{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:01:21Z","timestamp":1725793281637},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642554148"},{"type":"electronic","value":"9783642554155"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-55415-5_13","type":"book-chapter","created":{"date-parts":[[2014,5,12]],"date-time":"2014-05-12T02:18:10Z","timestamp":1399861090000},"page":"156-168","source":"Crossref","is-referenced-by-count":2,"title":["Privacy Risks from Public Data Sources"],"prefix":"10.1007","author":[{"given":"Zacharias","family":"Tzermias","sequence":"first","affiliation":[]},{"given":"Vassilis","family":"Prevelakis","sequence":"additional","affiliation":[]},{"given":"Sotiris","family":"Ioannidis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"http:\/\/www.amka.gr\/odigos4.html"},{"key":"13_CR2","unstructured":"http:\/\/www.asep.gr\/asep\/site\/home\/Tabs\/autepistasia\/autepistasia-sub1.csp"},{"key":"13_CR3","unstructured":"11888.gr (Greek Phone Catalogue), \n                    \n                      http:\/\/11888.ote.gr\/web\/guest\/home"},{"key":"13_CR4","unstructured":"AMKA Web Service, \n                    \n                      https:\/\/www.amka.gr\/AMKAGR\/"},{"key":"13_CR5","unstructured":"Charitable Work Programme, \n                    \n                      http:\/\/www.epanad.gov.gr\/"},{"key":"13_CR6","unstructured":"Diavgeia Document Repository, \n                    \n                      http:\/\/diavgeia.gov.gr"},{"key":"13_CR7","unstructured":"Greek Elections 2012 - Ministry of Interior, \n                    \n                      http:\/\/ekloges.ypes.gr\/v2012b\/public\/"},{"key":"13_CR8","unstructured":"Greek Electorate Web Service, \n                    \n                      http:\/\/www.ypes.gr\/services\/eea\/eea.htm"},{"key":"13_CR9","unstructured":"Hellenic Statistical Authority, \n                    \n                      http:\/\/www.statistics.gr"},{"key":"13_CR10","unstructured":"UltraCl@rity - Search in the depths of the Cl@rity program, \n                    \n                      http:\/\/www.yperdiavgeia.gr"},{"key":"13_CR11","unstructured":"VAT Registration Numbers Web Service, \n                    \n                      http:\/\/www.gsis.gr\/wsnp\/wsnp.html"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Aura, T., Kuhn, T.A., Roe, M.: Scanning Electronic Documents for Personally Identifiable Information. In: Proceedings of the 5th Annual ACM Workshop on Privacy in the Electronic Society. ACM (2006)","DOI":"10.1145\/1179601.1179608"},{"issue":"2","key":"13_CR13","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/328236.328114","volume":"43","author":"H. Berghel","year":"2000","unstructured":"Berghel, H.: Identity Theft, Social Security Numbers, and the Web. Communications of the ACM\u00a043(2), 17\u201321 (2000)","journal-title":"Communications of the ACM"},{"key":"13_CR14","series-title":"LNICST","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-642-05284-2_4","volume-title":"Security and Privacy in Communication Networks","author":"B.M. Bowen","year":"2009","unstructured":"Bowen, B.M., Hershkop, S., Keromytis, A.D., Stolfo, S.J.: Baiting Inside Attackers Using Decoy Documents. In: Chen, Y., Dimitriou, T.D., Zhou, J. (eds.) SecureComm 2009. LNICST, vol.\u00a019, pp. 51\u201370. Springer, Heidelberg (2009)"},{"issue":"2","key":"13_CR15","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/MSECP.2004.1281241","volume":"2","author":"S. Byers","year":"2004","unstructured":"Byers, S.: Information Leakage Caused by Hidden Data in Published Documents. Security & Privacy\u00a02(2), 23\u201327 (2004)","journal-title":"Security & Privacy"},{"issue":"10","key":"13_CR16","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1145\/226239.226269","volume":"38","author":"S. Garfinkel","year":"1995","unstructured":"Garfinkel, S.: Risks of Social Security Numbers. Communications of the ACM\u00a038(10), 146 (1995)","journal-title":"Communications