{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T16:26:41Z","timestamp":1747153601754,"version":"3.40.5"},"publisher-location":"Singapore","reference-count":26,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819932993"},{"type":"electronic","value":"9789819933006"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-3300-6_38","type":"book-chapter","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T15:04:01Z","timestamp":1685459041000},"page":"537-551","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Measurement Based on Social Network Properties and Structure"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1911-381X","authenticated-orcid":false,"given":"YuHong","family":"Gong","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3401-1691","authenticated-orcid":false,"given":"Biao","family":"Jin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2211-5517","authenticated-orcid":false,"given":"ZhiQiang","family":"Yao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,31]]},"reference":[{"key":"38_CR1","doi-asserted-by":"crossref","unstructured":"Aghasian, E., Garg, S., Gao, L., Yu, S., Montgomery, J.: Scoring users\u2019 privacy disclosure across multiple online social networks. IEEE Access (2017)","DOI":"10.1109\/ACCESS.2017.2720187"},{"key":"38_CR2","doi-asserted-by":"crossref","unstructured":"Aghasian, E., Garg, S., Montgomery, J.: An automated model to score the privacy of unstructured information-social media case. Comput. Secur. (2020)","DOI":"10.1016\/j.cose.2020.101778"},{"key":"38_CR3","doi-asserted-by":"crossref","unstructured":"Al-Asmari, H.A., Saleh, M.S.: A conceptual framework for measuring personal privacy risks in Facebook online social network. In: International Conference on Computer and Information Sciences (2019)","DOI":"10.1109\/ICCISci.2019.8716477"},{"key":"38_CR4","doi-asserted-by":"crossref","unstructured":"Alsarkal, Y., Zhang, N., Xu, H.: Your privacy is your friend\u2019s privacy: examining interdependent information disclosure on online social networks. In: Hawaii International Conference on System Sciences (2018)","DOI":"10.24251\/HICSS.2018.111"},{"key":"38_CR5","unstructured":"Baocun, C., Zhu, N., He, J., He, P., Shuting, J., Shijia, P.: A semantic inference based method for privacy measurement. IEEE Access (2020)"},{"key":"38_CR6","doi-asserted-by":"crossref","unstructured":"Bioglio, L., Pensa, R.G.: Impact of neighbors on the privacy of individuals in online social networks. In: International Conference on Computational Science (2017)","DOI":"10.1016\/j.procs.2017.05.030"},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"Bioglio, L., Pensa, R.G.: Analysis and classification of privacy-sensitive content in social media posts. EPJ Data Sci. (2022)","DOI":"10.1140\/epjds\/s13688-022-00324-y"},{"key":"38_CR8","unstructured":"Cirillo, S., Desiato, D., Polese, G.: Social network data analysis to highlight privacy threats in sharing data. J. Big Data (2022)"},{"issue":"3","key":"38_CR9","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1007\/s11760-021-02013-1","volume":"16","author":"O Coban","year":"2022","unstructured":"Coban, O., Inan, A., Ozel, S.A.: Inverse document frequency-based sensitivity scoring for privacy analysis. SIViP 16(3), 735\u2013743 (2022)","journal-title":"SIViP"},{"key":"38_CR10","doi-asserted-by":"crossref","unstructured":"Dey, R., Tang, C., Ross, K.W., Saxena, N.: Estimating age privacy leakage in online social networks. In: International Conference on Computer Communications (2012)","DOI":"10.1109\/INFCOM.2012.6195711"},{"key":"38_CR11","doi-asserted-by":"crossref","unstructured":"Han, X., Wang, L., Wu, J., Yang, Y.: Large-scale privacy-preserving network embedding against private link inference attacks (2022)","DOI":"10.1109\/TDSC.2023.3264110"},{"key":"38_CR12","doi-asserted-by":"crossref","unstructured":"Khazaei, T., Xiao, L., Mercer, R.E., Khan, A.: Understanding privacy dichotomy in twitter. In: ACM Conference on Hypertext (2018)","DOI":"10.1145\/3209542.3209564"},{"key":"38_CR13","unstructured":"Leskovec, J., Krevl, A.: SNAP Datasets: Stanford large network dataset collection, June 