Abstract
Online social networks have become an important part of the online activities on the web and one of the most influencing media. Unconstrained by physical spaces, online social networks offer to web users new interesting means to communicate, interact, and socialize. While these networks make frequent data sharing and inter-user communications instantly possible, privacy-related issues are their obvious much discussed immediate consequences. Although the notion of privacy may take different forms, the ultimate challenge is how to prevent privacy invasion when much personal information is available. In this context, we address privacy-related issues by resorting to social network analysis and link mining techniques. We first describe the fundamental of social networks, their common representations, and the main motivations associated with their use. Afterwards, we particularly show how privacy attacks can build on social network analysis and link mining techniques to reveal user-sensitive information. The chapter concludes with a discussion of some open challenges to address in future privacy-related works.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
https://www.facebook.com/press/info.php?statistics, accessed 01 October 2012.
- 9.
http://www.information-management.com/issues/21_5/big-data-is-scaling-bi-and-analytics-10021093-1.html, accessed 01 October 2012.
- 10.
- 11.
- 12.
- 13.
- 14.
- 15.
- 16.
- 17.
https://www.facebook.com/press/info.php?statistics, accessed 01 October 2012.
References
Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove, A.: Analyzing facebook privacy settings: user expectations vs. reality. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference. IMC ’11, pp. 61–70. ACM, New York (2011)
Lipford, H.R., Besmer, A., Watson, J.: Understanding privacy settings in facebook with an audience view. In: Proceedings of the 1st Conference on Usability, Psychology, and Security, USENIX Association Berkeley, CA, USA, pp. 1–8 (2008)
Acquisti, A., Gross, R.: Imagined communities: awareness, information sharing, and privacy on the facebook. In: Danezis, G., Golle, P. (eds.) Privacy Enhancing Technologies. Lecture Notes in Computer Science, Vol. 4258, pp. 36–58. Springer, Berlin/Heidelberg (2006)
Awad, N., Krishnan, M.: The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly 13–28 (2006)
Madejski, M., Johnson, M., Bellovin, S.: A study of privacy settings errors in an online social network. In: 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 340–345 (2012)
Johnson, M., Egelman, S., Bellovin, S.M.: Facebook and privacy: it’s complicated. In: Proceedings of the Eighth Symposium on Usable Privacy and Security. SOUPS ’12, pp. 1–15. ACM, New York (2012)
Besmer, A., Richter Lipford, H.: Moving beyond untagging: photo privacy in a tagged world. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI ’10, pp. 1563–1572. ACM, New York (2010)
Grimmelmann, J.: Saving Facebook. Iowa Law Rev. 94, 1137–1206 (2009)
Zhang, C., Sun, J., Zhu, X., Fang, Y.: Privacy and security for online social networks: challenges and opportunities. IEEE Netw. 24(4), 13–18 (2010)
Viswanath, B., Kiciman, E., Saroiu, S.: Keeping information safe from social networking apps. In: Proceedings of the 2012 ACM Workshop on Workshop on Online Social Networks. WOSN ’12, pp. 49–54. ACM, New York (2012)
Brey, P.: Ethical aspects of information security and privacy. In: Petkovic, M., Jonker, W., Carey, M.J., Ceri, S. (eds.) Security, Privacy, and Trust in Modern Data Management. Data-Centric Systems and Applications, pp. 21–36. Springer, Berlin/Heidelberg (2007)
Zheleva, E., Terzi, E., Getoor, L.: Privacy in social networks. Synth. Lect. Data Min. Knowl. Discov. 3(1), 1–85 (2012)
Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management (August 2010) v0.34
Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge (1994)
Getoor, L., Diehl, C.P.: Link mining: a survey. SIGKDD Explor. Newsl. 7(2), 3–12 (2005)
Broder, A., Kumar, R., Maghoul, F., Raghavan, P., Rajagopalan, S., Stata, R., Tomkins, A., Wiener, J.: Graph structure in the web. Comput. Network 33(1), 309–320 (2000)
