{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:11:13Z","timestamp":1761621073489},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642237645"},{"type":"electronic","value":"9783642237652"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23765-2_15","type":"book-chapter","created":{"date-parts":[[2011,8,31]],"date-time":"2011-08-31T05:47:31Z","timestamp":1314769651000},"page":"216-233","source":"Crossref","is-referenced-by-count":20,"title":["An Investigation into Facebook Friend Grouping"],"prefix":"10.1007","author":[{"given":"Patrick Gage","family":"Kelley","sequence":"first","affiliation":[]},{"given":"Robin","family":"Brewer","sequence":"additional","affiliation":[]},{"given":"Yael","family":"Mayer","sequence":"additional","affiliation":[]},{"given":"Lorrie Faith","family":"Cranor","sequence":"additional","affiliation":[]},{"given":"Norman","family":"Sadeh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Acquisti, A., Gross, R.: Imagined communities: Awareness, information sharing, and privacy on the facebook. In: Privacy Enhancing Technology Symposium (2006)","DOI":"10.1007\/11957454_3"},{"key":"15_CR2","unstructured":"Adams, P.: The real life social network v2, http:\/\/www.slideshare.net\/padday\/the-real-life-social-network-v2"},{"key":"15_CR3","unstructured":"Berteau, S.: Facebook\u2019s Misrepresentation of Beacon\u2019s Threat to Privacy: Tracking users who opt out or are not logged in (November 29, 2007), http:\/\/community.ca.com\/blogs\/securityadvisor\/archive\/2007\/11\/29\/facebook-s-misrepresentation-of-beacon-s-threat-to-privacy-tracking-users-who-opt-out-or-are-not-logged-in.aspx"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Binder, J., Howes, A., Sutcliffe, A.: Conflicting social spheres and experienced tension in social networking sites. In: CHI (2009)","DOI":"10.1145\/1518701.1518849"},{"key":"15_CR5","unstructured":"Carr, A.: Facebook\u2019s New Groups, Dashboards, and Downloads Explained (October 6, 2010), http:\/\/www.fastcompany.com\/1693443\/facebooks-big-announcements-dashboards-personal-information-downloads-friend-group-lists"},{"key":"15_CR6","unstructured":"Davis, S., Gutwin, C.: Using relationship to control disclosure in awareness servers. In: Proceedings of Graphics Interface GI 2005, School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada, pp. 145\u2013152. Canadian Human-Computer Communications Society (2005)"},{"key":"15_CR7","unstructured":"Gates, G.: Facebook Privacy: A Bewildering Tangle of Options (September 18 ,2010), http:\/\/www.nytimes.com\/interactive\/2010\/05\/12\/business\/facebook-privacy.html"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Jones, S., O\u2019Neil, E.: Feasibility of structural network clustering for group-based privacy control in social networks. In: SOUPS (2010)","DOI":"10.1145\/1837110.1837122"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1145\/75334.75356","volume-title":"Proceedings of the 12th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 1989","author":"B. Kwasnik","year":"1989","unstructured":"Kwasnik, B.: How a personal document\u2019s intended use or purpose affects its classification in an office. In: Proceedings of the 12th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 1989, pp. 207\u2013210. ACM, New York (1989)"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Lampinen, A., Tamminen, S., Oulasvirta, A.: All my people right here, right now: Management of group co-presence on a social networking site. In: International Conference on Supporting Group Work (2009)","DOI":"10.1145\/1531674.1531717"},{"key":"15_CR11","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/s00779-004-0304-9","volume":"8","author":"S. Lederer","year":"2004","unstructured":"Lederer, S., Hong, I., Dey, K., Landay, A.: Personal privacy through understanding and action: five pitfalls for designers. Personal Ubiquitous Comput\u00a08, 440\u2013454 (2004)","journal-title":"Personal Ubiquitous Comput"},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1145\/357423.357430","volume":"1","author":"T.W. Malone","year":"1983","unstructured":"Malone, T.W.: How do people organize their desks?: Implications for the design of office information systems. ACM Trans. Inf. Syst.\u00a01, 99\u2013112 (1983)","journal-title":"ACM Trans. Inf. Syst."},{"key":"15_CR13","unstructured":"Marsden, R.: Facebook unveils its latest trick but the implications are worrying (September 18, 2010), http:\/\/www.independent.co.uk\/life-style\/gadgets-and-tech\/news\/facebook-unveils-its-latest-trick-ndash-but-the-implications-are-worrying-2082708.html"},{"key":"15_CR14","unstructured":"Mccarty, C.: Structure in personal networks. Journal of Social Structure\u00a03 (2002)"},{"key":"15_CR15","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1146\/annurev.ps.32.020181.000513","volume":"32","author":"C. Mervis","year":"1981","unstructured":"Mervis, C., Rosch, E.: Categorization of natural objects. Annual Review of Psychology\u00a032, 89\u2013115 (1981)","journal-title":"Annual Review of Psychology"},{"key":"15_CR16","unstructured":"Ostrow, A.: FACEBOOK FIRED: 8% of US Companies Have Sacked Social Media Miscreants (August 10, 2009), http:\/\/mashable.com\/2009\/08\/10\/social-media-misuse\/"},{"key":"15_CR17","unstructured":"Preibusch, S.: W3c workshop on privacy for advanced web apis. Journal of Interactive Advertising, 1213 (July 2010), http:\/\/www.w3.org\/2010\/api-privacy-ws\/slides\/preibusch.pdf"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Reeder, R., Bauer, L., Cranor, L.F., Reiter, M., Bacon, K., How, K., Strong, H.: Expandable grids for visualizing and authoring computer security policies. In: CHI (2008)","DOI":"10.1145\/1357054.1357285"},{"key":"15_CR19","unstructured":"Smart, D.: How do people limit their behaviour in response to their perception of potential social tension? A study of Facebook. Manchester Business School Bsc Interactive Systems Design (2009), http:\/\/intranet.cs.man.ac.uk\/Intranetsubweb\/library\/3yrep\/2009\/7024300.pdf"},{"issue":"2","key":"15_CR20","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1037\/0022-3514.62.2.207","volume":"62","author":"C. Stangor","year":"1992","unstructured":"Stangor, C., Lynch, L., Duan, C., Glass, B.: Categorization of individuals on the basis of multiple social features. Journal of Personality and Social Psychology\u00a062(2), 207\u2013218 (1992)","journal-title":"Journal of Personality and Social Psychology"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction \u2013 INTERACT 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23765-2_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T22:13:36Z","timestamp":1606169616000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23765-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642237645","9783642237652"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23765-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}