Triggers and barriers to customizing software
CHI '91 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Friendster and publicly articulated social networking
CHI '04 Extended Abstracts on Human Factors in Computing Systems
Privacy in electronic commerce and the economics of immediate gratification
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
BT Technology Journal
Handbook of Face Recognition
Overview of the Face Recognition Grand Challenge
CVPR '05 Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Volume 1 - Volume 01
A face(book) in the crowd: social Searching vs. social browsing
CSCW '06 Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work
A familiar face(book): profile elements as signals in an online social network
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Capturing, sharing, and using local place information
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
SmokeScreen: flexible privacy controls for presence-sharing
Proceedings of the 5th international conference on Mobile systems, applications and services
Precision: Privacy Enhanced Context-Aware Information Fusion in Ubiquitous Healthcare
SEPCASE '07 Proceedings of the 1st International Workshop on Software Engineering for Pervasive Computing Applications, Systems, and Environments
Examining privacy and disclosure in a social networking community
Proceedings of the 3rd symposium on Usable privacy and security
Looking at, looking up or keeping up with people?: motives and use of facebook
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy and technology: folk definitions and perspectives
CHI '08 Extended Abstracts on Human Factors in Computing Systems
Privacy-enhanced sharing of personal content on the web
Proceedings of the 17th international conference on World Wide Web
Understanding privacy settings in facebook with an audience view
UPSEC'08 Proceedings of the 1st Conference on Usability, Psychology, and Security
Social Science Computer Review
The social web: global village or private cliques?
Proceedings of the 2007 conference on Designing for User eXperiences
Characterizing privacy in online social networks
Proceedings of the first workshop on Online social networks
Challenges of Designing Privacy Enhanced Context-Aware Middleware for Assisted Healthcare
ICOST '08 Proceedings of the 6th international conference on Smart Homes and Health Telematics
FlyByNight: mitigating the privacy risks of social networking
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Social networks and context-aware spam
Proceedings of the 2008 ACM conference on Computer supported cooperative work
Motivations for social networking at work
Proceedings of the 2008 ACM conference on Computer supported cooperative work
Changes in use and perception of facebook
Proceedings of the 2008 ACM conference on Computer supported cooperative work
On the need for user-defined fine-grained access control policies for social networking applications
Proceedings of the workshop on Security in Opportunistic and SOCial networks
Involuntary Information Leakage in Social Network Services
IWSEC '08 Proceedings of the 3rd International Workshop on Security: Advances in Information and Computer Security
Social computing privacy concerns: antecedents and effects
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Feed me: motivating newcomer contribution in social network sites
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Emotional experience on facebook site
CHI '09 Extended Abstracts on Human Factors in Computing Systems
Tagged photos: concerns, perceptions, and protections
CHI '09 Extended Abstracts on Human Factors in Computing Systems
Collective privacy management in social networks
Proceedings of the 18th international conference on World wide web
BCS-HCI '07 Proceedings of the 21st British HCI Group Annual Conference on People and Computers: HCI...but not as we know it - Volume 2
Strategies and struggles with privacy in an online social networking community
BCS-HCI '08 Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction - Volume 1
All My People Right Here, Right Now: management of group co-presence on a social networking site
Proceedings of the ACM 2009 international conference on Supporting group work
What happens when facebook is gone?
Proceedings of the 9th ACM/IEEE-CS joint conference on Digital libraries
Proceedings of the fourth international conference on Communities and technologies
Proceedings of the fourth international conference on Communities and technologies
How much do you tell?: information disclosure behaviour indifferent types of online communities
Proceedings of the fourth international conference on Communities and technologies
Social applications: exploring a more secure framework
Proceedings of the 5th Symposium on Usable Privacy and Security
Anonymous opinion exchange over untrusted social networks
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems
Persona: an online social network with user-defined privacy
Proceedings of the ACM SIGCOMM 2009 conference on Data communication
Analysis of Information Disclosure on a Social Networking Site
OCSC '09 Proceedings of the 3d International Conference on Online Communities and Social Computing: Held as Part of HCI International 2009
Adaptive Learning via Social Cognitive Theory and Digital Cultural Ecosystems
FAC '09 Proceedings of the 5th International Conference on Foundations of Augmented Cognition. Neuroergonomics and Operational Neuroscience: Held as Part of HCI International 2009
Social Network Privacy via Evolving Access Control
WASA '09 Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications
From spaces to places: emerging contexts in mobile privacy
Proceedings of the 11th international conference on Ubiquitous computing
Do Lenders Make Optimal Decisions in a Peer-to-Peer Network?