Wellman, B.: Computer networks as social networks. Science 293(5537), 2031–2034 (2001)
Ito, T., Chiba, T., Ozawa, R., Yoshida, M., Hattori, M., Sakaki, Y.: A comprehensive two-hybrid analysis to explore the yeast protein interactome. Proc. Natl. Acad. Sci. 98(8), 4569–4574 (2001)
Gomez-Rodriguez, M., Leskovec, J., Krause, A.: Inferring networks of diffusion and influence. ACM Trans. Knowl. Discov. Data 5(4) (2012)
Adamic, L., Buyukkokten, O., Adar, E.: A social network caught in the web. First Monday 8(6) (2003)
Wilson, C., Sala, A., Puttaswamy, K.P.N., Zhao, B.Y.: Beyond social graphs: User interactions in online social networks and their implications. ACM Trans. Web 6(4), 17:1–17:31 (2012)
Faust, K.: Centrality in affiliation networks. Soc. Network 19(2), 157–191 (1997)
Borgatti, S., Mehra, A., Brass, D., Labianca, G.: Network analysis in the social sciences. Science 323(5916), 892–895 (2009)
Matsuo, Y., Mori, J., Hamasaki, M., Nishimura, T., Takeda, H., Hasida, K., Ishizuka, M.: Polyphonet: An advanced social network extraction system from the web. Web Semant. 5(4), 262–278 (2007)
Gilbert, E.: Predicting tie strength in a new medium. In: Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work. CSCW ’12, pp. 1047–1056. ACM, New York (2012)
Haythornthwaite, C.: Social network analysis: An approach and technique for the study of information exchange. Library Inform. Sci. Res. 18(4), 323–342 (1996)
Musial, K., Kazienko, P.: Social networks on the internet. World Wide Web 16(1), 31–72 (2013)
Granovetter, M.S.: The strength of weak ties. Am. J. Sociol. 78(6), 1360–1380 (1973)
Haythornthwaite, C.: Social networks and internet connectivity effects. Inform. Comm. Soc. 8(2), 125–147 (2005)
Wellman, B., Wortley, S.: Different strokes from different folks: community ties and social support. Am. J. Sociol. 96(3), 558–588 (1990)
Bernard, H., Johnsen, E., Killworth, P., McCarty, C., Shelley, G., Robinson, S.: Comparing four different methods for measuring personal social networks. Soc. Network 12(3), 179–215 (1990)
Killworth, P., Johnsen, E., Bernard, H., Ann Shelley, G., McCarty, C.: Estimating the size of personal networks. Soc. Network 12(4), 289–312 (1990)
Steinfield, C., Ellison, N., Lampe, C.: Social capital, self-esteem, and use of online social network sites: A longitudinal analysis. J. Appl. Dev. Psychol. 29(6), 434–445 (2008)
Heidemann, J., Klier, M., Probst, F.: Online social networks: A survey of a global phenomenon. Comput. Network 56(18), 3866–3878 (2012)
Hua, W., Wellman, B.: Social connectivity in america: changes in adult friendship network size from 2002 to 2007. Am. Behav. Sci. 53(8), 1148–1169 (2010)
Dunbar, R.I.M.: Social cognition on the internet: testing constraints on social network size. Phil. Trans. Roy. Soc. B Biol. Sci. 367(1599), 2192–2201 (2012)
Subrahmanyam, K., Reich, S., Waechter, N., Espinoza, G.: Online and offline social networks: Use of social networking sites by emerging adults. J. Appl. Dev. Psychol. 29(6), 420–433 (2008)
Correa, T., Hinsley, A., de Zúñiga, H.: Who interacts on the web? The intersection of users’ personality and social media use. Comput. Hum. Behav. 26(2), 247–253 (2010)
Joinson, A.N.: Looking at, looking up or keeping up with people?: motives and use of facebook. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI ’08, pp. 1027–1036. ACM, New York (2008)
Papacharissi, Z., Mendelson, A.: Toward a new (er) sociability: uses, gratifications and social capital on facebook. Media Perspectives for the 21st Century, pp. 212–230 (2011)
Ryan, T., Xenos, S.: Who uses facebook? an investigation into the relationship between the big five, shyness, narcissism, loneliness, and facebook usage. Comput. Hum. Behav. 27(5), 1658–1664 (2011)
Gentile, B., Twenge, J., Freeman, E., Campbell, W.: The effect of social networking websites on positive self-views: An experimental investigation. Comput. Hum. Behav. 28(5), 1929–1933 (2012)
