{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:35:38Z","timestamp":1743140138857,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":43,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642402029"},{"type":"electronic","value":"9783642402036"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40203-6_38","type":"book-chapter","created":{"date-parts":[[2013,8,14]],"date-time":"2013-08-14T02:48:53Z","timestamp":1376448533000},"page":"682-699","source":"Crossref","is-referenced-by-count":9,"title":["Nowhere to Hide: Navigating around Privacy in Online Social Networks"],"prefix":"10.1007","author":[{"given":"Mathias","family":"Humbert","sequence":"first","affiliation":[]},{"given":"Th\u00e9ophile","family":"Studer","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Grossglauser","sequence":"additional","affiliation":[]},{"given":"Jean-Pierre","family":"Hubaux","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"38_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/11957454_3","volume-title":"Privacy Enhancing Technologies","author":"A. Acquisti","year":"2006","unstructured":"Acquisti, A., Gross, R.: Imagined communities: Awareness, information sharing, and privacy on the facebook. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol.\u00a04258, pp. 36\u201358. Springer, Heidelberg (2006)"},{"key":"38_CR2","doi-asserted-by":"crossref","unstructured":"Acquisti, A.: An experiment in hiring discrimination via online social networks. Berkeley (April 2012)","DOI":"10.2139\/ssrn.2031979"},{"key":"38_CR3","unstructured":"Acquisti, A., Gross, R., Stutzman, F.: Faces of facebook: Privacy in the age of augmented reality. BlackHat USA (2011)"},{"key":"38_CR4","doi-asserted-by":"crossref","unstructured":"Adamic, L., Lukose, R., Puniyani, A., Huberman, B.: Search in power-law networks. Physical Review E 64 (2001)","DOI":"10.1103\/PhysRevE.64.046135"},{"key":"38_CR5","doi-asserted-by":"crossref","unstructured":"Aiello, L.M., Barrat, A., Schifanella, R., Cattuto, C., Markines, B., Menczer, F.: Friendship prediction and homophily in social media. ACM Transactions on the Web (TWEB) 6 (2012)","DOI":"10.1145\/2180861.2180866"},{"key":"38_CR6","doi-asserted-by":"crossref","unstructured":"Backstrom, L., Boldi, P., Rosa, M., Ugander, J., Vigna, S.: Four degrees of separation. In: Proceedings of the 3rd Annual ACM Web Science Conference (2011)","DOI":"10.1145\/2380718.2380723"},{"key":"38_CR7","unstructured":"Chaabane, A., Acs, G., Kaafar, M.: You are what you like! Information leakage through users\u2019 interests. In: NDSS (2012)"},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"Dey, R., Tang, C., Ross, K., Saxena, N.: Estimating age privacy leakage in online social networks. In: INFOCOM (2012)","DOI":"10.1109\/INFCOM.2012.6195711"},{"key":"38_CR9","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1126\/science.1081058","volume":"301","author":"P. Dodds","year":"2003","unstructured":"Dodds, P., Muhamad, R., Watts, D.: An experimental study of search in global social networks. Science\u00a0301, 827\u2013829 (2003)","journal-title":"Science"},{"key":"38_CR10","unstructured":"Finder, A.: For some, online persona undermines a r\u00e9sum\u00e9. The NY Times (2006)"},{"key":"38_CR11","doi-asserted-by":"crossref","unstructured":"Gjoka, M., Kurant, M., Butts, C.T., Markopoulou, A.: A walk in Facebook: Uniform sampling of users in online social networks. Tech. rep., UC Irvine (2011)","DOI":"10.1109\/JSAC.2011.111012"},{"key":"38_CR12","doi-asserted-by":"crossref","unstructured":"Gong, N.Z., Xu, W., Huang, L., Mittal, P., Stefanov, E., Sekar, V., Song, D.: Evolution of social-attribute networks: measurements, modeling, and implications using Google+. In: IMC (2012)","DOI":"10.1145\/2398776.2398792"},{"key":"38_CR13","doi-asserted-by":"crossref","unstructured":"Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: WPES (2005)","DOI":"10.1145\/1102199.1102214"},{"key":"38_CR14","doi-asserted-by":"crossref","unstructured":"Gundecha, P., Barbier, G., Liu, H.: Exploiting vulnerability to secure user privacy on a social networking site. In: KDD (2011)","DOI":"10.1145\/2020408.2020489"},{"key":"38_CR15","unstructured":"Gurses, S.: Multilateral privacy requirements analysis in online social network services. Ph.D. thesis, KU Leuven (2010)"},{"key":"38_CR16","unstructured":"Hachman, M.: Facebook now totals 901 million users, profits slip (April 2012), \n                    \n                      http:\/\/www.pcmag.com\/article2\/0,2817,2403410,00.asp"},{"key":"38_CR17","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/TSSC.1968.300136","volume":"4","author":"P. Hart","year":"1968","unstructured":"Hart, P., Nilsson, N., Raphael, B.: A formal basis for the heuristic determination of minimum cost paths. IEEE Transactions on Systems Science and Cybernetics\u00a04, 100\u2013107 (1968)","journal-title":"IEEE Transactions on Systems Science and Cybernetics"},{"key":"38_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/11760146_14","volume-title":"Intelligence and Security Informatics","author":"J. He","year":"2006","unstructured":"He, J., Chu, W.W., Liu, Z(V.): Inferring privacy information from social networks. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol.\u00a03975, pp. 154\u2013165. Springer, Heidelberg (2006)"},{"key":"38_CR19","unstructured":"Jain, P., Kumaraguru, P.: Finding nemo: Searching and resolving identities of users across online social networks. arXiv preprint arXiv:1212.6147 (2012)"},{"key":"38_CR20","unstructured":"Johnson, C.: Project Gaydar: An MIT experiment raises new questions about online privacy. Boston Globe (2009)"},{"key":"38_CR21","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/0378-8733(78)90018-7","volume":"1","author":"P. Killworth","year":"1979","unstructured":"Killworth, P., Bernard, H.: The reversal small-world experiment. Social Networks\u00a01, 159\u2013192 (1979)","journal-title":"Social Networks"},{"key":"38_CR22","doi-asserted-by":"crossref","unstructured":"K\u00f3tyuk, G., Butty\u00e1n, L.: A machine learning based approach for predicting undisclosed attributes in social networks. In: SESOC (2012)","DOI":"10.1109\/PerComW.2012.6197511"},{"key":"38_CR23","doi-asserted-by":"crossref","unstructured":"Krishnamurthy, B., Wills, C.: Characterizing privacy in online social networks. In: WOSN (2008)","DOI":"10.1145\/1397735.1397744"},{"key":"38_CR24","doi-asserted-by":"crossref","unstructured":"Krishnamurthy, B., Wills, C.: On the leakage of personally identifiable information via online social networks. In: WOSN (2009)","DOI":"10.1145\/1592665.1592668"},{"key":"38_CR25","doi-asserted-by":"crossref","unstructured":"Lattanzi, S., Panconesi, A., Sivakumar, D.: Milgram-routing in social networks. In: Proceedings of the 20th International Conference on World Wide Web (2011)","DOI":"10.1145\/1963405.1963507"},{"key":"38_CR26","doi-asserted-by":"crossref","unstructured":"Liben-Nowell, D., Novak, J., Kumar, R., Raghavan, P., Tomkins, A.: Geographic routing in social networks. Proceedings of the National Academy of Sciences of the United States of America 102 (2005)","DOI":"10.1073\/pnas.0503018102"},{"key":"38_CR27","doi-asserted-by":"crossref","unstructured":"Lindamood, J., Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: Inferring private information using social network data. In: WWW (2009)","DOI":"10.1145\/1526709.1526899"},{"key":"38_CR28","doi-asserted-by":"crossref","unstructured":"Magno, G., Comarela, G., Saez-Trumper, D., Cha, M., Almeida, V.: New kid on the block: Exploring the Google+ social graph. In: IMC (2012)","DOI":"10.1145\/2398776.2398794"},{"key":"38_CR29","doi-asserted-by":"crossref","unstructured":"Mao, H., Shuai, X., Kapadia, A.: Loose tweets: an analysis of privacy