Software agents
Proceedings of the 11th international conference on World Wide Web
Introduction to Multiagent Systems
Introduction to Multiagent Systems
Information revelation and privacy in online social networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Developing Multi-Agent Systems with JADE (Wiley Series in Agent Technology)
Developing Multi-Agent Systems with JADE (Wiley Series in Agent Technology)
Parallel crawling for online social networks
Proceedings of the 16th international conference on World Wide Web
Examining privacy and disclosure in a social networking community
Proceedings of the 3rd symposium on Usable privacy and security
Who's really in your top 8: network security in the age of social networking
Proceedings of the 35th annual ACM SIGUCCS fall conference
Measurement and analysis of online social networks
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Involuntary Information Leakage in Social Network Services
IWSEC '08 Proceedings of the 3rd International Workshop on Security: Advances in Information and Computer Security
On the leakage of personally identifiable information via online social networks
Proceedings of the 2nd ACM workshop on Online social networks
On the evolution of user interaction in Facebook
Proceedings of the 2nd ACM workshop on Online social networks
Prying Data out of a Social Network
ASONAM '09 Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining
APWEB '10 Proceedings of the 2010 12th International Asia-Pacific Web Conference
Changes in adolescent online social networking behaviors from 2006 to 2009
Computers in Human Behavior
Algorithms for Data Retrieval from Online Social Network Graphs
CIT '10 Proceedings of the 2010 10th IEEE International Conference on Computer and Information Technology
Multi agent system for historical information retrieval from online social networks
KES-AMSTA'11 Proceedings of the 5th KES international conference on Agent and multi-agent systems: technologies and applications
KES-AMSTA'11 Proceedings of the 5th KES international conference on Agent and multi-agent systems: technologies and applications
Imagined communities: awareness, information sharing, and privacy on the facebook
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
SP 800-122. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
SP 800-122. Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
Hi-index | 0.00 |
Nowadays, we witness a flood of continuously changing information from a variety of web sources. New challenges to track information changes in real time require new methods in web information retrieval using multi agent system (MAS) technology. This research continues previous work on extracting data from online social networks (OSNs) by using an agent in each user profile to monitor its updates, which are sent to a controller agent that saves a history of each user's activity in a local repository, as well as applying a vulnerability measure to users' profiles. An algorithm making use of MAS within the online social network retrieval system (OSNRS) is proposed. Our experiments on data extraction show that using MAS simplifies the process of tracking profile's history and opens the opportunity of understanding the dynamic behaviour of OSN users especially when it is combined with text mining. The application of the vulnerability measure over time highlighted that in the case of this experiment the structure of the node's network, rather than the contents of the node, changed over time. The validation of the vulnerability measure showed that friends of a profile, that disclose their personal details online, may not leak personal details about the profile.