Skip to main content

Towards Trustworthy Mobile Social Networking

  • Chapter
  • First Online:
Mobile Social Networking

Part of the book series: Computational Social Sciences ((CSS))

Abstract

Self-organized networks based on mobile devices, e.g., mobile ad hoc networks (MANET), are becoming a practical platform for mobile social networking. People, either familiar or strangers, communicate with each other via such a network for instant social activities. How to help mobile users to build up trust in mobile social networking is becoming an important and interesting issue. Trust concerns not only security, but also privacy, as well as quality of social networking experiences. It relates to many properties that are essential for establishing a trust relationship in ephemeral and dynamically changed mobile social environments. This book chapter reviews the literature with regard to how to build up trust in mobile social networking. We explore whether mobile social networking is demanded, considering many existing popular Internet social networking services. Based on a need assessment survey, we propose a trust management framework that supports context-aware trust/reputation generation, trustworthy content recommendations, secure communications, unwanted traffic control, user privacy recommendation and preservation, and other trust and privacy enhancement technologies. Simulations, prototype implementation, and trial experiments further prove the effectiveness of proposed solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Aad, I., & Niemi, V. (2010). NRC data collection and privacy by design principles. In Proceedings of PhoneSense (pp. 41–45). Zurich, Switzerland.

    Google Scholar 

  • Adler, BT., & Alfaro, L. (2007). A content-driven reputation system for the Wikipedia. In WWW (pp. 261–270). Banff, Alberta, Canada.

    Google Scholar 

  • Ahn, J., & Amatriain, X. (2010). Towards fully distributed and privacy-preserving recommendations via expert collaborative filtering and RESTful linked data. In WI-IAT’10 (pp. 66–73). Toronto, Canada.

    Google Scholar 

  • Ahtiainen, A., et al. (2009). Awareness networking in wireless environments: Means of exchanging information. IEEE Vehicular Technology Magazine, 4(3), 48–54.

    Article  Google Scholar 

  • Bansal, S., & Baker, M. (2003). Observation-based cooperation enforcement in ad hoc networks (Technical Report No. NI/0307012). Stanford University, CA, USA.

    Google Scholar 

  • Basin, D., Klaedtke, F., Muller, S., Pfitzmann, B. (2008). Runtime monitoring of metric first-order temporal properties. In Proceedings of FSTTCS (pp. 49–60), Bangalore: India.

    Google Scholar 

  • Beach, A., Gartrell, M., Han, R. (2009). Solutions to security and privacy issues in mobile social networking. In International conference on computational science and engineering, 2009, CSE ’09 (Vol. 4, pp. 1036–1042). Vancouver.

    Google Scholar 

  • Becchetti, L., Castillo, C., Donato, D. et al. (2006). Using rank propagation and probabilistic counting for link-based spam detection. In Proceedings of WebKDD. Philadelphia, August 20, 2006.

    Google Scholar 

  • Berkovsky, S. (2010). Putting things in context: Challenge on context-aware movie recommendation. In Proceedings of the workshop on context-aware movie recommendation (pp 2–6). Barcelona.

    Google Scholar 

  • Bethencourt, J., Sahai, A., Waters, B. (2007). Ciphertext-policy attribute-based encryption. In Proceedings of the 2007 IEEE symposium on security and privacy (pp. 321–334). Oakland.

    Google Scholar 

  • Bi, J., Wu, J., Zhang, W. (2008). A trust and reputation based anti-spam method. IEEE INFOCOM, 2485–2493.

    Google Scholar 

  • Bilge, A., & Polat, H. (2010). Improving privacy-preserving NBC-based recommendations by preprocessing. WI-IAT (pp. 143–147). Toronto.

