Skip to main content

Privacy in Online Social Networks

  • Chapter
  • First Online:
Security and Privacy Preserving in Social Networks

Part of the book series: Lecture Notes in Social Networks ((LNSN))

Abstract

Online social networks have become an important part of the online activities on the web and one of the most influencing media. Unconstrained by physical spaces, online social networks offer to web users new interesting means to communicate, interact, and socialize. While these networks make frequent data sharing and inter-user communications instantly possible, privacy-related issues are their obvious much discussed immediate consequences. Although the notion of privacy may take different forms, the ultimate challenge is how to prevent privacy invasion when much personal information is available. In this context, we address privacy-related issues by resorting to social network analysis and link mining techniques. We first describe the fundamental of social networks, their common representations, and the main motivations associated with their use. Afterwards, we particularly show how privacy attacks can build on social network analysis and link mining techniques to reveal user-sensitive information. The chapter concludes with a discussion of some open challenges to address in future privacy-related works.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    http://www.facebook.com.

  2. 2.

    http://www.linkedin.com.

  3. 3.

    https://plus.google.com/.

  4. 4.

    http://www.twitter.com.

  5. 5.

    http://www.myspace.com/.

  6. 6.

    http://www.flickr.com/.

  7. 7.

    http://www.youtube.com/.

  8. 8.

    https://www.facebook.com/press/info.php?statistics, accessed 01 October 2012.

  9. 9.

    http://www.information-management.com/issues/21_5/big-data-is-scaling-bi-and-analytics-10021093-1.html, accessed 01 October 2012.

  10. 10.

    http://blog.nielsen.com/nielsenwire/social/2012/.

  11. 11.

    http://www.w3.org/MarkUp/2009/rdfa-for-html-authors.

  12. 12.

    http://microformats.org.

  13. 13.

    http://gmpg.org/xfn.

  14. 14.

    http://xmlns.com/foaf/spec.

  15. 15.

    http://www.w3.org/RDF.

  16. 16.

    http://foursquare.com/.

  17. 17.

    https://www.facebook.com/press/info.php?statistics, accessed 01 October 2012.

References

  1. Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove, A.: Analyzing facebook privacy settings: user expectations vs. reality. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference. IMC ’11, pp. 61–70. ACM, New York (2011)

    Google Scholar 

  2. Lipford, H.R., Besmer, A., Watson, J.: Understanding privacy settings in facebook with an audience view. In: Proceedings of the 1st Conference on Usability, Psychology, and Security, USENIX Association Berkeley, CA, USA, pp. 1–8 (2008)

    Google Scholar 

  3. Acquisti, A., Gross, R.: Imagined communities: awareness, information sharing, and privacy on the facebook. In: Danezis, G., Golle, P. (eds.) Privacy Enhancing Technologies. Lecture Notes in Computer Science, Vol. 4258, pp. 36–58. Springer, Berlin/Heidelberg (2006)

    Google Scholar 

  4. Awad, N., Krishnan, M.: The personalization privacy paradox: an empirical evaluation of information transparency and the willingness to be profiled online for personalization. MIS Quarterly 13–28 (2006)

    Google Scholar 

  5. Madejski, M., Johnson, M., Bellovin, S.: A study of privacy settings errors in an online social network. In: 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 340–345 (2012)

    Google Scholar 

  6. Johnson, M., Egelman, S., Bellovin, S.M.: Facebook and privacy: it’s complicated. In: Proceedings of the Eighth Symposium on Usable Privacy and Security. SOUPS ’12, pp. 1–15. ACM, New York (2012)

    Google Scholar 

  7. Besmer, A., Richter Lipford, H.: Moving beyond untagging: photo privacy in a tagged world. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI ’10, pp. 1563–1572. ACM, New York (2010)

    Google Scholar 

  8. Grimmelmann, J.: Saving Facebook. Iowa Law Rev. 94, 1137–1206 (2009)

    Google Scholar 

  9. Zhang, C., Sun, J., Zhu, X., Fang, Y.: Privacy and security for online social networks: challenges and opportunities. IEEE Netw. 24(4), 13–18 (2010)

    Google Scholar 

  10. Viswanath, B., Kiciman, E., Saroiu, S.: Keeping information safe from social networking apps. In: Proceedings of the 2012 ACM Workshop on Workshop on Online Social Networks. WOSN ’12, pp. 49–54. ACM, New York (2012)

    Google Scholar 

  11. Brey, P.: Ethical aspects of information security and privacy. In: Petkovic, M., Jonker, W., Carey, M.J., Ceri, S. (eds.) Security, Privacy, and Trust in Modern Data Management. Data-Centric Systems and Applications, pp. 21–36. Springer, Berlin/Heidelberg (2007)

    Google Scholar 

  12. Zheleva, E., Terzi, E., Getoor, L.: Privacy in social networks. Synth. Lect. Data Min. Knowl. Discov. 3(1), 1–85 (2012)

    Google Scholar 

  13. Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management (August 2010) v0.34

    Google Scholar 

  14. Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications. Cambridge University Press, Cambridge (1994)

    Google Scholar 

  15. Getoor, L., Diehl, C.P.: Link mining: a survey. SIGKDD Explor. Newsl. 7(2), 3–12 (2005)

    Google Scholar 

  16. Broder, A., Kumar, R., Maghoul, F., Raghavan, P., Rajagopalan, S., Stata, R., Tomkins, A., Wiener, J.: Graph structure in the web. Comput. Network 33(1), 309–320 (2000)

