{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T00:08:34Z","timestamp":1768349314705,"version":"3.49.0"},"publisher-location":"New York, New York, USA","reference-count":36,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"European Union Horizon 2020 research and innovation programme under the Marie Skodowska-Curie grant agreement","award":["Marie Skodowska-Curie grant agreement No 691025"],"award-info":[{"award-number":["Marie Skodowska-Curie grant agreement No 691025"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1145\/3184558.3191516","type":"proceedings-article","created":{"date-parts":[[2018,4,18]],"date-time":"2018-04-18T18:04:25Z","timestamp":1524074665000},"page":"905-910","source":"Crossref","is-referenced-by-count":10,"title":["Smart Cities at Risk!"],"prefix":"10.1145","author":[{"given":"Vaia","family":"Moustaka","sequence":"first","affiliation":[{"name":"Aristotle University of Thessaloniki, Thessaloniki, Greece"}]},{"given":"Zenonas","family":"Theodosiou","sequence":"additional","affiliation":[{"name":"SignalGeneriX Ltd, Limassol, Cyprus"}]},{"given":"Athena","family":"Vakali","sequence":"additional","affiliation":[{"name":"Aristotle University of Thessaloniki, Thessaloniki, Greece"}]},{"given":"Anastasis","family":"Kounoudes","sequence":"additional","affiliation":[{"name":"SignalGeneriX Ltd, Limassol, Cyprus"}]}],"member":"320","reference":[{"key":"key-10.1145\/3184558.3191516-1","unstructured":"NOKIA, Machina Research Smart City Playbook. 2016. https:\/\/pages.nokia.com\/2170.What.Are.Cities.Doing.to.Be.Smart.html"},{"key":"key-10.1145\/3184558.3191516-2","unstructured":"M. Batty, K-W. Axhausen, F. Giannotti, A. Pozdnoukhov, A. Bazzani, M. Wachowicz, G. Ouzounis and Y. Portugali. 2012. Smart cities of the future. The European Physical Journal Special Topics 214, 1 (Nov. 2012), 481--518. DOI: http:\/\/dx.doi.org\/10.1140\/epjst\/e2012-01703--3"},{"key":"key-10.1145\/3184558.3191516-3","unstructured":"L.-G. Anthopoulos. 2017. Understanding Smart Cities: A Tool for Smart Government or an Industrial Trick. Springer International Publishing. DOI: 10.1007\/978--3--319--57015-0"},{"key":"key-10.1145\/3184558.3191516-4","doi-asserted-by":"crossref","unstructured":"V. Moustaka, A. Vakali, and L.-G. Anthopoulos. 2018. A systematic review for smart city data analytics (under review)","DOI":"10.1145\/3239566"},{"key":"key-10.1145\/3184558.3191516-5","doi-asserted-by":"crossref","unstructured":"V. Moustaka, A. Vakali, and L.-G. Anthopoulos. 2017. CityDNA: smart city dimensions' correlations for identifying urban profile. In Proceedings of the 26th International World Wide Web Conference (WWW2017), ACM. DOI: https:\/\/doi.org\/10.1145\/3041021.3054714","DOI":"10.1145\/3041021.3054714"},{"key":"key-10.1145\/3184558.3191516-6","unstructured":"Statista. 2018. Number of social media users worldwide from 2010 to 2021 (in billions). Retrieved, Jan. 2018, from: https:\/\/www.statista.com\/statistics\/278414\/number-of-worldwide-social-network-users\/"},{"key":"key-10.1145\/3184558.3191516-7","doi-asserted-by":"crossref","unstructured":"E.-A. Nuaimi, H.-A. Neyadi, N. Mohamed, and J. Al-Jaroodi. 2015. Applications of big data to smart cities. Journal of Internet Services and Applications 6, 25. DOI 10.1186\/s13174-015-0041--5","DOI":"10.1186\/s13174-015-0041-5"},{"key":"key-10.1145\/3184558.3191516-8","doi-asserted-by":"crossref","unstructured":"A.-S. Elmaghraby and M.-M. Losavio. 2014. Cyber security challenges in Smart Cities: Safety, security and privacy. Journal of Advanced Research 5, 491--497. DOI: https:\/\/doi.org\/10.1016\/j.jare.2014.02.006","DOI":"10.1016\/j.jare.2014.02.006"},{"key":"key-10.1145\/3184558.3191516-9","doi-asserted-by":"crossref","unstructured":"K.