    Google Scholar 

  • Bilogrevic, I., Jadliwala, M., Lam, I., et al. (2012). Big Brother knows your friends: On privacy of social communities in pervasive networks. In Proceedings of the 10th International Conference on Pervasive Computing. Newcastle, UK

    Google Scholar 

  • Bindschaedler, L., Jadliwala, M., Bilogrevic, I., Aad, I., Ginzboorg, P., Niemi, V., Hubaux, J.P. (2012). Track me if you can: On the effectiveness of context-based identifier changes in deployed mobile networks. In Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS). Hilton San Diego Resort & Spa, US.

    Google Scholar 

  • Biswas, D., Nefedov, N., Niemi, V. (2011). Distributed usage control the 8th International Conference on Mobile Web Information Systems (MobiWIS 2011). In Proceedings. of MobiWIS. Procedia Computer Science 5, 562–569. Niagara Falls, Ontario, Canada

    Google Scholar 

  • Blaze, M., Feigenbaum, J., Lacy, J. (1996). Decentralized trust management. In Proceedings. of the IEEE Conference on Security and Privacy. (pp. 164–173). Oakland, CA

    Google Scholar 

  • Buchegger, S., & Boudec, J.L. (2002). Performance analysis of the CONFIDANT protocol. In Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) Lausanne, Switzerland. (pp. 226–236).

    Google Scholar 

  • Buchegger, S., & Boudec, J.Y.L. (2003). The effect of rumor spreading in reputation systems for mobile ad-hoc networks. In Proceedings of WiOpt Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks. Sophia-Antipolis, France.

    Google Scholar 

  • Chen, Y. (2010). A privacy-enhanced reputation system for mobile ad hoc services. Master thesis, Aalto University, Espoo, Finland.

    Google Scholar 

  • Chen, G., & Rahman, F. (2008). Analyzing privacy designs of mobile social networking applications. In IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC’08: Shanghai, China. Vol. 2. (pp. 83–88).

    Google Scholar 

  • Chen, Y., Yan, Z., Niemi, V. (2011). Implementation of a reputation system for pervasive social networking. In IEEE TrustID 2011 (pp. 857–862). Changsha, China.

    Google Scholar 

  • Chuong, C., Torabi, T., Loke, S.W. (2009). Towards context-aware task recommendation. In JCPC’09 (pp. 289–292). Taiwan.

    Google Scholar 

  • Corritore, C. L., Kracher, B., & Wiedenbeck, S. (2003). On-line trust: Concepts, evolving themes, a model. International Journal of Human–Computer Studies, Trust and Technology, 58(6), 737–758.

    Article  Google Scholar 

  • Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340.

    Article  Google Scholar 

  • Douceur, J.R. (2002). The Sybil attack. In IPTPS, LNCS 2429 (pp. 251–260). Cambridge, MA, USA.

    Google Scholar 

  • EZSetup. (2012). http://research.microsoft.com/en-us/groups/wn/mssn.aspx. Accessed 20 June 2012.

  • Goyal, V., Pandey, O., Sahai, A., et al. (2006). Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security (pp. 89–98). Alexandria, VA, USA.

    Google Scholar 

  • Gupta, M., Judge, P., Ammar, M. (2003). A reputation system for peer-to-peer networks. In Proceedings of the 13th international workshop on network and operating systems support for digital audio and video (NOSSDAV ’03), Monterey (pp. 144–152). New York: ACM.

    Google Scholar 

  • Gupta, A., Miettinen, M., Asokan, N. (2011). Using context-profiling to aid access control decisions in mobile devices. In Proceedings of PerCom Workshops (pp. 310–312). Seattle, WA, USA.

    Google Scholar 

  • Hancock, J.T., Toma, C., Ellison, N. (2007). The truth about lying in online dating profiles. Proceedings of the ACM CHI 2007 (pp. 449–452). San Jose, California, USA.

    Google Scholar 

  • Hu, J., & Burmester, M. (2006). LARS: A locally aware reputation system for mobile ad hoc networks. In Proceedings of the 44th ACM Annual Southeast Regional Conference (pp. 119–123). Melbourne, FL, USA.

