{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:19:09Z","timestamp":1725538749286},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642317231"},{"type":"electronic","value":"9783642317248"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31724-8_53","type":"book-chapter","created":{"date-parts":[[2012,7,21]],"date-time":"2012-07-21T15:32:34Z","timestamp":1342884754000},"page":"509-518","source":"Crossref","is-referenced-by-count":6,"title":["Privacy Issues in Social Networks: A Brief Survey"],"prefix":"10.1007","author":[{"given":"Irene","family":"D\u00edaz","sequence":"first","affiliation":[]},{"given":"Anca","family":"Ralescu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"53_CR1","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/S0378-8733(03)00009-1","volume":"25","author":"L.A. Adamic","year":"2003","unstructured":"Adamic, L.A., Adar, E.: Friends and neighbors on the web. Social networks\u00a025(3), 211\u2013230 (2003)","journal-title":"Social networks"},{"doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C., Yu, P.S.: An introduction to privacy-preserving data mining. In: Privacy-Preserving Data Mining, pp. 1\u20139 (2008)","key":"53_CR2","DOI":"10.1007\/978-0-387-70992-5_1"},{"doi-asserted-by":"crossref","unstructured":"Beach, A., Gartrell, M., Han, R.: q-anon: Rethinking anonymity for social networks. In: Elmagarmid, A.K., Agrawal, D. (eds.) SocialCom\/PASSAT, pp. 185\u2013192. IEEE Computer Society (2010)","key":"53_CR3","DOI":"10.1109\/SocialCom.2010.34"},{"doi-asserted-by":"crossref","unstructured":"Beach, A., Gartrell, M., Han, R.: Social-K: Real-time K-anonymity guarantees for social network applications. In: 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 600\u2013606. IEEE ( March 2010)","key":"53_CR4","DOI":"10.1109\/PERCOMW.2010.5470507"},{"issue":"4","key":"53_CR5","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1177\/001872675100400404","volume":"4","author":"D. Cartwright","year":"1951","unstructured":"Cartwright, D.: Achieving change in people: Some applications of group dynamics theory. Human Relations\u00a04(4), 381\u2013392 (1951)","journal-title":"Human Relations"},{"issue":"5","key":"53_CR6","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1037\/h0046049","volume":"63","author":"D. Cartwright","year":"1956","unstructured":"Cartwright, D., Harary, F.: Structural balance: a generalization of heider\u2019s theory. Psychological Review\u00a063(5), 277 (1956)","journal-title":"Psychological Review"},{"issue":"3","key":"53_CR7","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1086\/266399","volume":"16","author":"K.W. Deutsch","year":"1952","unstructured":"Deutsch, K.W.: On communication models in the social sciences. Public Opinion Quarterly\u00a016(3), 356\u2013380 (1952)","journal-title":"Public Opinion Quarterly"},{"key":"53_CR8","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/978-3-642-14055-6_47","volume-title":"Information Processing and Management of Uncertainty in Knowledge-Based Systems. Theory and Methods","author":"I. D\u00edaz","year":"2010","unstructured":"D\u00edaz, I., Ranilla, J., Rodr\u00edguez-Muniz, L.J., Troiano, L.: Identifying the Risk of Attribute Disclosure by Mining Fuzzy Rules. In: H\u00fcllermeier, E., Kruse, R., Hoffmann, F. (eds.) IPMU 2010. CCIS, vol.\u00a080, pp. 455\u2013464. Springer, Heidelberg (2010)"},{"doi-asserted-by":"crossref","unstructured":"D\u00edaz, I., Rodr\u00edguez-Mu\u00f1iz, L.J., Troiano, L.: Fuzzy sets in data protection: strategies and cardinalities. Logic Journal of IGPL (2011)","key":"53_CR9","DOI":"10.1093\/jigpal\/jzr014"},{"key":"53_CR10","first-page":"153","volume":"151","author":"J. Domingo-Ferrer","year":"2003","unstructured":"Domingo-Ferrer, J., Torra, V.: On the connections between statistical disclosure control for microdata and some artificial intelligence tools. Inf. Sci. Inf. Comput. Sci.\u00a0151, 153\u2013170 (2003)","journal-title":"Inf. Sci. Inf. Comput. Sci."