Abstract
The increasing popularity of social media has attracted a huge number of people to participate in numerous activities on a daily basis. This results in tremendous amounts of rich user-generated data. These data provide opportunities for researchers and service providers to study and better understand users’ behaviors and further improve the quality of the personalized services. Publishing user-generated data risks exposing individuals’ privacy. Users privacy in social media is an emerging research area and has attracted increasing attention recently. These works study privacy issues in social media from the two different points of views: identification of vulnerabilities and mitigation of privacy risks. Recent research has shown the vulnerability of user-generated data against the two general types of attacks, identity disclosure and attribute disclosure. These privacy issues mandate social media data publishers to protect users’ privacy by sanitizing user-generated data before publishing it. Consequently, various protection techniques have been proposed to anonymize user-generated social media data. There is vast literature on privacy of users in social media from many perspectives. In this survey, we review the key achievements of user privacy in social media. In particular, we review and compare the state-of-the-art algorithms in terms of the privacy leakage attacks and anonymization algorithms. We overview the privacy risks from different aspects of social media and categorize the relevant works into five groups: (1) social graphs and privacy, (2) authors in social media and privacy, (3) profile attributes and privacy, (4) location and privacy, and (5) recommendation systems and privacy. We also discuss open problems and future research directions regarding user privacy issues in social media.
- Jemal H. Abawajy, Mohd Izuan Hafez Ninggal, and Tutut Herawan. 2016. Privacy preserving social network data publication. IEEE Commun. Surv. Tutor. 18, 3 (2016), 1974--1997.Google ScholarCross Ref
- Ahmed Abbasi and Hsinchun Chen. 2008. Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans. Inf. Syst. 26, 2 (2008), 7.Google ScholarDigital Library
- Sadia Afroz, Michael Brennan, and Rachel Greenstadt. 2012. Detecting hoaxes, frauds, and deception in writing style online. In Proceedings of the 2012 IEEE Symposium on Security and Privacy (SP’12). IEEE, 461--475.Google ScholarDigital Library
- Gagan Aggarwal, Tomas Feder, Krishnaram Kenthapadi, Rajeev Motwani, Rina Panigrahy, Dilys Thomas, and An Zhu. 2005. Approximation algorithms for k-anonymity. In Proceedings of the International Conference on Database Theory (ICDT’05).Google Scholar
- Rakesh Agrawal and Ramakrishnan Srikant. 2000. Privacy-preserving data mining. In ACM SIGMOD Record, Vol. 29.Google ScholarDigital Library
- Esma Aimeur, Gilles Brassard, Jose M. Fernandez, Flavien Serge Mani Onana, and Zbigniew Rakowski. 2008. Experimental demonstration of a hybrid privacy-preserving recommender system. In Availability, Reliability and Security.Google Scholar
- Oluwaseun Ajao, Jun Hong, and Weiru Liu. 2015. A survey of location inference techniques on Twitter. J. Inf. Sci. 41, 6 (2015), 855--864.Google ScholarDigital Library
- Muhammad Al-Qurishi, Mabrook Al-Rakhami, Atif Alamri, Majed Alrubaian, Sk Md Mizanur Rahman, and M Shamim Hossain. 2017. Sybil defense techniques in online social networks: A survey. IEEE Access 5 (2017), 1200--1219.Google ScholarCross Ref
- Faiyaz Al Zamal, Wendy Liu, and Derek Ruths. 2012. Homophily and latent attribute inference: Inferring latent attributes of twitter users from neighbors. In Sixth International AAAI Conference on Weblogs and Social Media (ICWSM’12).Google Scholar
- Mishari Almishari and Gene Tsudik. 2012. Exploring linkability of user reviews. In Proceedings of the European Symposium on Research in Computer Security. Springer, 307--324.Google Scholar
- Yasmeen Alufaisan, Yan Zhou, Murat Kantarcioglu, and Bhavani Thuraisingham. 2017. Hacking social network data mining. In Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics (ISI’17). IEEE, 54--59.Google Scholar
- Hamidreza Alvari, Alireza Hajibagheri, Gita Sukthankar, and Kiran Lakkaraju. 2016. Identifying community structures in dynamic networks. Soc. Netw. Anal. Min. 6, 1 (2016), 77.Google Scholar
- Hamidreza Alvari, Kiran Lakkaraju, Gita Sukthankar, and Jon Whetzel. 2014. Predicting guild membership in massively multiplayer online games. In Proceedings of the International Conference on Social Computing, Behavioral-Cultural Modeling, and Prediction. Springer, 215--222.Google Scholar
- Hamidreza Alvari, Elham Shaabani, and Paulo Shakarian. 2018. Early identification of pathogenic social media accounts. In Proceedings of the IEEE Intelligence and Security Informatics (ISI’18). IEEE.Google Scholar
- Hamidreza Alvari, Paulo Shakarian, and J. E. Kelly Snyder. 2017. Semi-supervised learning for detecting human trafficking. Secur. Inf. 6, 1 (2017), 1.Google ScholarCross Ref
- Athanasios Andreou, Oana Goga, and Patrick Loiseau. 2017. Identity vs. attribute disclosure risks for users with multiple social profiles. In Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM’17). ACM, 163--170.Google Scholar
- Michael Backes, Pascal Berrang, Oana Goga, Krishna P. Gummadi, and Praveen Manoharan. 2016. On profile linkability despite anonymity in social media systems. In Proceedings of the ACM on Workshop on Privacy in the Electronic Society.Google Scholar
- Michael Backes, Mathias Humbert, Jun Pang, and Yang Zhang. 2017. walk2friends: Inferring social links from mobility profiles. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security.Google Scholar
- Lars Backstrom, Cynthia Dwork, and Jon Kleinberg. 2007. Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography. In Proceedings of the 16th International Conference on the World Wide Web (WWW’07).Google ScholarDigital Library