Nosko, A., Wood, E., Molema, S.: All about me: Disclosure in online social networking profiles: The case of facebook. Comput. Hum. Behav. 26(3), 406–418 (2010)
Krasnova, H., Spiekermann, S., Koroleva, K., Hildebrand, T.: Online social networks: Why we disclose. J. Inform. Tech. 25(2), 109–125 (2010)
Ross, C., Orr, E., Sisic, M., Arseneault, J., Simmering, M., Orr, R.: Personality and motivations associated with facebook use. Comput. Hum. Behav. 25(2), 578–586 (2009)
Morris, M.R., Teevan, J., Panovich, K.: What do people ask their social networks, and why?: a survey study of status message q&a behavior. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI ’10, pp. 1739–1748. ACM, New York (2010)
Lin, K.Y., Lu, H.P.: Why people use social networking sites: An empirical study integrating network externalities and motivation theory. Comput. Hum. Behav. 27(3), 1152–1161 (2011)
Nosko, A., Wood, E., Kenney, M., Archer, K., De Pasquale, D., Molema, S., Zivcakova, L.: Examining priming and gender as a means to reduce risk in a social networking context: Can stories change disclosure and privacy setting use when personal profiles are constructed? Comput. Hum. Behav. 28(6), 2067–2074 (2012)
Sledgianowski, D., Kulviwat, S.: Using social network sites: The effects of playfulness, critical mass and trust in a hedonic context. J. Comput. Inform. Syst. 49(4), 74–83 (2009)
Pempek, T., Yermolayeva, Y., Calvert, S.: College students’ social networking experiences on facebook. J. Appl. Dev. Psychol. 30(3), 227–238 (2009)
Kwon, O., Wen, Y.: An empirical study of the factors affecting social network service use. Comput. Hum. Behav. 26(2), 254–263 (2010)
Adamic, L., Adar, E.: How to search a social network. Soc. Network 27(3), 187–203 (2005)
Boyd, D., Ellison, N.: Social network sites: Definition, history, and scholarship. J. Comput. Mediat. Comm. 13(1), 210–230 (2007)
Schneider, F., Feldmann, A., Krishnamurthy, B., Willinger, W.: Understanding online social network usage from a network perspective. In: Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference. IMC ’09, pp. 35–48. ACM, New York (2009)
Bakshy, E., Rosenn, I., Marlow, C., Adamic, L.: The role of social networks in information diffusion. In: Proceedings of the 21st Annual Conference on World Wide Web. WWW’12, pp. 519–528 (2012)
Ellison, N., Steinfield, C., Lampe, C.: The benefits of facebook “friends:” social capital and college students’ use of online social network sites. J. Comput. Mediat. Comm. 12(4), 1143–1168 (2007)
Raad, E., Chbeir, R., Dipanda, A.: User profile matching in social networks. In: Proceedings - 13th International Conference on Network-Based Information Systems, NBiS 2010, pp. 297–304 (sept. 2010)
Thelwall, M.: Social networks, gender, and friending: An analysis of mySpace member profiles. J. Am. Soc. Inform. Sci. Tech. 59(8), 1321–1330 (2008)
Abel, F., Henze, N., Herder, E., Krause, D.: Interweaving public user profiles on the web. In: Bra, P., Kobsa, A., Chin, D. (eds.) User Modeling, Adaptation, and Personalization. Volume 6075 of Lecture Notes in Computer Science, pp. 16–27. Springer, Berlin/Heidelberg (2010)
Graves, M., Constabaris, A., Brickley, D.: FOAF: connecting people on the semantic web. Cataloging Classification Quarterly 43(3–4), 191–202 (2007)
Cranshaw, J., Toch, E., Hong, J., Kittur, A., Sadeh, N.: Bridging the gap between physical location and online social networks. In: UbiComp’10 - Proceedings of the 2010 ACM Conference on Ubiquitous Computing, pp. 119–128 (2010)
Raad, E., Chbeir, R., Dipanda, A.: Discovering relationship types between users using profiles and shared photos in a social network. Multimed. Tool Appl. 64(1), 141–170 (2013)
Tang, L., Liu, H.: Scalable learning of collective behavior based on sparse social dimensions. In: Proceedings of the 18th ACM Conference on Information and Knowledge Management. CIKM ’09, pp. 1107–1116. ACM, New York (2009)
McAuley, J., Leskovec, J.: Learning to discover social circles in ego networks. Adv. Neural Inform. Process. Syst. 25, 548–556 (2012)
