2017
DOI: 10.1016/j.eswa.2017.05.054
|View full text |Cite
|
Sign up to set email alerts
|

A privacy self-assessment framework for online social networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

1
26
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 36 publications
(28 citation statements)
references
References 32 publications
1
26
0
1
Order By: Relevance
“…Pensa et al use the community discovery method to group users, measure the privacy in each group, and help users make reasonable changes to privacy settings through online learning. Zeng et al believe that a single user's privacy disclosure depends on his trust in the friends around him and proposes a framework based on trust awareness to evaluate a user's privacy leakage [16]. Alsakal et al [17] introduced information metrics for users in a whole social network by using information entropy theory and discussed the impact of individual identifying information and combinations of different pieces of information on user information disclosure.…”
Section: Related Workmentioning
confidence: 99%
“…Pensa et al use the community discovery method to group users, measure the privacy in each group, and help users make reasonable changes to privacy settings through online learning. Zeng et al believe that a single user's privacy disclosure depends on his trust in the friends around him and proposes a framework based on trust awareness to evaluate a user's privacy leakage [16]. Alsakal et al [17] introduced information metrics for users in a whole social network by using information entropy theory and discussed the impact of individual identifying information and combinations of different pieces of information on user information disclosure.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, Li Minghui et al [36] believed that attackers could use the background knowledge of public neighbours to obtain the privacy of victims; they used K-anonymity and L-diversity to approach this challenge, but these two approaches do not completely solve the issue. Ruggero G. Pensa et al [23] used a circle-based definition of privacy score to measure privacy leakage and applied a learning approach to help users change privacy settings.…”
Section: Related Workmentioning
confidence: 99%
“…Given this trend, malicious attackers can integrate a complete online role via profiles across multiple OSNs, and serious harm can be caused to the real individual in various ways [21]. Given this background, privacy protection on a single platform is far more than enough to manage [8][9][10][11]22,23].At present, there is no perfect solution to this problem because users have varied requirements for privacy protection that depend on the context. Therefore, the best solution is to provide a method to quantify the privacy of individuals, transform the virtual concept of privacy into a visible physical space, help users accurately recognize the state of their privacy and help users improve their privacy.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Social networks have helped organizations adapt their content of advertising to the needs of individual customers and personalise advertisements and have also enabled the customer to manage the qualitative and quantitative parameters of advertising (content, length, time, place, etc.) to some extent [3,6,26,[33][34][35][36][37][38][39][40][41][42].…”
Section: Introductionmentioning
confidence: 99%