    Google Scholar 

  17. Wellman, B.: Computer networks as social networks. Science 293(5537), 2031–2034 (2001)

    Google Scholar 

  18. Ito, T., Chiba, T., Ozawa, R., Yoshida, M., Hattori, M., Sakaki, Y.: A comprehensive two-hybrid analysis to explore the yeast protein interactome. Proc. Natl. Acad. Sci. 98(8), 4569–4574 (2001)

    Google Scholar 

  19. Gomez-Rodriguez, M., Leskovec, J., Krause, A.: Inferring networks of diffusion and influence. ACM Trans. Knowl. Discov. Data 5(4) (2012)

    Google Scholar 

  20. Adamic, L., Buyukkokten, O., Adar, E.: A social network caught in the web. First Monday 8(6) (2003)

    Google Scholar 

  21. Wilson, C., Sala, A., Puttaswamy, K.P.N., Zhao, B.Y.: Beyond social graphs: User interactions in online social networks and their implications. ACM Trans. Web 6(4), 17:1–17:31 (2012)

    Google Scholar 

  22. Faust, K.: Centrality in affiliation networks. Soc. Network 19(2), 157–191 (1997)

    Google Scholar 

  23. Borgatti, S., Mehra, A., Brass, D., Labianca, G.: Network analysis in the social sciences. Science 323(5916), 892–895 (2009)

    Google Scholar 

  24. Matsuo, Y., Mori, J., Hamasaki, M., Nishimura, T., Takeda, H., Hasida, K., Ishizuka, M.: Polyphonet: An advanced social network extraction system from the web. Web Semant. 5(4), 262–278 (2007)

    Google Scholar 

  25. Gilbert, E.: Predicting tie strength in a new medium. In: Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work. CSCW ’12, pp. 1047–1056. ACM, New York (2012)

    Google Scholar 

  26. Haythornthwaite, C.: Social network analysis: An approach and technique for the study of information exchange. Library Inform. Sci. Res. 18(4), 323–342 (1996)

    Google Scholar 

  27. Musial, K., Kazienko, P.: Social networks on the internet. World Wide Web 16(1), 31–72 (2013)

    Google Scholar 

  28. Granovetter, M.S.: The strength of weak ties. Am. J. Sociol. 78(6), 1360–1380 (1973)

    Google Scholar 

  29. Haythornthwaite, C.: Social networks and internet connectivity effects. Inform. Comm. Soc. 8(2), 125–147 (2005)

    Google Scholar 

  30. Wellman, B., Wortley, S.: Different strokes from different folks: community ties and social support. Am. J. Sociol. 96(3), 558–588 (1990)

    Google Scholar 

  31. Bernard, H., Johnsen, E., Killworth, P., McCarty, C., Shelley, G., Robinson, S.: Comparing four different methods for measuring personal social networks. Soc. Network 12(3), 179–215 (1990)

    Google Scholar 

  32. Killworth, P., Johnsen, E., Bernard, H., Ann Shelley, G., McCarty, C.: Estimating the size of personal networks. Soc. Network 12(4), 289–312 (1990)

    Google Scholar 

  33. Steinfield, C., Ellison, N., Lampe, C.: Social capital, self-esteem, and use of online social network sites: A longitudinal analysis. J. Appl. Dev. Psychol. 29(6), 434–445 (2008)

    Google Scholar 

  34. Heidemann, J., Klier, M., Probst, F.: Online social networks: A survey of a global phenomenon. Comput. Network 56(18), 3866–3878 (2012)

    Google Scholar 

  35. Hua, W., Wellman, B.: Social connectivity in america: changes in adult friendship network size from 2002 to 2007. Am. Behav. Sci. 53(8), 1148–1169 (2010)

    Google Scholar 

  36. Dunbar, R.I.M.: Social cognition on the internet: testing constraints on social network size. Phil. Trans. Roy. Soc. B Biol. Sci. 367(1599), 2192–2201 (2012)

    Google Scholar 

  37. Subrahmanyam, K., Reich, S., Waechter, N., Espinoza, G.: Online and offline social networks: Use of social networking sites by emerging adults. J. Appl. Dev. Psychol. 29(6), 420–433 (2008)

    Google Scholar 

  38. Correa, T., Hinsley, A., de Zúñiga, H.: Who interacts on the web? The intersection of users’ personality and social media use. Comput. Hum. Behav. 26(2), 247–253 (2010)

    Google Scholar 

  39. Joinson, A.N.: Looking at, looking up or keeping up with people?: motives and use of facebook. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI ’08, pp. 1027–1036. ACM, New York (2008)

    Google Scholar 

  40. Papacharissi, Z., Mendelson, A.: Toward a new (er) sociability: uses, gratifications and social capital on facebook. Media Perspectives for the 21st Century, pp. 212–230 (2011)

    Google Scholar 

  41. Ryan, T., Xenos, S.: Who uses facebook? an investigation into the relationship between the big five, shyness, narcissism, loneliness, and facebook usage. Comput. Hum. Behav. 27(5), 1658–1664 (2011)

