2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing 2012
DOI: 10.1109/socialcom-passat.2012.16
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Threats Related to User Profiling in Online Social Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
3
1

Relationship

3
6

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…Profiling users is a practical solution that has been established. Several studies in the literature have successfully established solutions based on Facebook user profiling for the purpose of managing relationships between users (e.g., [127][128][129][130]), predicting users' privacy behaviors or threats (e.g., [131,132]), classifying users' relationships (e.g., [133]), and detecting similarity between contents, topics, or writing styles (e.g., [134]). Looking at the identified peripheral cues that have been explored in this study, we can see that they are even more measurable and useful than those variables used in previous profiling mechanisms.…”
Section: Implication For Research and Practicementioning
confidence: 99%
“…Profiling users is a practical solution that has been established. Several studies in the literature have successfully established solutions based on Facebook user profiling for the purpose of managing relationships between users (e.g., [127][128][129][130]), predicting users' privacy behaviors or threats (e.g., [131,132]), classifying users' relationships (e.g., [133]), and detecting similarity between contents, topics, or writing styles (e.g., [134]). Looking at the identified peripheral cues that have been explored in this study, we can see that they are even more measurable and useful than those variables used in previous profiling mechanisms.…”
Section: Implication For Research and Practicementioning
confidence: 99%
“…Once he/she has become friends with the person he can easily retrieve the sensitive information pertaining to the restricted group. Attacks that can be conducted due to this vulnerability is information leakage, phishing attack or the spam attack [17].…”
Section: Informational Retrieval Threatsmentioning
confidence: 99%
“…Issues about security and privacy of user data is a cause of major concern in online social network API development as discussed in [19]. In our current implementation, we consider the related issues and our API only fetches public data.…”
Section: Security Issues and Implementation Challengesmentioning
confidence: 99%