":"Elena","family":"Ferrari","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1145\/1321211.1321251","volume-title":"Proceedings of the 2007 Conference of the Center for Advanced Studies on Collaborative Research","author":"B. Ali","year":"2007","unstructured":"Ali, B., Villegas, W., Maheswaran, M.: A trust based approach for protecting user data in social networks. In: Proceedings of the 2007 Conference of the Center for Advanced Studies on Collaborative Research, pp. 288\u2013293. ACM, New York (2007)"},{"issue":"5","key":"11_CR2","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1016\/S0306-4573(99)00012-6","volume":"35","author":"G. Amati","year":"1999","unstructured":"Amati, G., Crestani, F.: Probabilistic learning for selective dissemination of information. Information Processing and Management\u00a035(5), 633\u2013654 (1999)","journal-title":"Information Processing and Management"},{"key":"11_CR3","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MC.2005.132","volume":"38","author":"P.O. Boykin","year":"2005","unstructured":"Boykin, P.O., Roychowdhury, V.P.: Leveraging social networks to fight spam. IEEE Computer Magazine\u00a038, 61\u201367 (2005)","journal-title":"IEEE Computer Magazine"},{"key":"11_CR4","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1108\/17440080810919468","volume":"4","author":"B. Carminati","year":"2008","unstructured":"Carminati, B., Ferrari, E.: Access control and privacy in web-based social networks. International Journal of Web Information Systems\u00a04, 395\u2013415 (2008)","journal-title":"International Journal of Web Information Systems"},{"issue":"1","key":"11_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1609956.1609962","volume":"13","author":"B. Carminati","year":"2009","unstructured":"Carminati, B., Ferrari, E., Perego, A.: Enforcing access control in web-based social networks. ACM Trans. Inf. Syst. Secur.\u00a013(1), 1\u201338 (2009)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"11_CR6","doi-asserted-by":"publisher","first-page":"870","DOI":"10.1016\/j.patrec.2009.04.001","volume":"30","author":"M. Carullo","year":"2009","unstructured":"Carullo, M., Binaghi, E., Gallo, I.: An online document clustering technique for short web contents. Pattern Recognition Letters\u00a030, 870\u2013876 (2009)","journal-title":"Pattern Recognition Letters"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Churcharoenkrung, N., Kim, Y.S., Kang, B.H.: Dynamic web content filtering based on user\u2019s knowledge. In: International Conference on Information Technology: Coding and Computing, vol.\u00a01, pp. 184\u2013188 (2005)","DOI":"10.1109\/ITCC.2005.137"},{"key":"11_CR8","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1145\/1772690.1772727","volume-title":"WWW 2010: Proceedings of the 19th International Conference on World Wide Web","author":"L. Fang","year":"2010","unstructured":"Fang, L., LeFevre, K.: Privacy wizards for social networking sites. In: WWW 2010: Proceedings of the 19th International Conference on World Wide Web, pp. 351\u2013360. ACM, New York (2010)"},{"key":"11_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-642-04444-1_19","volume-title":"Computer Security \u2013 ESORICS 2009","author":"P.W.L. Fong","year":"2009","unstructured":"Fong, P.W.L., Anwar, M.M., Zhao, Z.: A privacy preservation model for facebook-style social network systems. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.\u00a05789, pp. 303\u2013320. Springer, Heidelberg (2009)"},{"key":"11_CR10","volume-title":"Information Retrieval: Data Structures & Algorithms","year":"1992","unstructured":"Frakes, W., Baeza-Yates, R. (eds.): Information Retrieval: Data Structures & Algorithms. Prentice-Hall, Englewood Cliffs (1992)"},{"key":"11_CR11","unstructured":"Golbeck, J.A.: Computing and Applying Trust in Web-based Social Networks. Ph.D. thesis, Graduate School of the University of Maryland, College Park (2005)"},{"key":"11_CR12","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1023\/A:1011196000674","volume":"11","author":"U. Hanani","year":"2001","unstructured":"Hanani, U., Shapira, B., Shoval, P.: Information filtering: Overview of issues, research and systems. User Modeling and User-Adapted Interaction\u00a011, 203\u2013259 (2001)","journal-title":"User Modeling and User-Adapted Interaction"},{"key":"11_CR13","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1145\/345508.345572","volume-title":"SIGIR 2000: Proceedings of the 23rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval","author":"Y.H. Kim","year":"2000","unstructured":"Kim, Y.H., Hahn, S.Y., Zhang, B.T.: Text filtering by boosting naive bayes classifiers. In: SIGIR 2000: Proceedings of the 23rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 168\u2013175. ACM, New York (2000)"},{"issue":"1","key":"11_CR14","doi-asserted-by":"publisher","first-page":"159","DOI":"10.2307\/2529310","volume":"33","author":"J.R. Landis","year":"1977","unstructured":"Landis, J.R., Koch, G.: The measurement of observer agreement for categorical data. Biometrics\u00a033(1), 159\u2013174 (1977)","journal-title":"Biometrics"},{"key":"11_CR15","first-page":"103","volume":"1","author":"A. Laudanna","year":"1995","unstructured":"Laudanna, A., Thornton, A., Brown, G., Burani, C., Marconi, L.: Un corpus dell\u2019italiano scritto contemporaneo dalla parte del ricevente. III Giornate Internazionali di Analisi Statistica dei Dati Testuali\u00a01, 103\u2013109 (1995)","journal-title":"III Giornate Internazionali di Analisi Statistica dei Dati Testuali"},{"key":"11_CR16","unstructured":"Lewis, D.D., Yang, Y., Rose, T.G., Li, F.: RCV1: A new benchmark collection for text categorization research. Journal of Machine Learning Research (2004)"},{"key":"11_CR17","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction to Information Retrieval","author":"C. Manning","year":"2008","unstructured":"Manning, C., Raghavan, P., Sch\u00fctze, H.: Introduction to Information Retrieval. Cambridge University Press, Cambridge (2008)"},{"key":"11_CR18","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1162\/neco.1989.1.2.281","volume":"1","author":"J. Moody","year":"1989","unstructured":"Moody, J., Darken, C.: Fast learning in networks of locally-tuned processing units. Neural Computation\u00a01, 281\u2013294 (1989)","journal-title":"Neural Computation"},{"key":"11_CR19","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/LAWEB.2003.1250305","volume-title":"LA-WEB 2003: Proceedings of the First Conference on Latin American Web Congress","author":"J.d.J. P\u00e9rez-Alc\u00e1zar","year":"2003","unstructured":"P\u00e9rez-Alc\u00e1zar, J.d.J., Calder\u00f3n-Benavides, M.L., Gonz\u00e1lez-Caro, C.N.: Towards an information filtering system in the web integrating collaborative and content based techniques. In: LA-WEB 2003: Proceedings of the First Conference on Latin American Web Congress, p. 222. IEEE Computer Society, Washington (2003)"},{"issue":"5","key":"11_CR20","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1016\/0306-4573(88)90021-0","volume":"24","author":"G. Salton","year":"1988","unstructured":"Salton, G., Buckley, C.: Term-weighting approaches in automatic text retrieval. Information Processing and Management\u00a024(5), 513\u2013523 (1988)","journal-title":"Information Processing and Management"},{"issue":"1","key":"11_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/505282.505283","volume":"34","author":"F. Sebastiani","year":"2002","unstructured":"Sebastiani, F.: Machine learning in automated text categorization. ACM Computing Surveys\u00a034(1), 1\u201347 (2002)","journal-title":"ACM Computing Surveys"},{"key":"11_CR22","first-page":"157","volume-title":"SOUPS 2007: Proceedings of the 3rd Symposium on Usable Privacy and Security","author":"K. Strater","year":"2007","unstructured":"Strater, K., Richter, H.: Examining privacy and disclosure in a social networking community. In: SOUPS 2007: Proceedings of the 3rd Symposium on Usable Privacy and Security, pp. 157\u2013158. ACM, New York (2007)"},{"key":"11_CR23","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1145\/1397735.1397746","volume-title":"WOSP 2008: Proceedings of the First Workshop on Online Social Networks","author":"A. Tootoonchian","year":"2008","unstructured":"Tootoonchian, A., Gollu, K.K., Saroiu, S., Ganjali, Y., Wolman, A.: Lockr: social access control for web 2.0. In: WOSP 2008: Proceedings of the First Workshop on Online Social Networks, pp. 43\u201348. ACM, New York (2008)"}],"container-title":["Lecture Notes in Computer Science","Privacy and Security Issues in Data Mining and Machine Learning"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19896-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,5]],"date-time":"2025-03-05T03:38:54Z","timestamp":1741145934000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19896-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642198953","9783642198960"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19896-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}