    Google Scholar 

  42. Gentile, B., Twenge, J., Freeman, E., Campbell, W.: The effect of social networking websites on positive self-views: An experimental investigation. Comput. Hum. Behav. 28(5), 1929–1933 (2012)

    Google Scholar 

  43. Nosko, A., Wood, E., Molema, S.: All about me: Disclosure in online social networking profiles: The case of facebook. Comput. Hum. Behav. 26(3), 406–418 (2010)

    Google Scholar 

  44. Krasnova, H., Spiekermann, S., Koroleva, K., Hildebrand, T.: Online social networks: Why we disclose. J. Inform. Tech. 25(2), 109–125 (2010)

    Google Scholar 

  45. Ross, C., Orr, E., Sisic, M., Arseneault, J., Simmering, M., Orr, R.: Personality and motivations associated with facebook use. Comput. Hum. Behav. 25(2), 578–586 (2009)

    Google Scholar 

  46. Morris, M.R., Teevan, J., Panovich, K.: What do people ask their social networks, and why?: a survey study of status message q&a behavior. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI ’10, pp. 1739–1748. ACM, New York (2010)

    Google Scholar 

  47. Lin, K.Y., Lu, H.P.: Why people use social networking sites: An empirical study integrating network externalities and motivation theory. Comput. Hum. Behav. 27(3), 1152–1161 (2011)

    Google Scholar 

  48. Nosko, A., Wood, E., Kenney, M., Archer, K., De Pasquale, D., Molema, S., Zivcakova, L.: Examining priming and gender as a means to reduce risk in a social networking context: Can stories change disclosure and privacy setting use when personal profiles are constructed? Comput. Hum. Behav. 28(6), 2067–2074 (2012)

    Google Scholar 

  49. Sledgianowski, D., Kulviwat, S.: Using social network sites: The effects of playfulness, critical mass and trust in a hedonic context. J. Comput. Inform. Syst. 49(4), 74–83 (2009)

    Google Scholar 

  50. Pempek, T., Yermolayeva, Y., Calvert, S.: College students’ social networking experiences on facebook. J. Appl. Dev. Psychol. 30(3), 227–238 (2009)

    Google Scholar 

  51. Kwon, O., Wen, Y.: An empirical study of the factors affecting social network service use. Comput. Hum. Behav. 26(2), 254–263 (2010)

    Google Scholar 

  52. Adamic, L., Adar, E.: How to search a social network. Soc. Network 27(3), 187–203 (2005)

    Google Scholar 

  53. Boyd, D., Ellison, N.: Social network sites: Definition, history, and scholarship. J. Comput. Mediat. Comm. 13(1), 210–230 (2007)

    Google Scholar 

  54. Schneider, F., Feldmann, A., Krishnamurthy, B., Willinger, W.: Understanding online social network usage from a network perspective. In: Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference. IMC ’09, pp. 35–48. ACM, New York (2009)

    Google Scholar 

  55. Bakshy, E., Rosenn, I., Marlow, C., Adamic, L.: The role of social networks in information diffusion. In: Proceedings of the 21st Annual Conference on World Wide Web. WWW’12, pp. 519–528 (2012)

    Google Scholar 

  56. Ellison, N., Steinfield, C., Lampe, C.: The benefits of facebook “friends:” social capital and college students’ use of online social network sites. J. Comput. Mediat. Comm. 12(4), 1143–1168 (2007)

    Google Scholar 

  57. Raad, E., Chbeir, R., Dipanda, A.: User profile matching in social networks. In: Proceedings - 13th International Conference on Network-Based Information Systems, NBiS 2010, pp. 297–304 (sept. 2010)

    Google Scholar 

  58. Thelwall, M.: Social networks, gender, and friending: An analysis of mySpace member profiles. J. Am. Soc. Inform. Sci. Tech. 59(8), 1321–1330 (2008)

    Google Scholar 

  59. Abel, F., Henze, N., Herder, E., Krause, D.: Interweaving public user profiles on the web. In: Bra, P., Kobsa, A., Chin, D. (eds.) User Modeling, Adaptation, and Personalization. Volume 6075 of Lecture Notes in Computer Science, pp. 16–27. Springer, Berlin/Heidelberg (2010)

    Google Scholar 

  60. Graves, M., Constabaris, A., Brickley, D.: FOAF: connecting people on the semantic web. Cataloging Classification Quarterly 43(3–4), 191–202 (2007)

    Google Scholar 

  61. Cranshaw, J., Toch, E., Hong, J., Kittur, A., Sadeh, N.: Bridging the gap between physical location and online social networks. In: UbiComp’10 - Proceedings of the 2010 ACM Conference on Ubiquitous Computing, pp. 119–128 (2010)

    Google Scholar 

  62. Raad, E., Chbeir, R., Dipanda, A.: Discovering relationship types between users using profiles and shared photos in a social network. Multimed. Tool Appl. 64(1), 141–170 (2013)

    Google Scholar 

  63. Tang, L., Liu, H.: Scalable learning of collective behavior based on sparse social dimensions. In: Proceedings of the 18th ACM Conference on Information and Knowledge Management. CIKM ’09, pp. 1107–1116. ACM, New York (2009)

    Google Scholar 

  64. McAuley, J., Leskovec, J.: Learning to discover social circles in ego networks. Adv. Neural Inform. Process. Syst. 25, 548–556 (2012)

