Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015 2015
DOI: 10.1145/2808797.2809290
|View full text |Cite
|
Sign up to set email alerts
|

Revealing Censored Information Through Comments and Commenters in Online Social Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
4
1
1

Relationship

4
2

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 18 publications
0
11
0
Order By: Relevance
“…The steps from comment identification to identity revelation are labor intensive. We are currently pursuing efforts to automate this process through techniques that reveal and cross‐reference the friend subnetworks of L‐classified commenters, with initial results reported previously (Cascavilla, Conti, Schwartz, & Yahav, ).…”
Section: Discussionmentioning
confidence: 97%
“…The steps from comment identification to identity revelation are labor intensive. We are currently pursuing efforts to automate this process through techniques that reveal and cross‐reference the friend subnetworks of L‐classified commenters, with initial results reported previously (Cascavilla, Conti, Schwartz, & Yahav, ).…”
Section: Discussionmentioning
confidence: 97%
“…In addition, AdWords further refines the campaign an advertiser would like to launch, by giving her the possibility to reach exactly the audience she is looking for, specifying a list of websites users should have visited before being exposed to the campaign. Having visited such websites let users be part of custom affinity audiences 6 . To represent the relation between topics, interests and audiences, we refer to Figure 3.…”
Section: The Google Targeted Advertising Systemmentioning
confidence: 99%
“…More broadly, one can run campaigns in order to infer age or gender distribution of employees of particular companies, estimate the amount of time employees spend on Facebook, the fraction of employees who are interested in job opportunities elsewhere, etc. Similarly, in [6], [7], Cascavilla et al show several techniques to retrieve supposedly hidden information from Facebook user profile, while they do not rely on advertisements.…”
Section: ) Privacy Violationsmentioning
confidence: 99%
“…Also, the names of the victims of particularly hateful offences, like rapes and abuses on minors, are typically obfuscated, as for regulations dictated by law. Finally, a peculiar practice when publishing Israeli military-related news on social media is the veiling of the identities of public officers (e.g., Corporal S., rather than the explicit identity of such officer, see, e.g., [2]). However, as highlighted by recent literature [3], given the essential nature of social networking, the "non identification alone is ineffective in protecting sensitive information".…”
Section: Introductionmentioning
confidence: 99%
“…This work places itself amongst a few ones, like, e.g., [4,2] that investigate to which extent the connections among news articles, comments, and social media influence the effectiveness of identities censorship procedures. In particular, we present a novel approach to unveil a censored identity in a news post, by exploiting the fact that, on the social Web, it is not unusual to find the same content, or a very similar one, published elsewhere, e.g., by another publisher with different censorship policies.…”
Section: Introductionmentioning
confidence: 99%