2015
DOI: 10.5121/ijsptm.2015.4201
|View full text |Cite
|
Sign up to set email alerts
|

Measuring Privacy in Online Social Networks

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 8 publications
0
11
0
Order By: Relevance
“…A third-party from class B can request for all three types of attributes of ID, QI, and S as there is no elimination of attributes at this level. The anonymization algorithm calculates the percentage of privacy leakage of a request ( ( ) ) and compares the result with the percentage of privacy leakage in level 1( ( ) ) [48]. If it is less than the percentage of privacy leakage in level 1, the anonymization algorithm will grant access to the third-party to level 1.…”
Section: Classification Algorithmmentioning
confidence: 99%
“…A third-party from class B can request for all three types of attributes of ID, QI, and S as there is no elimination of attributes at this level. The anonymization algorithm calculates the percentage of privacy leakage of a request ( ( ) ) and compares the result with the percentage of privacy leakage in level 1( ( ) ) [48]. If it is less than the percentage of privacy leakage in level 1, the anonymization algorithm will grant access to the third-party to level 1.…”
Section: Classification Algorithmmentioning
confidence: 99%
“…An individual's identity could be derived from data generated from both online and offline worlds (Creese et al 2013;Ananthula et al 2015;Li and Wang 2015). In particular, one's offline identity includes data elements such as name, date of birth, gender, nationality, and relationships; online identity includes data elements such as username, browsing history, and email.…”
Section: Re-identification Risksmentioning
confidence: 99%
“…Albeit users may consider whether there is any possibility of disclosing identifying information when they are going to publish a post, as long as the personal information exposed in the public space, there is the possibility of being 9 compromised. The problem of privacy security boils down to the privacy risk caused by the internet users' active sharing (Ananthula, Abuzaghleh, Alla, Chaganti, Kaja, & Mogilineedi, 2015). The ability to manage and control the personal information can effectively reduce the probability of privacy leakage.…”
Section: Privacy Preservation Measuresmentioning
confidence: 99%