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 01
Web-Traveler Policies for Images on Social Networks
World Wide Web
Network level footprints of facebook applications
Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy
Proceedings of the 2nd ACM workshop on Security and artificial intelligence
Configuring audience-oriented privacy policies
Proceedings of the 2nd ACM workshop on Assurable and usable security configuration
Face off: Implications of visual cues on initiating friendship on Facebook
Computers in Human Behavior
Dramaturgical capitalization of positive emotions: the answer for Facebook success?
Proceedings of the 23rd British HCI Group Annual Conference on People and Computers: Celebrating People and Technology
Personality traits, usage patterns and information disclosure in online communities
Proceedings of the 23rd British HCI Group Annual Conference on People and Computers: Celebrating People and Technology
How to Get Proper Profiles? A Psychological Perspective on Social Networking Sites
EC-TEL '09 Proceedings of the 4th European Conference on Technology Enhanced Learning: Learning in the Synergy of Multiple Disciplines
Let Only the Right One IN: Privacy Management Scheme for Social Network
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
A measure of online social networks
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Usable key agreement in home networks
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Social network classification incorporating link typevalues
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
BBN-based privacy management sytem for facebook
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Sh@re: negotiated audit in social networks
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
Moving beyond untagging: photo privacy in a tagged world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Is a friend a friend?: investigating the structure of friendship networks in virtual worlds
CHI '10 Extended Abstracts on Human Factors in Computing Systems
Generating default privacy policies for online social networks
CHI '10 Extended Abstracts on Human Factors in Computing Systems
PriMa: an effective privacy protection mechanism for social networks
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Privacy wizards for social networking sites
Proceedings of the 19th international conference on World wide web
The credibility of digital identity information on the social web: a user study
Proceedings of the 4th workshop on Information credibility
Proceedings of the 2010 ICSE Workshop on Software Engineering in Health Care
Privacy issues in educational systems
International Journal of Internet Technology and Secured Transactions
VisualSec: a secure message delivery scheme for online social networks based on profile images
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Tailoring collaboration according privacy needs in real-identity collaborative systems
CRIWG'09 Proceedings of the 15th international conference on Groupware: design, implementation, and use
Users' (mis)conceptions of social applications
Proceedings of Graphics Interface 2010
Active networks privacy protection and vulnerabilities
ACMOS'10 Proceedings of the 12th WSEAS international conference on Automatic control, modelling & simulation
A privacy-aware architecture for a web rating system
IBM Journal of Research and Development
Understanding factors affecting perceived sociability of social software
Computers in Human Behavior
Pre-service teachers' perceptions about e-democracy: A case in Turkey
Computers & Education
Analysis of privacy in online social networks of runet
Proceedings of the 3rd international conference on Security of information and networks
Design for Enterprise 2.0: Articulating the Online Social Capital Hypothesis
Proceedings of the 2010 conference on Bridging the Socio-technical Gap in Decision Support Systems: Challenges for the Next Decade
Privacy and security for online social networks: challenges and opportunities
IEEE Network: The Magazine of Global Internetworking
Proceedings of the 12th ACM international conference on Ubiquitous computing
A holistic multipurpose life-log framework
Proceedings of the 12th ACM international conference adjunct papers on Ubiquitous computing - Adjunct
Dissolving active networks privacy threats and vulnerabilities
WSEAS TRANSACTIONS on COMMUNICATIONS
A privacy recommendation wizard for users of social networking sites
Proceedings of the 17th ACM conference on Computer and communications security
Exploiting social networking sites for spam
Proceedings of the 17th ACM conference on Computer and communications security
Cheap and automated socio-technical attacks based on social networking sites
Proceedings of the 3rd ACM workshop on Artificial intelligence and security
Using social networks to harvest email addresses
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Privacy-awareness information for web forums: results from an empirical study
Proceedings of the 6th Nordic Conference on Human-Computer Interaction: Extending Boundaries
A Framework for Computing the Privacy Scores of Users in Online Social Networks
ACM Transactions on Knowledge Discovery from Data (TKDD)
Automatic creation of photo books from stories in social media
Proceedings of second ACM SIGMM workshop on Social media
Listen to me if you can: tracking user experience of mobile network on social media
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