- Lars Backstrom, Eric Sun, and Cameron Marlow. 2010. Find me if you can: Improving geographical prediction with social and spatial proximity. In Proceedings of the 19th International Conference on the World Wide Web (WWW’10).Google ScholarDigital Library
- Shahriar Badsha, Xun Yi, Ibrahim Khalil, and Elisa Bertino. 2017. Privacy preserving user-based recommender system. In Proceedings of the 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS’17). IEEE, 1074--1083.Google Scholar
- Ghazaleh Beigi. 2018. Social media and user privacy. Arxiv Preprint Arxiv:1806.09786 (2018).Google Scholar
- Ghazaleh Beigi, Ruocheng Guo, Alexander Nou, Yanchao Zhang, and Huan Liu. 2019. Protecting user privacy: An approach for untraceable web browsing history and unambiguous user profiles. In Proceedings of the 12th ACM International Conference on Web Search and Data Mining. ACM, 213--221.Google ScholarDigital Library
- Ghazaleh Beigi, Mahdi Jalili, Hamidreza Alvari, and Gita Sukthankar. 2014. Leveraging community detection for accurate trust prediction. In Proceedings of the ASE International Conference on Social Computing.Google Scholar
- Ghazaleh Beigi and Huan Liu. 2018. Similar but different: Exploiting users’ congruity for recommendation systems. In Proceedings of the International Conference on Social Computing, Behavioral-Cultural Modeling, and Prediction. Springer.Google Scholar
- Ghazaleh Beigi and Huan Liu. 2019. Identifying novel privacy issues of online users on social media platforms by Ghazaleh Beigi and Huan Liu with Martin Vesely as coordinator. ACM SIGWEB Newslett. Article 4 (Winter, 2019), 7 pages. http://doi.acm.org/10.1145/3293874.3293878Google Scholar
- Ghazaleh Beigi, Suhas Ranganath, and Huan Liu. 2019. Signed link prediction with sparse data: The role of personality information. In Companion Proceedings of the Web Conference 2019. International World Wide Web Conferences Steering Committee.Google ScholarDigital Library
- Ghazaleh Beigi, Kai Shu, Yanchao Zhang, and Huan Liu. 2018. Securing social media user data: An adversarial approach. In Proceedings of the 29th Conference on Hypertext and Social Media. ACM, 165--173.Google Scholar
- Ghazaleh Beigi, Jiliang Tang, and Huan Liu. 2016. Signed link analysis in social media networks. In Proceedings of the 10th International Conference on Web and Social Media (ICWSM’16). AAAI Press.Google Scholar
- Ghazaleh Beigi, Jiliang Tang, Suhang Wang, and Huan Liu. 2016. Exploiting emotional information for trust/distrust prediction. In Proceedings of the 2016 SIAM International Conference on Data Mining. SIAM, 81--89.Google ScholarCross Ref
- Smriti Bhagat, Graham Cormode, Balachander Krishnamurthy, and Divesh Srivastava. 2009. Class-based graph anonymization for social network data. Proc. VLDB Endow. 2, 1 (2009), 766--777.Google ScholarDigital Library
- Smriti Bhagat, Udi Weinsberg, Stratis Ioannidis, and Nina Taft. 2014. Recommending with an agenda: Active learning of private attributes using matrix factorization. In Proceedings of the Recommender Systems Conference (RecSys’14). ACM.Google Scholar
- Asia J. Biega, Rishiraj Saha Roy, and Gerhard Weikum. 2017. Privacy through solidarity: A user-utility-preserving framework to counter profiling. In Proceedings of the ACM SIGIR Conference on Research and Development in Information Retrieval. ACM, 665--674.Google Scholar
- David M. Blei, Andrew Y. Ng, and Michael I. Jordan. 2003. Latent dirichlet allocation. In Proceedings of Machine Learning Research (JMLR’03).Google Scholar
- Joseph Bonneau, Jonathan Anderson, and George Danezis. 2009. Prying data out of a social network. In Proceedings of the International Conference on Advances in Social Network Analysis and Mining 2009 (ASONAM’09). IEEE, 249--254.Google ScholarDigital Library
- Jasmine Bowers, Henry Williams, Gerry Dozier, and R Williams. 2015. Mitigation deanonymization attacks via language translation for anonymous social networks. Proceedings of the International Conference on Machine Learning (ICML’15) (2015).Google Scholar
- Joseph K. Bradley, Patrick Gage Kelley, and Aaron Roth. [n.d.]. Author identification from citations. ([n. d.]).Google Scholar
- Karl Bringmann, Tobias Friedrich, and Anton Krohmer. 2014. De-anonymization of heterogeneous random graphs in quasilinear time. In Proceedings of the European Symposium on Algorithms. Springer, 197--208.Google Scholar
- Joseph A. Calandrino, Ann Kilzer, Arvind Narayanan, Edward W. Felten, and Vitaly Shmatikov. 2011. ” You might also like:” Privacy risks of collaborative filtering. In Proceedings of the Security and Privacy (SP). IEEE.Google Scholar
- John Canny. 2002. Collaborative filtering with privacy via factor analysis. In Proceedings of the SIGIR Conference on Research and Development in Information Retrieval. ACM, 238--245.Google Scholar
- Abdelberi Chaabane, Gergely Acs, Mohamed Ali Kaafar, et al. 2012. You are what you like! information leakage through users’ interests. In Proceedings of the 19th Annual Network 8 Distributed System Security Symposium (NDSS).Google Scholar
- Carole E Chaski. 2005. Who is at the keyboard? Authorship attribution in digital evidence investigations. International Journal of Digital Evidence 4, 1 (2005), 1--13.Google Scholar
- James Cheng, Ada Wai-chee Fu, and Jia Liu. 2010. K-isomorphism: Privacy preserving network publication against structural attacks. In Proceedings of the ACM SIGMOD International Conference on Management of Data.Google Scholar
- Zhiyuan Cheng, James Caverlee, and Kyumin Lee. 2010. You are where you tweet: A content-based approach to geo-locating twitter users. In Proceedings of the Conference on Information and Knowledge Management (CIKM’10). ACM, 759--768.Google Scholar
