{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T12:40:13Z","timestamp":1688560813309},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,10,20]],"date-time":"2013-10-20T00:00:00Z","timestamp":1382227200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comb Optim"],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1007\/s10878-013-9667-z","type":"journal-article","created":{"date-parts":[[2013,10,19]],"date-time":"2013-10-19T05:35:10Z","timestamp":1382160910000},"page":"186-217","source":"Crossref","is-referenced-by-count":0,"title":["Staying safe and visible via message sharing in online social networks"],"prefix":"10.1007","volume":"28","author":[{"given":"Yilin","family":"Shen","sequence":"first","affiliation":[]},{"given":"Thang N.","family":"Dinh","sequence":"additional","affiliation":[]},{"given":"My T.","family":"Thai","sequence":"additional","affiliation":[]},{"given":"Hien T.","family":"Nguyen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,10,20]]},"reference":[{"key":"9667_CR1","doi-asserted-by":"crossref","unstructured":"Cha M, Haddadi H, Benevenuto F, Gummadi KP (2010) Measuring user influence in twitter: the million follower fallacy. In: Proceedings of the 4th international AAAI conference on weblogs and social media (ICWSM), May","DOI":"10.1609\/icwsm.v4i1.14033"},{"key":"9667_CR2","doi-asserted-by":"crossref","unstructured":"Cha M, Mislove A, Gummadi KP (2009) A measurement-driven analysis of information propagation in the flickr social network. In: Proceedings of the 18th international conference on world wide web, WWW \u201909, NY, USA. ACM, New York, pp 721\u2013730","DOI":"10.1145\/1526709.1526806"},{"key":"9667_CR3","volume-title":"The combinatorics of network reliability","author":"CJ Colbourn","year":"1987","unstructured":"Colbourn CJ (1987) The combinatorics of network reliability. Oxford University Press, New York"},{"key":"9667_CR4","unstructured":"Garey MR, Johnson DS (1979) Computers and intractability: a guide to the theory of NP-completeness. Series of books in the mathematical sciences, 1st edn. W. H. Freeman, New York"},{"key":"9667_CR5","doi-asserted-by":"crossref","unstructured":"Gjoka M, Kurant M, Butts CT (2010) Markopoulou a walking in facebook: a case study of unbiased sampling of OSNs. In: Proceedings of IEEE INFOCOM 2010. IEEE, New York, pp 1\u20139","DOI":"10.1109\/INFCOM.2010.5462078"},{"issue":"6","key":"9667_CR6","doi-asserted-by":"crossref","first-page":"1420","DOI":"10.1086\/226707","volume":"83","author":"M Granovetter","year":"1978","unstructured":"Granovetter M (1978) Threshold models of collective behavior. Am J Sociol 83(6):1420","journal-title":"Am J Sociol"},{"key":"9667_CR7","unstructured":"Hastad J (1996) Clique is hard to approximate within $$n^{1-\\epsilon }$$ n 1 - \u03f5 . In: FOCS \u201996. IEEE Computer Society, Washington, DC, p 627"},{"key":"9667_CR8","doi-asserted-by":"crossref","unstructured":"Kempe D, Kleinberg J, Tardos E (2003) Maximizing the spread of influence through a social network. In: Proceedings of the ninth ACM SIGKDD international conference on knowledge discovery and data mining, KDD \u201903. ACM, New York, pp 137\u2013146","DOI":"10.1145\/956750.956769"},{"key":"9667_CR9","unstructured":"Lam I-F, Chen K-T, Chen L-J (2008) Involuntary information leakage in social network services. In: Proceedings of the 3rd international workshop on security: advances in information and computer security, IWSEC \u201908. Springer, Berlin, pp 167\u2013183"},{"key":"9667_CR10","unstructured":"Luenberger DG (2003) Linear and nonlinear programming, 2nd edn. Springer, New York"},{"key":"9667_CR11","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/0167-6377(93)90041-E","volume":"13","author":"N Megiddo","year":"1993","unstructured":"Megiddo N, Tamir A (1993) Linear time algorithms for some separable quadratic programming problems. Oper Res Lett 13:203\u2013211","journal-title":"Oper Res Lett"},{"key":"9667_CR12","doi-asserted-by":"crossref","unstructured":"Ngoc TH, Echizen I, Komei K, Yoshiura H (2010) New approach to quantification of privacy on social network sites. In: Proceedings of the 2010 24th IEEE international conference on advanced information networking and applications, AINA \u201910. IEEE Computer Society, Washington, DC, pp 556\u2013564","DOI":"10.1109\/AINA.2010.118"},{"key":"9667_CR13","unstructured":"Nigusse G, Decker BD (2010) Privacy codes of practice for the social web: the analysis of existing privacy codes and emerging social-centric privacy risks. In: AAAI spring symposium series"},{"key":"9667_CR14","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/0022-0000(88)90003-7","volume":"37","author":"P Raghavan","year":"1988","unstructured":"Raghavan P (1988) Probabilistic construction of deterministic algorithms: approximating packing integer programs. J Comput Syst Sci 37:130\u2013143","journal-title":"J Comput Syst Sci"},{"key":"9667_CR15","doi-asserted-by":"crossref","unstructured":"Viswanath B, Mislove A, Cha M, Gummadi KP (2009) On the evolution of user interaction in facebook. In: Proceedings of WOSN\u201909","DOI":"10.1145\/1592665.1592675"},{"issue":"6","key":"9667_CR16","doi-asserted-by":"crossref","first-page":"1168","DOI":"10.1016\/j.addbeh.2004.12.005","volume":"30","author":"ST Walters","year":"2005","unstructured":"Walters ST, Neighbors C (2005) Feedback interventions for college alcohol misuse: what, why and for whom? Addict Behav 30(6):1168\u20131182","journal-title":"Addict Behav"}],"container-title":["Journal of Combinatorial Optimization"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-013-9667-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10878-013-9667-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-013-9667-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T12:18:06Z","timestamp":1688559486000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10878-013-9667-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,20]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,7]]}},"alternative-id":["9667"],"URL":"https:\/\/doi.org\/10.1007\/s10878-013-9667-z","relation":{},"ISSN":["1382-6905","1573-2886"],"issn-type":[{"value":"1382-6905","type":"print"},{"value":"1573-2886","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,20]]}}}