    Google Scholar 

  65. Ellison, N., Steinfield, C., Lampe, C.: Connection strategies: Social capital implications of facebook-enabled communication practices. New Media Soc. 13(6), 873–892 (2011)

    Google Scholar 

  66. Newman, M.: The structure and function of complex networks. SIAM Rev. 45(2), 167–256 (2003)

    MathSciNet  MATH  Google Scholar 

  67. Boccaletti, S., Latora, V., Moreno, Y., Chavez, M., Hwang, D.U.: Complex networks: structure and dynamics. Phys. Rep. 424(4–5), 175–308 (2006)

    MathSciNet  Google Scholar 

  68. Fortunato, S.: Community detection in graphs. Phys. Rep. 486(3–5), 75–174 (2010)

    MathSciNet  Google Scholar 

  69. Brams, S., Mutlu, H., Ramirez, S.: Influence in terrorist networks: From undirected to directed graphs. Stud. Conflict Terrorism 29(7), 703–718 (2006)

    Google Scholar 

  70. Morselli, C., Giguère, C., Petit, K.: The efficiency/security trade-off in criminal networks. Soc. Network 29(1), 143–153 (2007)

    Google Scholar 

  71. Bachi, G., Coscia, M., Monreale, A., Giannotti, F.: Classifying trust/distrust relationships in online social networks. In: Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Confernece on Social Computing (SocialCom), pp. 552–557 (Sept. 2012)

    Google Scholar 

  72. Zhang, T., Chao, H., Tretter, D.: Dynamic estimation of family relations from photos. In: Lee, K.T., Tsai, W.H., Liao, H.Y., Chen, T., Hsieh, J.W., Tseng, C.C. (eds.) Advances in Multimedia Modeling. Volume 6524 of Lecture Notes in Computer Science, pp. 65–76. Springer, Berlin/Heidelberg (2011)

    Google Scholar 

  73. Carminati, B., Ferrari, E., Perego, A.: Enforcing access control in Web-based social networks. ACM Trans. Inf. Syst. Secur. 13(1), 1–38 (2009)

    Google Scholar 

  74. Xiang, R., Neville, J., Rogati, M.: Modeling relationship strength in online social networks. In: Proceedings of the 19th International Conference on World Wide Web. WWW ’10, pp. 981–990. ACM, New York (2010)

    Google Scholar 

  75. Stutzman, F., Kramer-Duffield, J.: Friends only: examining a privacy-enhancing behavior in facebook. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. CHI ’10, pp. 1553–1562. ACM, New York (2010)

    Google Scholar 

  76. Kogovšek, T., Ferligoj, A., Coenders, G., Saris, W.: Estimating the reliability and validity of personal support measures: Full information ML estimation with planned incomplete data. Soc. Network 24(1), 1–20 (2002)

    Google Scholar 

  77. Groves, R.: Survey Errors and Survey Costs, vol. 536. Wiley-Interscience, Hoboken, NJ (2004)

    Google Scholar 

  78. Gonzalez-Bailon, S.: Opening the black box of link formation: Social factors underlying the structure of the web. Soc. Network 31(4), 271–280 (2009)

    Google Scholar 

  79. Tyler, J., Wilkinson, D., Huberman, B.: E-mail as spectroscopy: Automated discovery of community structure within organizations. Inform. Soc. 21(2), 133–141 (2005)

    Google Scholar 

  80. Kautz, H., Selman, B., Shah, M.: Referral web: combining social networks and collaborative filtering. Comm. ACM 40(3), 63–65 (1997)

    Google Scholar 

  81. Mika, P.: Flink: Semantic web technology for the extraction and analysis of social networks. Web Semant. 3(2–3), 211–223 (2005)

    Google Scholar 

  82. Marin, A., Wellman, B.: Social network analysis: An introduction. Handbook Soc. Network Anal. 22(January), 11–25 (2010)

    Google Scholar 

  83. Kwak, H., Lee, C., Park, H., Moon, S.: What is twitter, a social network or a news media? In: Proceedings of the 19th International Conference on World Wide Web. WWW ’10, pp. 591–600. ACM, New York (2010)

    Google Scholar 

  84. Kazienko, P., Musial, K., Kajdanowicz, T.: Multidimensional social network in the social recommender system. IEEE Trans. Syst. Man Cybern. A Syst. Hum. 41(4), 746–759 (2011)

    Google Scholar 

  85. Catanese, S., Meo, P., Ferrara, E., Fiumara, G., Provetti, A.: Extraction and analysis of facebook friendship relations. In Abraham, A. (ed.) Computational Social Networks, pp. 291–324. Springer, London (2012)

    Google Scholar 

  86. Schneier, B.: A taxonomy of social networking data. IEEE Secur. Privacy 8(4), 88 (2010)

    Google Scholar 

  87. Diesner, J., Frantz, T., Carley, K.: Communication networks from the enron email corpus “it’s always about the people. enron is no different”. Comput. Math. Organ. Theor 11(3), 201–228 (2005)

    Google Scholar 

  88. Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data. SIGMOD ’08, pp. 93–106. ACM, New York (2008)

    Google Scholar 

  89. Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 173–187 (may 2009)

