2012
DOI: 10.1016/j.procs.2012.06.086
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Issues in Mobile Social Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 12 publications
(12 citation statements)
references
References 15 publications
0
12
0
Order By: Relevance
“…Most mobile social networking applications show a popup dialogue requesting permission to access location information from the user. Some applications only provide a notification message to notify on automatic acquiring of user location information without allowing users" control over that process [16]. These accesses sometimes are done without user"s conscience.…”
Section: A Service Accessmentioning
confidence: 99%
See 2 more Smart Citations
“…Most mobile social networking applications show a popup dialogue requesting permission to access location information from the user. Some applications only provide a notification message to notify on automatic acquiring of user location information without allowing users" control over that process [16]. These accesses sometimes are done without user"s conscience.…”
Section: A Service Accessmentioning
confidence: 99%
“…As most social networking platforms offer association and connectivity, users have the ability to view other users" profiles directly or through a common connection. Therefore, a geosocial networking application should offer visibility setting feature as a privacy-preserving mechanism that support users" controlling decisions regarding who can view their information such as location information or being "nearby" as named in many application [16]. Onion metaphor from Social Penetration Theory [18] will be adapted in this feature.…”
Section: Visibility Settingmentioning
confidence: 99%
See 1 more Smart Citation
“…• Google+,Foursquare Linkage: There are two options to obtain the linked Google+ and Foursquare users: (1) use Google+ API to obtain Foursquare linked users from Google+ users; (2) search the set of Twitter users obtained using the above two linkage method. If a Twitter user links both a Google+ user and a Foursquare user, we link this pair of Google+,Foursquare users together.…”
Section: User Accounts Linkage Collectionmentioning
confidence: 99%
“…By conducting profile cloning attacks, