Abstract
The emergence of microblogging-based social networks shows how important it is for common people to share information worldwide. In this environment, Twitter has set it apart from the rest of competitors. Users publish text messages containing opinions and information about a wide range of topics, including personal ones. Previous works have shown that these publications can be analyzed to extract useful information for the society but also to characterize the users who generate them and, hence, to build personal profiles. This latter situation poses a serious threat to users’ privacy. In this paper, we present a new privacy-preserving scheme that distorts the real user profile in front of automatic profiling systems applied to Twitter. This is done while keeping user publications intact in order to interfere the least with her followers. The method has been tested using Twitter publications gathered from renowned users, showing that it effectively obfuscates users’ profiles.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
McMillan, G.: Twitter Reveals Active User Number, How Many Actually Say Something. Time - Techland (September 2011)
Consumer Reports National Research Center, Annual State of the Net Survey, Consumer Reports 75(6) (2010)
Rui, H., Whinston, A.: Information or attention? An empirical study of user contribution on Twitter. Information Systems and E-Business Management, 1–16 (2011)
Zhang, C., Sun, J., Zhu, X., Fang, Y.: Privacy and Security for Online Social Networks: Challenges and Opportunities. IEEE Network 24(4), 13–18 (2010)
TweetPsych (2011), http://tweetpsych.com
Peerindex (2011), http://www.peerindex.com
Ebner, M., Mühlburger, H., Schaffert, S., Schiefner, M., Reinhardt, W., Wheeler, S.: Getting Granular on Twitter: Tweets from a Conference and Their Limited Usefulness for Non-participants. Key Competencies in the Knowledge Society 324, 102–113 (2010)
Zoltan, K., Johann, S.: Semantic Analysis of Microposts for Efficient People to People Interactions. In: Proc. of the Roedunet International Conference – RoEduNet 2011, pp. 1–4 (2011)
Michelson, M., Macskassy, S.A.: Discovering Users’ Topics of Interest on Twitter: a First Look. In: Proc. of the Fourth Workshop on Analytics for Noisy Unstructured Text Data (2010)
Abel, F., Gao, Q., Houben, G.-J., Tao, K.: Semantic Enrichment of Twitter Posts for User Profile Construction on the Social Web. In: Antoniou, G., Grobelnik, M., Simperl, E., Parsia, B., Plexousakis, D., De Leenheer, P., Pan, J. (eds.) ESWC 2011, Part II. LNCS, vol. 6644, pp. 375–389. Springer, Heidelberg (2011)
DBpedia (2011), http://dbpedia.org/
Luo, W., Xie, Q., Hengartner, U.: Facecloak: an Architecture for User Privacy on Social Networking Sites. In: Proc. of the 2009 International Conference on Computational Science and Engineering, pp. 26–33 (2009)
Abril, D., Navarro-Arribas, G., Torra, V.: On the Declassification of Confidential Documents. In: Torra, V., Narakawa, Y., Yin, J., Long, J. (eds.) MDAI 2011. LNCS, vol. 6820, pp. 235–246. Springer, Heidelberg (2011)
Martínez, S., Sánchez, D., Valls, A.: Semantic adaptive microaggregation of categorical microdata. Computers & Security 31(5), 653–672 (2012)
Sánchez, D., Batet, M.: Semantic similarity estimation in the biomedical domain: An ontology-based information-theoretic perspective. Journal of Biomedical Informatics 44(5), 749–759 (2011)
Sánchez, D.: A methodology to learn ontological attributes from the Web. Data and Knowledge Engineering 69(6), 573–597 (2010)
Martínez, S., Sánchez, D., Valls, A., Batet, M.: Privacy protection of textual attributes through a semantic-based masking method. Information Fusion 13(4), 304–314 (2012)
Sánchez, D., Moreno, A.: Pattern-based automatic taxonomy learning from the Web. AI Communications 21(1), 27–48 (2008)
Sánchez, D., Isern, D., Millan, M.: Content Annotation for the Semantic Web: an Automatic Web-based Approach. Knowledge and Information Systems 27(3), 393–418 (2011)
Guarino, N.: Formal Ontology in Information Systems. In: Proc. of the 1st International Conference on Formal Ontology in Information Systems, FOIS 1998, pp. 3–15 (1998)
Open Directory Project (2012), http://www.dmoz.org/docs/en/about.html
Twitter - WhoToFollow (2012), http://twitter.com/#!/who_to_follow
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Viejo, A., Sánchez, D., Castellà-Roca, J. (2012). Using Profiling Techniques to Protect the User’s Privacy in Twitter. In: Torra, V., Narukawa, Y., López, B., Villaret, M. (eds) Modeling Decisions for Artificial Intelligence. MDAI 2012. Lecture Notes in Computer Science(), vol 7647. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34620-0_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-34620-0_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34619-4
Online ISBN: 978-3-642-34620-0
eBook Packages: Computer ScienceComputer Science (R0)