{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T14:57:49Z","timestamp":1766415469887,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,8,17]],"date-time":"2012-08-17T00:00:00Z","timestamp":1345161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,8,17]]},"DOI":"10.1145\/2342549.2342552","type":"proceedings-article","created":{"date-parts":[[2012,8,21]],"date-time":"2012-08-21T13:06:35Z","timestamp":1345554395000},"page":"7-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Big friend is watching you"],"prefix":"10.1145","author":[{"given":"Abdelberi","family":"Chaabane","sequence":"first","affiliation":[{"name":"INRIA, Grenoble, France"}]},{"given":"Mohamed Ali","family":"Kaafar","sequence":"additional","affiliation":[{"name":"INRIA &amp; National ICT Australia, Grenoble, France"}]},{"given":"Roksana","family":"Boreli","sequence":"additional","affiliation":[{"name":"National ICT Australia &amp; University of New South Wales, Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2012,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Alerts users about the web bugs ad networks and widgets on visited web pages. www.ghostery.com.  Alerts users about the web bugs ad networks and widgets on visited web pages. www.ghostery.com."},{"key":"e_1_3_2_1_2_1","unstructured":"Facebook Sets Historic IPO. online.wsj.com\/article\/SB10001424052970204879004577110780078310366.html.  Facebook Sets Historic IPO. online.wsj.com\/article\/SB10001424052970204879004577110780078310366.html."},{"key":"e_1_3_2_1_3_1","unstructured":"Method and system for web user profiling and selective content delivery. http:\/\/www.google.com\/patents\/US8108245.  Method and system for web user profiling and selective content delivery. http:\/\/www.google.com\/patents\/US8108245."},{"key":"e_1_3_2_1_4_1","unstructured":"TrustedSource - Customer URL Ticketing System. www.trustedsource.org\/en\/feedback\/url.  TrustedSource - Customer URL Ticketing System. www.trustedsource.org\/en\/feedback\/url."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2003.1249171"},{"key":"e_1_3_2_1_6_1","volume-title":"Privacy on twitter: How much is too much? privacy issues on twitter. the annual meeting of the International Communication Association","author":"Humphreys L.","year":"2010","unstructured":"L. Humphreys , P. Gill , and B. Krishnamurthy . Privacy on twitter: How much is too much? privacy issues on twitter. the annual meeting of the International Communication Association , 2010 . L. Humphreys, P. Gill, and B. Krishnamurthy. Privacy on twitter: How much is too much? privacy issues on twitter. the annual meeting of the International Communication Association, 2010."},{"key":"e_1_3_2_1_7_1","volume-title":"Web 2.0 Security and Privacy Workshop","author":"Krishnamurthy B.","year":"2011","unstructured":"B. Krishnamurthy , K. Naryshkin , and C. E. Wills . Privacy leakage vs. protection measures: the growing disconnect . In Web 2.0 Security and Privacy Workshop , 2011 . B. Krishnamurthy, K. Naryshkin, and C. E. Wills. Privacy leakage vs. protection measures: the growing disconnect. In Web 2.0 Security and Privacy Workshop, 2011."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526782"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 3rd conference on Online social networks, WOSN'10","author":"Krishnamurthy B.","year":"2010","unstructured":"B. Krishnamurthy and C. E. Wills . Privacy leakage in mobile online social networks . In Proceedings of the 3rd conference on Online social networks, WOSN'10 , 2010 . B. Krishnamurthy and C. E. Wills. Privacy leakage in mobile online social networks. In Proceedings of the 3rd conference on Online social networks, WOSN'10, 2010."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068823"},{"key":"e_1_3_2_1_11_1","volume-title":"Facebook Tracks and Traces Everyone: Like This! SSRN eLibrary","author":"Roosendaal A.","year":"2010","unstructured":"A. Roosendaal . Facebook Tracks and Traces Everyone: Like This! SSRN eLibrary , 2010 . A. Roosendaal. Facebook Tracks and Traces Everyone: Like This! SSRN eLibrary, 2010."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS)","author":"Yen T.-F.","year":"2012","unstructured":"T.-F. Yen , Y. Xie , F. Yu , R. P. Yu , and M. Abadi . Host fingerprinting and tracking on the web: Privacy and security implications . In Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS) , Feb. 2012 . T.-F. Yen, Y. Xie, F. Yu, R. P. Yu, and M. Abadi. Host fingerprinting and tracking on the web: Privacy and security implications. In Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS), Feb. 2012."}],"event":{"name":"SIGCOMM '12: ACM SIGCOMM 2012 Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Helsinki Finland","acronym":"SIGCOMM '12"},"container-title":["Proceedings of the 2012 ACM workshop on Workshop on online social networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2342549.2342552","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2342549.2342552","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:05Z","timestamp":1750239245000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2342549.2342552"}},"subtitle":["analyzing online social networks tracking capabilities"],"short-title":[],"issued":{"date-parts":[[2012,8,17]]},"references-count":12,"alternative-id":["10.1145\/2342549.2342552","10.1145\/2342549"],"URL":"https:\/\/doi.org\/10.1145\/2342549.2342552","relation":{},"subject":[],"published":{"date-parts":[[2012,8,17]]},"assertion":[{"value":"2012-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}