{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T16:16:35Z","timestamp":1774196195551,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,8,18]],"date-time":"2008-08-18T00:00:00Z","timestamp":1219017600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,8,18]]},"DOI":"10.1145\/1397735.1397744","type":"proceedings-article","created":{"date-parts":[[2009,9,28]],"date-time":"2009-09-28T17:33:43Z","timestamp":1254159223000},"page":"37-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":164,"title":["Characterizing privacy in online social networks"],"prefix":"10.1145","author":[{"given":"Balachander","family":"Krishnamurthy","sequence":"first","affiliation":[{"name":"AT&amp;T Research Labs, Florham Park, NJ, USA"}]},{"given":"Craig E.","family":"Wills","sequence":"additional","affiliation":[{"name":"Worcester Polytechnic Institute, Worcester, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,8,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Anonymizer-online privacy and security. http:\/\/www.anonymizer.com.  Anonymizer-online privacy and security. http:\/\/www.anonymizer.com."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242598"},{"key":"e_1_3_2_1_3_1","volume-title":"June","author":"Cormode Graham","year":"2008","unstructured":"Graham Cormode and Balachander Krishnamurthy . Key differences between Web1.0 and Web2.0. First Monday, 13(6) , June 2008 . Graham Cormode and Balachander Krishnamurthy. Key differences between Web1.0 and Web2.0. First Monday, 13(6), June 2008."},{"key":"e_1_3_2_1_4_1","volume-title":"Internet Measurement: Infrastructure, Traffic and Applications","author":"Crovella Mark","year":"2006","unstructured":"Mark Crovella and Balachander Krishnamurthy . Internet Measurement: Infrastructure, Traffic and Applications . John Wiley and Sons, Inc. , 2006 . Mark Crovella and Balachander Krishnamurthy. Internet Measurement: Infrastructure, Traffic and Applications. John Wiley and Sons, Inc., 2006."},{"key":"e_1_3_2_1_5_1","unstructured":"Scot DeDeo. Pagestats May 2006. http:\/\/www.cs.wpi.edu\/~cew\/pagestats\/  Scot DeDeo. Pagestats May 2006. http:\/\/www.cs.wpi.edu\/~cew\/pagestats\/"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497554"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"e_1_3_2_1_8_1","unstructured":"Social networking visits increase 11.5 percent from January to February March 2007. http:\/\/www.hitwise.com\/press-center\/hitwiseHS2004\/socialnetworkingmarch07.php.  Social networking visits increase 11.5 percent from January to February March 2007. http:\/\/www.hitwise.com\/press-center\/hitwiseHS2004\/socialnetworkingmarch07.php."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397741"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280688"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177088"},{"key":"e_1_3_2_1_12_1","article-title":"Betrayed by my shadow: Learning data identify via trail matching","author":"Malin Bradley","year":"2005","unstructured":"Bradley Malin . Betrayed by my shadow: Learning data identify via trail matching . Journal of Privacy Technology , June 2005 . Bradley Malin. Betrayed by my shadow: Learning data identify via trail matching. Journal of Privacy Technology, June 2005.","journal-title":"Journal of Privacy Technology"},{"key":"e_1_3_2_1_13_1","unstructured":"Social network downtime in 2008 February 2008. http:\/\/royal.pingdom.com\/?p=253.  Social network downtime in 2008 February 2008. http:\/\/royal.pingdom.com\/?p=253."},{"key":"e_1_3_2_1_14_1","volume-title":"October 2","author":"Facebook","year":"2007","unstructured":"Facebook members bare all on networks , Sophos warns of new privacy concerns , October 2 , 2007 . http:\/\/www.sophos.com\/pressoffice\/news\/articles\/2007\/10\/facebook-network.html. Facebook members bare all on networks, Sophos warns of new privacy concerns, October 2, 2007. http:\/\/www.sophos.com\/pressoffice\/news\/articles\/2007\/10\/facebook-network.html."},{"key":"e_1_3_2_1_15_1","volume-title":"July 30","author":"Stone Brad","year":"2007","unstructured":"Brad Stone . New scrutiny for Facebook over predators , July 30 , 2007 . http:\/\/nytimes.com\/2007\/07\/30\/business\/media\/30facebook.html. Brad Stone. New scrutiny for Facebook over predators, July 30, 2007. http:\/\/nytimes.com\/2007\/07\/30\/business\/media\/30facebook.html."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497459"}],"event":{"name":"SIGCOMM '08: ACM SIGCOMM 2008 Conference","location":"Seattle WA USA","acronym":"SIGCOMM '08","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the first workshop on Online social networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1397735.1397744","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1397735.1397744","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:57:47Z","timestamp":1750255067000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1397735.1397744"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,8,18]]},"references-count":17,"alternative-id":["10.1145\/1397735.1397744","10.1145\/1397735"],"URL":"https:\/\/doi.org\/10.1145\/1397735.1397744","relation":{},"subject":[],"published":{"date-parts":[[2008,8,18]]},"assertion":[{"value":"2008-08-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}