{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T10:14:59Z","timestamp":1776420899387,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":41,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642413193","type":"print"},{"value":"9783642413209","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41320-9_10","type":"book-chapter","created":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T06:08:20Z","timestamp":1380607700000},"page":"149-163","source":"Crossref","is-referenced-by-count":13,"title":["Bootstrapping Trust in Online Dating: Social Verification of Online Dating Profiles"],"prefix":"10.1007","author":[{"given":"Gregory","family":"Norcie","sequence":"first","affiliation":[]},{"given":"Emiliano","family":"De Cristofaro","sequence":"additional","affiliation":[]},{"given":"Victoria","family":"Bellotti","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/11957454_3","volume-title":"Privacy Enhancing Technologies","author":"A. Acquisti","year":"2006","unstructured":"Acquisti, A., Gross, R.: Imagined communities: Awareness, information sharing, and privacy on the Facebook. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol.\u00a04258, pp. 36\u201358. Springer, Heidelberg (2006)"},{"issue":"27","key":"10_CR2","doi-asserted-by":"publisher","first-page":"10975","DOI":"10.1073\/pnas.0904891106","volume":"106","author":"A. Acquisti","year":"2009","unstructured":"Acquisti, A., Gross, R.: Predicting Social Security numbers from public data. Proceedings of the National Academy of Sciences\u00a0106(27), 10975\u201310980 (2009)","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"10_CR3","unstructured":"Badoo. Social Lives Vs Social Networks (2012), http:\/\/corp.badoo.com\/lv\/entry\/press\/53\/"},{"issue":"1","key":"10_CR4","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","volume":"13","author":"D. Boyd","year":"2007","unstructured":"Boyd, D., Ellison, N.B.: Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication\u00a013(1), 210\u2013230 (2007)","journal-title":"Journal of Computer-Mediated Communication"},{"key":"10_CR5","unstructured":"Brym, R., Lenton, R.: Love online: A report on digital dating in Canada. MSN. ca (February 6, 2001)"},{"key":"10_CR6","unstructured":"Byrne, C.: Users do care about location privacy (2011), http:\/\/www.venturebeat.com\/2011\/04\/21\/smartphone-users-location-privacy\/"},{"key":"10_CR7","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/3-540-36609-1_3","volume-title":"Trust, Reputation, and Security: Theories and Practice","author":"L.J. Camp","year":"2003","unstructured":"Camp, L.J.: Designing for trust. In: Falcone, R., Barber, S.K., Korba, L., Singh, M.P. (eds.) AAMAS 2002. LNCS (LNAI), vol.\u00a02631, pp. 15\u201329. Springer, Heidelberg (2003)"},{"key":"10_CR8","unstructured":"Cao, Q., Sirivianos, M., Yang, X., Pregueiro, T.: Aiding the Detection of Fake Accounts in Large-scale Social Online Services. In: USENIX Symposium on Networked Systems Design and Implementation (2012)"},{"key":"10_CR9","unstructured":"Cavoukian, A.: S. U. S. of Law, C. S. C. for Computers, and Law. Privacy by design. Stanford Law School (2010)"},{"issue":"3","key":"10_CR10","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1080\/13698570701488936","volume":"9","author":"D. Couch","year":"2007","unstructured":"Couch, D., Liamputtong, P.P.: Online dating and mating: Perceptions of risk and health among online users. Health, Risk & Society\u00a09(3), 275\u2013294 (2007)","journal-title":"Health, Risk & Society"},{"key":"10_CR11","unstructured":"Current Online Dating and Dating Services Facts & Statistics (2012), http:\/\/preview.tinyurl.com\/254pum6"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-642-14577-3_13","volume-title":"Financial Cryptography and Data Security","author":"E. Cristofaro De","year":"2010","unstructured":"De Cristofaro, E., Tsudik, G.: Practical private set intersection protocols with linear complexity. In: Sion, R. (ed.) FC 2010. LNCS, vol.