-B. Ahmed, M. Bouhorma, and M.-B. Ahmed. 2014. Age of Big Data and Smart Cities: Privacy TradeOff. International Journal of Engineering Trends and Technology (IJETT) 16, 6 (Oct 2014). Retrieved, Dec. 2017, from: https:\/\/arxiv.org\/ftp\/arxiv\/papers\/1411\/1411.0087.pdf","DOI":"10.14445\/22315381\/IJETT-V16P258"},{"key":"key-10.1145\/3184558.3191516-10","unstructured":"A. Bartoli, J. Hernandez-Serrano, M. Sorian, M. Dohler, A. Kountouris, and D. Barthel. 2011. Security and Privacy in your Smart City. In Proceedings of Barcelona Smart Cities Congress. Retrieved, Dec. 2017, from: http:\/\/www.cttc.es\/publication\/security-and-privacy-in-your-smart-city\/"},{"key":"key-10.1145\/3184558.3191516-11","doi-asserted-by":"crossref","unstructured":"V. Beltran, A. F. Skarmeta, and P.-M. Ruiz. 2017. An ARM-Compliant Architecture for User Privacy in Smart Cities: SMARTIEQuality by Design in the IoT. Wireless Communications and Mobile Computing. DOI: https:\/\/doi.org\/10.1155\/2017\/3859836","DOI":"10.1155\/2017\/3859836"},{"key":"key-10.1145\/3184558.3191516-12","doi-asserted-by":"crossref","unstructured":"A. Mart&#237;nez-Balleste, P.-A. P&#233;rez-Mart&#237;nez, and A. Solanas. 2013. The Pursuit of Citizens Privacy: A Privacy-Aware Smart City Is Possible. IEEE Communications Magazine 51, 6 (June 2013), 136--141. DOI: http:\/\/dx.doi.org\/10.1109\/MCOM.2013.6525606","DOI":"10.1109\/MCOM.2013.6525606"},{"key":"key-10.1145\/3184558.3191516-13","doi-asserted-by":"crossref","unstructured":"O. Mazhelis, A. H&#228;m&#228;l&#228;inen, T. Asp. and P. Tyrv&#228;inen. 2016. Towards enabling privacy preserving smart city apps. In Proceedings of the 2016 IEEE International Smart Cities Conference (ISC2), IEEE. DOI: 10.1109\/ISC2.2016.7580755","DOI":"10.1109\/ISC2.2016.7580755"},{"key":"key-10.1145\/3184558.3191516-14","doi-asserted-by":"crossref","unstructured":"M.-G. Solomon, V. Sunderam, L. Xiong, and M. Li. 2016. Enabling mutually private location proximity services in smart cities: A comparative assessment. In Proceedings of the 2016 IEEE International Smart Cities Conference (ISC2), IEEE. DOI: 10.1109\/ISC2.2016.7580757","DOI":"10.1109\/ISC2.2016.7580757"},{"key":"key-10.1145\/3184558.3191516-15","doi-asserted-by":"crossref","unstructured":"L. Van Zoonen. 2016. Privacy concerns in smart cities. Government Information Quarterly 33, 3 (July 2016), 472--480. DOI: https:\/\/doi.org\/10.1016\/j.giq.2016.06.004","DOI":"10.1016\/j.giq.2016.06.004"},{"key":"key-10.1145\/3184558.3191516-16","unstructured":"D. Doran, K. Severin, S. Gokhale, and A. Dagnino. 2014. Social Media Enabled Human Sensing for Smart Cities. AI Communications 2014. Retrieved, Dec. 2017, from: http:\/\/knoesis.wright.edu\/sites\/default\/files\/aic14.pdf"},{"key":"key-10.1145\/3184558.3191516-17","unstructured":"R.-P. Dameri and F. Ricciardi. 2014. Using Social Networks in Smart City:organizational challenges, synergies, and benefits. In Proceedings of the European Conference on Social Media (ECSM 2014)"},{"key":"key-10.1145\/3184558.3191516-18","unstructured":"K.-E. Kumar and H.-. Ahmed. 2016. Estimation of Traffic with Accuracy through Twitter Stream Analysis. International Journal of Innovative Technlogies 04, 08 (July 2016), 1317--1324"},{"key":"key-10.1145\/3184558.3191516-19","doi-asserted-by":"crossref","unstructured":"G. Rizzo, R. Meo, R.-G. Pensa, G. Falcone, and R. Troncy. 