    Google Scholar 

  • Hyytia, E., Virtamo, J., Lassila, P., Kangasharju, J., Ott, J. (2011). When does content float? Characterizing availability of anchored information in opportunistic content sharing. In Proceedings of IEEE INFOCOM (pp. 3137–3145). Shanghai, China.

    Google Scholar 

  • Jadliwala, M., Freudiger, J., Aad, I., Hubaux, J.P., Niemi, V. (2011). Privacy-triggered communications in pervasive social networks. In Proceedings of IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (pp. 1–6). Lucca, Italy.

    Google Scholar 

  • Jøsang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2), 618–644. Elsevier.

    Article  Google Scholar 

  • Junction. (2012). Harvard MobiSocial Group. http://openjunction.org/. Accessed 20 June 2012.

  • Katzenbeisser, S., & Petkovic, M. (2008). Privacy-preserving recommendation systems for consumer healthcare services. In ARES’08 (pp. 889–895). Barcelona , Spain.

    Google Scholar 

  • Kikuchi, H. (2009). Privacy-preserving collaborative filtering schemes. In ARES’09 (pp. 911–916). Fukuoka, Japan.

    Google Scholar 

  • Kiukkonen, N., Blom, J., Dousse, O., Gatica-Perez, D., Laurila, J. (2010). Towards rich mobile phone datasets: Lausanne data collection campaign. In Proceedings of ICPS. Berlin, Germany.

    Google Scholar 

  • Kolan, P., & Dantu, R. (2007). Socio-technical defense against voice spamming. ACM Transactions on Autonomous and Adaptive Systems, 2(1), Article 2(44).

    Google Scholar 

  • Krishna, P., Puttaswamy, N., Zhao, B. (2010). Preserving privacy in location-based mobile social applications. In Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications (HotMobile '10) Annapolis, Maryland, US (pp. 1–6). New York: ACM.

    Google Scholar 

  • Kujimura, K., & Nishihara, T. (2003). Reputation rating system based on past behavior of evaluators. In Proceedings of the 4th ACM Conference on Electronic Commerce (pp. 246–247). San Diego, CA, USA.

    Google Scholar 

  • Li, J., Li, R., Kato, J., et al. (2008). Future trust management framework for mobile ad hoc networks. IEEE Communications Magazine, 46(4), 108–115.

    Article  Google Scholar 

  • Li, T., Gao, C., Du, J. (2009). A NMF-based privacy-preserving recommendation algorithm. In ICISE’09 (pp. 754–757). Nanjing, China.

    Google Scholar 

  • Liiv, I., Tammet, T., Ruotsalo, T. et al. (2009). A: Personalized context-aware recommendations in SMARTMUSEUM: Combining semantics with statistics. In SEMAPRO ’09 (pp. 50–55). Sliema, Malta.

    Google Scholar 

  • Liu, Z., Yau, S.S., Peng, D. et al. (2008a). A flexible trust model for distributed service infrastructures. In Proceedings of 11th IEEE Symposium on Object Oriented Real-Time Distributed Computing (pp. 108–115). Orlando, Florida, USA.

    Google Scholar 

  • Liu, D., Meng, X., Chen, J. (2008b). A framework for context-aware service recommendation. In ICACT 2008 (pp. 2131–2134). Gangwon-Do, Korea (South).

    Google Scholar 

  • Luo, Y., Le, J., Chen, H. (2009). A privacy-preserving book recommendation model based on multi-agent. WCSE ’09 (pp. 323–327). Xiamen, China.

    Google Scholar 

  • Michiardi, P., & Molva, R. (2002). Core: A COllaborative REputation mechanism to enforce node cooperation in mobile ad hoc networks. In Advanced Communications and Multimedia Security, LNCS 2828 (pp. 107–121). Portorož, Slovenia.

