{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T16:59:34Z","timestamp":1773334774425,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2017,6,3]],"date-time":"2017-06-03T00:00:00Z","timestamp":1496448000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s11036-017-0892-z","type":"journal-article","created":{"date-parts":[[2017,6,3]],"date-time":"2017-06-03T05:08:14Z","timestamp":1496466494000},"page":"1641-1653","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Community-Based Localized Disaster Response through Temporary Social Overlay Networks"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5920-5401","authenticated-orcid":false,"given":"Youna","family":"Jung","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,3]]},"reference":[{"key":"892_CR1","unstructured":"Red Cross Shelter Finder. The American National Red Cross (2017). \nhttp:\/\/www.redcross.org\/mobileapps\/shelter-finder-app\n\n. Accessed 27 Feb 2017"},{"key":"892_CR2","unstructured":"Outbreaks Near Me. Freifeld C and Brownstein J (2007). \nhttp:\/\/www.healthmap.org\/outbreaksnearme\n\n. Accessed 27 Feb 2017"},{"key":"892_CR3","unstructured":"Disaster Alert. Pacific Disaster Center (2013). \nhttp:\/\/www.pdc.org\/solutions\/tools\/disaster-alert-app\n\n. Accessed 27 Feb 2017"},{"key":"892_CR4","unstructured":"HelpBridge: a new mobile app to get help and give help during a disaster. Microsoft Blog (2013). \nhttps:\/\/www.blogs.microsoft.com\/firehose\/2013\/01\/16\/helpbridge-a-new-mobile-app-to-get-help-and-give-help-during-adisaster"},{"key":"892_CR5","unstructured":"Ushahidi. Ushahidi Inc., (2008). \nhttps:\/\/www.ushahidi.com\n\n. Accessed 27 Feb 2017"},{"key":"892_CR6","unstructured":"Twitter. Dorsey J, Glass N, Stone B, Williams E (2006). \nhttps:\/\/twitter.com\n\n. Accessed 27 Feb 2017"},{"key":"892_CR7","unstructured":"Facebook. Zuckerberg M, Saverin E, McCollum A, Moskovitz D, and Hughes C (2004). \nhttps:\/\/www.facebook.com\n\n. Accessed 27 Feb 2017"},{"key":"892_CR8","doi-asserted-by":"crossref","unstructured":"Jung Y, Figueiredo RJ, Fortes J (2014) Location-based timely cooperation over social private network. In: Proceedings of the 10th International conference on collaborative computing, 25 October, pp 388\u2013396","DOI":"10.4108\/icst.collaboratecom.2014.257321"},{"issue":"12","key":"892_CR9","doi-asserted-by":"publisher","first-page":"1926","DOI":"10.1016\/j.comnet.2009.11.019","volume":"54","author":"PS Juste","year":"2012","unstructured":"Juste PS, Wolinsky D, Boykin PO, Covington MJ, Figueiredo RJ (2012) SocialVPN: enabling wide-area collaboration with integrated social and overlay networks. COMPUT NETWORKS ISDN 54(12):1926\u20131938","journal-title":"COMPUT NETWORKS ISDN"},{"key":"892_CR10","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.cose.2013.08.004","volume":"41","author":"Y Jung","year":"2014","unstructured":"Jung Y, Joshi JBC (2014) CPBAC: property-based access control model for secure cooperation in online social networks. Comput Secur 41:19\u201339","journal-title":"Comput Secur"},{"key":"892_CR11","unstructured":"GeoNames Ontology. Wick M (2006). \nhttp:\/\/www.geonames.org\/ontology\/ontology_v3.1.rdf\n\n. Accessed 27 February 2017"},{"key":"892_CR12","unstructured":"Semantic Sensor Network Ontology. W3C Semantic Sensor Network Incubator Group (2009). \nhttps:\/\/www.w3.org\/2005\/Incubator\/ssn\/ssnx\/ssn\n\n. Accessed 27 Feb 2017"},{"key":"892_CR13","doi-asserted-by":"crossref","unstructured":"Laszewski G, Fox GC, Wang F, Younge AJ, Kulshrestha A, Pike GG, Smith W, Voeckler J, Figueiredo RJ, Fortes J, Keahey K, Delman E (2010) Design of the FutureGrid experiment management framework. In: Proceedings of the workshop on gateway computing environments workshop (GCE), pp 1\u201310","DOI":"10.1109\/GCE.2010.5676126"},{"key":"892_CR14","unstructured":"Wireshark. Combs G (1998). \nhttp:\/\/www.wireshark.org\n\n\/. Accessed 27 Feb 2017"},{"key":"892_CR15","doi-asserted-by":"crossref","unstructured":"Symeonidis P, Ntempos D, Manolopoulos Y (2014) Location-based