2016. Shaping City Neighborhoods Leveraging Crowd Sensor. Information Systems, July 2016. DOI: http:\/\/dx.doi.org\/10.1016\/j.engappai.2012.05.005","DOI":"10.1016\/j.engappai.2012.05.005"},{"key":"key-10.1145\/3184558.3191516-20","doi-asserted-by":"crossref","unstructured":"F. Luo, G. Cao, K. Mulligan and X. Li. 2016. Explore spatiotemporal and demographic characteristics of human mobility via Twitter: A case study of Chicago. Applied Geography 70, May 2016, 11--25. DOI: http:\/\/dx.doi.org\/10.1016\/j.apgeog.2016.03.001","DOI":"10.1016\/j.apgeog.2016.03.001"},{"key":"key-10.1145\/3184558.3191516-21","doi-asserted-by":"crossref","unstructured":"C. Zhang and J. Sun. 2010. Privacy and Security for Online Social Networks: Challenges and Opportunities. IEEE Network 24, 4 (July-August 2010). DOI: 10.1109\/MNET.2010.5510913","DOI":"10.1109\/MNET.2010.5510913"},{"key":"key-10.1145\/3184558.3191516-22","doi-asserted-by":"crossref","unstructured":"C. Patsakis, A. Zigomitros, A. Papageorgiou and A. Solanas. 2014. Privacy and Security for Multimedia Content shared on OSNs: Issues and Countermeasures, Computer Journal 58, 4, 518--535. DOI: https:\/\/doi.org\/10.1093\/comjnl\/bxu066","DOI":"10.1093\/comjnl\/bxu066"},{"key":"key-10.1145\/3184558.3191516-23","doi-asserted-by":"crossref","unstructured":"M. Fire, R. Goldschmidt and Y. Elovici. 2014. Online Social Networks: Threats and Solutions, IEEE Communication Surveys &#38; Tutorials 16, 4, Fourth Quarter 2014, 2019--2036","DOI":"10.1109\/COMST.2014.2321628"},{"key":"key-10.1145\/3184558.3191516-24","doi-asserted-by":"crossref","unstructured":"T. Minkus, K. Liu, and K.-W. Ross. 2015. Children Seen But Not Heard: When Parents Compromise Children's Online Privacy. In Proceedings of the 24th International Conference on World Wide Web (WWW'15), 776--786. DOI: https:\/\/doi.org\/10.1145\/2736277.2741124","DOI":"10.1145\/2736277.2741124"},{"key":"key-10.1145\/3184558.3191516-25","doi-asserted-by":"crossref","unstructured":"R. Giffinger and H. Gudrun. 2010. Smart Cities Ranking: An Effective Instrument for the Positioning of Cities. ACE 4, 12 (February 2010), 7--25, URI=http:\/\/hdl.handle.net\/2099\/8550","DOI":"10.5821\/ace.v4i12.2483"},{"key":"key-10.1145\/3184558.3191516-26","doi-asserted-by":"crossref","unstructured":"T. Nam and T.-A. Pardo. 2011. Conceptualizing Smart City with Dimensions of Technology, People, and Institutions. In Proceedings of the 12th Annual International Digital Government Research Conference: Digital Government Innovation in Challenging Times (dg.o' 11), ACM. DOI: https:\/\/doi.org\/10.1145\/2037556.2037602","DOI":"10.1145\/2037556.2037602"},{"key":"key-10.1145\/3184558.3191516-27","doi-asserted-by":"crossref","unstructured":"J. Lee and H. Lee. 2014. Developing and validating a citizen-centric typology for smart city services. Government Information Quarterly 31, s93-s105. DOI: https:\/\/doi.org\/10.1016\/j.giq.2014.01.010","DOI":"10.1016\/j.giq.2014.01.010"},{"key":"key-10.1145\/3184558.3191516-28","doi-asserted-by":"crossref","unstructured":"B. Kantarci and H.-T. Mouftah. 2014. Trustworthy Sensing for Public Safety in Cloud-Centric Internet of Things. IEEE Internet of Things Journal 1, 4 (Aug. 2014). DOI: http:\/\/dx.doi.org\/360--368. 10.1109\/JIOT.2014.2337886","DOI":"10.1109\/JIOT.2014.2337886"},{"key":"key-10.1145\/3184558.3191516-29","doi-asserted-by":"crossref","unstructured":"R. Shillair, S.-R. Cotton, H.-Y-S. Tsai, S. Alhabash, R. LaRose, and N.-J. Rifon. 2015. Online safety begins with you and me: Convincing Internet users to protect themselves. Computers in Human Behavior 48, 199--207. DOI: https:\/\/doi.org\/10.1016\/j.chb.2015.01.046","DOI":"10.1016\/j.chb.2015.01.046"},{"key":"key-10.1145\/3184558.3191516-30","doi-asserted-by":"crossref","unstructured":"Y. Li, Y Li., Q. Yan, and R.