2014. https:\/\/snap.stanford.edu\/data"},{"key":"38_CR14","doi-asserted-by":"crossref","unstructured":"Li, M., Liu, Z., Dong, K.: Privacy preservation in social network against public neighborhood attacks. In: Trust Security and Privacy in Computing and Communications (2016)","DOI":"10.1109\/TrustCom.2016.0244"},{"key":"38_CR15","doi-asserted-by":"crossref","unstructured":"Li, X., Yang, Y., Chen, Y., Niu, X.X.: A privacy measurement framework for multiple online social networks against social identity linkage. Appl. Sci. (2018)","DOI":"10.3390\/app8101790"},{"issue":"5","key":"38_CR16","doi-asserted-by":"publisher","first-page":"812","DOI":"10.4218\/etrij.2019-0495","volume":"43","author":"X Li","year":"2021","unstructured":"Li, X., Zhao, C., Tian, K.: Privacy measurement method using a graph structure on online social networks. ETRI J. 43(5), 812\u2013824 (2021)","journal-title":"ETRI J."},{"key":"38_CR17","doi-asserted-by":"crossref","unstructured":"Liu, K., Terzi, E.: A framework for computing the privacy scores of users in online social networks. ACM Trans. Knowl. Discov. From Data (2009)","DOI":"10.1109\/ICDM.2009.21"},{"key":"38_CR18","unstructured":"Maximilien, E.M., Grandison, T., Sun, T., Richardson, D., Guo, S., Liu, K.: Privacy-as-a-service: models, algorithms, and results on the Facebook platform. In: Proceedings of Web, vol. 2 (2009)"},{"key":"38_CR19","doi-asserted-by":"crossref","unstructured":"Pensa, R.G., Blasi, G.D.: A privacy self-assessment framework for online social networks. Expert Syst. With Appl. (2017)","DOI":"10.1016\/j.eswa.2017.05.054"},{"issue":"1","key":"38_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-019-0558-x","volume":"9","author":"RG Pensa","year":"2019","unstructured":"Pensa, R.G., Di Blasi, G., Bioglio, L.: Network-aware privacy risk estimation in online social networks. Soc. Netw. Anal. Min. 9(1), 1\u201315 (2019). https:\/\/doi.org\/10.1007\/s13278-019-0558-x","journal-title":"Soc. Netw. Anal. Min."},{"key":"38_CR21","doi-asserted-by":"crossref","unstructured":"Pensa, R.G., Di Blasi, G.: A centrality-based measure of user privacy in online social networks. In: 2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 1438\u20131439. IEEE (2016)","DOI":"10.1109\/ASONAM.2016.7752439"},{"key":"38_CR22","doi-asserted-by":"crossref","unstructured":"Pilton, C., Faily, S., Henriksen-Bulmer, J.: Evaluating privacy: determining user privacy expectations on the web. Comput. Secur. (2021)","DOI":"10.1016\/j.cose.2021.102241"},{"key":"38_CR23","doi-asserted-by":"crossref","unstructured":"Shi, W., Hu, J., Yan, J., Wu, Z., Lu, L.: A privacy measurement method using network structure entropy. In: International Conference on Networking (2017)","DOI":"10.1109\/NaNA.2017.32"},{"key":"38_CR24","doi-asserted-by":"crossref","unstructured":"Wang, C., Tianqing, Z., Xiong, P., Ren, W., Choo, K.K.R.: A privacy preservation method for multiple-source unstructured data in online social networks. Comput. Secur. (2021)","DOI":"10.1016\/j.cose.2021.102574"},{"key":"38_CR25","doi-asserted-by":"crossref","unstructured":"Yang, R., Ma, J., Miao, Y., Ma, X.: Privacy-preserving generative framework against membership inference attacks (2022)","DOI":"10.1049\/cmu2.12507"},{"key":"38_CR26","doi-asserted-by":"crossref","unstructured":"Zeng, Y., Sun, Y., Xing, L., Vokkarane, V.M.: Trust-aware privacy evaluation in online social networks. In: International Conference on Communications (2014)","DOI":"10.1109\/ICC.2014.6883439"}],"container-title":["Communications in Computer and Information Science","Big Data and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-3300-6_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T15:11:45Z","timestamp":1685459505000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-3300-6_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819932993","9789819933006"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-3300-6_38","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xiamen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbds2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icbds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}