Ellison, N., Steinfield, C., Lampe, C.: Connection strategies: Social capital implications of facebook-enabled communication practices. New Media Soc. 13(6), 873–892 (2011)
Newman, M.: The structure and function of complex networks. SIAM Rev. 45(2), 167–256 (2003)
Boccaletti, S., Latora, V., Moreno, Y., Chavez, M., Hwang, D.U.: Complex networks: structure and dynamics. Phys. Rep. 424(4–5), 175–308 (2006)
Fortunato, S.: Community detection in graphs. Phys. Rep. 486(3–5), 75–174 (2010)
Brams, S., Mutlu, H., Ramirez, S.: Influence in terrorist networks: From undirected to directed graphs. Stud. Conflict Terrorism 29(7), 703–718 (2006)
Morselli, C., Giguère, C., Petit, K.: The efficiency/security trade-off in criminal networks. Soc. Network 29(1), 143–153 (2007)
Bachi, G., Coscia, M., Monreale, A., Giannotti, F.: Classifying trust/distrust relationships in online social networks. In: Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Confernece on Social Computing (SocialCom), pp. 552–557 (Sept. 2012)
Zhang, T., Chao, H., Tretter, D.: Dynamic estimation of family relations from photos. In: Lee, K.T., Tsai, W.H., Liao, H.Y., Chen, T., Hsieh, J.W., Tseng, C.C. (eds.) Advances in Multimedia Modeling. Volume 6524 of Lecture Notes in Computer Science, pp. 65–76. Springer, Berlin/Heidelberg (2011)
Carminati, B., Ferrari, E., Perego, A.: Enforcing access control in Web-based social networks. ACM Trans. Inf. Syst. Secur. 13(1), 1–38 (2009)
Xiang, R., Neville, J., Rogati, M.: Modeling relationship strength in online social networks. In: Proceedings of the 19th International Conference on World Wide Web. WWW ’10, pp. 981–990. ACM, New York (2010)
Stutzman, F., Kramer-Duffield, J.: Friends only: examining a privacy-enhancing behavior in facebook. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI ’10, pp. 1553–1562. ACM, New York (2010)
Kogovšek, T., Ferligoj, A., Coenders, G., Saris, W.: Estimating the reliability and validity of personal support measures: Full information ML estimation with planned incomplete data. Soc. Network 24(1), 1–20 (2002)
Groves, R.: Survey Errors and Survey Costs, vol. 536. Wiley-Interscience, Hoboken, NJ (2004)
Gonzalez-Bailon, S.: Opening the black box of link formation: Social factors underlying the structure of the web. Soc. Network 31(4), 271–280 (2009)
Tyler, J., Wilkinson, D., Huberman, B.: E-mail as spectroscopy: Automated discovery of community structure within organizations. Inform. Soc. 21(2), 133–141 (2005)
Kautz, H., Selman, B., Shah, M.: Referral web: combining social networks and collaborative filtering. Comm. ACM 40(3), 63–65 (1997)
Mika, P.: Flink: Semantic web technology for the extraction and analysis of social networks. Web Semant. 3(2–3), 211–223 (2005)
Marin, A., Wellman, B.: Social network analysis: An introduction. Handbook Soc. Network Anal. 22(January), 11–25 (2010)
Kwak, H., Lee, C., Park, H., Moon, S.: What is twitter, a social network or a news media? In: Proceedings of the 19th International Conference on World Wide Web. WWW ’10, pp. 591–600. ACM, New York (2010)
Kazienko, P., Musial, K., Kajdanowicz, T.: Multidimensional social network in the social recommender system. IEEE Trans. Syst. Man Cybern. A Syst. Hum. 41(4), 746–759 (2011)
Catanese, S., Meo, P., Ferrara, E., Fiumara, G., Provetti, A.: Extraction and analysis of facebook friendship relations. In Abraham, A. (ed.) Computational Social Networks, pp. 291–324. Springer, London (2012)
Schneier, B.: A taxonomy of social networking data. IEEE Secur. Privacy 8(4), 88 (2010)
Diesner, J., Frantz, T., Carley, K.: Communication networks from the enron email corpus “it’s always about the people. enron is no different”. Comput. Math. Organ. Theor 11(3), 201–228 (2005)
Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data. SIGMOD ’08, pp. 93–106. ACM, New York (2008)
Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 173–187 (may 2009)
Hay, M., Miklau, G., Jensen, D., Towsley, D., Li, C.: Resisting structural re-identification in anonymized social networks. VLDB J. 19(6), 797–823 (2010)