    Google Scholar 

  90. Hay, M., Miklau, G., Jensen, D., Towsley, D., Li, C.: Resisting structural re-identification in anonymized social networks. VLDB J. 19(6), 797–823 (2010)

    Google Scholar 

  91. Agrawal, R., Srikant, R.: Privacy-preserving data mining. SIGMOD Rec. (ACM Special Interest Group on Management of Data) 29(2), 439–450 (2000)

    Google Scholar 

  92. Verykios, V., Bertino, E., Fovino, I., Provenza, L., Saygin, Y., Theodoridis, Y.: State-of-the-art in privacy preserving data mining. SIGMOD Rec. 33(1), 50–57 (2004)

    Google Scholar 

  93. Zhou, B., Pei, J.: The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks. Knowl. Inform. Syst. 28(1), 47–77 (2011)

    MathSciNet  Google Scholar 

  94. Li, N., Zhang, N., Das, S.K.: Relationship privacy preservation in publishing online social networks. In: PASSAT/SocialCom., pp. 443–450 (oct. 2011)

    Google Scholar 

  95. Fong, P.W., Siahaan, I.: Relationship-based access control policies and their policy languages. In: Proceedings of the 16th ACM Symposium on Access Control Models and Technologies. SACMAT ’11, pp. 51–60. ACM, New York (2011)

    Google Scholar 

  96. Cheek, G.P., Shehab, M.: Policy-by-example for online social networks. In: Proceedings of the 17th ACM Symposium on Access Control Models and Technologies. SACMAT ’12, pp. 23–32. ACM, New York (2012)

    Google Scholar 

  97. Li, N., Chen, G.: Sharing location in online social networks. IEEE Network 24(5), 20–25 (2010)

    Google Scholar 

  98. Backstrom, L., Sun, E., Marlow, C.: Find me if you can: improving geographical prediction with social and spatial proximity. In: Proceedings of the 19th International Conference on World Wide Web. WWW ’10, pp. 61–70. ACM, New York (2010)

    Google Scholar 

  99. Cunningham, S., Masoodian, M., Adams, A.: Privacy issues for online personal photograph collections. J. Theor. Appl. Electron. Commerce Res. 5(2), 26–40 (2010)

    Google Scholar 

  100. Frikken, K., Atallah, M., Li, J.: Attribute-based access control with hidden policies and hidden credentials. IEEE Trans. Comput. 55(10), 1259–1270 (2006)

    Google Scholar 

  101. Bouna, B., Chbeir, R., Marrara, S.: Enforcing role based access control model with multimedia signatures. J. Syst. Architect. 55(4), 264–274 (2009)

    Google Scholar 

  102. Peng, H., Gu, J., Ye, X.: Dynamic purpose-based access control. In: International Symposium on Parallel and Distributed Processing with Applications, 2008. ISPA ’08, pp. 695–700 (2008)

    Google Scholar 

  103. Willinger, W., Rejaie, R., Torkjazi, M., Valafar, M., Maggioni, M.: Research on online social networks: time to face the real challenges. SIGMETRICS Perform. Eval. Rev. 37(3), 49–54 (2010)

    Google Scholar 

  104. Wellman, B.: The school child’s choice of companions. J. Educ. Res. 14(2), 126–132 (1926)

    Google Scholar 

  105. Bott, H.: Observation of play activities in a nursery school. Genet. Psychol. Monogr. 4(1), 44–88 (1928)

    Google Scholar 

  106. Moreno, J.: Who Shall Survive? vol. 58. Nervous and Mental Disease Publishing Company, Washington, DC (1934)

    Google Scholar 

  107. Wellman, B.: Network analysis: Some basic principles. Socio. Theor 1(1), 155–200 (1983)

    Google Scholar 

  108. Barnes, J.A.: Class and committees in a norwegian island parish. Hum. Relat. 7(1), 39–58 (1954)

    Google Scholar 

  109. Luke, D., Harris, J.: Network analysis in public health: History, methods, and applications. Annu. Rev. Publ. Health 28, 69–93 (2007)

    Google Scholar 

  110. Watts, D.: The “new” science of networks. Annu. Rev. Sociol. 30, 243–270 (2004)

    Google Scholar 

  111. Barabási, A.L., Bonabeau, E.: Scale-free networks. Sci. Am. 288(5), 60–69 (2003)

    Google Scholar 

  112. Christley, R., Pinchbeck, G., Bowers, R., Clancy, D., French, N., Bennett, R., Turner, J.: Infection in social networks: using network analysis to identify high-risk individuals. Am. J. Epidemiol. 162(10), 1024–1031 (2005)

    Google Scholar 

  113. Mislove, A., Marcon, M., Gummadi, K.P., Druschel, P., Bhattacharjee, B.: Measurement and analysis of online social networks. In: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement. IMC ’07, pp. 29–42. ACM, New York (2007)

    Google Scholar 

  114. Koschützki, D., Lehmann, K., Peeters, L., Richter, S., Tenfelde-Podehl, D., Zlotowski, O.: Centrality indices. In: Brandes, U., Erlebach, T. (eds.) Network Analysis. Volume 3418 of Lecture Notes in Computer Science, pp. 16–61. Springer, Berlin/Heidelberg (2005)

