User Vulnerability and Its Reduction on a Social Networking Site

@article{Gundecha2014UserVA,
  title={User Vulnerability and Its Reduction on a Social Networking Site},
  author={Pritam Gundecha and Geoffrey Barbier and Jiliang Tang and Huan Liu},
  journal={ACM Trans. Knowl. Discov. Data},
  year={2014},
  volume={9},
  pages={12:1-12:25}
}
Privacy and security are major concerns for many users of social media. When users share information (e.g., data and photos) with friends, they can make their friends vulnerable to security and privacy breaches with dire consequences. With the continuous expansion of a user’s social network, privacy settings alone are often inadequate to protect a user’s profile. In this research, we aim to address some critical issues related to privacy protection: (1) How can we measure and assess individual… 
Managing a User ’ s Vulnerability on a Social Networking Site
TLDR
This research first proposes a way to measure and reduce a user vulnerability to protect such personal data, and proposes an algorithm to minimize a user’s vulnerability while maximizing their social utility values.
Managing a User's Vulnerability on a Social Networking Site
TLDR
This dissertation aims to systematically study a user vulnerability against privacy attacks, suggesting that many personal attributes, including religious and political affiliations, sexual orientation, relationship status, age, and gender are predictable using users' personal data from an OSN site.
Identifying vulnerable friends on a social networking site
TLDR
This paper presents a Fuzzy Analytical Hierarchy Process (FAHP) based method by fusing users' influence consideration and adopts FAHP to analysis users' information and consider their probability of propagating other people's information.
Role of Security in Social Networking
TLDR
Some solutions to improve a user’s privacy and security on social networks will be suggested and some steps which can be taken by both users and social network organizations to help improve security and privacy are suggested.
Investigation of User Vulnerability in Social Networking Site
TLDR
The vulnerability of the social network users becomes a social networking problem and a special tool was developed to automate the users clustering process and a phishing attack and corresponding conclusions about user vulnerability were made.
Security Risk Estimation of Social Network Privacy Issue
TLDR
Experiments show that the security risk estimation framework can assist users to find vulnerable friends by calculating the average and the maximum privacy leakage probability in all information spreading paths of target user in social network.
Colour as an Indicator of Vulnerability of Users Within Social Networks
TLDR
By employing a risk matrix to a social media profile, a user could be alerted to the potential dangers of the information being contained within the profile, and the risks to the individual user of asocial media profile will be minimised.
Vulnerable Friend Identification: Who Should You Beware of Most in Online Social Networks?
TLDR
A Privacy Receiving-Disseminating model is developed to simulate the iterative course of privacy information dissemination within social graph and the contribution of each direct friend could be evaluated by comparing the disseminating intensities of detected UCDs before and after unfriending himself.
Vulnerable Friend Identification: Who Should You Beware of Most in Online Social Networks?
TLDR
A Privacy Receiving-Disseminating model is developed to simulate the iterative course of privacy information dissemination within social graph and the contribution of each direct friend could be evaluated by comparing the disseminating intensities of detected UCDs before and after unfriending himself.
Individual Attribute and Cascade Influence Capability-Based Privacy Protection Method in Social Networks
TLDR
This paper aims to find a subset of secure users that can make the spread of influence maximization and privacy disclosure minimization and proposes a Bayesian-based individual privacy risk evaluation model to rank the individual risk levels.
...
...

References

SHOWING 1-10 OF 62 REFERENCES
Exploiting vulnerability to secure user privacy on a social networking site
TLDR
By leveraging the indexes proposed and employing new strategies for unfriending vulnerable friends, it is possible to further improve security and privacy without changing the social networking site's existing architecture.
To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles
TLDR
This work shows how an adversary can exploit an online social network with a mixture of public and private user profiles to predict the private attributes of users, and proposes practical models that use friendship and group membership information to infer sensitive attributes.
Persona: an online social network with user-defined privacy
TLDR
This work presents Persona, an OSN where users dictate who may access their information, and describes an implementation of Persona that replicates Facebook applications and shows how Persona provides the functionality of existing online social networks with additional privacy benefits.
Collective privacy management in social networks
TLDR
This paper proposes a solution that offers automated ways to share images based on an extended notion of content ownership that promotes truthfulness, and that rewards users who promote co-ownership, and shows that supporting these type of solutions is not feasible, but can be implemented through a minimal increase in overhead to end-users.
Information revelation and privacy in online social networks
TLDR
This paper analyzes the online behavior of more than 4,000 Carnegie Mellon University students who have joined a popular social networking site catered to colleges and evaluates the amount of information they disclose and study their usage of the site's privacy settings.
A Practical Attack to De-anonymize Social Network Users
TLDR
A novel de-anonymization attack is introduced that exploits group membership information that is available on social networking sites and shows that information about the group memberships of a user is sufficient to uniquely identify this person, or to significantly reduce the set of possible candidates.
Privacy wizards for social networking sites
TLDR
A template for the design of a social networking privacy wizard based on an active learning paradigm called uncertainty sampling, which is able to recommend high-accuracy privacy settings using less user input than existing policy-specification tools.
De-anonymizing Social Networks
TLDR
A framework for analyzing privacy and anonymity in social networks is presented and a new re-identification algorithm targeting anonymized social-network graphs is developed, showing that a third of the users who can be verified to have accounts on both Twitter and Flickr can be re-identified in the anonymous Twitter graph.
On the leakage of personally identifiable information via online social networks
TLDR
This research shows that it is possible for third-parties to link PII, which is leaked via OSNs, with user actions both within OSN sites and else-where on non-OSN sites.
Randomizing Social Networks: a Spectrum Preserving Approach
TLDR
A spectrum preserving graph randomization method is presented which can better preserve network properties while protecting edge anonymity, and is empirically evaluated and theoretical analysis on the extent to which edge anonymity can be achieved.
...
...