{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:42:44Z","timestamp":1743133364678,"version":"3.40.3"},"publisher-location":"Vienna","reference-count":60,"publisher":"Springer Vienna","isbn-type":[{"type":"print","value":"9783709117965"},{"type":"electronic","value":"9783709117972"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-7091-1797-2_9","type":"book-chapter","created":{"date-parts":[[2014,7,11]],"date-time":"2014-07-11T13:16:51Z","timestamp":1405084611000},"page":"179-231","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy and Ethical Issues in Social Network Analysis"],"prefix":"10.1007","author":[{"given":"Lei","family":"Chen","sequence":"first","affiliation":[]},{"given":"Mingxuan","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,23]]},"reference":[{"key":"9_CR1","volume-title":"Data mining: concepts and techniques","author":"J Han","year":"2005","unstructured":"Han J (2005) Data mining: concepts and techniques. Morgan Kaufmann, San Francisco"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Backstrom L (2006) Group formation in large social networks: membership, growth, and evolution. In: In KDD 06: proceedings of the 12th ACM SIGKDD international conference on knowledge discovery and data mining. ACM Press, New York, pp 44\u201354","DOI":"10.1145\/1150402.1150412"},{"key":"9_CR3","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1007\/978-3-540-25952-7_28","volume-title":"Intelligence and Security Informatics","author":"Jeff Baumes","year":"2004","unstructured":"Baumes J, Goldberg M, Magdon-Ismail M, Wallace A (2004) Discovering hidden groups in communication networks. In: Proceedings of the 2nd NSF\/NIJ symposium on intelligence and security informatics"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Berger-Wolf TY, Saia J (2006) A framework for analysis of dynamic social networks. In: Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD \u201906), New York. ACM, New York, pp 523\u2013528","DOI":"10.1145\/1150402.1150462"},{"issue":"12","key":"9_CR5","doi-asserted-by":"publisher","first-page":"7821","DOI":"10.1073\/pnas.122653799","volume":"99","author":"M Girvan","year":"2002","unstructured":"Girvan M, Newman MEJ (2002) Community structure in social and biological networks. Proc Natl Acad Sci 99(12):7821\u20137826","journal-title":"Proc Natl Acad Sci"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Kempe D, Kleinberg J, Tardos E (2003) Maximizing the spread of influence through a social network. In: Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining (KDD \u201903), New York. ACM, New York, pp 137\u2013146","DOI":"10.1145\/956750.956769"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Kumar R, Novak J, Tomkins A (2006) Structure and evolution of online social networks. In: Proceedings of the 12th ACM SIGKDD international conference on knowledge discovery and data mining (KDD \u201906), New York. ACM, New York, pp 611\u2013617","DOI":"10.1145\/1150402.1150476"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Zhang J, Tang J, Li J (2007) Expert finding in a social network. In Proceedings of 12th International Conference on Database Systems for Advanced Applications, DASFAA, 1066\u20131069, 2007","DOI":"10.1007\/978-3-540-71703-4_106"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Hay M, Liu K, Miklau G, Pei J, Terzi E (2011) Privacy-aware data management in information networks. In: Proceedings of the 2011 international conference on Management of data (SIGMOD \u201911), New York. ACM, New York, pp 1201\u20131204","DOI":"10.1145\/1989323.1989453"},{"issue":"1","key":"9_CR10","doi-asserted-by":"publisher","first-page":"102","DOI":"10.14778\/1453856.1453873","volume":"1","author":"M Hay","year":"2008","unstructured":"Hay M, Miklau G, Jensen D, Towsley D, Weis P (2008) Resisting structural re-identification in anonymized social networks. Proc VLDB Endow 1(1):102\u2013114","journal-title":"Proc VLDB Endow"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/1540276.1540279","volume":"10","author":"B Zhou","year":"2008","unstructured":"Zhou B, Pei J, Luk W (2008) A brief survey on anonymization techniques for privacy preserving publishing of social network data. SIGKDD Explor. Newsl. 10:12\u201322","journal-title":"SIGKDD Explor. Newsl."