of the ACM"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Gessiou, E., Labrinidis, A., Ioannidis, S.: A Greek (privacy) Tragedy: The Introduction of Social Security Numbers in Greece. In: Proceedings of the 8th Annual ACM Workshop on Privacy in the Electronic Society. ACM (2009)","DOI":"10.1145\/1655188.1655203"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Gessiou, E., Volanis, S., Athanasopoulos, E., Markatos, E.P., Ioannidis, S.: Digging up Social Structures from Documents on the Web. In: Proceedings of the Global Communications Conference (GLOBECOM). IEEE (2012)","DOI":"10.1109\/GLOCOM.2012.6503202"},{"key":"13_CR19","unstructured":"Glenn, S.: Marijuana bust shines light on utilities, \n                    \n                      http:\/\/www.postandcourier.com\/article\/20120129\/PC1602\/301299979\n                    \n                    \n                   (January 29, 2012)"},{"key":"13_CR20","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-31668-5_1","volume-title":"Privacy and Identity","author":"T.P. Keenan","year":"2012","unstructured":"Keenan, T.P.: Are They Making Our Privates Public?\u2013Emerging Risks of Governmental Open Data Initiatives. In: Camenisch, J., Crispo, B., Fischer-H\u00fcbner, S., Leenes, R., Russello, G. (eds.) Privacy and Identity 2011. IFIP AICT, vol.\u00a0375, pp. 1\u201313. Springer, Heidelberg (2012)"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Krishnamurthy, B., Wills, C.E.: On the Leakage of Personally Identifiable Information via Online Social Networks. In: Proceedings of the 2nd ACM Workshop on Online Social Networks. ACM (2009)","DOI":"10.1145\/1592665.1592668"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Mao, H., Shuai, X., Kapadia, A.: Loose Tweets: An Analysis of Privacy leaks on Twitter. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society. ACM (2011)","DOI":"10.1145\/2046556.2046558"},{"issue":"6","key":"13_CR23","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/1743546.1743558","volume":"53","author":"A. Narayanan","year":"2010","unstructured":"Narayanan, A., Shmatikov, V.: Myths and Fallacies of Personally Identifiable Information. Communications of the ACM\u00a053(6), 24\u201326 (2010)","journal-title":"Communications of the ACM"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Polakis, I., Kontaxis, G., Antonatos, S., Gessiou, E., Petsas, T., Markatos, E.P.: Using Social Networks to Harvest Email Addresses. In: Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society. ACM (2010)","DOI":"10.1145\/1866919.1866922"},{"issue":"1","key":"13_CR25","doi-asserted-by":"crossref","first-page":"4","DOI":"10.29012\/jpc.v3i1.595","volume":"3","author":"A. Simpson","year":"2011","unstructured":"Simpson, A.: On Privacy and Public Data: A study of data.gov.uk. Journal of Privacy and Confidentiality\u00a03(1), 4 (2011)","journal-title":"Journal of Privacy and Confidentiality"},{"key":"13_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-642-32873-2_3","volume-title":"Secure Data Management","author":"S.E. Whang","year":"2012","unstructured":"Whang, S.E., Garcia-Molina, H.: A model for Quantifying Information Leakage. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2012. LNCS, vol.\u00a07482, pp. 25\u201344. Springer, Heidelberg (2012)"},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"Wondracek, G., Holz, T., Kirda, E., Kruegel, C.: A Practical Attack to De-Anonymize Social Network Users. In: Proceedings of 2010 IEEE Symposium on Security and Privacy (2010)","DOI":"10.1109\/SP.2010.21"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-55415-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T19:59:10Z","timestamp":1558900750000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-55415-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642554148","9783642554155"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-55415-5_13","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2014]]}}}