2012 6th IEEE International Conference on Digital Ecosystems and Technologies (DEST) 2012
DOI: 10.1109/dest.2012.6227909
|View full text |Cite
|
Sign up to set email alerts
|

Big data privacy issues in public social media

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
67
0
3

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 157 publications
(70 citation statements)
references
References 10 publications
0
67
0
3
Order By: Relevance
“…However, the use of social media in the healthcare environment poses some challenges, which include threat to privacy and the need to continuously monitor and manage where and when possible (Katal et al 2013). The emergent threats to user online privacy comes from other users' social media, which makes this threat particularly bad, as the victims are often not involved in the process of uploading the content and as a result cannot take any pre-emptive cautions, in that the amount of data being uploaded varies so much that it cannot be detected manually (Smith et al 2012).…”
Section: Big Data and Social Media In Healthcarementioning
confidence: 99%
“…However, the use of social media in the healthcare environment poses some challenges, which include threat to privacy and the need to continuously monitor and manage where and when possible (Katal et al 2013). The emergent threats to user online privacy comes from other users' social media, which makes this threat particularly bad, as the victims are often not involved in the process of uploading the content and as a result cannot take any pre-emptive cautions, in that the amount of data being uploaded varies so much that it cannot be detected manually (Smith et al 2012).…”
Section: Big Data and Social Media In Healthcarementioning
confidence: 99%
“…The increasing use of online social networks also causes privacy issues, and sensitive information is usually either publicly provided or uploaded by other people or friends [14], [15]. Authors in [1] showed that, with a small piece of seed information, attackers can search local database or query web search engine, to launch re-identification attacks and crossdatabase aggregation.…”
Section: Related Workmentioning
confidence: 99%
“…According to Smith et al [18], SNS users have no control over their published information on social network sites. In addition, users often do not know what SNS companies will do with their published data/messages.…”
Section: A Privacy Issues On Social Networking Sitesmentioning
confidence: 99%