- Carla-Fabiana Chiasserini, Michele Garetto, and Emilio Leonardi. 2016. Social network de-anonymization under scale-free user relations. IEEE/ACM Trans. Netw. 24, 6 (2016), 3756--3769.Google ScholarDigital Library
- Carla-Fabiana Chiasserini, Michel Garetto, and Emili Leonardi. 2018. De-anonymizing clustered social networks by percolation graph matching. ACM Trans. Knowl. Discov. Data 12, 2 (2018), 21.Google Scholar
- Ryan Compton, David Jurgens, and David Allen. 2014. Geotagging one hundred million twitter accounts with total variation minimization. In Proceedings of the 2014 IEEE International Conference on Big Data (Big Data’14). IEEE, 393--401.Google Scholar
- Thomas M. Cover and Joy A. Thomas. 2012. Elements of Information Theory. John Wiley 8 Sons.Google Scholar
- Ratan Dey, Cong Tang, Keith Ross, and Nitesh Saxena. 2012. Estimating age privacy leakage in online social networks. In Proceedings of the 2012 Proceedings IEEE International Conference on Computer Communications (INFOCOM’12). IEEE, 2836--2840.Google Scholar
- Xenofontas Dimitropoulos, Dmitri Krioukov, Amin Vahdat, and George Riley. 2009. Graph annotations in modeling complex network topologies. ACM Trans. Model. Comput. Simul. 19, 4 (2009), 17.Google Scholar
- George T. Duncan and Diane Lambert. 1986. Disclosure-limited data dissemination. J. Am. Stat. Assoc. 81, 393 (1986), 10--18.Google ScholarCross Ref
- Cynthia Dwork. 2008. Differential privacy: A survey of results. In Proceedings of the International Conference on Theory and Applications of Models of Computation. Springer, 1--19.Google ScholarCross Ref
- Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Proceedings of the Theory of Cryptography Conference. Springer, 265--284.Google Scholar
- Alexandre Evfimievski, Ramakrishnan Srikant, Rakesh Agrawal, and Johannes Gehrke. 2004. Privacy preserving mining of association rules. Inf. Syst. 29, 4 (2004), 343--364.Google ScholarDigital Library
- Carla Fabiana, Michele Garetto, and Emilio Leonardi. 2015. De-anonymizing scale-free social networks by percolation graph matching. In Proceedings of the 2015 IEEE International Conference on Computer Communications (INFOCOM’15). IEEE, 1571--1579.Google Scholar
- Hao Fu, Aston Zhang, and Xing Xie. 2014. De-anonymizing social graphs via node similarity. In Proceedings of the Annual Conference on the World Wide Web (WWW’14).Google Scholar
- Hao Fu, Aston Zhang, and Xing Xie. 2015. Effective social graph deanonymization based on graph structure and descriptive information. ACM Trans. Intell. Syst. Technol. 6, 4 (2015), 49.Google Scholar
- Xinzhe Fu, Zhongzhao Hu, Zhiying Xu, Luoyi Fu, and Xinbing Wang. 2017. De-anonymization of networks with communities: When quantifications meet algorithms. In Proceedings of the IEEE Global Communications Conference.Google Scholar
- Benjamin C. M. Fung, K. Wang, R. Chen, and S. Yu Philip. 2010. Privacy-preserving data publishing: A survey on recent developments. ACM Comput. Surv. 42, 4 (2010), 1--53.Google ScholarDigital Library
- Sébastien Gambs, Marc-Olivier Killijian, and Miguel Núñez del Prado Cortez. 2010. Show me how you move and i will tell you who you are. In Proceedings of the SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS.Google Scholar
- Daniel Gayo Avello. 2011. All liaisons are dangerous when all your friends are known to us. In Proceedings of the 22nd ACM conference on Hypertext and hypermedia. ACM, 171--180.Google Scholar
- Oana Goga, Howard Lei, Sree Hari Krishnan Parthasarathi, Gerald Friedland, Robin Sommer, and Renata Teixeira. 2013. Exploiting innocuous activity for correlating users across sites. In Proceedings of the Annual Conference on the World Wide Web (WWW’13).Google Scholar
- Neil Zhenqiang Gong and Bin Liu. 2016. You are who you know and how you behave: Attribute inference attacks via users’ social friends and behaviors. In Proceedings of the USENIX Security Symposium. 979--995.Google Scholar
- Neil Zhenqiang Gong and Bin Liu. 2018. Attribute inference attacks in online social networks. ACM Trans. Priv. Secur. 21, 1 (2018), 3.Google Scholar
- Neil Zhenqiang Gong, Ameet Talwalkar, Lester Mackey, Ling Huang, Eui Chul Richard Shin, Emil Stefanov, Elaine Runting Shi, and Dawn Song. 2014. Joint link prediction and attribute inference using a social-attribute network. ACM Trans. Intell. Syst. Technol. 5, 2 (2014), 27.Google ScholarDigital Library
- Rachid Guerraoui, Anne-Marie Kermarrec, Rhicheek Patra, and Mahsa Taziki. 2015. D 2 p: Distance-based differential privacy in recommenders. Proc. VLDB Endow. 8, 8 (2015), 862--873.Google ScholarDigital Library
- Rachid Guerraoui, Anne-Marie Kermarrec, and Mahsa Taziki. 2017. The utility and privacy effects of a click. In Proceedings of the ACM SIGIR Conference on Research and Development in Information Retrieval. ACM.Google Scholar
- Payas Gupta, Swapna Gottipati, Jing Jiang, and Debin Gao. 2013. Your love is public now: Questioning the use of personal information in authentication. In Proceedings of the ACM Special Interest Group on Security, Audit and Control Conference (SIGSAC’13). ACM.Google Scholar
- Alireza Hajibagheri, Gita Sukthankar, Kiran Lakkaraju, Hamidreza Alvari, Rolf T. Wigand, and Nitin Agarwal. 2018. Using massively multiplayer online game data to analyze the dynamics of social interactions. Social Interactions in Virtual Worlds: An Interdisciplinary Perspective (2018).Google Scholar
- Michael Hay, Gerome Miklau, David Jensen, Don Towsley, and Philipp Weis. 2008. Resisting structural re-identification in anonymized social networks. Proc. VLDB Endow. 1, 1 (2008), 102--114.Google ScholarDigital Library
- Jianming He, Wesley W. Chu, and Zhenyu Victor Liu. 2006. Inferring privacy information from social networks. In Proceedings of the International Conference on Intelligence and Security Informatics. Springer, 154--165.Google ScholarDigital Library
- Brent Hecht, Lichan Hong, Bongwon Suh, and Ed H. Chi. 2011. Tweets from justin bieber’s heart: The dynamics of the location field in user profiles. In Proceedings of the Conference of the Special Interest Group on Computer-Human Interaction (SIGCHI’11). ACM, 237--246.Google Scholar
- Shawndra Hill and Foster Provost. 2003. The myth of the double-blind review?: Author identification using only citations. ACM SIGKDD Explor. Newslett. 5, 2 (2003), 179--184.Google ScholarDigital Library
- T. Ryan Hoens, Marina Blanton, and Nitesh V. Chawla. 2010. A private and reliable recommendation system for social networks. In Proceedings of the 2010 IEEE Second International Conference on Social Computing (SocialCom’10). IEEE, 816--825.Google Scholar
- D. C. Howe and H. Nissenbaum. 2009. TrackMeNot: Resisting surveillance in web search. In Lessons from the Identity Trail: Privacy, Anonymity and Identity in a Networked Society. (Oxford University Press, New York, 2009), 417--436.Google Scholar
- Jingyu Hua, Chang Xia, and Sheng Zhong. 2015. Differentially private matrix factorization. In Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI’15).Google Scholar
- Mathias Humbert, Théophile Studer, Matthias Grossglauser, and Jean-Pierre Hubaux. 2013. Nowhere to hide: Navigating around privacy in online social networks. In Proceedings of the European Symposium on Research in Computer Security.Google Scholar
- Piotr Indyk and Rajeev Motwani. 1998. Approximate nearest neighbors: Towards removing the curse of dimensionality. In Proceedings of the 30th Annual ACM Symposium on Theory of Computing. ACM, 604--613.Google ScholarDigital Library
- P. James. 1992. Knowledge graphs. Linguistic Instruments in Knowledge Engineering (1992), 97--117.Google Scholar
- Shouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, and Raheem A. Beyah. 2015. On your social network de-anonymizablity: Quantification and large scale evaluation with seed knowledge. In Proceedings of the Network and Distributed System Security Symposium (NDSS’15).Google Scholar
- Shouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, and Raheem A. Beyah. 2016. Seed based deanonymizability quantification of social networks. IEEE Trans. Inf. Forens. Secur. 11, 7, 1398--1411.Google ScholarCross Ref
- Shouling Ji, Weiqing Li, Prateek Mittal, and Raheem Beyah. 2015. SecGraph: A uniform and open-source evaluation system for graph data anonymization and de-anonymization. In Proceedings of the USENIX Security Symposium. 303--318.Google Scholar
- Shouling Ji, Weiqing Li, Mudhakar Srivatsa, and Raheem Beyah. 2014. Structural data de-anonymization: Quantification, practice, and implications. In Proceedings of the 2014 ACM Special Interest Group on Security, Audit and Control Conference (SIGSAC’14). ACM, 1040--1053.Google Scholar
- Shouling Ji, Weiqing Li, Mudhakar Srivatsa, and Raheem Beyah. 2016. Structural data de-anonymization: Theory and practice. IEEE/ACM Trans. Netw. 24, 6 (2016), 3523--3536.Google ScholarDigital Library
- Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing Selena He, and Raheem Beyah. 2016. General graph data de-anonymization: From mobility traces to social networks. ACM Trans. Intell. Syst. Technol. 18, 4 (2016).Google Scholar
- Shouling Ji, Prateek Mittal, and Raheem Beyah. 2016. Graph data anonymization, de-anonymization attacks, and de-anonymizability quantification: A survey. IEEE Commun. Surv. Tutor. 19, 2 (2016), 1305--1326.Google ScholarCross Ref
- Shouling Ji, Ting Wang, Jianhai Chen, Weiqing Li, Prateek Mittal, and Raheem Beyah. 2017. De-SAG: On the de-anonymization of structure-attribute graph data. IEEE Trans. Depend. Sec. Comput. 16, 4 (2017), 594--607.Google Scholar
- Jinyuan Jia, Binghui Wang, Le Zhang, and Neil Zhenqiang Gong. 2017. AttriInfer: Inferring user attributes in online social networks using markov random fields. In Proceedings of the Annual Conference on the world wide web (WWW’17). 1561--1569.Google Scholar
- Zach Jorgensen and Ting Yu. 2014. A privacy-preserving framework for personalized, social recommendations. In Proceedings of the Extended Database Technology Conference (EDBT’14). 582.Google Scholar
- David Jurgens. 2013. That’s what friends are for: Inferring location in online social media platforms based on social relationships. In Seventh International AAAI Conference on Weblogs and Social Media.Google Scholar
- David Jurgens, Tyler Finethy, James McCorriston, Yi Tian Xu, and Derek Ruths. 2015. Geolocation prediction in twitter using social networks: A critical analysis and review of current practice. In Ninth International AAAI Conference on Web and Social Media.Google Scholar
- Daniel Kifer and Ashwin Machanavajjhala. 2011. No free lunch in data privacy. In Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data. ACM, 193--204.Google ScholarDigital Library
- Dan Klein and Christopher D. Manning. 2003. Accurate unlexicalized parsing. In Proceedings of the 41st Annual Meeting of the Association for Computational Linguistics.Google Scholar
- Longbo Kong, Zhi Liu, and Yan Huang. 2014. Spot: Locating social media users based on social network context. Proc. VLDB Endow. 7, 13 (2014), 1681--1684.Google ScholarDigital Library
- Moshe Koppel, Jonathan Schler, and Shlomo Argamon. 2009. Computational methods in authorship attribution. J. Assoc. Inf. Sci. Technol. 60, 1 (2009), 9--26.Google ScholarDigital Library
- Moshe Koppel, Jonathan Schler, and Shlomo Argamon. 2011. Authorship attribution in the wild. Lang. Resourc. Eval. 45, 1 (2011), 83--94.Google ScholarDigital Library
- Moshe Koppel, Jonathan Schler, Shlomo Argamon, and Eran Messeri. 2006. Authorship attribution with thousands of candidate authors. In Proceedings of the ACM SIGIR Conference on Research and Development in Information Retrieval. ACM, 659--660.Google Scholar