    Google Scholar 

  115. Freeman, L.: Centrality in social networks conceptual clarification. Soc. Network 1(3), 215–239 (1978)

    MathSciNet  Google Scholar 

  116. He, X., Vaidya, J., Shafiq, B., Adam, N., Atluri, V.: Preserving privacy in social networks: A structure-aware approach. In: Web Intelligence and Intelligent Agent Technologies, vol. 1, pp. 647–654 (Sept. 2009)

    Google Scholar 

  117. Campan, A., Truta, T.: Data and structural k-anonymity in social networks. In: Bonchi, F., Ferrari, E., Jiang, W., Malin, B. (eds.) Privacy, Security, and Trust in KDD. Volume 5456 of Lecture Notes in Computer Science, pp. 33–54. Springer, Berlin/Heidelberg (2009)

    Google Scholar 

  118. Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In: Proceedings of the 16th International Conference on World Wide Web. WWW ’07, pp. 181–190. ACM, New York (2007)

    Google Scholar 

  119. Hay, M., Miklau, G., Jensen, D., Weis, P., Srivastava, S.: Anonymizing social networks. Technical report (2007)

    Google Scholar 

  120. Korolova, A., Motwani, R., Nabar, S.U., Xu, Y.: Link privacy in social networks. In: Proceedings of the 17th ACM Conference on Information and Knowledge Management. CIKM ’08, pp. 289–298. ACM, New York (2008)

    Google Scholar 

  121. Zheleva, E., Getoor, L.: Preserving the privacy of sensitive relationships in graph data. In: Bonchi, F., Ferrari, E., Malin, B., Saygin, Y. (eds.) Privacy, Security, and Trust in KDD. Volume 4890 of Lecture Notes in Computer Science, pp. 53–171. Springer, Berlin/Heidelberg (2008)

    Google Scholar 

  122. Wu, X., Kumar, V., Ross, Q., Ghosh, J., Yang, Q., Motoda, H., McLachlan, G., Ng, A., Liu, B., Yu, P., Zhou, Z.H., Steinbach, M., Hand, D., Steinberg, D.: Top 10 algorithms in data mining. Knowl. Inform. Syst. 14(1), 1–37 (2008)

    Google Scholar 

  123. Liu, X., Bollen, J., Nelson, M., Van De Sompel, H.: Co-authorship networks in the digital library research community. Inform. Process. Manag. 41(6), 1462–1480 (2005)

    Google Scholar 

  124. Creamer, G., Stolfo, S.: A link mining algorithm for earnings forecast and trading. Data Min. Knowl. Discov. 18(3), 419–445 (2009)

    MathSciNet  Google Scholar 

  125. Li, P., Li, Z., Liu, H., He, J., Du, X.: Using link-based content analysis to measure document similarity effectively. In: Li, Q., Feng, L., Pei, J., Wang, S., Zhou, X., Zhu, Q.M. (eds.) Advances in Data and Web Management. Volume 5446 of Lecture Notes in Computer Science, pp. 455–467. Springer, Berlin/Heidelberg (2009)

    Google Scholar 

  126. Lin, Z., Wang, L., Guo, S.: Recommendations on social network sites: From link mining perspective. In: International Conference on Management and Service Science, 2009. MASS ’09, pp. 1–4 (Sept. 2009)

    Google Scholar 

  127. Karamon, J., Matsuo, Y., Yamamoto, H., Ishizuka, M.: Generating social network features for link-based classification. In: Kok, J., Koronacki, J., Lopez de Mantaras, R., Matwin, S., Mladenic, D., Skowron, A. (eds.) Knowledge Discovery in Databases: PKDD 2007. Volume 4702 of Lecture Notes in Computer Science, pp. 127–139. Springer, Berlin/Heidelberg (2007)

    Google Scholar 

  128. Chakrabarti, S., Dom, B., Indyk, P.: Enhanced hypertext categorization using hyperlinks. SIGMOD Rec. 27(2), 307–318 (1998)

    Google Scholar 

  129. Segal, E., Wang, H., Koller, D.: Discovering molecular pathways from protein interaction and gene expression data. Bioinformatics 19(SUPPL. 1), i264–i272 (2003)

    Google Scholar 

  130. Stattner, E., Vidot, N.: Social network analysis in epidemiology: current trends and perspectives. In: 2011 Fifth International Conference on Research Challenges in Information Science (RCIS), pp. 1–11 (may 2011)

    Google Scholar 

  131. Fard, A., Ester, M.: Collaborative mining in multiple social networks data for criminal group discovery. In: International Conference on Computational Science and Engineering, 2009. CSE ’09, vol. 4, pp. 582–587 (Aug. 2009)

    Google Scholar 

  132. Barbier, G., Liu, H.: Data mining in social media. In: Aggarwal, C.C. (ed.) Social Network Data Analytics, pp. 327–352. Springer, New York (2011)

    Google Scholar 

  133. Bhattacharya, I., Getoor, L.: Iterative record linkage for cleaning and integration. In: Proceedings of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery. DMKD ’04, pp. 11–18. ACM, New York (2004)

    Google Scholar 

  134. Ponzetto, S.P., Strube, M.: Exploiting semantic role labeling, wordnet and wikipedia for coreference resolution. In: Proceedings of the Main Conference on Human Language Technology Conference of the North American Chapter of the Association of Computational Linguistics. HLT-NAACL ’06, pp. 192–199. Association for Computational Linguistics (2006)