\u00a06052, pp. 143\u2013159. Springer, Heidelberg (2010)"},{"issue":"6","key":"10_CR13","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/s00779-004-0308-5","volume":"8","author":"P. Dourish","year":"2004","unstructured":"Dourish, P., Grinter, R., Delgado de la Flor, J., Joseph, M.: Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing\u00a08(6), 391\u2013401 (2004)","journal-title":"Personal and Ubiquitous Computing"},{"issue":"2","key":"10_CR14","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1111\/j.1083-6101.2006.00020.x","volume":"11","author":"N. Ellison","year":"2006","unstructured":"Ellison, N., Heino, R., Gibbs, J.: Managing Impressions Online: Self-Presentation Processes in the Online Dating Environment. Journal of Computer-Mediated Communication\u00a011(2), 415\u2013441 (2006)","journal-title":"Journal of Computer-Mediated Communication"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Fahl, S., Harbach, M., Muders, T., Smith, M., Sander, U.: Helping Johnny 2.0 to encrypt his Facebook conversations. In: Symposium on Usable Privacy and Security, p. 11 (2012)","DOI":"10.1145\/2335356.2335371"},{"key":"10_CR16","unstructured":"Felt, A., Evans, D.: Privacy protection for social networking APIs. In: Web 2.0 Security and Privacy (2008)"},{"issue":"1","key":"10_CR17","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1177\/0093650210377091","volume":"38","author":"J. Gibbs","year":"2011","unstructured":"Gibbs, J., Ellison, N., Lai, C.: First comes love, then comes Google: An investigation of uncertainty reduction strategies and self-disclosure in online dating. Communication Research\u00a038(1), 70\u2013100 (2011)","journal-title":"Communication Research"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Goldman, D.: Facebook tops 900 million users (2012), http:\/\/money.cnn.com\/2012\/04\/23\/technology\/facebook-q1\/index.htm","DOI":"10.1016\/S0969-4765(12)70173-X"},{"key":"10_CR19","unstructured":"Goo, S.K.: Explaining Facebook\u2019s Spam Prevention Systems (2010), http:\/\/preview.tinyurl.com\/23gmv7r"},{"key":"10_CR20","unstructured":"Goo, S.K.: Facebook: A Profile of its \u2018Friends\u2019 (2012), http:\/\/preview.tinyurl.com\/7hfpgjj"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: ACM Workshop on Privacy in the Electronic Society, pp. 71\u201380 (2005)","DOI":"10.1145\/1102199.1102214"},{"key":"10_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"906","DOI":"10.1007\/978-3-540-73111-5_100","volume-title":"Human-Computer Interaction. HCI Applications and Services","author":"D.-L. Huang","year":"2007","unstructured":"Huang, D.-L., Rau, P.-L.P., Salvendy, G.: A survey of factors influencing people\u2019s perception of information security. In: Jacko, J.A. (ed.) HCI 2007. LNCS, vol.\u00a04553, pp. 906\u2013915. Springer, Heidelberg (2007)"},{"issue":"10","key":"10_CR23","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"T. Jagatic","year":"2007","unstructured":"Jagatic, T., Johnson, N., Jakobsson, M., Menczer, F.: Social phishing. Communications of the ACM\u00a050(10), 94\u2013100 (2007)","journal-title":"Communications of the ACM"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Kittur, A., Chi, E., Suh, B.: Crowdsourcing user studies with Mechanical Turk. In: SIGCHI Conference on Human Factors in Computing Systems, pp. 453\u2013456 (2008)","DOI":"10.1145\/1357054.1357127"},{"key":"10_CR25","unstructured":"Liu, D., Camp, L.: Proof of work can work. In: Workshop on the Economics of Information Security (2006)"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Motahari, S., Ziavras, S., Schuler, R., Jones, Q.: Identity inference as a privacy risk in computer-mediated communication. In: International Conference on System Sciences, pp. 1\u201310 (2009)","DOI":"10.1109\/HICSS.2009.243"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Murayama, Y., Hikage, N., Hauser, C., Chakraborty, B., Segawa, N.: An Anshin Model for the Evaluation of the Sense of Security. In: Hawaii International Conference on System Sciences (2006)","DOI":"10.1109\/HICSS.2006.46"},{"issue":"5","key":"10_CR28","first-page":"559","volume":"17","author":"H. Nissenbaum","year":"1998","unstructured":"Nissenbaum, H.: Protecting privacy in an information age: The problem of privacy in public. Law and Philosophy\u00a017(5), 559\u2013596 (1998)","journal-title":"Law and Philosophy"},{"key":"10_CR29","unstructured":"OAuth 2.0, http:\/\/oauth.net\/"},{"key":"10_CR30","unstructured":"OpenID, http:\/\/openid.net\/"},{"issue":"5","key":"10_CR31","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1017\/S1930297500002205","volume":"5","author":"G. Paolacci","year":"2010","unstructured":"Paolacci, G., Chandler, J., Ipeirotis, P.: Running Experiments On Amazon Mechanical Turk. Judgment and Decision Making\u00a05(5), 411\u2013419 (2010)","journal-title":"Judgment and Decision Making"},{"key":"10_CR32","unstructured":"Protalinski, E.: How to spot a fake Facebook profile (2012), http:\/\/preview.tinyurl.com\/87hmqyr"},{"issue":"5","key":"10_CR33","doi-asserted-by":"publisher","first-page":"754","DOI":"10.1037\/0021-9010.84.5.754","volume":"84","author":"W. Richman","year":"1999","unstructured":"Richman, W., Kiesler, S., Weisband, S., Drasgow, F.: A meta-analytic study of social desirability distortion in computer-administered questionnaires, traditional questionnaires, and interviews. Journal of Applied Psychology\u00a084(5), 754\u2013775 (1999)","journal-title":"Journal of Applied Psychology"},{"issue":"4","key":"10_CR34","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1177\/0003122412448050","volume":"77","author":"M. Rosenfeld","year":"2012","unstructured":"Rosenfeld, M., Thomas, R.: Searching for a Mate The Rise of the Internet as a Social Intermediary. American Sociological Review\u00a077(4), 523\u2013547 (2012)","journal-title":"American Sociological Review"},{"key":"10_CR35","unstructured":"Ryan, T., Mauch, G.: Getting in bed with Robin Sage. In: Black Hat Conference (2010)"},{"issue":"3","key":"10_CR36","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1023\/A:1011902718709","volume":"19","author":"M. Sasse","year":"2001","unstructured":"Sasse, M., Brostoff, S., Weirich, D.: Transforming the weakest link \u2013 Human\/Computer Interaction Approach to Usable and Effective Security. BT Technology Journal\u00a019(3), 122\u2013131 (2001)","journal-title":"BT Technology Journal"},{"key":"10_CR37","unstructured":"Schneier, B.: Beyond Fear: Thinking Sensibly about Security in an Uncertain World. Springer (2003)"},{"key":"10_CR38","doi-asserted-by":"crossref","unstructured":"Sirivianos, M., Kim, K., Gan, J.W., Yang, X.: Assessing the veracity of identity assertions via osns. In: 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS), pp. 1\u201310. IEEE (2012)","DOI":"10.1109\/COMSNETS.2012.6151325"},{"issue":"8","key":"10_CR39","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.1177\/0146167208318067","volume":"34","author":"C. Toma","year":"2008","unstructured":"Toma, C., Hancock, J., Ellison, N.: Separating fact from fiction: An examination of deceptive self-presentation in online dating profiles. Personality and Social Psychology Bulletin\u00a034(8), 1023\u20131036 (2008)","journal-title":"Personality and Social Psychology Bulletin"},{"key":"10_CR40","doi-asserted-by":"crossref","unstructured":"Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P., Cranor, L.: I regretted the minute I pressed share: A qualitative study of regrets on Facebook. In: Symposium on Usable Privacy and Security (2011)","DOI":"10.1145\/2078827.2078841"},{"key":"10_CR41","unstructured":"Whitten, A., Tygar, J.: Why Johnny can\u2019t encrypt: A usability evaluation of PGP 5.0. In: USENIX Security Symposium (1999)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41320-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T15:04:40Z","timestamp":1746025480000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41320-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642413193","9783642413209"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41320-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}