{"id":"https://openalex.org/W2162765858","doi":"https://doi.org/10.1109/pst.2014.6890922","title":"Inferring social relationships from technology-level device connections","display_name":"Inferring social relationships from technology-level device connections","publication_year":2014,"publication_date":"2014-07-01","ids":{"openalex":"https://openalex.org/W2162765858","doi":"https://doi.org/10.1109/pst.2014.6890922","mag":"2162765858"},"language":"en","primary_location":{"id":"doi:10.1109/pst.2014.6890922","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst.2014.6890922","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 Twelfth Annual International Conference on Privacy, Security and Trust","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075453550","display_name":"Jason R. C. Nurse","orcid":"https://orcid.org/0000-0003-4118-1680"},"institutions":[{"id":"https://openalex.org/I40120149","display_name":"University of Oxford","ror":"https://ror.org/052gg0110","country_code":"GB","type":"education","lineage":["https://openalex.org/I40120149"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Jason R. C. Nurse","raw_affiliation_strings":["Department of Computer Science, University of Oxford, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Oxford, UK","institution_ids":["https://openalex.org/I40120149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079161434","display_name":"Jess Pumphrey","orcid":null},"institutions":[{"id":"https://openalex.org/I40120149","display_name":"University of Oxford","ror":"https://ror.org/052gg0110","country_code":"GB","type":"education","lineage":["https://openalex.org/I40120149"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Jess Pumphrey","raw_affiliation_strings":["University of Oxford, Oxford, Oxfordshire, GB"],"affiliations":[{"raw_affiliation_string":"University of Oxford, Oxford, Oxfordshire, GB","institution_ids":["https://openalex.org/I40120149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012851566","display_name":"Thomas Gibson\u2212Robinson","orcid":"https://orcid.org/0000-0002-7330-6348"},"institutions":[{"id":"https://openalex.org/I40120149","display_name":"University of Oxford","ror":"https://ror.org/052gg0110","country_code":"GB","type":"education","lineage":["https://openalex.org/I40120149"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Thomas Gibson-Robinson","raw_affiliation_strings":["Department of Computer Science, University of Oxford, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Oxford, UK","institution_ids":["https://openalex.org/I40120149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063148097","display_name":"Michael Goldsmith","orcid":"https://orcid.org/0000-0001-7808-0600"},"institutions":[{"id":"https://openalex.org/I40120149","display_name":"University of Oxford","ror":"https://ror.org/052gg0110","country_code":"GB","type":"education","lineage":["https://openalex.org/I40120149"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Michael Goldsmith","raw_affiliation_strings":["Department of Computer Science, University of Oxford, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Oxford, UK","institution_ids":["https://openalex.org/I40120149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004437304","display_name":"Sadie Creese","orcid":"https://orcid.org/0000-0002-2414-9657"},"institutions":[{"id":"https://openalex.org/I40120149","display_name":"University of Oxford","ror":"https://ror.org/052gg0110","country_code":"GB","type":"education","lineage":["https://openalex.org/I40120149"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Sadie Creese","raw_affiliation_strings":["Department of Computer Science, University of Oxford, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Oxford, UK","institution_ids":["https://openalex.org/I40120149"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5075453550"],"corresponding_institution_ids":["https://openalex.org/I40120149"],"apc_list":null,"apc_paid":null,"fwci":7.3116,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.96730028,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"2","issue":null,"first_page":"40","last_page":"47"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12592","display_name":"Opinion Dynamics and Social Influence","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7648115158081055},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7109235525131226},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5573002099990845},{"id":"https://openalex.org/keywords/scope","display_name":"Scope (computer science)","score":0.5488324165344238},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5239018201828003},{"id":"https://openalex.org/keywords/plan","display_name":"Plan (archaeology)","score":0.5049098134040833},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.45214328169822693},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.4482561945915222},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4443610906600952},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42955881357192993},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3597434163093567},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.14197993278503418},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12222543358802795}],"concepts":[{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7648115158081055},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7109235525131226},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5573002099990845},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.5488324165344238},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5239018201828003},{"id":"https://openalex.org/C2776505523","wikidata":"https://www.wikidata.org/wiki/Q4785468","display_name":"Plan (archaeology)","level":2,"score":0.5049098134040833},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.45214328169822693},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.4482561945915222},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4443610906600952},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42955881357192993},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3597434163093567},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14197993278503418},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12222543358802795},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/pst.2014.6890922","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pst.2014.6890922","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 Twelfth Annual International Conference on Privacy, Security and Trust","raw_type":"proceedings-article"},{"id":"pmh:oai:kar.kent.ac.uk:67515","is_oa":false,"landing_page_url":"https://doi.org/10.1109/PST.2014.6890922>)","pdf_url":null,"source":{"id":"https://openalex.org/S4377196264","display_name":"Kent Academic Repository (University of Kent)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I20581793","host_organization_name":"University of Kent","host_organization_lineage":["https://openalex.org/I20581793"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:ora.ox.ac.uk:uuid:562ad9c7-0859-44f9-b151-e1dda582b5ef","is_oa":false,"landing_page_url":"https://ora.ox.ac.uk/objects/uuid:562ad9c7-0859-44f9-b151-e1dda582b5ef","pdf_url":null,"source":{"id":"https://openalex.org/S4306402636","display_name":"Oxford University Research Archive (ORA) (University of Oxford)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I40120149","host_organization_name":"University of Oxford","host_organization_lineage":["https://openalex.org/I40120149"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Department of Computer Science","raw_type":"Conference item"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W19838944","https://openalex.org/W23287379","https://openalex.org/W379337736","https://openalex.org/W934261879","https://openalex.org/W1525967479","https://openalex.org/W1528614120","https://openalex.org/W1594000319","https://openalex.org/W1599904921","https://openalex.org/W1914375141","https://openalex.org/W1976126576","https://openalex.org/W1977186326","https://openalex.org/W1977712835","https://openalex.org/W1987142574","https://openalex.org/W1989704868","https://openalex.org/W1990867522","https://openalex.org/W1994838421","https://openalex.org/W2012349973","https://openalex.org/W2061480123","https://openalex.org/W2066961254","https://openalex.org/W2077673877","https://openalex.org/W2103096344","https://openalex.org/W2116099759","https://openalex.org/W2128248711","https://openalex.org/W2131681506","https://openalex.org/W2156491575","https://openalex.org/W2295733497","https://openalex.org/W2493410043","https://openalex.org/W2540342703","https://openalex.org/W2795857897","https://openalex.org/W3099768174","https://openalex.org/W3142588439","https://openalex.org/W3152448956","https://openalex.org/W6631680504","https://openalex.org/W6640128244","https://openalex.org/W6683186270","https://openalex.org/W6723834664"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W4312814274","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W1986325614"],"abstract_inverted_index":{"Technology":[0],"is":[1,123],"present":[2,65],"in":[3,103,205],"every":[4],"area":[5],"of":[6,21,187,199],"our":[7,163,178],"lives":[8],"and,":[9],"for":[10,38],"many,":[11],"life":[12],"without":[13],"it":[14,71],"has":[15],"become":[16],"unthinkable.":[17],"As":[18],"a":[19,43,67,195],"consequence":[20],"this":[22,87,93],"dependence":[23],"and":[24,33,40,48,127,151,157],"the":[25,61,76,113,129,134,159,185],"extent":[26],"to":[27,60,91,95,109,124,155],"which":[28],"technology":[29,100],"devices":[30,47,101],"(computers,":[31],"tablets":[32],"smartphones)":[34],"are":[35],"being":[36],"used":[37,108],"work":[39,145],"social":[41,114,170],"activities,":[42],"clear":[44],"coupling":[45,94],"between":[46,99,116],"their":[49,84],"owners":[50],"can":[51,79,106,172],"now":[52],"be":[53,70,107,174,203],"observed.":[54],"By":[55],"coupling,":[56],"we":[57,89,138,166,193],"specifically":[58],"refer":[59],"fact":[62],"that":[63,137,168,201],"information":[64],"on":[66],"person's":[68],"device,":[69],"user-generated":[72],"or":[73],"created":[74],"by":[75],"native":[77],"OS,":[78],"produce":[80],"great":[81],"insight":[82],"into":[83],"life.":[85],"In":[86],"paper,":[88],"look":[90],"exploit":[92],"investigate":[96,184],"whether":[97],"connections":[98],"recorded":[102],"system":[104],"log-files,":[105],"make":[110],"inferences":[111],"about":[112],"relationships":[115,171],"device":[117],"owners.":[118],"A":[119],"key":[120],"motivation":[121],"here":[122],"better":[125],"understand":[126],"elucidate":[128],"privacy":[130,188],"risks":[131],"associated":[132],"with":[133],"digital":[135],"footprints":[136],"as":[139],"humans":[140],"(often":[141],"inadvertently)":[142],"create.":[143],"Our":[144],"draws":[146],"upon":[147],"Social":[148],"Network":[149],"Analysis":[150],"basic":[152],"Computer":[153],"Forensics":[154],"develop":[156],"achieve":[158],"inference":[160],"goals.":[161],"From":[162],"preliminary":[164],"experimentation,":[165],"demonstrate":[167],"human":[169],"indeed":[173],"inferred":[175],"even":[176],"within":[177],"limited":[179],"initial":[180],"scope.":[181],"To":[182],"further":[183],"level":[186],"exposure":[189],"from":[190],"technology-level":[191],"links,":[192],"outline":[194],"more":[196],"comprehensive":[197],"plan":[198],"experimentation":[200],"will":[202],"conducted":[204],"future":[206],"work.":[207]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":4}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