Agrawal, R., Srikant, R.: Privacy-preserving data mining. SIGMOD Rec. (ACM Special Interest Group on Management of Data) 29(2), 439–450 (2000)
Verykios, V., Bertino, E., Fovino, I., Provenza, L., Saygin, Y., Theodoridis, Y.: State-of-the-art in privacy preserving data mining. SIGMOD Rec. 33(1), 50–57 (2004)
Zhou, B., Pei, J.: The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks. Knowl. Inform. Syst. 28(1), 47–77 (2011)
Li, N., Zhang, N., Das, S.K.: Relationship privacy preservation in publishing online social networks. In: PASSAT/SocialCom., pp. 443–450 (oct. 2011)
Fong, P.W., Siahaan, I.: Relationship-based access control policies and their policy languages. In: Proceedings of the 16th ACM Symposium on Access Control Models and Technologies. SACMAT ’11, pp. 51–60. ACM, New York (2011)
Cheek, G.P., Shehab, M.: Policy-by-example for online social networks. In: Proceedings of the 17th ACM Symposium on Access Control Models and Technologies. SACMAT ’12, pp. 23–32. ACM, New York (2012)
Li, N., Chen, G.: Sharing location in online social networks. IEEE Network 24(5), 20–25 (2010)
Backstrom, L., Sun, E., Marlow, C.: Find me if you can: improving geographical prediction with social and spatial proximity. In: Proceedings of the 19th International Conference on World Wide Web. WWW ’10, pp. 61–70. ACM, New York (2010)
Cunningham, S., Masoodian, M., Adams, A.: Privacy issues for online personal photograph collections. J. Theor. Appl. Electron. Commerce Res. 5(2), 26–40 (2010)
Frikken, K., Atallah, M., Li, J.: Attribute-based access control with hidden policies and hidden credentials. IEEE Trans. Comput. 55(10), 1259–1270 (2006)
Bouna, B., Chbeir, R., Marrara, S.: Enforcing role based access control model with multimedia signatures. J. Syst. Architect. 55(4), 264–274 (2009)
Peng, H., Gu, J., Ye, X.: Dynamic purpose-based access control. In: International Symposium on Parallel and Distributed Processing with Applications, 2008. ISPA ’08, pp. 695–700 (2008)
Willinger, W., Rejaie, R., Torkjazi, M., Valafar, M., Maggioni, M.: Research on online social networks: time to face the real challenges. SIGMETRICS Perform. Eval. Rev. 37(3), 49–54 (2010)
Wellman, B.: The school child’s choice of companions. J. Educ. Res. 14(2), 126–132 (1926)
Bott, H.: Observation of play activities in a nursery school. Genet. Psychol. Monogr. 4(1), 44–88 (1928)
Moreno, J.: Who Shall Survive? vol. 58. Nervous and Mental Disease Publishing Company, Washington, DC (1934)
Wellman, B.: Network analysis: Some basic principles. Socio. Theor 1(1), 155–200 (1983)
Barnes, J.A.: Class and committees in a norwegian island parish. Hum. Relat. 7(1), 39–58 (1954)
Luke, D., Harris, J.: Network analysis in public health: History, methods, and applications. Annu. Rev. Publ. Health 28, 69–93 (2007)
Watts, D.: The “new” science of networks. Annu. Rev. Sociol. 30, 243–270 (2004)
Barabási, A.L., Bonabeau, E.: Scale-free networks. Sci. Am. 288(5), 60–69 (2003)
Christley, R., Pinchbeck, G., Bowers, R., Clancy, D., French, N., Bennett, R., Turner, J.: Infection in social networks: using network analysis to identify high-risk individuals. Am. J. Epidemiol. 162(10), 1024–1031 (2005)
Mislove, A., Marcon, M., Gummadi, K.P., Druschel, P., Bhattacharjee, B.: Measurement and analysis of online social networks. In: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement. IMC ’07, pp. 29–42. ACM, New York (2007)
Koschützki, D., Lehmann, K., Peeters, L., Richter, S., Tenfelde-Podehl, D., Zlotowski, O.: Centrality indices. In: Brandes, U., Erlebach, T. (eds.) Network Analysis. Volume 3418 of Lecture Notes in Computer Science, pp. 16–61. Springer, Berlin/Heidelberg (2005)
Freeman, L.: Centrality in social networks conceptual clarification. Soc. Network 1(3), 215–239 (1978)
He, X., Vaidya, J., Shafiq, B., Adam, N., Atluri, V.: Preserving privacy in social networks: A structure-aware approach. In: Web Intelligence and Intelligent Agent Technologies, vol. 1, pp. 647–654 (Sept. 2009)
Campan, A., Truta, T.: Data and structural k-anonymity in social networks. In: Bonchi, F., Ferrari, E., Jiang, W., Malin, B. (eds.) Privacy, Security, and Trust in KDD. Volume 5456 of Lecture Notes in Computer Science, pp. 33–54. Springer, Berlin/Heidelberg (2009)
Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In: Proceedings of the 16th International Conference on World Wide Web. WWW ’07, pp. 181–190. ACM, New York (2007)
Hay, M., Miklau, G., Jensen, D., Weis, P., Srivastava, S.: Anonymizing social networks. Technical report (2007)
Korolova, A., Motwani, R., Nabar, S.U., Xu, Y.: Link privacy in social networks. In: Proceedings of the 17th ACM Conference on Information and Knowledge Management. CIKM ’08, pp. 289–298. ACM, New York (2008)
Zheleva, E., Getoor, L.: Preserving the privacy of sensitive relationships in graph data. In: Bonchi, F., Ferrari, E., Malin, B., Saygin, Y. (eds.) Privacy, Security, and Trust in KDD. Volume 4890 of Lecture Notes in Computer Science, pp. 53–171. Springer, Berlin/Heidelberg (2008)
Wu, X., Kumar, V., Ross, Q., Ghosh, J., Yang, Q., Motoda, H., McLachlan, G., Ng, A., Liu, B., Yu, P., Zhou, Z.H., Steinbach, M., Hand, D., Steinberg, D.: Top 10 algorithms in data mining. Knowl. Inform. Syst. 14(1), 1–37 (2008)
Liu, X., Bollen, J., Nelson, M., Van De Sompel, H.: Co-authorship networks in the digital library research community. Inform. Process. Manag. 41(6), 1462–1480 (2005)
Creamer, G., Stolfo, S.: A link mining algorithm for earnings forecast and trading. Data Min. Knowl. Discov. 18(3), 419–445 (2009)
Li, P., Li, Z., Liu, H., He, J., Du, X.: Using link-based content analysis to measure document similarity effectively. In: Li, Q., Feng, L., Pei, J., Wang, S., Zhou, X., Zhu, Q.M. (eds.) Advances in Data and Web Management. Volume 5446 of Lecture Notes in Computer Science, pp. 455–467. Springer, Berlin/Heidelberg (2009)
Lin, Z., Wang, L., Guo, S.: Recommendations on social network sites: From link mining perspective. In: International Conference on Management and Service Science, 2009. MASS ’09, pp. 1–4 (Sept. 2009)
Karamon, J., Matsuo, Y., Yamamoto, H., Ishizuka, M.: Generating social network features for link-based classification. In: Kok, J., Koronacki, J., Lopez de Mantaras, R., Matwin, S., Mladenic, D., Skowron, A. (eds.) Knowledge Discovery in Databases: PKDD 2007. Volume 4702 of Lecture Notes in Computer Science, pp. 127–139. Springer, Berlin/Heidelberg (2007)
Chakrabarti, S., Dom, B., Indyk, P.: Enhanced hypertext categorization using hyperlinks. SIGMOD Rec. 27(2), 307–318 (1998)
Segal, E., Wang, H., Koller, D.: Discovering molecular pathways from protein interaction and gene expression data. Bioinformatics 19(SUPPL. 1), i264–i272 (2003)
Stattner, E., Vidot, N.: Social network analysis in epidemiology: current trends and perspectives. In: 2011 Fifth International Conference on Research Challenges in Information Science (RCIS), pp. 1–11 (may 2011)
Fard, A., Ester, M.: Collaborative mining in multiple social networks data for criminal group discovery. In: International Conference on Computational Science and Engineering, 2009. CSE ’09, vol. 4, pp. 582–587 (Aug. 2009)
Barbier, G., Liu, H.: Data mining in social media. In: Aggarwal, C.C. (ed.) Social Network Data Analytics, pp. 327–352. Springer, New York (2011)
Bhattacharya, I., Getoor, L.: Iterative record linkage for cleaning and integration. In: Proceedings of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery. DMKD ’04, pp. 11–18. ACM, New York (2004)
Ponzetto, S.P., Strube, M.: Exploiting semantic role labeling, wordnet and wikipedia for coreference resolution. In: Proceedings of the Main Conference on Human Language Technology Conference of the North American Chapter of the Association of Computational Linguistics. HLT-NAACL ’06, pp. 192–199. Association for Computational Linguistics (2006)
Stein, L.: Integrating biological databases. Nat. Rev. Genet. 4(5), 337–345 (2003)
Taskar, B., Wong, M.F., Abbeel, P., Koller, D.: Link prediction in relational data. In: Advances in Neural Information Processing Systems (NIPS). MIT Press, Cambridge, MA (2003)