unfriendly: multi-party privacy risks in social networks
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
"But the data is already public": on the ethics of research in Facebook
Ethics and Information Technology
Abusing social networks for automated user profiling
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Identity in the Information Society
Privacy policies for shared content in social network sites
The VLDB Journal — The International Journal on Very Large Data Bases
Understanding the behavior of malicious applications in social networks
IEEE Network: The Magazine of Global Internetworking
Public disclosure versus private practice: challenges in business process management
ICSOC/ServiceWave'09 Proceedings of the 2009 international conference on Service-oriented computing
Toward a behavioral approach to privacy for online social networks
SocInfo'10 Proceedings of the Second international conference on Social informatics
Social email: a framework and application for more socially-aware communications
SocInfo'10 Proceedings of the Second international conference on Social informatics
Intentions to use social media in organizing and taking vacation trips
Computers in Human Behavior
Review: Students' and teachers' use of Facebook
Computers in Human Behavior
Social media futures: why iSchools should care
Proceedings of the 2011 iConference
Virtual private social networks
Proceedings of the first ACM conference on Data and application security and privacy
Beyond the panopticon framework: privacy, control and user generated content
Proceedings of the Third COST 2102 international training school conference on Toward autonomous, adaptive, and context-aware multimodal interfaces: theoretical and practical issues
SELECT * FROM USER: infrastructure and socio-technical representation
Proceedings of the ACM 2011 conference on Computer supported cooperative work
Location privacy protection on social networks
SBP'11 Proceedings of the 4th international conference on Social computing, behavioral-cultural modeling and prediction
EASiER: encryption-based access control in social networks with efficient revocation
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Oops, I did it again: mitigating repeated access control errors on facebook
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The smart internet as a catalyst for health care reform
The smart internet
The smart internet as a catalyst for health care reform
The smart internet
Crawling Facebook for social network analysis purposes
Proceedings of the International Conference on Web Intelligence, Mining and Semantics
Designing for privacy in personal learning spaces
The New Review of Hypermedia and Multimedia - Special issue: Observing users of digital educational technologies
Revealing only the superficial me: Exploring categorical self-disclosure online
Computers in Human Behavior
Exploiting vulnerability to secure user privacy on a social networking site
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
On the privacy of anonymized networks
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Social networks as a platform for distributed dictionary attack
CIT'11 Proceedings of the 5th WSEAS international conference on Communications and information technology
Influence of gender and English proficiency on Facebook mobile adoption
International Journal of Mobile Communications
A survey on privacy in mobile participatory sensing applications
Journal of Systems and Software
Scramble! your social network data
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Automatic creation of photo books from stories in social media
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP) - Special section on ACM multimedia 2010 best paper candidates, and issue on social media
Sharing ephemeral information in online social networks: privacy perceptions and behaviours
INTERACT'11 Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part III
Privacy concerns in enterprise social travel: attitudes and actions
INTERACT'11 Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part III
A trust-augmented voting scheme for collaborative privacy management
STM'10 Proceedings of the 6th international conference on Security and trust management
Local computation of PageRank: the ranking side
Proceedings of the 20th ACM international conference on Information and knowledge management
Analyzing facebook privacy settings: user expectations vs. reality
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
LotusNet: Tunable privacy for distributed online social network services
Computer Communications
Contextual gaps: privacy issues on Facebook
Ethics and Information Technology
BUNNY BURNit: the volatile message as a new social network system to overcome digital eternity
Proceedings of the 8th International Conference on Advances in Computer Entertainment Technology
Privacy threat analysis of social network data
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part II
Third-party apps on Facebook: privacy and the illusion of control
CHIMIT '11 Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology
A three dimensional sender anonymity metric
International Journal of Security and Networks
"I regretted the minute I pressed share": a qualitative study of regrets on Facebook
Proceedings of the Seventh Symposium on Usable Privacy and Security
ROAuth: recommendation based open authorization
Proceedings of the Seventh Symposium on Usable Privacy and Security
Poster: preliminary analysis of Google+'s privacy