-H. Deng. 2015. Privacy leakage analysis in online social networks. Computers &#38; Security 49, 239--254. DOI: https:\/\/doi.org\/10.1016\/j.cose.2014.10.012","DOI":"10.1016\/j.cose.2014.10.012"},{"key":"key-10.1145\/3184558.3191516-31","doi-asserted-by":"crossref","unstructured":"M. Tierney, I. Spiro, C. Bregler and L. Subramanian. 2013. Cryptagram: Photo privacy for online social media. In Proceedings of the 1st ACM Conference on Online Social Networks (COSN'13), 75--88, ACM, New York, NY, USA.","DOI":"10.1145\/2512938.2512939"},{"key":"key-10.1145\/3184558.3191516-32","doi-asserted-by":"crossref","unstructured":"A. Tsirtsis, N. Tsapatsoulis, M. Stamatelatos, K. Papadamou, and M. Sirivianos. 2016. Cyber Security Risks for Minors: A Taxonomy and a Software Architecture. In 2016 11th International Workshop on Semantic and Social Media Adaptation and Personalization (SMAP), IEEE. DOI: https:\/\/doi.org\/10.1109\/SMAP.2016.7753391","DOI":"10.1109\/SMAP.2016.7753391"},{"key":"key-10.1145\/3184558.3191516-33","doi-asserted-by":"crossref","unstructured":"L. Van Zoonen &#38; G. Turner. 2013. Taboos and desires of the UK public for identitymanagement in the future: Findings from two survey games. In Proceedings of the 2013 ACM workshop on Digital Identity Management (DIM '13), 37--44. DOI: https:\/\/doi.org\/10.1145\/2517881.2517887","DOI":"10.1145\/2517881.2517887"},{"key":"key-10.1145\/3184558.3191516-34","doi-asserted-by":"crossref","unstructured":". Kirby. 2014. Controversy surrounds England's new NHS database. The Lancet 383, 9918. http:\/\/www.thelancet.com\/journals\/lancet\/article\/PIIS0140--6736(14)60230-0\/fulltext","DOI":"10.1016\/S0140-6736(14)60230-0"},{"key":"key-10.1145\/3184558.3191516-35","doi-asserted-by":"crossref","unstructured":"Y.-M. Baek, E-M Kim, and Y. Bae. 2014. My privacy is okay, but theirs is endangered: Why comparative optimism matters in online privacy concerns Computers in Human Behavior 31, Feb. 2014, 48--56. DOI: https:\/\/doi.org\/10.1016\/j.chb.2013.10.010","DOI":"10.1016\/j.chb.2013.10.010"},{"key":"key-10.1145\/3184558.3191516-36","doi-asserted-by":"crossref","unstructured":"A. Bergstr&#246;m. 2015. Online privacy concerns: A broad approach to understanding the concerns of different groups for different uses. Computers in Human Behavior 53, Dec. 2015, 419--426. DOI: https:\/\/doi.org\/10.1016\/j.chb.2015.07.025","DOI":"10.1016\/j.chb.2015.07.025"}],"event":{"name":"Companion of the The Web Conference 2018","location":"Lyon, France","acronym":"WWW '18","number":"2018","sponsor":["IW3C2, International World Wide Web Conference Committee","SIGWEB, ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"start":{"date-parts":[[2018,4,23]]},"end":{"date-parts":[[2018,4,27]]}},"container-title":["Companion of the The Web Conference 2018 on The Web Conference 2018 - WWW '18"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3184558.3191516","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3191516&ftid=1958294&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:30Z","timestamp":1750208910000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3184558.3191516"}},"subtitle":["Privacy and Security Borderlines from Social Networking in Cities"],"proceedings-subject":"The Web Conference 2018","short-title":[],"issued":{"date-parts":[[2018]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1145\/3184558.3191516","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}