},{"key":"53_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C. Dwork","year":"2006","unstructured":"Dwork, C.: Differential Privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol.\u00a04052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"53_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C. Dwork","year":"2008","unstructured":"Dwork, C.: Differential Privacy: A Survey of Results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol.\u00a04978, pp. 1\u201319. Springer, Heidelberg (2008)"},{"unstructured":"Dwyer, C., Hiltz, S.R., Passerini, K.: Trust and privacy concern within social networking sites: A comparison of facebook and myspace. In: Proceedings of the Thirteenth Americas Conference on Information Systems (AMCIS 2007) (2007) Paper 339","key":"53_CR13"},{"unstructured":"Fang, C., Kohram, M., Ralescu, A.: Towards a spectral regression with low-rank approximation approach for link prediction in dynamic graphs. IEEE Intelligent Systems\u00a099, 1","key":"53_CR14"},{"key":"53_CR15","volume-title":"Introduction to social network methods","author":"R.A. Hanneman","year":"2005","unstructured":"Hanneman, R.A., Riddle, M.: Introduction to social network methods. University of California, Riverside (2005)"},{"issue":"1","key":"53_CR16","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1080\/00223980.1946.9917275","volume":"21","author":"F. Heider","year":"1946","unstructured":"Heider, F.: Attitudes and cognitive organization. The Journal of Psychology\u00a021(1), 107\u2013112 (1946)","journal-title":"The Journal of Psychology"},{"unstructured":"Holsheimer, M., Siebes, A.P.J.M.: Data mining: the search for knowledge in databases. Technical report, Amsterdam, The Netherlands, The Netherlands (1994)","key":"53_CR17"},{"doi-asserted-by":"crossref","unstructured":"Jamali, M., Abolhassani, H.: Different aspects of social network analysis. In: IEEE\/WIC\/ACM International Conference on Web Intelligence, WI 2006, pp. 66\u201372 (December 2006)","key":"53_CR18","DOI":"10.1109\/WI.2006.61"},{"issue":"1","key":"53_CR19","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/BF02289026","volume":"18","author":"L. Katz","year":"1953","unstructured":"Katz, L.: A new status index derived from sociometric analysis. Psychometrika\u00a018(1), 39\u201343 (1953)","journal-title":"Psychometrika"},{"doi-asserted-by":"crossref","unstructured":"Korolova, A., Motwani, R., Nabar, S.U., Xu, Y.: Link privacy in social networks. In: Proceeding of the 17th ACM Conference on Information and Knowledge Management, pp. 289\u2013298. ACM (2008)","key":"53_CR20","DOI":"10.1145\/1458082.1458123"},{"key":"53_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-1685-5","volume-title":"Learning from good and bad data","author":"P.D. Laird","year":"1988","unstructured":"Laird, P.D.: Learning from good and bad data. Kluwer Academic Publishers, Norwell (1988)"},{"issue":"2","key":"53_CR22","doi-asserted-by":"publisher","first-page":"26120","DOI":"10.1103\/PhysRevE.73.026120","volume":"73","author":"E.A. Leicht","year":"2006","unstructured":"Leicht, E.A., Holme, P., Newman, M.E.J.: Vertex similarity in networks. Physical Review E\u00a073(2), 26120 (2006)","journal-title":"Physical Review E"},{"key":"53_CR23","volume-title":"The structure of American economy: An empirical application of equilibrium analysis","author":"W.W. Leontief","year":"1951","unstructured":"Leontief, W.W.: The structure of American economy, 1919-1939: An empirical application of equilibrium analysis. Oxford University Press, New York (1951)"},{"doi-asserted-by":"crossref","unstructured":"Li, N., Li, T.: t-closeness: Privacy beyond k-anonymity and?-diversity. In: Proceedings of IEEE International Conference on Data Engineering (2007)","key":"53_CR24","DOI":"10.1109\/ICDE.2007.367856"},{"doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: ICDE, pp. 106\u2013115 (2007)","key":"53_CR25","DOI":"10.1109\/ICDE.2007.367856"},{"issue":"7","key":"53_CR26","doi-asserted-by":"publisher","first-page":"1019","DOI":"10.1002\/asi.20591","volume":"58","author":"D. Liben-Nowell","year":"2007","unstructured":"Liben-Nowell, D., Kleinberg, J.: The link-prediction problem for social networks. Journal of the American society for information science and technology\u00a058(7), 1019\u20131031 (2007)","journal-title":"Journal of the American society for information science and technology"},{"unstructured":"Liu, K., Das, K., Grandison, T., Kargupta, H.: Privacy-preserving data analysis on graphs and social networks","key":"53_CR27"},{"issue":"4","key":"53_CR28","doi-asserted-by":"publisher","first-page":"4559","DOI":"10.1016\/j.eswa.2010.09.130","volume":"38","author":"G. Loukides","year":"2011","unstructured":"Loukides, G., Shao, J.: Preventing range disclosure in k-anonymised data. Expert Syst. Appl.\u00a038(4), 4559\u20134574 (2011)","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"53_CR29","first-page":"1","volume":"2","author":"L. Lov\u00e1sz","year":"1993","unstructured":"Lov\u00e1sz, L.: Random walks on graphs: A survey. Combinatorics, Paul Erdos is Eighty\u00a02(1), 1\u201346 (1993)","journal-title":"Combinatorics, Paul Erdos is Eighty"},{"doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: 22nd IEEE International Conference on Data Engineering (2006)","key":"53_CR30","DOI":"10.1109\/ICDE.2006.1"},{"key":"53_CR31","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents\u2019 identities in microdata release. IEEE Transactions on Knowledge and Data Engineering\u00a013, 1010\u20131027 (2001)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"1","key":"53_CR32","first-page":"1","volume":"4","author":"R. Sarathy","year":"2011","unstructured":"Sarathy, R., Muralidhar, K.: Evaluating laplace noise addition to satisfy differential privacy for numeric data. Transactions on Data Privacy\u00a04(1), 1\u201317 (2011)","journal-title":"Transactions on Data Privacy"},{"unstructured":"Facebook Statistics, \n                    \n                      www.facebook.com\/press\/info.php?statistics","key":"53_CR33"},{"issue":"5","key":"53_CR34","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"key":"53_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/978-3-642-01307-2_6","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"X. Ying","year":"2009","unstructured":"Ying, X., Wu, X.: On Link Privacy in Randomizing Social Networks. In: Theeramunkong, T., Kijsirikul, B., Cercone, N., Ho, T.-B. (eds.) PAKDD 2009. LNCS, vol.\u00a05476, pp. 28\u201339. Springer, Heidelberg (2009)"},{"doi-asserted-by":"crossref","unstructured":"Zheleva, E., Getoor, L.: To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In: Proceedings of the 18th International Conference on World Wide Web, pp. 531\u2013540. ACM (2009)","key":"53_CR36","DOI":"10.1145\/1526709.1526781"},{"issue":"1","key":"53_CR37","first-page":"1","volume":"28","author":"B. Zhou","year":"2010","unstructured":"Zhou, B., Pei, J.: The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks. Knowledge and Information Systems\u00a028(1), 1\u201338 (2010)","journal-title":"Knowledge and Information Systems"},{"key":"53_CR38","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/1540276.1540279","volume":"10","author":"B. Zhou","year":"2008","unstructured":"Zhou, B., Pei, J., Luk, W.: A brief survey on anonymization techniques for privacy preserving publishing of social network data. SIGKDD Explor. Newsl.\u00a010, 12\u201322 (2008)","journal-title":"SIGKDD Explor. Newsl."}],"container-title":["Communications in Computer and Information Science","Advances in Computational Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31724-8_53.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:46:16Z","timestamp":1620128776000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31724-8_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642317231","9783642317248"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31724-8_53","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}