    Google Scholar 

  • MicroBlog. (2012). SyNRG, Duke University. http://synrg.ee.duke.edu/microblog.html. Accessed 20 June 2012.

  • Miluzzo, E., Lane, N., Fodor, K. et al. (2008). Sensing meets mobile social networks: The design, implementation and evaluation of the CenceMe application. In Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems (SenSys ‘08) (pp. 337–350). Raleigh, NC, USA.

    Google Scholar 

  • Muller, S., Katzenbeisser, S., Eckert, C. (2008). Distributed attribute-based encryption. In Proceedings of the 11th Annual International Conference on Information Security and Cryptology (pp. 20–36). Seoul, Korea.

    Google Scholar 

  • Nokia Instant Community. (2010a). https://lausanne.nokiaresearch.com/nic/. Accessed 20 June 2012.

  • Nokia Instant Community. (2010b). http://conversations.nokia.com/2010/05/25/nokia-instant-community-gets-you-social/. Accessed 20 June 2012.

  • Nokia. (2012). Mobile Data Challenge. Workshop in Pervasive 2012. Newcastle, UK. http://pervasiveconference.org. Accessed August 31, 2013.

  • O’Donovan, J., & Smyth, B. (2006). Trust in recommender systems. In IUI’05 (pp. 167–174).

    Google Scholar 

  • Ott, J., Hyytiä, E., Lassila, P. E., Kangasharju, J., & Santra, S. (2011). Floating content for probabilistic information sharing. Pervasive and Mobile Computing, 7(6), 671–689.

    Article  Google Scholar 

  • Polat, H., & Du. W.L. (2005). Privacy-preserving top-n recommendation on horizontally partitioned data. In The 2005 IEEE/WIC/ACM International Conference on Web Intelligence Compiegne University of Technology, France. (pp. 725–731).

    Google Scholar 

  • Paulos, E. and Goodman, G. (2002). http://www.paulos.net/research/intel/familiarstranger/index.htm. Accessed 20 June 2012.

  • Raya, M., Papadimitratos, P., Gligory, VD. et al. (2008). On data-centric trust establishment in ephemeral ad hoc networks. In IEEE INFOCOM, Phoenix, AZ, US. 1912–1920.

    Google Scholar 

  • Resnick, P., & Varian, H. R. (1997). Recommender systems. Communications of the ACM, 40(3), 56–58.

    Article  Google Scholar 

  • Resnick, P., & Zeckhauser, R. (2002). Trust among strangers in Internet transactions: Empirical analysis of eBay’s reputation system. In M. Baye (Ed.), The economics of the Internet and e-commerce (Advances in applied microeconomics, Vol. 11, pp. 127–157). Amsterdam: Elsevier.

    Chapter  Google Scholar 

  • Resnick, P., Kuwabara, K., Zeckhauser, R., et al. (2000). Reputation systems. Communications of the ACM, 43(12), 45–48.

    Article  Google Scholar 

  • Sadeh, N., Hong, J., Cranor, L., et al. (2009). Understanding and capturing people’s privacy policies in a mobile social networking application. Personal and Ubiquitous Computing, 13(6), 401–412.

    Article  Google Scholar 

  • Sahai, A., & Waters, B. (2005). Fuzzy identity-based encryption. In Proceedings of 24th International Conference on the Theory and Application of Cryptographic Techniques (pp. 457–473). Aarhus, Denmark.

    Google Scholar 

  • Seetharam, A., & Ramakrishnan, R. (2008). A context-sensitive, yet private experience towards a contextually apt recommendation of service. In IMSAA 2008 (pp. 1–6). Bangalore.

    Google Scholar 

  • Song, S., Hwang, K., Zhou, R., et al. (2005). Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Computing, 9(6), 24–34.