- Aleksandra Korolova, Rajeev Motwani, Shubha U Nabar, and Ying Xu. 2008. Link privacy in social networks. In Proceedings of the 17th ACM Conference on Information and Knowledge Management. ACM, 289--298.Google ScholarDigital Library
- Nitish Korula and Silvio Lattanzi. 2014. An efficient reconciliation algorithm for social networks. Proc. VLDB Endow. 7, 5 (2014), 377--388.Google ScholarDigital Library
- Michal Kosinski, David Stillwell, and Thore Graepel. 2013. Private traits and attributes are predictable from digital records of human behavior. Proc. Natl. Acad. Sci. U.S.A. 110, 15 (2013), 5802--5805.Google ScholarCross Ref
- Harold W. Kuhn. 2010. The hungarian method for the assignment problem. In 50 Years of Integer Programming 1958-2008. Springer, 29--47.Google Scholar
- Sebastian Labitzke, Florian Werling, Jens Mittag, and Hannes Hartenstein. 2013. Do online social network friends still threaten my privacy? In Proceedings of the ACM Conference on Data and Application Security and Privacy.Google Scholar
- Diane Lambert. 1993. Measures of disclosure risk and harm. J. Off. Stat. 9, 2 (1993), 313.Google Scholar
- Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, and Ruby B. Lee. 2017. How to quantify graph de-anonymization risks. In International Conference on Information Systems Security and Privacy. Springer, 84--104.Google Scholar
- Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, and Ruby B. Lee. 2017. Blind de-anonymization attacks using social networks. In Proceedings of the 2017 on Workshop on Privacy in the Electronic Society. ACM, 1--4.Google Scholar
- Kevin Lewis, Jason Kaufman, Marco Gonzalez, Andreas Wimmer, and Nicholas Christakis. 2008. Tastes, ties, and time: A new social network dataset using facebook. com. Soc. Netw. 30, 4 (2008), 330--342.Google ScholarCross Ref
- Ninghui Li, Tiancheng Li, and Suresh Venkatasubramanian. 2007. t-closeness: Privacy beyond k-anonymity and l-diversity. In Proceedings of the IEEE 23rd International Conference on Data Engineering 2007 (ICDE’07). IEEE, 106--115.Google Scholar
- Rui Li, Shengjie Wang, and Kevin Chen-Chuan Chang. 2012. Multiple location profiling for users and relationships from social network and content. Proc. VLDB Endow. 5, 11 (2012), 1603--1614.Google ScholarDigital Library
- Rui Li, Shengjie Wang, Hongbo Deng, Rui Wang, and Kevin Chen-Chuan Chang. 2012. Towards social user profiling: Unified and discriminative influence model for inferring home locations. In Proceedings of the ACM SIGKDD Conference on Knowledge Discovery and Data Mining (SIGKDD’12).Google Scholar
- Xiaoxue Li, Yanan Cao, Yanmin Shang, Yanbing Liu, Jianlong Tan, and Li Guo. 2017. Inferring user profiles in online social networks based on convolutional neural network. In Proceedings of the International Conference on Knowledge Science, Engineering and Management. Springer.Google Scholar
- Jack Lindamood, Raymond Heatherly, Murat Kantarcioglu, and Bhavani Thuraisingham. 2009. Inferring private information using social network data. In Proceedings of the Annual Conference of the World Wide Web (WWW’09). ACM, 1145--1146.Google Scholar
- Bo Liu, Wanlei Zhou, Tianqing Zhu, Longxiang Gao, and Yong Xiang. 2018. Location privacy and its applications: A systematic study. IEEE Access 6 (2018), 17606--17624.Google ScholarCross Ref
- Changchang Liu, Supriyo Chakraborty, and Prateek Mittal. 2016. Dependence makes you vulnberable: Differential privacy under dependent tuples. In Proceedings of the Network and Distributed System Security Symposium (NDSS’16), Vol. 16. 21--24.Google Scholar
- Changchang Liu and Prateek Mittal. 2016. LinkMirage: Enabling privacy-preserving analytics on social relationships. In Proceedings of the Network and Distributed System Security Symposium (NDSS’16).Google Scholar
- Kun Liu and Evimaria Terzi. 2008. Towards identity anonymization on graphs. In Proceedings of the ACM Special Interest Group on Management of Data Conference (SIGMOD’08).Google Scholar
- Yushan Liu, Shouling Ji, and Prateek Mittal. 2016. SmartWalk: Enhancing social network security via adaptive random walks. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 492--503.Google Scholar
- Dixin Luo, Hongteng Xu, Hongyuan Zha, Jun Du, Rong Xie, Xiaokang Yang, and Wenjun Zhang. 2014. You are what you watch and when you watch: Inferring household structures from iptv viewing data. IEEE Trans. Broadcast. 60, 1 (2014), 61--72.Google ScholarCross Ref
- Zhifeng Luo and Zhanli Chen. 2014. A privacy preserving group recommender based on cooperative perturbation. In Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery. IEEE.Google Scholar
- Ashwin Machanavajjhala, Johannes Gehrke, Daniel Kifer, and Muthuramakrishnan Venkitasubramaniam. 2006. l-diversity: Privacy beyond k-anonymity. In Proceedings of the IEEE International Conference on Data Engineering (ICDE’06). IEEE, 24--24.Google Scholar
- Ashwin Machanavajjhala, Aleksandra Korolova, and Atish Das Sarma. 2011. Personalized social recommendations: Accurate or private. Proc. VLDB Endow. 4, 7 (2011), 440--450.Google ScholarDigital Library
- Nathan Mack, Jasmine Bowers, Henry Williams, Gerry Dozier, and Joseph Shelton. 2015. The best way to a strong defense is a strong offense: Mitigating deanonymization attacks via iterative language translation. Int. J. Mach. Learn. Comput. 5, 5 (2015), 409.Google ScholarCross Ref
- Priya Mahadevan, Dmitri Krioukov, Kevin Fall, and Amin Vahdat. 2006. Systematic topology analysis and generation using degree correlations. In Proceedings of the ACM SIGCOMM Computer Communication Review, Vol. 36. ACM, 135--146.Google Scholar
- Jalal Mahmud, Jeffrey Nichols, and Clemens Drews. 2014. Home location identification of twitter users. ACM Trans. Intell. Syst. Technol. 5, 3 (2014), 47.Google ScholarDigital Library