},{"key":"9_CR12","volume-title":"A survey of algorithms for privacy-preservation of graphs and social networks","author":"X Wu","year":"2009","unstructured":"Wu X, Ying X (2009) A survey of algorithms for privacy-preservation of graphs and social networks. Kluwer Academic, Dordrecht"},{"key":"9_CR13","first-page":"93","volume-title":"ACM SIGMOD international conference on Management of data","author":"Liu K, Terzi E (2008) Towards identity anonymization on graphs. In: SIGMOD \u201908: proceedings of the","year":"2008","unstructured":"Liu K, Terzi E (2008) Towards identity anonymization on graphs. In: SIGMOD \u201908: proceedings of the 2008 ACM SIGMOD international conference on Management of data, New York. ACM, New York, pp 93\u2013106"},{"key":"9_CR14","first-page":"459","volume-title":"ACM SIGMOD international conference on management of data (SIGMOD \u201910)","author":"Cheng J, Fu AW-C, Liu J (2010) K-isomorphism: privacy preserving network publication against structural attacks. In: proceedings of the","year":"2010","unstructured":"Cheng J, Fu AW-C, Liu J (2010) K-isomorphism: privacy preserving network publication against structural attacks. In: proceedings of the 2010 ACM SIGMOD international conference on management of data (SIGMOD \u201910), New York. ACM, New York, pp 459\u2013470"},{"key":"9_CR15","first-page":"506","volume-title":"IEEE 24th international conference on data engineering, Washington","author":"Zhou B, Pei J (2008) Preserving privacy in social networks against neighborhood attacks. In: ICDE \u201908: proceedings of the","year":"2008","unstructured":"Zhou B, Pei J (2008) Preserving privacy in social networks against neighborhood attacks. In: ICDE \u201908: proceedings of the 2008 IEEE 24th international conference on data engineering, Washington, DC. IEEE Computer Society, Silver Spring, pp 506\u2013515"},{"issue":"1","key":"9_CR16","doi-asserted-by":"publisher","first-page":"946","DOI":"10.14778\/1687627.1687734","volume":"2","author":"L Zou","year":"2009","unstructured":"Zou L, Chen L, \u00d6zsu MT (2009) k-automorphism: a general framework for privacy preserving network publication. Proc VLDB Endow 2(1):946\u2013957","journal-title":"Proc VLDB Endow"},{"key":"9_CR17","first-page":"739","volume-title":"Randomizing social networks: a spectrum preserving approach","author":"X Ying","year":"2008","unstructured":"Ying X, Wu X (2008) Randomizing social networks: a spectrum preserving approach. In: Proceedings of the SIAM international conference on data mining, pp 739\u2013750"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Zheleva E, Getoor L (2008) Preserving the privacy of sensitive relationships in graph data. In: PinKDD\u201907: proceedings of the 1st ACM SIGKDD international conference on privacy, security, and trust in KDD. Springer, Berlin, pp 153\u2013171","DOI":"10.1007\/978-3-540-78478-4_9"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Campan A, Truta TM (2008) A clustering approach for data and structural anonymity in social networks. In: Privacy, security, and trust in KDD workshop (PinKDD)","DOI":"10.1007\/978-3-642-01718-6_4"},{"issue":"1","key":"9_CR20","doi-asserted-by":"publisher","first-page":"833","DOI":"10.14778\/1453856.1453947","volume":"1","author":"G Cormode","year":"2008","unstructured":"Cormode G, Srivastava D, Yu T, Zhang Q (2008) Anonymizing bipartite graph data using safe groupings. Proc VLDB Endow 1(1):833\u2013844","journal-title":"Proc VLDB Endow"},{"issue":"1","key":"9_CR21","doi-asserted-by":"publisher","first-page":"766","DOI":"10.14778\/1687627.1687714","volume":"2","author":"S Bhagat","year":"2009","unstructured":"Bhagat S, Cormode G, Krishnamurthy B, Srivastava D (2009) Class-based graph anonymization for social network data. Proc VLDB Endow 2(1):766\u2013777","journal-title":"Proc VLDB Endow"},{"issue":"1","key":"9_CR22","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s10115-010-0311-2","volume":"28","author":"B Zhou","year":"June","unstructured":"Zhou B, Pei J (June 2010) The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks. Knowl Inf Syst 28(1):47\u201377","journal-title":"Knowl Inf Syst"},{"key":"9_CR23","unstructured":"Ford R, Truta TM, Campan A (2009) P-sensitive k-anonymity for social networks. In: DMIN 2009: proceedings of the 2009 international conference on data mining, pp 403\u2013409"},{"key":"9_CR24","unstructured":"Liu L, Wang J, Liu J, Zhang J (2008) Privacy preserving in social networks against sensitive edge