Semantic-integration research in the database community
AI Magazine - Special issue on semantic integration
Correlating user profiles from multiple folksonomies
Proceedings of the nineteenth ACM conference on Hypertext and hypermedia
Proceedings of the 18th international conference on World wide web
Detecting spammers and content promoters in online video social networks
Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval
On the leakage of personally identifiable information via online social networks
Proceedings of the 2nd ACM workshop on Online social networks
De-anonymizing Social Networks
SP '09 Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
Linking social networks on the web with FOAF: a semantic web case study
AAAI'08 Proceedings of the 23rd national conference on Artificial intelligence - Volume 2
Large Online Social Footprints--An Emerging Threat
CSE '09 Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 03
I seek you: searching and matching individuals in social networks
Proceedings of the eleventh international workshop on Web information and data management
The credibility of digital identity information on the social web: a user study
Proceedings of the 4th workshop on Information credibility
@spam: the underground on 140 characters or less
Proceedings of the 17th ACM conference on Computer and communications security
User Profile Matching in Social Networks
NBIS '10 Proceedings of the 2010 13th International Conference on Network-Based Information Systems
Who is tweeting on Twitter: human, bot, or cyborg?
Proceedings of the 26th Annual Computer Security Applications Conference
How unique and traceable are usernames?
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Is more always merrier?: a deep dive into online social footprints
Proceedings of the 2012 ACM workshop on Workshop on online social networks
Social networks profile mapping using games
WebApps'12 Proceedings of the 3rd USENIX conference on Web Application Development
WhACKY! - What anyone could know about you from Twitter
PST '12 Proceedings of the 2012 Tenth Annual International Conference on Privacy, Security and Trust (PST)
Studying User Footprints in Different Online Social Networks
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
Hi-index | 0.00 |
An online user joins multiple social networks in order to enjoy different services. On each joined social network, she creates an identity and constitutes its three major dimensions namely profile, content and connection network. She largely governs her identity formulation on any social network and therefore can manipulate multiple aspects of it. With no global identifier to mark her presence uniquely in the online domain, her online identities remain unlinked, isolated and difficult to search. Literature has proposed identity search methods on the basis of profile attributes, but has left the other identity dimensions e.g. content and network, unexplored. In this work, we introduce two novel identity search algorithms based on content and network attributes and improve on traditional identity search algorithm based on profile attributes of a user. We apply proposed identity search algorithms to find a user's identity on Facebook, given her identity on Twitter. We report that a combination of proposed identity search algorithms found Facebook identity for 39% of Twitter users searched while traditional method based on profile attributes found Facebook identity for only 27.4%. Each proposed identity search algorithm access publicly accessible attributes of a user on any social network. We deploy an identity resolution system, Finding Nemo, which uses proposed identity search methods to find a Twitter user's identity on Facebook. We conclude that inclusion of more than one identity search algorithm, each exploiting distinct dimensional attributes of an identity, helps in improving the accuracy of an identity resolution process.