2009 International Conference on Advances in Social Network Analysis and Mining 2009
DOI: 10.1109/asonam.2009.45
|View full text |Cite
|
Sign up to set email alerts
|

Prying Data out of a Social Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
71
0
4

Year Published

2010
2010
2024
2024

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 306 publications
(75 citation statements)
references
References 10 publications
0
71
0
4
Order By: Relevance
“…On the back of this come debates about the ways in which use may actual constitute misuse. The literature here is simply huge, encompassing both quite discrete topics such as the notion of attack surfaces [ [9][76], and much broader ones such as privacy [6] [51]. The latter may also be seen to encompass matters such as the use of personal data for the purposes of shame and ridicule, exposure, retribution, bullying, and even blackmail [32][46] [69].…”
Section: The Use Of Personal Data and Associated Threatsmentioning
confidence: 99%
“…On the back of this come debates about the ways in which use may actual constitute misuse. The literature here is simply huge, encompassing both quite discrete topics such as the notion of attack surfaces [ [9][76], and much broader ones such as privacy [6] [51]. The latter may also be seen to encompass matters such as the use of personal data for the purposes of shame and ridicule, exposure, retribution, bullying, and even blackmail [32][46] [69].…”
Section: The Use Of Personal Data and Associated Threatsmentioning
confidence: 99%
“…Similarly, Danezis [2] proposed a machine-learning based approach to automatically extract privacy settings from the social context within which the data is produced. Parallel to the work of Danezis, AduOppong et al [3] develop privacy settings based on a concept of "Social Circles" which consist of clusters of friends formed by partitioning users' friend lists.…”
Section: Existing Methodologymentioning
confidence: 99%
“…The validity or originality behind the acquired and shared content makes a strong trust factor among users in the group which later gets multiplied within other users also. [5] …”
Section: Social Networking Based Learning Patternsmentioning
confidence: 99%