2016
DOI: 10.1007/s10115-016-1010-4
|View full text |Cite
|
Sign up to set email alerts
|

Shall I post this now? Optimized, delay-based privacy protection in social networks

Abstract: Abstract-Despite the several advantages commonly attributed to social networks such as easiness and immediacy to communicate with acquaintances and friends, significant privacy threats provoked by unexperienced or even irresponsible users recklessly publishing sensitive material are also noticeable. Yet, a different, but equally significant privacy risk might arise from social networks profiling the online activity of their users based on the timestamp of the interactions between the former and the latter. In … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 40 publications
0
2
0
Order By: Relevance
“…Precisely, the privacy-utility trade-off posed by the suppression of tags was investigated mathematically in [13], measuring privacy as the Shannon entropy of the perturbed profile, and utility as the percentage of tags users are willing to eliminate. Closely related to this are also other studies regarding the impact of suppressive PETs [15][16][17], where the impact of tag suppression is assessed experimentally in the context of various applications and real-world scenarios. This is particularly relevant when online services provide the users with the perception that sharing less data impacts their optimal service experience.…”
Section: State-of-the-artmentioning
confidence: 84%
“…Precisely, the privacy-utility trade-off posed by the suppression of tags was investigated mathematically in [13], measuring privacy as the Shannon entropy of the perturbed profile, and utility as the percentage of tags users are willing to eliminate. Closely related to this are also other studies regarding the impact of suppressive PETs [15][16][17], where the impact of tag suppression is assessed experimentally in the context of various applications and real-world scenarios. This is particularly relevant when online services provide the users with the perception that sharing less data impacts their optimal service experience.…”
Section: State-of-the-artmentioning
confidence: 84%
“…Finally, by examining the prevalent traits in the out of scope group of comments, we can identify potentially malicious and unreliable users or social bots in the early stage and reduce their influence. As stated by Parra-Arnau et al, even though social networks provide an easy and immediate way of communication, there exist significant privacy threats provoked by inexperienced or even irresponsible users recklessly publishing sensitive material [Parra-Arnau et al, 2017]. For example, Pastor-Galindo et al [Pastor-Galindo et al, 2020] analysed the presence and behaviour of social bots in Twitter in the context of the Spanish general election.…”
Section: Application In Real Scenariosmentioning
confidence: 99%
“…Precisely, the the privacy-utility tradeoff posed by the suppression of tags was investigated mathematically [100,101,112], measuring privacy as the Shannon entropy of the perturbed profile, and utility as the percentage of tags users are willing to eliminate. Closely related to this are also other studies regarding the impact of suppressive PETs [98,103,112], where the impact of tag suppression is assessed experimentally in the context of various applications and real-world scenarios.…”
Section: User Profilingmentioning
confidence: 83%