Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Who wants to know what when? privacy preference determinants in ubiquitous computing
CHI '03 Extended Abstracts on Human Factors in Computing Systems
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Location disclosure to social relations: why, when, & what people want to share
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Context-aware telephony: privacy preferences and sharing patterns
CSCW '06 Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work
SCAN: a structural clustering algorithm for networks
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
User-controllable learning of security and privacy policies
Proceedings of the 1st ACM workshop on Workshop on AISec
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Who's viewed you?: the impact of feedback in a mobile location-sharing application
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Understanding and capturing people's privacy policies in a mobile social networking application
Personal and Ubiquitous Computing
Eight friends are enough: social graph approximation via public listings
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems
Friends only: examining a privacy-enhancing behavior in facebook
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Networks, Crowds, and Markets: Reasoning About a Highly Connected World
Networks, Crowds, and Markets: Reasoning About a Highly Connected World
Feasibility of structural network clustering for group-based privacy control in social networks
Proceedings of the Sixth Symposium on Usable Privacy and Security
Hide and seek: location sharing practices with social media
Proceedings of the 12th international conference on Human computer interaction with mobile devices and services
Empirical models of privacy in location sharing
Proceedings of the 12th ACM international conference on Ubiquitous computing
SOCIALCOM '10 Proceedings of the 2010 IEEE Second International Conference on Social Computing
Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs
Personal and Ubiquitous Computing
Sharing ephemeral information in online social networks: privacy perceptions and behaviours
INTERACT'11 Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part III
Imagined communities: awareness, information sharing, and privacy on the facebook
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Networking Recon: Network reconnaissance
Network Security
Stalking online: on user privacy in social networks
Proceedings of the second ACM conference on Data and Application Security and Privacy
Fusing Text and Frienships for Location Inference in Online Social Networks
WI-IAT '12 Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Volume 01
Fine-grained sharing of sensed physical activity: a value sensitive approach
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Hi-index | 0.00 |
This paper presents a study that aims to answer two important questions related to targeted location-sharing privacy attacks: (1) given a group of users and their social graph, is it possible to predict which among them is likely to reveal most about their whereabouts, and (2) given a user, is it possible to predict which among her friends knows most about her whereabouts. To answer these questions we analyse the privacy policies of users of a real-time location sharing application, in which users actively shared their location with their contacts. The results show that users who are central to their network are more likely to reveal most about their whereabouts. Furthermore, we show that the friend most likely to know the whereabouts of a specific individual is the one with most common contacts and/or greatest number of contacts.