    Article  Google Scholar 

  • Stuedi, P., et al. (2008). Demo abstract ad hoc social networking using MAND. http://www.iks.inf.ethz.ch/publications/files/mobicom08_demo.pdf, Accessed 25 June 2010

  • Su, X., & Khoshgoftaar, T.M. (2009). A survey of collaborative filtering techniques. Advances in Artificial Intelligence 19p. doi:10.1155/2009/421425.

    Google Scholar 

  • Sun, Y., Yu, W., Han, Z., et al. (2006a). Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Area in Communications, 24(2), 305–317.

    Article  MATH  Google Scholar 

  • Sun, Y., Han, Y.Z., Yu, W. et al. (2006b). A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. IEEE INFOCOM (pp. 1–13). Barcelona, Spain.

    Google Scholar 

  • Sun, Y., Han, Z., & Liu, K. J. (2008). Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine, 46(2), 112–119.

    Article  Google Scholar 

  • Tada, M., Kikuchi, H., Puntheeranurak, S. (2010). Privacy-preserving collaborative filtering protocol based on similarity between items. AINA’10 (pp. 573–578). Perth, Australia.

    Google Scholar 

  • Tang, Y., Krasser, S., He, Y. et al. (2008). Support vector machines and random forests modeling for spam senders behavior analysis. In IEEE GLOBECOM (pp. 1–5). New Orleans, LA, US.

    Google Scholar 

  • Theodorakopoulos, G., & Baras, J. S. (2006). On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 318–332.

    Article  Google Scholar 

  • Trifunovic, S., Legendre, F., Anastasiades, C. (2010). Social trust in opportunistic networks. IEEE INFOCOM Workshops, 1–6. San Diego, CA, US.

    Google Scholar 

  • Venkatesh, V., & Bala, H. (2008). Technology acceptance model 3 and a research agenda on interventions. Decision Sciences, 39(2), 273–315.

    Article  Google Scholar 

  • Walsh, K., & Sirer, E.G. (2005) Fighting peer-to-peer SPAM and decoys with object reputation. In Proceedings of P2PECON (pp. 138–143). Philadelphia, Pennsylvania, USA.

    Google Scholar 

  • Wang, J. (2010). Mining context-related sequential patterns for recommendation systems. In CAMP’10 (pp. 270–275). Shah Alam, Malaysia.

    Google Scholar 

  • Wang, G., Liu, Q., Wu, J. (2010). Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In Proceedings of the 17th ACM Conference on Computer and Communications Security (Poster) (pp. 735–737). Hyatt Regency Chicago, Chicago, IL, USA.

    Google Scholar 

  • Wu, B. et al. (2006). Topical TrustRank: Using topicality to combat web spam. In WWW ‘06: Proceedings of the 15th international conference on World Wide Web (pp. 63–72). Edinburgh, Scortland.

    Google Scholar 

  • Xiao, H. (2010). An approach for context-aware service discovery and recommendation. In IEEE ICWS’10 (pp. 163–170). Miami, Florida, USA.

    Google Scholar 

  • Xiong, L., & Liu, L. (2004). PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, 16(7), 843–857.

    Article  Google Scholar 

  • Yan, Z. (Ed.). (2010). Trust modeling and management in digital environments: From social concept to system development. Hershey: IGI Global.

    Google Scholar 

  • Yan, Z., & Chen, Y. (2010). AdContRep: A privacy-enhanced reputation system for MANET content services. In UIC 2010, LNCS 6406, (pp. 414–429). Xi’an, China.

    Google Scholar 

  • Yan, Z., & Chen, Y. (2011). AdChatRep: A reputation system for MANET chatting. In SCI2011 in UbiComp2011 (pp. 43–48). Beijing, China.

    Google Scholar 

  • Yan, Z., & Holtmanns, S. (2008). Trust modeling and management: From social trust to digital trust. In R. Subramanian (Ed.), Computer security, privacy and politics: Current issues, challenges, and solutions (pp. 290–323). Hershey: Idea Group.

