Privacy-enhanced sharing of personal content on the web
Proceedings of the 17th international conference on World Wide Web
Does enforcing anonymity mean decreasing data usefulness?
Proceedings of the 4th ACM workshop on Quality of protection
PRIMO - Towards Privacy Aware Image Sharing
WI-IAT '08 Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
Collective privacy management in social networks
Proceedings of the 18th international conference on World wide web
Eight friends are enough: social graph approximation via public listings
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Privacy wizards for social networking sites
Proceedings of the 19th international conference on World wide web
Proceedings of the 2010 ICSE Workshop on Software Engineering in Health Care
Privacy policies for shared content in social network sites
The VLDB Journal — The International Journal on Very Large Data Bases
Location privacy protection on social networks
SBP'11 Proceedings of the 4th international conference on Social computing, behavioral-cultural modeling and prediction
Information Systems Frontiers
Exploiting vulnerability to secure user privacy on a social networking site
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
A trust-augmented voting scheme for collaborative privacy management
STM'10 Proceedings of the 6th international conference on Security and trust management
Privacy threat analysis of social network data
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part II
Conceptualizing and advancing research networking systems
ACM Transactions on Computer-Human Interaction (TOCHI)
Guarding a walled garden — semantic privacy preferences for the social web
ESWC'10 Proceedings of the 7th international conference on The Semantic Web: research and Applications - Volume Part II
Mitigating the malicious trust expansion in social network service
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
Regroup: interactive machine learning for on-demand group creation in social networks
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Self-disclosure under social networking sites: a risk-utility decision model
Proceedings of the 14th Annual International Conference on Electronic Commerce
Social software for learning --- the institutional policy of the university of glamorgan
ICHL'12 Proceedings of the 5th international conference on Hybrid Learning
CHI '13 Extended Abstracts on Human Factors in Computing Systems
International Journal of Business Information Systems
Retrospective privacy: managing longitudinal privacy in online social networks
Proceedings of the Ninth Symposium on Usable Privacy and Security
A trust-augmented voting scheme for collaborative privacy management
Journal of Computer Security - STM'10
Hi-index | 0.00 |
For the Net generation, social networking sites have become the preferred forum for social interactions, from posturing and role playing to simply sounding off. However, because such forums are relatively easy to access, posted content can be reviewed by anyone with an interest in the users' personal information.