The small-world phenomenon: an algorithmic perspective
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
Communications of the ACM
Involuntary Information Leakage in Social Network Services
IWSEC '08 Proceedings of the 3rd International Workshop on Security: Advances in Information and Computer Security
On Protecting Private Information in Social Networks: A Proposal
ICDE '09 Proceedings of the 2009 IEEE International Conference on Data Engineering
On the leakage of personally identifiable information via online social networks
Proceedings of the 2nd ACM workshop on Online social networks
De-anonymizing Social Networks
SP '09 Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
Modeling relationship strength in online social networks
Proceedings of the 19th international conference on World wide web
Changes in adolescent online social networking behaviors from 2006 to 2009
Computers in Human Behavior
Abusing social networks for automated user profiling
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Algorithms for Data Retrieval from Online Social Network Graphs
CIT '10 Proceedings of the 2010 10th IEEE International Conference on Computer and Information Technology
Measuring message propagation and social influence on Twitter.com
SocInfo'10 Proceedings of the Second international conference on Social informatics
Hi-index | 0.00 |
Online social network (OSN) usage has led to personal details being presented on online profiles readily. This can cause profile owners to be vulnerable to social engineering attacks. Our approach to quantifying vulnerability consists of a model with three components: individual, relative and absolute vulnerabilities. The individual vulnerability is calculated by allocating weights to profile attribute values disclosed which may contribute towards the personal vulnerability of the profile owner. The relative vulnerability is the collective vulnerability of the profiles' friends. The absolute vulnerability is the overall vulnerability for the profile which considers the individual and relative vulnerabilities. This paper extends research done on axioms based on the vulnerability model, by stating propositions to explore the effects of different operators on the profiles relative and absolute vulnerabilities. The case studies show that our approach offers a formal background for estimating how attributes and operator changes influence the individual, relative and absolute vulnerability of OSN profiles.