    Google Scholar 

  135. Stein, L.: Integrating biological databases. Nat. Rev. Genet. 4(5), 337–345 (2003)

    Google Scholar 

  136. Taskar, B., Wong, M.F., Abbeel, P., Koller, D.: Link prediction in relational data. In: Advances in Neural Information Processing Systems (NIPS). MIT Press, Cambridge, MA (2003)

    Google Scholar 

  137. Huang, Z., Li, X., Chen, H.: Link prediction approach to collaborative filtering. In: Proceedings of the 5th ACM/IEEE-CS Joint Conference on Digital Libraries. JCDL ’05, pp. 141–142. ACM, New York (2005)

    Google Scholar 

  138. Yu, H., Paccanaro, A., Trifonov, V., Gerstein, M.: Predicting interactions in protein networks by completing defective cliques. Bioinformatics 22(7), 823–829 (2006)

    Google Scholar 

  139. Zheleva, E., Getoor, L., Golbeck, J., Kuter, U.: Using friendship ties and family circles for link prediction. Lect. Note Comput. Sci. 5498 LNAI, 97–113 (2009)

    Google Scholar 

  140. Buccafurri, F., Lax, G., Nocera, A., Ursino, D.: Discovering links among social networks. In: Flach, P., Bie, T., Cristianini, N. (eds.) Machine Learning and Knowledge Discovery in Databases. Volume 7524 of Lecture Notes in Computer Science, pp. 467–482. Springer, Berlin/Heidelberg (2012)

    Google Scholar 

  141. Getoor, L.: Link mining: a new data mining challenge. SIGKDD Explor. Newsl. 5(1), 84–89 (2003)

    MathSciNet  Google Scholar 

  142. Cheng, H., Lo, D., Zhou, Y., Wang, X., Yan, X.: Identifying bug signatures using discriminative graph mining. In: Proceedings of the Eighteenth International Symposium on Software Testing and Analysis. ISSTA ’09, pp. 141–152. ACM, New York (2009)

    Google Scholar 

  143. Ciriello, G., Guerra, C.: A review on models and algorithms for motif discovery in protein-protein interaction networks. Brief. Funct. Genomic. Proteomic. 7(2), 147–156 (2008)

    Google Scholar 

  144. Borgwardt, K., Ong, C., Schönauer, S., Vishwanathan, S., Smola, A., Kriegel, H.P.: Protein function prediction via graph kernels. Bioinformatics 21(SUPPL. 1), i47–i56 (2005)

    Google Scholar 

  145. Rabelo, J., Prudêncio, R., Barros, F.: Leveraging relationships in social networks for sentiment analysis. In: Proceedings of the 18th Brazilian Symposium on Multimedia and the Web. WebMedia ’12, pp. 181–188. ACM, New York (2012)

    Google Scholar 

  146. Zhou, D., Manavoglu, E., Li, J., Giles, C.L., Zha, H.: Probabilistic models for discovering e-communities. In: Proceedings of the 15th International Conference on World Wide Web. WWW ’06, pp. 173–182. ACM, New York (2006)

    Google Scholar 

  147. Nguyen, C., Mamitsuka, H.: Kernels for link prediction with latent feature models. In: Gunopulos, D., Hofmann, T., Malerba, D., Vazirgiannis, M. (eds.) Machine Learning and Knowledge Discovery in Databases. Volume 6912 of Lecture Notes in Computer Science, pp. 517–532. Springer, Berlin/Heidelberg (2011)

    Google Scholar 

  148. Zhou, B., Pei, J., Luk, W.: A brief survey on anonymization techniques for privacy preserving publishing of social network data. SIGKDD Explor. Newsl. 10(2), 12–22 (2008)

    Google Scholar 

  149. Bakshy, E., Hofman, J.M., Mason, W.A., Watts, D.J.: Everyone’s an influencer: quantifying influence on twitter. In: Proceedings of the Fourth ACM International Conference on Web Search and Data Mining. WSDM ’11, pp. 65–74. ACM, New York (2011)

    Google Scholar 

  150. Chen, W., Wang, C., Wang, Y.: Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD ’10, pp 1029–1038. ACM, New York (2010)

    Google Scholar 

  151. Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD ’03, pp. 137–146. ACM, New York (2003)

    Google Scholar 

  152. National Research Council (US). Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention and Other National Goals: Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment. National Academies Press (2008)

    Google Scholar 

  153. Adali, S., Sisenda, F., Magdon-Ismail, M.: Actions speak as loud as words: predicting relationships from social behavior data. In: Proceedings of the 21st International Conference on World Wide Web. WWW ’12, pp. 689–698. ACM, New York (2012)

    Google Scholar 

  154. McPherson, M., Smith-Lovin, L., Cook, J.: Birds of a feather: Homophily in social networks. Annu. Rev. Sociol. 27, 415–444 (2001)

    Google Scholar 

  155. Macskassy, S., Provost, F.: Classification in networked data: A toolkit and a univariate case study. J. Mach. Learn. Res. 8, 935–983 (2007)

    Google Scholar 

  156. Mislove, A., Viswanath, B., Gummadi, K.P., Druschel, P.: You are who you know: inferring user profiles in online social networks. In: Proceedings of the Third ACM International Conference on Web Search and Data Mining. WSDM ’10, pp. 251–260. ACM, New York (2010)