- Huina Mao, Xin Shuai, and Apu Kapadia. 2011. Loose tweets: An analysis of privacy leaks on twitter. In Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society. ACM, 1--12.Google ScholarDigital Library
- Jeffrey McGee, James Caverlee, and Zhiyuan Cheng. 2013. Location prediction in social media based on tie strength. In Proceedings of the Conference on Information and Knowledge Management (CIKM’13). ACM.Google Scholar
- Jeffrey McGee, James A. Caverlee, and Zhiyuan Cheng. 2011. A geographic study of tie strength in social media. In Proceedings of the Conference on Information and Knowledge Management (CIKM’11). ACM, 2333--2336.Google Scholar
- Miller McPherson, Lynn Smith-Lovin, and James M. Cook. 2001. Birds of a feather: Homophily in social networks. Annu. Rev. Sociol. 27, 1 (2001), 415--444.Google ScholarCross Ref
- Frank McSherry and Ilya Mironov. 2009. Differentially private recommender systems: Building privacy into the netflix prize contenders. In Proceedings of the ACM SIGKDD Conference on Knowledge Discovery and Data Mining (SIGKDD’09). ACM.Google Scholar
- Frank McSherry and Kunal Talwar. 2007. Mechanism design via differential privacy. In Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science 2007 (FOCS’07). IEEE, 94--103.Google Scholar
- Xuying Meng, Suhang Wang, Kai Shu, Jundong Li, Bo Chen, Huan Liu, and Yujun Zhang. 2018. Personalized privacy-preserving social recommendation. In Proceedings of the AAAI Conference on Artificial Intelligence (AAAI’18).Google Scholar
- Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S. Corrado, and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in Neural Information Processing Systems. 3111--3119.Google Scholar
- Tehila Minkus, Yuan Ding, Ratan Dey, and Keith W. Ross. 2015. The city privacy attack: Combining social media and public records for detailed profiles of adults and children. In Proceedings of the ACM Conference on Online Social Networks.Google Scholar
- Alan Mislove, Bimal Viswanath, Krishna P. Gummadi, and Peter Druschel. 2010. You are who you know: Inferring user profiles in online social networks. In Proceedings of the ACM International Conference on Web Search and Data Mining (WSDM’10). ACM, 251--260.Google Scholar
- Prateek Mittal, Charalampos Papamanthou, and Dawn Song. 2013. Preserving link privacy in social network based systems. NDSS.Google Scholar
- Frederick Mosteller and David Wallace. 1964. Inference and Disputed Authorship: The Federalist. Addison-Wesley, Reading, Mass.Google Scholar
- Mihir Nanavati, Nathan Taylor, William Aiello, and Andrew Warfield. 2011. Herbert west-deanonymizer. In Proceedings of the 6th USENIX Conference on Hot Topics in Security (HotSec’11). USENIX Association, San Francisco, CA, 6--6.Google ScholarDigital Library
- Arvind Narayanan, Hristo Paskov, Neil Zhenqiang Gong, John Bethencourt, Emil Stefanov, Eui Chul Richard Shin, and Dawn Song. 2012. On the feasibility of internet-scale author identification. In Proceedings of the Conference on Security and Privacy (SP’12). IEEE.Google Scholar
- Arvind Narayanan, Elaine Shi, and Benjamin IP Rubinstein. 2011. Link prediction by de-anonymization: How we won the kaggle social network challenge. In Proceedings of the International Joint Conference on Neural Networks. IEEE.Google Scholar
- Arvind Narayanan and Vitaly Shmatikov. 2008. Robust de-anonymization of large sparse datasets. In Proceedings of the Conference on Security and Privacy. IEEE.Google Scholar
- Arvind Narayanan and Vitaly Shmatikov. 2009. De-anonymizing social networks. In Proceedings of the Conference on Security and Privacy. IEEE.Google Scholar
- M. E. J. Newman. 2003. The structure and function of complex networks. In SIAM Review, Vol. 45. 167--256.Google ScholarDigital Library
- Shirin Nilizadeh, Apu Kapadia, and Yong-Yeol Ahn. 2014. Community-enhanced de-anonymization of online social networks. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 537--548.Google ScholarDigital Library
- Kobbi Nissim, Sofya Raskhodnikova, and Adam Smith. 2007. Smooth sensitivity and sampling in private data analysis. In Proceedings of the 39th Annual ACM Symposium on Theory of Computing. ACM, 75--84.Google Scholar
- Jahna Otterbacher. 2010. Inferring gender of movie reviewers: Exploiting writing style, content and metadata. In Proceedings of the 19th ACM International Conference on Information and Knowledge Management. ACM, 369--378.Google Scholar
- Rupa Parameswaran and D. Blough. 2005. A robust data obfuscation approach for privacy preservation of clustered data. In Proceedings of the Workshop on Privacy and Security Aspects of Data Mining. 18--25.Google Scholar
- Rupa Parameswaran and Douglas M. Blough. 2007. Privacy preserving collaborative filtering using data obfuscation. In Proceedings of the IEEE International Conference on Granular Computing.Google Scholar
- Javier Parra-Arnau. 2017. Pay-per-tracking: A collaborative masking model for web browsing. Information Sciences 385--386 (2017), 96--124.Google Scholar
- Javier Parra-Arnau, David Rebollo-Monedero, and Jordi Forné. 2014. Optimal forgery and suppression of ratings for privacy enhancement in recommendation systems. Entropy 16, 3 (2014), 1586--1631.Google ScholarCross Ref
- Pedram Pedarsani and Matthias Grossglauser. 2011. On the privacy of anonymized networks. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 1235--1243.Google ScholarDigital Library
- Wei Peng, Feng Li, Xukai Zou, and Jie Wu. 2014. A two-stage deanonymization attack against anonymized social networks. IEEE Trans. Comput. 63, 2 (2014), 290--303.Google ScholarDigital Library
- Huseyin Polat and Wenliang Du. 2003. Privacy-preserving collaborative filtering using randomized perturbation techniques. In Proceedings of the 3rd IEEE International Conference on Data Mining 2003 (ICDM’03). IEEE, 625--628.Google Scholar
