2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing 2011
DOI: 10.1109/passat/socialcom.2011.22
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing Privacy in Social Networks--An Interdisciplinary Approach

Abstract: Abstract-The rise of the social web has traditionally been accompanied by privacy concerns. Research on social web privacy has been conducted from various directions including law, social and computer sciences contributing to the body of literature. In this paper, we argue for an interdisciplinary approach to capture the multidimensional concept of privacy. For this purpose, we propose a three-layered framework to systematically analyze the privacy impact of various research directions. Subsequently, we conduc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 38 publications
0
5
0
Order By: Relevance
“…As an example, we consider the tree of Figure 5. For k = 2, there we have that Ξ k (T ) = {v 3 , v 15 13 , v 14 , v 16 , v 17 } (notice that N 2 =l ξ (v 15 ) can be different from this set, but it always has five vertices).…”
Section: The K-metric Antidimension Of Treesmentioning
confidence: 99%
See 1 more Smart Citation
“…As an example, we consider the tree of Figure 5. For k = 2, there we have that Ξ k (T ) = {v 3 , v 15 13 , v 14 , v 16 , v 17 } (notice that N 2 =l ξ (v 15 ) can be different from this set, but it always has five vertices).…”
Section: The K-metric Antidimension Of Treesmentioning
confidence: 99%
“…Interested readers could refer to [13,22,29] for further reading on privacy-preserving publication of social graphs.…”
Section: Related Workmentioning
confidence: 99%
“…Netter et al [12] introduce an interdisciplinary approach to decompose social Web privacy and the impact of different research directions, including legal, technical, and social perspectives. Li et al [13] analyze existing approaches that compromise relation-privacy and offer secure alternatives.…”
Section: Related Workmentioning
confidence: 99%
“…In recent years, several research works have appeared that deal with decreasing the impact of these active attacks (see, for instance, [20]). For other related publications on privacy-preserving methods in social networks, see [15,21,23].…”
Section: Introductionmentioning
confidence: 99%