Characterizing privacy in online social networks
Proceedings of the first workshop on Online social networks
Privacy diffusion on the web: a longitudinal perspective
Proceedings of the 18th international conference on World wide web
SP 800-122. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
SP 800-122. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
A recommendation system for spots in location-based online social networks
Proceedings of the 4th Workshop on Social Network Systems
Exploiting vulnerability to secure user privacy on a social networking site
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Mailbook: privacy-protecting social networking via email
Proceedings of the Third International Conference on Internet Multimedia Computing and Service
A three dimensional sender anonymity metric
International Journal of Security and Networks
Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Social network privacy and trust concerns
Proceedings of the 13th International Conference on Information Integration and Web-based Applications and Services
Proceedings of the Fifth Workshop on Social Network Systems
Proceedings of the First Workshop on Measurement, Privacy, and Mobility
Is more always merrier?: a deep dive into online social footprints
Proceedings of the 2012 ACM workshop on Workshop on online social networks
The shy mayor: private badges in geosocial networks
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Privacy-preserving social plugins
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Private location centric profiles for GeoSocial networks
Proceedings of the 20th International Conference on Advances in Geographic Information Systems
Do online social network friends still threaten my privacy?
Proceedings of the third ACM conference on Data and application security and privacy
Trade-Offs in social and behavioral modeling in mobile networks
SBP'13 Proceedings of the 6th international conference on Social Computing, Behavioral-Cultural Modeling and Prediction
Modeling Social Network Interaction Graphs
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
Structural and Message Based Private Friend Recommendation
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
PROTOSS: A Run Time Tool for Detecting Privacy Violations in Online Social Networks
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
International Journal of Business Information Systems
Toward preserving privacy and functionality in geosocial networks
Proceedings of the 19th annual international conference on Mobile computing & networking
Detecting and predicting privacy violations in online social networks
Distributed and Parallel Databases
Contextual integrity's decision heuristic and the tracking by social network sites
Ethics and Information Technology
Hi-index | 0.00 |
For purposes of this paper, we define "Personally identifiable information" (PII) as information which can be used to distinguish or trace an individual's identity either alone or when combined with other information that is linkable to a specific individual. The popularity of Online Social Networks (OSN) has accelerated the appearance of vast amounts of personal information on the Internet. Our research shows that it is possible for third-parties to link PII, which is leaked via OSNs, with user actions both within OSN sites and elsewhere on non-OSN sites. We refer to this ability to link PII and combine it with other information as "leakage". We have identified multiple ways by which such leakage occurs and discuss measures to prevent it.