Huang, Z., Li, X., Chen, H.: Link prediction approach to collaborative filtering. In: Proceedings of the 5th ACM/IEEE-CS Joint Conference on Digital Libraries. JCDL ’05, pp. 141–142. ACM, New York (2005)
Yu, H., Paccanaro, A., Trifonov, V., Gerstein, M.: Predicting interactions in protein networks by completing defective cliques. Bioinformatics 22(7), 823–829 (2006)
Zheleva, E., Getoor, L., Golbeck, J., Kuter, U.: Using friendship ties and family circles for link prediction. Lect. Note Comput. Sci. 5498 LNAI, 97–113 (2009)
Buccafurri, F., Lax, G., Nocera, A., Ursino, D.: Discovering links among social networks. In: Flach, P., Bie, T., Cristianini, N. (eds.) Machine Learning and Knowledge Discovery in Databases. Volume 7524 of Lecture Notes in Computer Science, pp. 467–482. Springer, Berlin/Heidelberg (2012)
Getoor, L.: Link mining: a new data mining challenge. SIGKDD Explor. Newsl. 5(1), 84–89 (2003)
Cheng, H., Lo, D., Zhou, Y., Wang, X., Yan, X.: Identifying bug signatures using discriminative graph mining. In: Proceedings of the Eighteenth International Symposium on Software Testing and Analysis. ISSTA ’09, pp. 141–152. ACM, New York (2009)
Ciriello, G., Guerra, C.: A review on models and algorithms for motif discovery in protein-protein interaction networks. Brief. Funct. Genomic. Proteomic. 7(2), 147–156 (2008)
Borgwardt, K., Ong, C., Schönauer, S., Vishwanathan, S., Smola, A., Kriegel, H.P.: Protein function prediction via graph kernels. Bioinformatics 21(SUPPL. 1), i47–i56 (2005)
Rabelo, J., Prudêncio, R., Barros, F.: Leveraging relationships in social networks for sentiment analysis. In: Proceedings of the 18th Brazilian Symposium on Multimedia and the Web. WebMedia ’12, pp. 181–188. ACM, New York (2012)
Zhou, D., Manavoglu, E., Li, J., Giles, C.L., Zha, H.: Probabilistic models for discovering e-communities. In: Proceedings of the 15th International Conference on World Wide Web. WWW ’06, pp. 173–182. ACM, New York (2006)
Nguyen, C., Mamitsuka, H.: Kernels for link prediction with latent feature models. In: Gunopulos, D., Hofmann, T., Malerba, D., Vazirgiannis, M. (eds.) Machine Learning and Knowledge Discovery in Databases. Volume 6912 of Lecture Notes in Computer Science, pp. 517–532. Springer, Berlin/Heidelberg (2011)
Zhou, B., Pei, J., Luk, W.: A brief survey on anonymization techniques for privacy preserving publishing of social network data. SIGKDD Explor. Newsl. 10(2), 12–22 (2008)
Bakshy, E., Hofman, J.M., Mason, W.A., Watts, D.J.: Everyone’s an influencer: quantifying influence on twitter. In: Proceedings of the Fourth ACM International Conference on Web Search and Data Mining. WSDM ’11, pp. 65–74. ACM, New York (2011)
Chen, W., Wang, C., Wang, Y.: Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD ’10, pp 1029–1038. ACM, New York (2010)
Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD ’03, pp. 137–146. ACM, New York (2003)
National Research Council (US). Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals: Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. National Academies Press (2008)
Adali, S., Sisenda, F., Magdon-Ismail, M.: Actions speak as loud as words: predicting relationships from social behavior data. In: Proceedings of the 21st International Conference on World Wide Web. WWW ’12, pp. 689–698. ACM, New York (2012)
McPherson, M., Smith-Lovin, L., Cook, J.: Birds of a feather: Homophily in social networks. Annu. Rev. Sociol. 27, 415–444 (2001)
Macskassy, S., Provost, F.: Classification in networked data: A toolkit and a univariate case study. J. Mach. Learn. Res. 8, 935–983 (2007)
Mislove, A., Viswanath, B., Gummadi, K.P., Druschel, P.: You are who you know: inferring user profiles in online social networks. In: Proceedings of the Third ACM International Conference on Web Search and Data Mining. WSDM ’10, pp. 251–260. ACM, New York (2010)
Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: Preventing private information inference attacks on social networks. IEEE Trans. Knowl. Data Eng. PP(99), 1 (2012)
