2020
DOI: 10.1007/978-3-030-57805-3_18
|View full text |Cite
|
Sign up to set email alerts
|

Automatic Detection of Sensitive Information in Educative Social Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 19 publications
0
8
0
Order By: Relevance
“…Since its introduction by Nobel Prize winners Richard Thaler and Cass Sunstein, the "nudge" theory has been extensively investigated and applied repeatedly to the design of privacy-enhancing technologies. When it comes to OSNs, there is a wide variety of privacy nudges in the current literature whose goal is to support users' online self-disclosure decisions [7,9,10,16,30,38]. For instance, Raber et al [38] introduced PrivacyWedges, a visualization strategy for aiding the audience selection of social media publications.…”
Section: Background and Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Since its introduction by Nobel Prize winners Richard Thaler and Cass Sunstein, the "nudge" theory has been extensively investigated and applied repeatedly to the design of privacy-enhancing technologies. When it comes to OSNs, there is a wide variety of privacy nudges in the current literature whose goal is to support users' online self-disclosure decisions [7,9,10,16,30,38]. For instance, Raber et al [38] introduced PrivacyWedges, a visualization strategy for aiding the audience selection of social media publications.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Other nudging solutions precisely seek to warn users about publications containing sensitive information. Such is the case of Botti-Cebriá et al [9], who applied a compound of Natural Language Processing (NLP) techniques for determining whether a post contains information about one's location, health, and personal identifiers, among others. In line with this, Bracamonte et al [10] empirically assessed users' perception of warnings about the presence of personal information in their posts.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Kaur et al [10] had made an attempt to survey various techniques for the prevention of data leakage, aside from certain challenges and data protection approaches, and also accounted for the constraints. Academics and professionals, we're able to draw benefits from the survey.Botti-Cebriá et al, [11]provided the sensitivity of the data that the user would share when published online. To this end, an assistant agent was proposed for the identification of sensitive data that was dependent on the message's distinct types of detected categories (that is, emotions, personal attacks, health, personal data, location, and so on).…”
Section: Related Workmentioning
confidence: 99%
“…In recent years, some proposals for assessing privacy on social networks have been made [1,4,29]. Most of these proposals involve the definition of metrics and mechanisms to improve trust and avoid the vulnerability of privacy in social networks [191,218].…”
Section: Pesedia: a Pedagogical Social Networkmentioning
confidence: 99%