disclosure. Technical Report CMIDA-HiPSCCS 006-08"},{"key":"9_CR25","unstructured":"Das S, Egecioglu O, Abbadi AE (2011) Anonymizing weighted social network graphs. In: ICDE\u201911: proceedings of the 2011 IEEE 23th international conference on data engineering"},{"key":"9_CR26","first-page":"739","volume-title":"Randomizing social networks: a spectrum preserving approach","author":"X Ying","year":"2008","unstructured":"Ying X, Wu X (2008) Randomizing social networks: a spectrum preserving approach. In: SDM. SIAM, Philadelphia, pp 739\u2013750"},{"key":"9_CR27","first-page":"912","volume-title":"IEEE 27th international conference on data engineering (ICDE \u201911), Washington","author":"Ying X, Wu X, Barbara D (2011) Spectrum based fraud detection in social networks. In: Proceedings of the","year":"2011","unstructured":"Ying X, Wu X, Barbara D (2011) Spectrum based fraud detection in social networks. In: Proceedings of the 2011 IEEE 27th international conference on data engineering (ICDE \u201911), Washington, DC. IEEE Computer Society, Silver Spring, pp 912\u2013923"},{"issue":"3","key":"9_CR28","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1109\/TKDE.2011.259","volume":"25","author":"M Yuan","year":"2013","unstructured":"Yuan M, Chen L, Yu PS, Yu T, Mei H (2011) Protecting sensitive labels in social network data anonymization. In IEEE Transactions on Data and Knowledge Engineering (TKDE), 25(3), pp 633\u2013647, 2013","journal-title":"In IEEE Transactions on Data and Knowledge Engineering (TKDE)"},{"key":"9_CR29","doi-asserted-by":"publisher","first-page":"141","DOI":"10.14778\/1921071.1921080","volume":"4","author":"M Yuan","year":"2010","unstructured":"Yuan M, Chen L, Yu PS (2010) Personalized privacy protection in social networks. Proc VLDB Endow 4:141\u2013150","journal-title":"Proc VLDB Endow"},{"key":"9_CR30","first-page":"1182","volume-title":"IEEE 12th international conference on data mining (ICDM \u201912), Washington","author":"Yuan M, Chen L, Rao W, Mei H (2012) A general framework for publishing privacy protected and utility preserved graph. In: Proceedings of the","year":"2012","unstructured":"Yuan M, Chen L, Rao W, Mei H (2012) A general framework for publishing privacy protected and utility preserved graph. In: Proceedings of the 2012 IEEE 12th international conference on data mining (ICDM \u201912), Washington, DC. IEEE Computer Society, Silver Spring, pp 1182\u20131187"},{"issue":"05","key":"9_CR31","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"LATANYA SWEENEY","year":"2002","unstructured":"Sweeney L (2002) k-anonymity: a model for protecting privacy. Int J Uncertain Quantif Fuzziness and Knowledge-Based Systems 10(5):557\u2013570, 202","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"9_CR32","volume-title":"Venkitasubramaniam M (2007) ACM Trans Knowl Discov Data (TKDD), 1(1)","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M (2007) ACM Trans Knowl Discov Data (TKDD), 1(1), 2007"},{"key":"9_CR33","first-page":"924","volume-title":"IEEE 27th international conference on data engineering (ICDE \u201911), Washington","author":"Bonchi F, Gionis A, Tassa T (2011) Identity obfuscation in graphs through the information theoretic lens. In: Proceedings of the","year":"2011","unstructured":"Bonchi F, Gionis A, Tassa T (2011) Identity obfuscation in graphs through the information theoretic lens. In: Proceedings of the 2011 IEEE 27th international conference on data engineering (ICDE \u201911), Washington, DC. IEEE Computer Society, Silver Spring, pp 924\u2013935"},{"key":"9_CR34","first-page":"33","volume-title":"Lecture Notes in Computer Science","author":"Qian Xiao","year":"2011","unstructured":"Xiao Q, Wang Z, Tan K-L (2011) Lora: link obfuscation by randomization in graphs. In: Proceedings of the 8th VLDB international conference on secure data management (SDM\u201911). Springer, Berlin, pp 33\u201351"},{"key":"9_CR35","doi-asserted-by":"crossref","unstructured":"Backstrom L, Dwork C, Kleinberg J (2007) Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In: WWW \u201907: proceedings of the 16th international conference on World wide web, New York. ACM, New York, pp 181\u2013190","DOI":"10.1145\/1242572.1242598"},{"key":"9_CR36","first-page":"486","volume-title":"IEEE 24th international conference on data engineering, Washington","author":"Shrivastava N, Majumder A, Rastogi R (2008) Mining (social) network graphs to detect random link attacks. In: ICDE \u201908: proceedings of the","year":"2008","unstructured":"Shrivastava N, Majumder A, Rastogi R (2008) Mining (social) network graphs to detect random link attacks. In: ICDE \u201908: proceedings of the 2008 IEEE 24th international conference on data engineering, Washington, DC. IEEE Computer Society, Silver Spring, pp 486\u2013495"},{"key":"9_CR37","first-page":"173","volume-title":"30th IEEE symposium on security and privacy, Washington","author":"Narayanan A, Shmatikov V (2009) De-anonymizing social networks. In: Proceedings of the","year":"2009","unstructured":"Narayanan A, Shmatikov V (2009) De-anonymizing social networks. In: Proceedings of the 2009 30th IEEE symposium on security and privacy, Washington, DC. IEEE Computer Society, Silver Spring, pp 173\u2013187"},{"key":"9_CR38","doi-asserted-by":"crossref","unstructured":"Liu K, Terzi E (2009) A framework for computing the privacy scores of users in online social networks. In: Proceedings of the 2009 ninth IEEE international conference on data mining (ICDM \u201909), Washington, DC. IEEE Computer Society, Silver Spring, pp 288\u2013297","DOI":"10.1109\/ICDM.2009.21"},{"key":"9_CR39","unstructured":"Becker J, Chen H (2009) Measuring privacy risk in online social networks. In: Proceedings of the 2009 Web 2.0 security and privacy (W2SP \u201909)"},{"key":"9_CR40","doi-asserted-by":"crossref","unstructured":"Zheleva E, Getoor L (2009) To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In: Proceedings of the 18th international conference on World wide web (WWW \u201909), New York. ACM, New York, pp 531\u2013540","DOI":"10.1145\/1526709.1526781"},{"key":"9_CR41","doi-asserted-by":"crossref","unstructured":"Mislove A, Viswanath B, Gummadi KP, Druschel P (2010) You are who you know: inferring user profiles in online social networks. In: Proceedings of the third ACM international conference on Web search and data mining (WSDM \u201910), New York. ACM, New York, pp 251\u2013260","DOI":"10.1145\/1718487.1718519"},{"key":"9_CR42","doi-asserted-by":"crossref","unstructured":"Lindamood J, Heatherly R, Kantarcioglu M, Thuraisingham B (2009) Inferring private information using social network data. In: Proceedings of the 18th international conference on World wide web (WWW \u201909), New York. ACM, New York, pp 1145\u20131146","DOI":"10.1145\/1526709.1526899"},{"key":"9_CR43","doi-asserted-by":"crossref","unstructured":"Fang L, LeFevre K (2010) Privacy wizards for social networking sites. In: Proceedings of the 19th international conference on World wide web (WWW \u201910), New York. ACM, New York, pp 351\u2013360","DOI":"10.1145\/1772690.1772727"},{"key":"9_CR44","doi-asserted-by":"crossref","unstructured":"Shehab M, Cheek G, Touati H, Squicciarini AC, Cheng P-C (2010) Learning based access control in online social networks. In: Proceedings of the 19th international conference on World wide web (WWW \u201910), New York. ACM, New York, pp 1179\u20131180","DOI":"10.1145\/1772690.1772863"},{"key":"9_CR45","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"A-L Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si A-L, Albert R (1999) Emergence of scaling in random networks. Science 286:509\u2013512","journal-title":"Science"},{"key":"9_CR46","doi-asserted-by":"crossref","unstructured":"Puttaswamy KP, Sala A, Zhao BY (2009) Starclique: guaranteeing user privacy in social networks against intersection attacks. In: Proceedings of the 5th international conference on emerging networking experiments and technologies (CoNEXT \u201909), New York. ACM, New York, pp 157\u2013168","DOI":"10.1145\/1658939.1658958"},{"key":"9_CR47","doi-asserted-by":"crossref","unstructured":"Xiao X, Tao Y (2006) Anatomy: simple and effective privacy preservation. In: VLDB\u201906, pp 139\u2013150","DOI":"10.1145\/1142473.1142500"},{"key":"9_CR48","first-page":"669","volume-title":"Neural Information Processing. Theory and Algorithms","author":"Mingzhen Mo","year":"2010","unstructured":"Mo M, King I (2010) Exploit of online social networks with community-based graph semi-supervised learning. In: Proceedings of the 17th international conference on neural information processing: theory and algorithms - Volume Part I (ICONIP\u201910). Springer, Berlin, pp 669\u2013678"},{"key":"9_CR49","doi-asserted-by":"crossref","unstructured":"Campbell