Baatarjav, E.A., Phithakkitnukoon, S., Dantu, R.: Group recommendation system for facebook. In: Meersman, R., Tari, Z., Herrero, P. (eds.) On the Move to Meaningful Internet Systems: OTM 2008 Workshops. Volume 5333 of Lecture Notes in Computer Science, pp. 211–219. Springer, Berlin/Heidelberg (2008)
Zheleva, E., Getoor, L.: To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In: Proceedings of the 18th International Conference on World Wide Web. WWW ’09, pp. 531–540. ACM, New York (2009)
Chaabane, A., Acs, G., Kaafar, M.A.: You are what you like! Information leakage through users’ interests. In: Proc. Annual Network and Distributed System Security Symposium (NDSS) (2012)
Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: IEEE 23rd International Conference on Data Engineering, 2007. ICDE 2007, pp. 106–115 (April 2007)
Machanavajjhala, A., Korolova, A., Sarma, A.D.: Personalized social recommendations: accurate or private. Proc. VLDB Endow. 4(7), 440–450 (2011)
Ying, X., Wu, X.: On link privacy in randomizing social networks. Knowl. Inform. Syst. 28, 645–663 (2011)
Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: Social network classification incorporating link type values. In: IEEE International Conference on Intelligence and Security Informatics, 2009. ISI ’09, pp. 19–24 (June 2009)
Donath, J., Boyd, D.: Public displays of connection. BT Tech. J. 22(4), 71–82 (2004)
Gayo-Avello, D.: All liaisons are dangerous when all your friends are known to us. In: Proceedings of the 22nd ACM Conference on Hypertext and Hypermedia. HT 2011, pp. 171–180 (2011)
Kubica, J., Moore, A., Schneider, J., Yang, Y.: Stochastic link and group detection. In: Proceedings of the National Conference on Artificial Intelligence, pp. 798–804 (2002)
Zheleva, E., Sharara, H., Getoor, L.: Co-evolution of social and affiliation networks. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD ’09, pp. 1007–1016. ACM, New York (2009)
Backstrom, L., Leskovec, J.: Supervised random walks: predicting and recommending links in social networks. In: Proceedings of the fourth ACM International Conference on Web Search and Data Mining. WSDM ’11, pp. 635–644. ACM, New York (2011)
Hogg, T., Wilkinson, D., Szabo, G., Brzozowski, M.: Multiple relationship types in online communities and social networks. In: Proceedings of the AAAI Symposium on Social Information Processing, pp. 30–35. AAAI (2008)
Hart, J., Ridley, C., Taher, F., Sas, C., Dix, A.: Exploring the facebook experience: a new approach to usability. In: Proceedings of the 5th Nordic Conference on Human-Computer Interaction: Building Bridges. NordiCHI ’08, pp. 471–474. ACM, New York (2008)
Krishnamurthy, B., Wills, C.E.: Characterizing privacy in online social networks. In: Proceedings of the First Workshop on Online Social Networks. WOSN ’08, pp. 37–42. ACM, New York (2008)
Thelwall, M.: Social network sites: Users and uses. Adv. Comput. 76, 19–73 (2009)
Clemons, E.: The complex problem of monetizing virtual electronic social networks. Decis. Support Syst. 48(1), 46–56 (2009)
Boongoen, T., Shen, Q., Price, C.: Disclosing false identity through hybrid link analysis. Artif. Intell. Law 18(1), 77–102 (2010)
Enamul Kabir, M., Wang, H., Bertino, E.: A conditional purpose-based access control model with dynamic roles. Expert Syst. Appl. 38(3), 1482–1489 (2011)
McNealy, J.: The privacy implications of digital preservation: social media archives and the social networks theory of privacy. Elon Law Rev. 3, 133 (2011)
Fisher, B., Turner, K., Morling, P.: Defining and classifying ecosystem services for decision making. Ecol. Econ. 68(3), 643–653 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Wien
About this chapter
Cite this chapter
Raad, E., Chbeir, R. (2013). Privacy in Online Social Networks. In: Chbeir, R., Al Bouna, B. (eds) Security and Privacy Preserving in Social Networks. Lecture Notes in Social Networks. Springer, Vienna. https://doi.org/10.1007/978-3-7091-0894-9_1
Download citation
DOI: https://doi.org/10.1007/978-3-7091-0894-9_1
Published:
Publisher Name: Springer, Vienna
Print ISBN: 978-3-7091-0893-2
Online ISBN: 978-3-7091-0894-9
eBook Packages: Computer ScienceComputer Science (R0)