A guided tour to approximate string matching
ACM Computing Surveys (CSUR)
Reference reconciliation in complex information spaces
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Duplicate Record Detection: A Survey
IEEE Transactions on Knowledge and Data Engineering
Eliminating fuzzy duplicates in data warehouses
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Towards identity anonymization on graphs
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Resisting structural re-identification in anonymized social networks
Proceedings of the VLDB Endowment
Semantic Modelling of User Interests Based on Cross-Folksonomy Analysis
ISWC '08 Proceedings of the 7th International Conference on The Semantic Web
Proceedings of the 18th international conference on World wide web
Cross-tagging for personalized open social networking
Proceedings of the 20th ACM conference on Hypertext and hypermedia
Enriching Trust Prediction Model in Social Network with User Rating Similarity
CASON '09 Proceedings of the 2009 International Conference on Computational Aspects of Social Networks
De-anonymizing Social Networks
SP '09 Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
Constraint-based entity matching
AAAI'05 Proceedings of the 20th national conference on Artificial intelligence - Volume 2
I seek you: searching and matching individuals in social networks
Proceedings of the eleventh international workshop on Web information and data management
You are who you know: inferring user profiles in online social networks
Proceedings of the third ACM international conference on Web search and data mining
An Analysis of Security in Social Networks
DASC '09 Proceedings of the 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing
Proceedings of the 1st International Workshop on Information Heterogeneity and Fusion in Recommender Systems
Abusing social networks for automated user profiling
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Entity Resolution and Information Quality
Entity Resolution and Information Quality
Identity matching using personal and social identity features
Information Systems Frontiers
Modeling Unintended Personal-Information Leakage from Multiple Online Social Networks
IEEE Internet Computing
Analyzing cross-system user modeling on the social web
ICWE'11 Proceedings of the 11th international conference on Web engineering
How unique and traceable are usernames?
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Automatically detecting criminal identity deception: an adaptive detection algorithm
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Hi-index | 0.00 |
This paper presents a study on factors that may increase the risks of personal information leakage, owing to the possibility of connecting user profiles that are not explicitly linked together. First, we introduce a technique for user identification based on cross-site checking and linking of user attributes. Then, we describe the experimental evaluation of the identification technique both in a real setting and on an online sample, showing its accuracy to discover unknown personal data. Finally, we combine the results on the accuracy of identification with the results of a questionnaire completed by the same subjects who performed the test in the real setting. The aim of the study was to discover possible factors that make users vulnerable to this kind of technique. We found that the number of social networks used, their features and especially the amount of profiles abandoned and forgotten by the user are factors that increase the likelihood of identification and the privacy risks.