social networks. In: Symeonidis P et al (ed) Recommender Systems for Location-based Social Networks, Springer New York, p 35\u201348","DOI":"10.1007\/978-1-4939-0286-6_4"},{"key":"892_CR16","unstructured":"NeerbyFeed. Wushibu LLC (2012). \nhttp:\/\/www.androidfreeware.net\/download-nearbyfeed-location-basedsocial-networking-and-microblogging.html\n\n. Accessed 27 Feb 2017"},{"key":"892_CR17","unstructured":"Facebook Places. Facebook (2010). \nhttps:\/\/www.facebook.com\/places\n\n. Accessed 27 Feb 2017"},{"key":"892_CR18","unstructured":"TNS (2012) Two thirds of world\u2019s mobile users signal they want to be found. \nhttp:\/\/www.tnsglobal.com\/press-release\/two-thirds-world\u02cas-mobile-users-signal-they-want-be-found\n\n. Accessed 10 Aug 2016"},{"key":"892_CR19","doi-asserted-by":"crossref","unstructured":"Andersen D, Balakrishnan H, Kaashoek F, Morris R (2001) Resilient overlay networks. In: Proceedings of the 18th ACM Symposium on operating systems principles, pp 131\u2013145","DOI":"10.1145\/502059.502048"},{"issue":"3","key":"892_CR20","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/1842733.1842736","volume":"44","author":"E Nygren","year":"2010","unstructured":"Nygren E, Sitaraman R, Sun J (2010) The Akamai network: a platform for high-performance internet applications. SIGOPS Oper Syst Rev 44(3):2\u201319","journal-title":"SIGOPS Oper Syst Rev"},{"key":"892_CR21","unstructured":"Gnutella Protocol. Kirk P (2003). \nhttp:\/\/rfc-gnutella.sourceforge.net\n\n. Accessed 27 Feb 2017"},{"key":"892_CR22","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","volume-title":"Peer-to-Peer Systems","author":"Petar Maymounkov","year":"2002","unstructured":"Maymounkov P, Mazieres D (2002) Kademlia: a peer-to-peer information system based on the XOR metric. In: Proceedings of the International peer-to-peer Symposium (IPTPS), pp 53\u201365"},{"key":"892_CR23","unstructured":"Guha S, Daswani N, Jain R (2006) An experimental study of the Skype peer-to-peer VoIP system. In: Proceedings of the International peer-to-peer Symposium (IPTPS)"},{"issue":"63","key":"892_CR24","first-page":"1","volume":"3","author":"D Clark","year":"2006","unstructured":"Clark D, Lehr B, Bauer S, Faratin P, Sami R (2006) Overlay networks and the future of the internet. J Commun Strategies 3(63):1\u201321","journal-title":"J Commun Strategies"},{"key":"892_CR25","unstructured":"Ford B, Strauss J, Lesniewski-Laas C, Rhea S, Kaashoek F, Morris R (2006) Persistent personal names for globally connected mobile devices. In: Proceedings of the 7th Symposium on operating systems design and implementation (OSDI), pp 223\u2013248"},{"key":"892_CR26","unstructured":"goTenna. Perdomo D and Perdomo J (2012). \nhttp:\/\/www.gotenna.com\n\n. Accessed 27 Feb 2017"},{"key":"892_CR27","unstructured":"Rysavy P (2014) How Beacons and Bluetooth Can Help Us Get to the Best Possible Wireless 911. \nhttps:\/\/gigaom.com\/2014\/08\/17\/how-beacons-and-bluetooth-can-help-us-get-to-the-best-possible-wireless-911\/\n\n. Accessed 27 Feb 2017"},{"key":"892_CR28","unstructured":"iBeacon. Apple (2013). \nhttps:\/\/developer.apple.com\/ibeacon\n\n. Accessed 27 Feb 2017"},{"key":"892_CR29","unstructured":"Terrazas T (2015) Emergency response system operated on a Bluetooth low energy network. US 20150289088, WO 2015152959"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-017-0892-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-017-0892-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-017-0892-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,7]],"date-time":"2020-03-07T06:10:33Z","timestamp":1583561433000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-017-0892-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,3]]},"references-count":29,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["892"],"URL":"https:\/\/doi.org\/10.1007\/s11036-017-0892-z","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6,3]]},"assertion":[{"value":"3 June 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}