    Chapter  Google Scholar 

  • Yan, Z., & Niemi, V. (2009). A methodology towards usable trust management. In Proceedings of ATC’09, LNCS 5586 (pp. 179–193). Brisbane, Australia.

    Google Scholar 

  • Yan, Z., & Zhang, P. (2011). AdPriRec: A context-aware recommender system for user privacy in MANET services. In UIC2011, LNCS 6905 (pp. 295–309). Banff, Canada.

    Google Scholar 

  • Yan, Z., Liu, C., Niemi, V., Yu, G. (2009). Trust information indication: Effects of displaying trust information on mobile application usage (Technical Report No. NRC-TR-2009-004). Nokia Research Center. http://research.nokia.com/files/NRCTR2009004.pdf.

  • Yan, Z., Zhang, P., & Deng, R. H. (2012a). TruBeRepec: A trust-behavior-based reputation and recommender system for mobile applications. Journal of Personal and Ubiquitous Computing, 16(5), 485–506. Springer.

    Article  Google Scholar 

  • Yan, Z., Kantola, R., Shen, Y. (2012b). Unwanted traffic control via hybrid trust management. In IEEE TrustCom 2012. Liverpool, UK.

    Google Scholar 

  • Yang, Y., Sun, Y., Kay, S. et al. (2002). Defending online reputation systems against collaborative unfair raters through signal modeling and trust. In SAC’09, 2009 (pp. 1308–1315). Hawaii, USA.

    Google Scholar 

  • Yap, G. (2007). Discovering and exploiting causal dependencies for robust mobile context-aware recommenders. IEEE Transactions on Knowledge and Data Engineering, 19(7), 977–992.

    Article  Google Scholar 

  • Yu, Z., Zhou, X., Zhang, D., et al. (2006). Supporting context-aware media recommendations for smart phones. IEEE Pervasive Computing, 5(3), 68–75.

    Article  Google Scholar 

  • Zhang, J. (2010). MailTrust: A mail reputation mechanism based on improved TrustGuard. In International Conference on Communications and Mobile Computing (CMC) (pp. 218–222). Shenzhen, China.

    Google Scholar 

  • Zhang, D., & Yu, Z. (2007). Spontaneous and context-aware media recommendation in heterogeneous spaces. In IEEE VTC’07 (pp. 267–271). Baltimore, MD, USA.

    Google Scholar 

  • Zhang, H., Duan, H., Liu, W. et al. (2009a). IPGroupRep: A novel reputation-based system for anti-spam. In Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing (pp. 513–518). Brisbane, QLD.

    Google Scholar 

  • Zhang, X., Han, B., Liang, W. (2009b). Automatic seed set expansion for trust propagation based on anti-spamming algorithms. In WIDM’09, Proceeding of the Eleventh International Workshop on Web Information and Data Management (pp. 31–38). HongKong, China.

    Google Scholar 

  • Zouridaki, C., Mark, B.L., Hejmo, M. et al. (2006). Robust cooperative trust establishment for MANETs. In SASN ’06: Proceedings of the fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (pp. 23–24). Alexandria, VA, USA.

    Google Scholar 

Download references

Acknowledgments

This work is sponsored by the Fundamental Research Funds for the Central Universities with the grant number K5051201032 and the initial grant of Chinese Educational Ministry for researchers returned from abroad. The authors would like to thank Nokia Research Center. Part of the work for this chapter was conducted and sponsored by Nokia Research Center, Helsinki and Nokia Research Center, Lausanne.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zheng Yan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this chapter

Cite this chapter

Yan, Z., Niemi, V., Chen, Y., Zhang, P., Kantola, R. (2014). Towards Trustworthy Mobile Social Networking. In: Chin, A., Zhang, D. (eds) Mobile Social Networking. Computational Social Sciences. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8579-7_9

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-8579-7_9

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-8578-0

  • Online ISBN: 978-1-4614-8579-7

  • eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)

Publish with us

Policies and ethics