Characterizing privacy in online social networks
Proceedings of the first workshop on Online social networks
Privacy diffusion on the web: a longitudinal perspective
Proceedings of the 18th international conference on World wide web
Lockr: better privacy for social networks
Proceedings of the 5th international conference on Emerging networking experiments and technologies
Proceedings of the 2010 ICSE Workshop on Software Engineering in Health Care
Multiscale not multicore: efficient heterogeneous cloud computing
Proceedings of the 2010 ACM-BCS Visions of Computer Science Conference
WOSN'10 Proceedings of the 3rd conference on Online social networks
Privacy leakage in mobile online social networks
WOSN'10 Proceedings of the 3rd conference on Online social networks
Using social networks to harvest email addresses
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
User's privacy in applications provided through social networks
Proceedings of second ACM SIGMM workshop on Social media
Challenges in measuring online advertising systems
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
I know what you will do next summer
ACM SIGCOMM Computer Communication Review
Is content publishing in BitTorrent altruistic or profit-driven?
Proceedings of the 6th International COnference
Re-Socializing Online Social Networks
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Auctions in do-not-track compliant internet advertising
Proceedings of the 18th ACM conference on Computer and communications security
Analyzing facebook privacy settings: user expectations vs. reality
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
LotusNet: Tunable privacy for distributed online social network services
Computer Communications
For sale : your data: by : you
Proceedings of the 10th ACM Workshop on Hot Topics in Networks
Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Stalking online: on user privacy in social networks
Proceedings of the second ACM conference on Data and Application Security and Privacy
The privacy in the time of the internet: secrecy vs transparency
Proceedings of the second ACM conference on Data and Application Security and Privacy
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Third-party applications' data practices on facebook
CHI '12 Extended Abstracts on Human Factors in Computing Systems
Detecting and defending against third-party tracking on the web
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Towards statistical queries over distributed private user data
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
A vulnerability evaluation framework for online social network profiles: axioms and propositions
International Journal of Internet Technology and Secured Transactions
The shy mayor: private badges in geosocial networks
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Understanding what they do with what they know
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
Analysis of vulnerability to facebook users
Proceedings of the 18th Brazilian symposium on Multimedia and the web
Beyond friendship: modeling user activity graphs on social network-based gifting applications
Proceedings of the 2012 ACM conference on Internet measurement conference
Enabling private conversations on Twitter
Proceedings of the 28th Annual Computer Security Applications Conference
Multi agent system approach for vulnerability analysis of online social network profiles over time
International Journal of Knowledge and Web Intelligence
An online experiment of privacy authorization dialogues for social applications
Proceedings of the 2013 conference on Computer supported cooperative work
On the linkability of complementary information from free versions of people databases
ACM SIGMETRICS Performance Evaluation Review
Mosaic: quantifying privacy leakage in mobile networks
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
@i seek 'fb.me': identifying users across multiple online social networks
Proceedings of the 22nd international conference on World Wide Web companion
Proceedings of the Ninth Symposium on Usable Privacy and Security
Appinspect: large-scale evaluation of social networking apps
Proceedings of the first ACM conference on Online social networks
Personally identifiable information leakage through online social networks
Proceedings of the South African Institute for Computer Scientists and Information Technologists Conference
A case of collusion: a study of the interface between ad libraries and their apps
Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices
Mining groups of common interest: discovering topical communities with network flows
MLDM'13 Proceedings of the 9th international conference on Machine Learning and Data Mining in Pattern Recognition
Peeking into the invitation-based adoption process of OSN-based applications
ACM SIGCOMM Computer Communication Review
Stranger danger: exploring the ecosystem of ad-based URL shortening services
Proceedings of the 23rd international conference on World wide web
Unveiling the incentives for content publishing in popular BitTorrent portals
IEEE/ACM Transactions on Networking (TON)
Hi-index | 0.00 |
For purposes of this paper, we define "Personally identifiable information" (PII) as information which can be used to distinguish or trace an individual's identity either alone or when combined with other information that is linkable to a specific individual. The popularity of Online Social Networks (OSN) has accelerated the appearance of vast amounts of personal information on the Internet. Our research shows that it is possible for third-parties to link PII, which is leaked via OSNs, with user actions both within OSN sites and else-where on non-OSN sites. We refer to this ability to link PII and combine it with other information as "leakage". We have identified multiple ways by which such leakage occurs and discuss measures to prevent it.