leaks on twitter. In: WPES (2011)","DOI":"10.1145\/2046556.2046558"},{"key":"38_CR30","doi-asserted-by":"crossref","unstructured":"McPherson, M., Smith-Lovin, L., Cook, J.M.: Birds of a feather: Homophily in social networks. Annual Review of Sociology, 415\u2013444 (2001)","DOI":"10.1146\/annurev.soc.27.1.415"},{"key":"38_CR31","first-page":"60","volume":"2","author":"S. Milgram","year":"1967","unstructured":"Milgram, S.: The small world problem. Psychology Today\u00a02, 60\u201367 (1967)","journal-title":"Psychology Today"},{"key":"38_CR32","doi-asserted-by":"crossref","unstructured":"Mislove, A., Marcon, M., Gummadi, K., Druschel, P., Bhattacharjee, B.: Measurement and analysis of online social networks. In: IMC (2007)","DOI":"10.1145\/1298306.1298311"},{"key":"38_CR33","doi-asserted-by":"crossref","unstructured":"Mislove, A., Viswanath, B., Gummadi, K., Druschel, P.: You are who you know: inferring user profiles in online social networks. In: WSDM (2010)","DOI":"10.1145\/1718487.1718519"},{"key":"38_CR34","doi-asserted-by":"crossref","unstructured":"Mohaisen, A., Yun, A., Kim, Y.: Measuring the mixing time of social graphs. In: IMC (2010)","DOI":"10.1145\/1879141.1879191"},{"key":"38_CR35","unstructured":"Preston, J.: Seeking to disrupt protesters, Syria cracks down on social media. (May 2011), \n                    \n                      http:\/\/www.nytimes.com\/2011\/05\/23\/world\/middleeast\/23facebook.html?_r=1"},{"key":"38_CR36","unstructured":"Sullivan, B.: Govt. agencies, colleges demand applicants\u2019 facebook passwords (2012), \n                    \n                      http:\/\/redtape.msnbc.msn.com\/_news\/2012\/03\/06\/10585353-govt-agencies-colleges-demand-applicants-facebook-passwords?chromedomain=usnews"},{"key":"38_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-642-14527-8_14","volume-title":"Privacy Enhancing Technologies","author":"K. Thomas","year":"2010","unstructured":"Thomas, K., Grier, C., Nicol, D.M.: unFriendly: Multi-party privacy risks in social networks. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol.\u00a06205, pp. 236\u2013252. Springer, Heidelberg (2010)"},{"key":"38_CR38","doi-asserted-by":"crossref","unstructured":"Travers, J., Milgram, S.: An experimental study of the small world problem. Sociometry, 425\u2013443 (1969)","DOI":"10.2307\/2786545"},{"key":"38_CR39","unstructured":"Ugander, J., Karrer, B., Backstrom, L., Marlow, C.: The anatomy of the Facebook social graph. Tech. rep. (2011)"},{"key":"38_CR40","unstructured":"Watkins, T.: Suddenly, Google Plus is outpacing Twitter to become the world\u2019s second largest social netwo. Business Insider (2013), \n                    \n                      http:\/\/www.businessinsider.com\/google-plus-is-outpacing-twitter-2013-5"},{"key":"38_CR41","doi-asserted-by":"publisher","first-page":"1302","DOI":"10.1126\/science.1070120","volume":"296","author":"D. Watts","year":"2002","unstructured":"Watts, D., Dodds, P., Newman, M.: Identity and search in social networks. Science\u00a0296, 1302\u20131305 (2002)","journal-title":"Science"},{"key":"38_CR42","unstructured":"Yamada, A., Kim, T., Perrig, A.: Exploiting privacy policy conflicts in online social networks. Tech. rep. (2012)"},{"key":"38_CR43","doi-asserted-by":"crossref","unstructured":"Zheleva, E., Getoor, L.: To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In: WWW (2009)","DOI":"10.1145\/1526709.1526781"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2013"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40203-6_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:02:27Z","timestamp":1559505747000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40203-6_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642402029","9783642402036"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40203-6_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}