- Davide Proserpio, Sharon Goldberg, and Frank McSherry. 2014. Calibrating data to sensitivity in private data analysis: A platform for differentially-private analysis of weighted datasets. Proc. VLDB Endow. 7, 8 (2014).Google Scholar
- Silvia Puglisi, Javier Parra-Arnau, Jordi Forné, and David Rebollo-Monedero. 2015. On content-based recommendation and user privacy in social-tagging systems. Comput. Stand. Interfaces 41 (2015), 17--27.Google ScholarDigital Library
- Jianwei Qian, Xiang-Yang Li, Chunhong Zhang, and Linlin Chen. 2016. De-anonymizing social networks and inferring private attributes using knowledge graphs. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM’16).Google ScholarDigital Library
- Naren Ramakrishnan, Benjamin J. Keller, Batul J. Mirza, Ananth Y. Grama, and George Karypis. 2001. Privacy risks in recommender systems. IEEE Internet Comput. 5, 6 (2001), 54.Google ScholarDigital Library
- Josyula R. Rao, Pankaj Rohatgi, et al. 2000. Can pseudonymity really guarantee privacy? In Proceedings of the USENIX Conference on Security.Google Scholar
- David Rebollo-Monedero and Jordi Forné. 2010. Optimized query forgery for private information retrieval. IEEE Trans. Inf. Theory 56, 9 (2010), 4631--4642.Google ScholarDigital Library
- David Rebollo-Monedero, Javier Parra-Arnau, and Jordi Forné. 2011. An information-theoretic privacy criterion for query forgery in information retrieval. In Proceedings of the International Conference on Security Technology. Springer, 146--154.Google Scholar
- Shariq J Rizvi and Jayant R Haritsa. 2002. Maintaining data privacy in association rule mining. In Proceedings of the 28th International Conference on Very Large Databases (VLDB’02). Elsevier, 682--693.Google Scholar
- Dominic Rout, Kalina Bontcheva, Daniel Preoţiuc-Pietro, and Trevor Cohn. 2013. Where’s@ wally?: A classification approach to geolocating users based on their social ties. In Proceedings of the Annual Conference on Hypertext and Social Media. ACM.Google ScholarDigital Library
- KyoungMin Ryoo and Sue Moon. 2014. Inferring twitter user locations with 10 km accuracy. In Proceedings of the Annual Conference on the World Wide Web (WWW’14).Google Scholar
- Alessandra Sala, Xiaohan Zhao, Christo Wilson, Haitao Zheng, and Ben Y Zhao. 2011. Sharing graphs using differentially private graph models. In Proceedings of the ACM SIGCOMM on Internet Measurement Conference.Google Scholar
- Kumar Sharad. 2016. Change of guard: The next generation of social graph de-anonymization attacks. In Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security. ACM, 105--116.Google Scholar
- Kumar Sharad and George Danezis. 2014. An automated social graph de-anonymization technique. In Proceedings of the 13th Workshop on Privacy in the Electronic Society. ACM, 47--58.Google ScholarDigital Library
- Sanur Sharma, Preeti Gupta, and Vishal Bhatnagar. 2012. Anonymisation in social network: A literature survey and classification. Int. J. Soc. Netw. Min. 1, 1 (2012), 51--66.Google ScholarCross Ref
- Yilin Shen and Hongxia Jin. 2014. Privacy-preserving personalized recommendation: An instance-based approach via differential privacy. In Proceedings of the 2014 IEEE International Conference on Data Mining (ICDM’14). IEEE, 540--549.Google Scholar
- Reza Shokri, George Theodorakopoulos, Jean-Yves Le Boudec, and Jean-Pierre Hubaux. 2011. Quantifying location privacy. In Proceedings of the 2011 IEEE Symposium on Security and Privacy (SP’11). IEEE, 247--262.Google ScholarDigital Library
- Mudhakar Srivatsa and Mike Hicks. 2012. Deanonymizing mobility traces: Using social network as a side-channel. In Proceedings of the 2012 ACM Conference on Computer and Communications Security. ACM, 628--637.Google Scholar
- Efstathios Stamatatos. 2009. A survey of modern authorship attribution methods. J. Assoc. Inf. Sci. Technol. 60, 3 (2009), 538--556.Google ScholarDigital Library
- Zak Stone, Todd Zickler, and Trevor Darrell. 2008. Autotagging facebook: Social network context improves photo annotation. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.Google Scholar
- Latanya Sweeney. 2002. k-anonymity: A model for protecting privacy. Int. J. Uncert. Fuzz. Knowl.-Based Syst. 10, 05 (2002), 557--570.Google ScholarDigital Library
- Qiang Tang and Jun Wang. 2018. Privacy-preserving friendship-based recommender systems. IEEE Trans. Depend. Sec. Comput. 15, 5 (2018), 784--796.Google Scholar
- Kurt Thomas, Chris Grier, and David M Nicol. 2010. unfriendly: Multi-party privacy risks in social networks. In Proceedings of the International Symposium on Privacy Enhancing Technologies Symposium. Springer, 236--252.Google Scholar
- Brian Thompson and Danfeng Yao. 2009. The union-split algorithm and cluster-based anonymization of social networks. In Proceedings of the Symposium on Information, Computer, and Communications Security.Google ScholarDigital Library
- Hanghang Tong, Christos Faloutsos, and Jia-Yu Pan. 2006. Fast random walk with restart and its applications. In Proceedings of the Sixth International Conference on Data Mining (ICDM’06). IEEE Computer Society, 613--622.Google ScholarDigital Library
- Vassilios S. Verykios, Elisa Bertino, Igor Nai Fovino, Loredana Parasiliti Provenza, Yucel Saygin, and Yannis Theodoridis. 2004. State-of-the-art in privacy preserving data mining. ACM SIGMOD Rec. 33, 1 (2004), 50--57.Google ScholarDigital Library
- Huandong Wang, Yong Li, Gang Wang, and Depeng Jin. 2018. You are how you move: Linking multiple user identities from massive mobility traces. In Proceedings of the SIAM International Conference on Data Mining (SDM’18). Society for Industrial and Applied Mathematics.Google ScholarCross Ref
- Pengfei Wang, Jiafeng Guo, Yanyan Lan, Jun Xu, and Xueqi Cheng. 2016. Your cart tells you: Inferring demographic attributes from purchase data. In Proceedings of the ACM International Conference on Web Search and Data Mining (WSDM’16). ACM.Google Scholar