Proceedings of the 18th ACM conference on Computer and communications security
The decreasing marginal value of evaluation network size
ACM SIGCAS Computers and Society
Preserving privacy on the searchable internet
Proceedings of the 13th International Conference on Information Integration and Web-based Applications and Services
Self-disclosure and student satisfaction with Facebook
Computers in Human Behavior
Valuation of online social networks taking into account users' interconnectedness
Information Systems and e-Business Management
Matelas: a predicate calculus common formal definition for social networking
ABZ'10 Proceedings of the Second international conference on Abstract State Machines, Alloy, B and Z
Stalking online: on user privacy in social networks
Proceedings of the second ACM conference on Data and Application Security and Privacy
Conceptualizing and advancing research networking systems
ACM Transactions on Computer-Human Interaction (TOCHI)
Imagined communities: awareness, information sharing, and privacy on the facebook
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
From the economics to the behavioral economics of privacy: a note
ICEB'10 Proceedings of the Third international conference on Ethics and Policy of Biometrics and International Data Sharing
User generated content consumption and social networking in knowledge-sharing OSNs
SBP'10 Proceedings of the Third international conference on Social Computing, Behavioral Modeling, and Prediction
Proceedings of the Fifth Workshop on Social Network Systems
Decentralised privacy preservation in social networks
International Journal of Business Information Systems
Decentralized information dissemination in multidimensional semantic social overlays
ICDCN'12 Proceedings of the 13th international conference on Distributed Computing and Networking
Privacy attacks in social media using photo tagging networks: a case study with Facebook
Proceedings of the 1st Workshop on Privacy and Security in Online Social Media
Collective exposure: peer effects in voluntary disclosure of personal data
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Preserving privacy in online social networks
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
Regroup: interactive machine learning for on-demand group creation in social networks
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Fighting for my space: coping mechanisms for sns boundary regulation
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Talking in circles: selective sharing in google+
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Third-party applications' data practices on facebook
CHI '12 Extended Abstracts on Human Factors in Computing Systems
Clustering user trajectories to find patterns for social interaction applications
W2GIS'12 Proceedings of the 11th international conference on Web and Wireless Geographical Information Systems
User behavior in online social networks and its implications: a user study
Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics
Introduction to special section: Social aspects of social networking
International Journal of Information Management: The Journal for Information Professionals
International Journal of Information Management: The Journal for Information Professionals
Who knows about me?: an analysis of age-related disclosure preferences
BCS-HCI '11 Proceedings of the 25th BCS Conference on Human-Computer Interaction
TrustSplit: usable confidentiality for social network messaging
Proceedings of the 23rd ACM conference on Hypertext and social media
Facebook and privacy: it's complicated
Proceedings of the Eighth Symposium on Usable Privacy and Security
Are privacy concerns a turn-off?: engagement and privacy in social networks
Proceedings of the Eighth Symposium on Usable Privacy and Security
The PViz comprehension tool for social network privacy settings
Proceedings of the Eighth Symposium on Usable Privacy and Security
International Journal of Web Based Communities
Cryptographic treatment of private user profiles
FC'11 Proceedings of the 2011 international conference on Financial Cryptography and Data Security
What to Tell About Me? Self-Presentation in Online Communities
Journal of Computer-Mediated Communication
Privacy-aware image classification and search
SIGIR '12 Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrieval
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
We know where you live: privacy characterization of foursquare behavior
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Analysis of vulnerability to facebook users
Proceedings of the 18th Brazilian symposium on Multimedia and the web
Towards an understanding of social inference opportunities in social computing
Proceedings of the 17th ACM international conference on Supporting group work
New kid on the block: exploring the google+ social graph
Proceedings of the 2012 ACM conference on Internet measurement conference
Online social networks: A survey of a global phenomenon
Computer Networks: The International Journal of Computer and Telecommunications Networking
Multi agent system approach for vulnerability analysis of online social network profiles over time
International Journal of Knowledge and Web Intelligence
FC'12 Proceedings of the 16th international conference on Financial Cryptography and Data Security
Social networks: the role of users' privacy concerns
Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services
Do online social network friends still threaten my privacy?