    Google Scholar 

  157. Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: Preventing private information inference attacks on social networks. IEEE Trans. Knowl. Data Eng. PP(99), 1 (2012)

    Google Scholar 

  158. Baatarjav, E.A., Phithakkitnukoon, S., Dantu, R.: Group recommendation system for facebook. In: Meersman, R., Tari, Z., Herrero, P. (eds.) On the Move to Meaningful Internet Systems: OTM 2008 Workshops. Volume 5333 of Lecture Notes in Computer Science, pp. 211–219. Springer, Berlin/Heidelberg (2008)

    Google Scholar 

  159. Zheleva, E., Getoor, L.: To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In: Proceedings of the 18th International Conference on World Wide Web. WWW ’09, pp. 531–540. ACM, New York (2009)

    Google Scholar 

  160. Chaabane, A., Acs, G., Kaafar, M.A.: You are what you like! Information leakage through users’ interests. In: Proc. Annual Network and Distributed System Security Symposium (NDSS) (2012)

    Google Scholar 

  161. Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: IEEE 23rd International Conference on Data Engineering, 2007. ICDE 2007, pp. 106–115 (April 2007)

    Google Scholar 

  162. Machanavajjhala, A., Korolova, A., Sarma, A.D.: Personalized social recommendations: accurate or private. Proc. VLDB Endow. 4(7), 440–450 (2011)

    Google Scholar 

  163. Ying, X., Wu, X.: On link privacy in randomizing social networks. Knowl. Inform. Syst. 28, 645–663 (2011)

    Google Scholar 

  164. Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: Social network classification incorporating link type values. In: IEEE International Conference on Intelligence and Security Informatics, 2009. ISI ’09, pp. 19–24 (June 2009)

    Google Scholar 

  165. Donath, J., Boyd, D.: Public displays of connection. BT Tech. J. 22(4), 71–82 (2004)

    Google Scholar 

  166. Gayo-Avello, D.: All liaisons are dangerous when all your friends are known to us. In: Proceedings of the 22nd ACM Conference on Hypertext and Hypermedia. HT 2011, pp. 171–180 (2011)

    Google Scholar 

  167. Kubica, J., Moore, A., Schneider, J., Yang, Y.: Stochastic link and group detection. In: Proceedings of the National Conference on Artificial Intelligence, pp. 798–804 (2002)

    Google Scholar 

  168. Zheleva, E., Sharara, H., Getoor, L.: Co-evolution of social and affiliation networks. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD ’09, pp. 1007–1016. ACM, New York (2009)

    Google Scholar 

  169. Backstrom, L., Leskovec, J.: Supervised random walks: predicting and recommending links in social networks. In: Proceedings of the fourth ACM International Conference on Web Search and Data Mining. WSDM ’11, pp. 635–644. ACM, New York (2011)

    Google Scholar 

  170. Hogg, T., Wilkinson, D., Szabo, G., Brzozowski, M.: Multiple relationship types in online communities and social networks. In: Proceedings of the AAAI Symposium on Social Information Processing, pp. 30–35. AAAI (2008)

    Google Scholar 

  171. Hart, J., Ridley, C., Taher, F., Sas, C., Dix, A.: Exploring the facebook experience: a new approach to usability. In: Proceedings of the 5th Nordic Conference on Human-Computer Interaction: Building Bridges. NordiCHI ’08, pp. 471–474. ACM, New York (2008)

    Google Scholar 

  172. Krishnamurthy, B., Wills, C.E.: Characterizing privacy in online social networks. In: Proceedings of the First Workshop on Online Social Networks. WOSN ’08, pp. 37–42. ACM, New York (2008)

    Google Scholar 

  173. Thelwall, M.: Social network sites: Users and uses. Adv. Comput. 76, 19–73 (2009)

    Google Scholar 

  174. Clemons, E.: The complex problem of monetizing virtual electronic social networks. Decis. Support Syst. 48(1), 46–56 (2009)

    Google Scholar 

  175. Boongoen, T., Shen, Q., Price, C.: Disclosing false identity through hybrid link analysis. Artif. Intell. Law 18(1), 77–102 (2010)

    Google Scholar 

  176. Enamul Kabir, M., Wang, H., Bertino, E.: A conditional purpose-based access control model with dynamic roles. Expert Syst. Appl. 38(3), 1482–1489 (2011)

    Google Scholar 

  177. McNealy, J.: The privacy implications of digital preservation: social media archives and the social networks theory of privacy. Elon Law Rev. 3, 133 (2011)

    Google Scholar 

  178. Fisher, B., Turner, K., Morling, P.: Defining and classifying ecosystem services for decision making. Ecol. Econ. 68(3), 643–653 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Elie Raad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Wien

About this chapter

Cite this chapter

Raad, E., Chbeir, R. (2013). Privacy in Online Social Networks. In: Chbeir, R., Al Bouna, B. (eds) Security and Privacy Preserving in Social Networks. Lecture Notes in Social Networks. Springer, Vienna. https://doi.org/10.1007/978-3-7091-0894-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-7091-0894-9_1

  • Published:

  • Publisher Name: Springer, Vienna

  • Print ISBN: 978-3-7091-0893-2

  • Online ISBN: 978-3-7091-0894-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics