Corpus ID: 8742825

Privacy Leakage through Innocent Content Sharing in Online Social Networks

  title={Privacy Leakage through Innocent Content Sharing in Online Social Networks},
  author={Maria Han Veiga and Carsten Eickhoff},
The increased popularity and ubiquitous availability of online social networks and globalised Internet access have affected the way in which people share content. The information that users willingly disclose on these platforms can be used for various purposes, from building consumer models for advertising, to inferring personal, potentially invasive, information. In this work, we use Twitter, Instagram and Foursquare data to convey the idea that the content shared by users, especially when… Expand
A Privacy-Enhanced Friending Approach for Users on Multiple Online Social Networks
A new privacy-preserving friending method is proposed that helps users decide what to share with other individuals with the reduced risk of being exploited or re-identified and a new model is applied to anonymise the data of users who participate in multiple social networks. Expand
Scoring Users’ Privacy Disclosure Across Multiple Online Social Networks
This paper investigates an approach that can help social media users to measure their privacy disclosure score (PDS) based on the information shared across multiple social networking sites, and identifies the main factors that have impact on users privacy, namely, sensitivity and visibility. Expand
Social Media and the Scourge of Visual Privacy
It is found that participants need more education about the threats of visual content and how these privacy leaks can lead to physical, mental, and emotional danger. Expand
Towards a Visual Privacy Advisor: Understanding and Predicting Privacy Risks in Images
A model is trained to predict the user specific privacy risk and even outperforms the judgment of the users, who often fail to follow their own privacy preferences on image data. Expand
A Comparison of String Distance Metrics on Usernames for Cross-Platform Identification
People often use similar usernames across different social media sites. This fact can be used to correlate accounts between different platforms. Since the first mention of this fact in 2009 noExpand
Cross-Domain Recommendation via Clustering on Multi-Layer Graphs
This work introduces a novel cross-network collaborative recommendation framework C3R, which utilizes both individual and group knowledge, while being trained on data from multiple social media sources, and suggests a new approach for automatic construction of inter-network relationship graph based on the data, which eliminates the necessity of having pre-defined domain knowledge. Expand
This study has been focused on the automatic detection of sensitive attributes using data mining technique in Hadoop environment. We establish Privacy Preserved Hadoop Environment (PPHE) thatExpand
Speaking the Same Language: Matching Machine to Human Captions by Adversarial Training
This work changes the training objective of the caption generator from reproducing ground-truth captions to generating a set of captions that is indistinguishable from human written captions, and employs adversarial training in combination with an approximate Gumbel sampler to implicitly match the generated distribution to the human one. Expand


A Cross-Platform Collection of Social Network Profiles
To enable the structured study of privacy hazards, the potential for unique user deanonymization and information leakage between the various social media profiles many of us maintain, a dedicated dataset of cross-platform social network personas is presented. Expand
Information Disclosure on Mobile Devices: Re-Examining Privacy Calculus with Actual User Behavior
A more realistic experimental methodology designed to replicate real perceptions of privacy risk and capture the effects of actual information disclosure decisions is proposed and tested, finding that only a weak, albeit significant, relationship exists between information disclosure intentions and actual disclosure. Expand
Want a coffee?: predicting users' trails
The assumption that users' current trails contain cues of their future routes is verified and the results from the preliminary experiments show promising performance of a basic Markov Chain-based model. Expand
Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model
The results of this study indicate that the second-order IUIPC factor, which consists of three first-order dimensions--namely, collection, control, and awareness--exhibited desirable psychometric properties in the context of online privacy. Expand
A characterization of online browsing behavior
A large-scale study of online user behavior based on search and toolbar logs, and a new CCS taxonomy of pageviews consisting of Content, Communication, and Search, which shows that mail, news, and social networking pageviews are insular in nature. Expand
An Empirical Examination of the Concern for Information Privacy Instrument
This study examines the factor structure of the concern for information privacy (CFIP) instrument and suggests that each dimension of this instrument is reliable and distinct and that CFIP may be more parsimoniously represented as a higher-order factor structure rather than a correlated set of first-order factors. Expand
Unique in the Crowd: The privacy bounds of human mobility
It is found that in a dataset where the location of an individual is specified hourly, and with a spatial resolution equal to that given by the carrier's antennas, four spatio-temporal points are enough to uniquely identify 95% of the individuals. Expand
Private traits and attributes are predictable from digital records of human behavior
We show that easily accessible digital records of behavior, Facebook Likes, can be used to automatically and accurately predict a range of highly sensitive personal attributes including: sexualExpand
Semantic Search Log k-Anonymization with Generalized k-Cores of Query Concept Graph
This work presents a more flexible, semantic approach to k-anonymity that consists of three steps: query concept mining, automatic query expansion, and affinity assessment of expanded queries. Expand
Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies
The empirical results confirm that, in general, the third-order conceptualizations of IPC outperform their lower-order alternatives and are a significant determinant of both trusting beliefs and risk beliefs. Expand