Proceedings of the third ACM conference on Data and application security and privacy
Private friends on a social networking site operated by an overly curious SNP
NSS'12 Proceedings of the 6th international conference on Network and System Security
Usable privacy by visual and interactive control of information flow
SP'12 Proceedings of the 20th international conference on Security Protocols
Radiator: context propagation based on delayed aggregation
Proceedings of the 2013 conference on Computer supported cooperative work
International Journal of Wireless Networks and Broadband Technologies
Disclosure Intention of Location-Related Information in Location-Based Social Network Services
International Journal of Electronic Commerce
Design and analysis of a social botnet
Computer Networks: The International Journal of Computer and Telecommunications Networking
Monitoring and recommending privacy settings in social networks
Proceedings of the Joint EDBT/ICDT 2013 Workshops
Improving privacy settings for facebook by using interpersonal distance as criterion
CHI '13 Extended Abstracts on Human Factors in Computing Systems
Enabling an integrated identity from disparate sources
IBM Journal of Research and Development
curso: protect yourself from curse of attribute inference: a social network privacy-analyzer
Proceedings of the ACM SIGMOD Workshop on Databases and Social Networks
Going it all alone in web entrepreneurship?: a comparison of single founders vs. co-founders
Proceedings of the 2013 annual conference on Computers and people research
The power of local information in PageRank
Proceedings of the 22nd international conference on World Wide Web companion
Privacy nudges for social media: an exploratory Facebook study
Proceedings of the 22nd international conference on World Wide Web companion
Electronic word of mouth and knowledge sharing on social network sites: a social capital perspective
Journal of Theoretical and Applied Electronic Commerce Research
Analysis of publicly disclosed information in Facebook profiles
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Privacy manipulation and acclimation in a location sharing application
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Retrospective privacy: managing longitudinal privacy in online social networks
Proceedings of the Ninth Symposium on Usable Privacy and Security
A survey of trust in social networks
ACM Computing Surveys (CSUR)
Location tracking via social networking sites
Proceedings of the 5th Annual ACM Web Science Conference
Factors affecting privacy disclosure on social network sites: an integrated model
Electronic Commerce Research
Virtual private social networks and a facebook implementation
ACM Transactions on the Web (TWEB)
Privacy awareness about information leakage: who knows what about me?
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Trends and research directions for privacy preserving approaches on the cloud
Proceedings of the 6th ACM India Computing Convention
An online social-networking enabled telehealth system for seniors: a case study
AUIC '13 Proceedings of the Fourteenth Australasian User Interface Conference - Volume 139
Automatic anonymous fingerprinting of text posted on social networking services
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Identity management through "profiles": prototyping an online information segregation service
HCI'13 Proceedings of the 15th international conference on Human-Computer Interaction: users and contexts of use - Volume Part III
OCSC'13 Proceedings of the 5th international conference on Online Communities and Social Computing
"You can't block people offline": examining how facebook's affordances shape the disclosure process
Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing
Anonymizing social networks: A generalization approach
Computers and Electrical Engineering
SGor: Trust graph based onion routing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Location sharing privacy preference: analysis and personalized recommendation
Proceedings of the 19th international conference on Intelligent User Interfaces
A defence scheme against Identity Theft Attack based on multiple social networks
Expert Systems with Applications: An International Journal
Computers in Human Behavior
International Journal of Business Information Systems
Antecipando possíveis implicações de privacidade na postagem de fotos no Facebook
Proceedings of the 12th Brazilian Symposium on Human Factors in Computing Systems
A time-evolution model for the privacy degree of information disseminated in online social networks
International Journal of Communication Networks and Distributed Systems
Research Report: An exploration of the potential educational value of Facebook
Computers in Human Behavior
A trust-augmented voting scheme for collaborative privacy management
Journal of Computer Security - STM'10
Hi-index | 0.00 |
Participation in social networking sites has dramatically increased in recent years. Services such as Friendster, Tribe, or the Facebook allow millions of individuals to create online profiles and share personal information with vast networks of friends - and, often, unknown numbers of strangers. In this paper we study patterns of information revelation in online social networks and their privacy implications. We analyze the online behavior of more than 4,000 Carnegie Mellon University students who have joined a popular social networking site catered to colleges. We evaluate the amount of information they disclose and study their usage of the site's privacy settings. We highlight potential attacks on various aspects of their privacy, and we show that only a minimal percentage of users changes the highly permeable privacy preferences.