- Yue Wang and Xintao Wu. 2013. Preserving differential privacy in degree-correlation based graph generation. Trans. Data Priv. 6, 2 (2013), 127.Google ScholarDigital Library
- Udi Weinsberg, Smriti Bhagat, Stratis Ioannidis, and Nina Taft. 2012. BlurMe: Inferring and obfuscating user gender based on ratings. In Proceedings of the 6th ACM Conference on Recommender Systems. ACM, 195--202.Google Scholar
- Xinyu Wu, Zhongzhao Hu, Xinzhe Fu, Luoyi Fu, Xinbing Wang, and Songwu Lu. 2018. Social network de-anonymization with overlapping communities: Analysis, algorithm and experiments. In Proceeding of the International Conference on Computer Communications (INFOCOM’18).Google Scholar
- Qian Xiao, Rui Chen, and Kian-Lee Tan. 2014. Differentially private network data release via structural inference. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 911--920.Google ScholarDigital Library
- Yu Xin and Tommi Jaakkola. 2014. Controlling privacy in recommender systems. In Proceedings of the Conference on Neural Information Processing Systems (NIPS’14).Google Scholar
- Jaewon Yang and Jure Leskovec. 2013. Overlapping community detection at scale: A nonnegative matrix factorization approach. In Proceedings of the 6th ACM International Conference on Web Search and Data Mining. ACM, 587--596.Google ScholarDigital Library
- Lyudmila Yartseva and Matthias Grossglauser. 2013. On the performance of percolation graph matching. In Proceedings of the 1st ACM Conference on Online Social Networks. ACM, 119--130.Google ScholarDigital Library
- Zhijun Yin, Manish Gupta, Tim Weninger, and Jiawei Han. 2010. Linkrec: A unified framework for link recommendation with user attributes and graph structure. In Proceedings of the Annual Conference of the World Wide Web (WWW’10). ACM, 1211--1212.Google Scholar
- Zhijun Yin, Manish Gupta, Tim Weninger, and Jiawei Han. 2010. A unified framework for link recommendation using random walks. In Proceedings of the International Conference on Advances in Social Networks Analysis and Mining (ASONAM’10). IEEE, 152--159.Google Scholar
- Xiaowei Ying and Xintao Wu. 2009. Graph generation with prescribed feature constraints. In Proceedings of the SIAM International Conference on Data Mining (SDM’09).Google Scholar
- Mingxuan Yuan, Lei Chen, and Philip S. Yu. 2010. Personalized privacy protection in social networks. Proc. VLDB Endow. 4, 2 (2010), 141--150.Google ScholarDigital Library
- Aston Zhang, Xing Xie, Carl A. Gunter, Jiawei Han, and XiaoFeng Wang. 2014. Privacy risk in anonymized heterogeneous information networks. In Proceedings of the Extended Database Technology Conference (EDBT’14).Google Scholar
- Jinxue Zhang, Jingchao Sun, Rui Zhang, and Yanchao Zhang. 2018. Privacy-preserving social media data outsourcing. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM’18).Google Scholar
- Elena Zheleva and Lise Getoor. 2009. To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles. In Proceedings of the 18th International Conference on World Wide Web. ACM, 531--540.Google ScholarDigital Library
- Elena Zheleva, Evimaria Terzi, and Lise Getoor. 2012. Privacy in social networks. Synth. Lect. Data Min. Knowl. Discov. 3, 1 (2012), 1--85.Google ScholarCross Ref
- X. Zheng, J. Han, and A. Sun. 2018. A survey of location prediction on twitter. IEEE Trans. Knowl. Data Eng. 30, 9 (2018), 1652--1671.Google ScholarDigital Library
- Yuan Zhong, Nicholas Jing Yuan, Wen Zhong, Fuzheng Zhang, and Xing Xie. 2015. You are where you go: Inferring demographic attributes from location check-ins. In Proceedings of the ACM International Conference on Web Search and Data Mining (WSDM’15). ACM, 295--304.Google Scholar
- Bin Zhou and Jian Pei. 2008. Preserving privacy in social networks against neighborhood attacks. In Proceedings of the IEEE International Conference on Data Engineering (ICDE’08).Google Scholar
- Tianqing Zhu, Gang Li, Yongli Ren, Wanlei Zhou, and Ping Xiong. 2013. Differential privacy for neighborhood-based collaborative filtering. In Proceedings of the International Conference on Advances in Social Networks Analysis and Mining (ASONAM’13). ACM, 752--759.Google Scholar
- Xue Zhu and Yuqing Sun. 2016. Differential privacy for collaborative filtering recommender algorithm. In Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics. ACM, 9--16.Google ScholarDigital Library
- Lei Zou, Lei Chen, and M. Tamer Özsu. 2009. K-automorphism: A general framework for privacy preserving network publication. Proc. VLDB Endow. 2, 1 (2009), 946--957.Google ScholarDigital Library
Index Terms
- A Survey on Privacy in Social Media: Identification, Mitigation, and Applications
Recommendations
Privacy perception and protection on Chinese social media: a case study of WeChat
In this study, the under-examined area of privacy perception and protection on Chinese social media is investigated. The prevalence of digital technology shapes the social, political and cultural aspects of the lives of urban young adults. The ...
{Privacy, privacidad, Приватност} policies in social media: providing translated privacy notice
PSOSM '12: Proceedings of the 1st Workshop on Privacy and Security in Online Social MediaAs online social media have become a global phenomenon, popular sites have been translated into many languages. However, since many social media sites rely on crowdsourced translation, privacy-critical pages are not always translated into all languages ...
Reconciling privacy with social media
CSCW '12: Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work CompanionSocial media is one way that individuals share information, present themselves, and manage their social interactions in both personal and professional contexts. While social media benefits have been examined in the literature, relatively little ...
Comments