CS, Maglio PP, Cozzi A, Dom B (2003) Expertise identification using email communications. In: CIKM \u201903: proceedings of the twelfth international conference on information and knowledge management, New York. ACM, New York, pp 528\u2013531","DOI":"10.1145\/956863.956965"},{"key":"9_CR50","doi-asserted-by":"crossref","unstructured":"Zhang J, Tang J, Liu L, Li J (2008) A mixture model for expert finding. In: Proceedings of the 12th Pacific-Asia conference on advances in knowledge discovery and data mining (PAKDD\u201908). Springer, Berlin, pp 466\u2013478","DOI":"10.1007\/978-3-540-68125-0_41"},{"key":"9_CR51","unstructured":"Lu Q, Getoor L (2003) Link-based classification. In: Proceedings of the international conference on machine learning (ICML), pp 496\u2013503"},{"key":"9_CR52","first-page":"2007","volume":"8","author":"J Neville","year":"2003","unstructured":"Neville J, and Jensen D (2003) Collective classification with relational dependency networks. J Mach Learn Res 8:2007","journal-title":"J Mach Learn Res"},{"key":"9_CR53","doi-asserted-by":"crossref","unstructured":"Tang L, Liu H (2009) Relational learning via latent social dimensions. In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining (KDD \u201909), New York. ACM, New York, pp 817\u2013826","DOI":"10.1145\/1557019.1557109"},{"key":"9_CR54","volume-title":"Anonimos: an lp based approach for anonymizing weighted social network graphs","author":"S Das","year":"2010","unstructured":"Das S, Egecioglu O, Abbadi AE (2010) Anonimos: an lp based approach for anonymizing weighted social network graphs. In: TKDE, pp pre-print"},{"key":"9_CR55","doi-asserted-by":"crossref","unstructured":"Li T, Li N (2009) On the tradeoff between privacy and utility in data publishing. In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining (KDD \u201909), New York. ACM, New York, pp 517\u2013526","DOI":"10.1145\/1557019.1557079"},{"issue":"7","key":"9_CR56","doi-asserted-by":"publisher","first-page":"440","DOI":"10.14778\/1988776.1988780","volume":"4","author":"A Machanavajjhala","year":"2011","unstructured":"Machanavajjhala A, Korolova A, Sarma AD (2011) Personalized social recommendations: accurate or private. Proc VLDB Endow 4(7):440\u2013450","journal-title":"Proc VLDB Endow"},{"key":"9_CR57","doi-asserted-by":"crossref","unstructured":"Leskovec J, Kleinberg J, Faloutsos C (2005) Graphs over time: densification laws, shrinking diameters and possible explanations. In: Proceedings of the eleventh ACM SIGKDD international conference on knowledge discovery in data mining (KDD \u201905), New York. ACM, New York, pp 177\u2013187","DOI":"10.1145\/1081870.1081893"},{"key":"9_CR58","doi-asserted-by":"crossref","unstructured":"Leskovec J, Faloutsos C (2006) Sampling from large graphs. In: Proceedings of the 12th ACM SIGKDD international conference on knowledge discovery and data mining (KDD \u201906), New York. ACM, New York, pp 631\u2013636","DOI":"10.1145\/1150402.1150479"},{"key":"9_CR59","doi-asserted-by":"crossref","unstructured":"Sch\u00f6ning U (1987) Graph isomorphism is in the low hierarchy. In: Proceedings of the 4th annual symposium on theoretical aspects of computer science (STACS \u201987), London. Springer, London, pp 114\u2013124","DOI":"10.1007\/BFb0039599"},{"key":"9_CR60","doi-asserted-by":"crossref","unstructured":"Ganta SR, Kasiviswanathan SP, Smith A (2008) Composition attacks and auxiliary information in data privacy. In: Proceedings of the 14th ACM SIGKDD international conference on knowledge discovery and data mining (KDD \u201908), New York. ACM, New York, pp. 265\u2013273","DOI":"10.1145\/1401890.1401926"}],"container-title":["Lecture Notes in Social Networks","Social Networks: Analysis and Case Studies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-7091-1797-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T18:05:08Z","timestamp":1676657108000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-7091-1797-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783709117965","9783709117972"],"references-count":60,"URL":"https:\/\/doi.org\/10.1007\/978-3-7091-1797-2_9","relation":{},"ISSN":["2190-5428","2190-5436"],"issn-type":[{"type":"print","value":"2190-5428"},{"type":"electronic","value":"2190-5436"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"23 June 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}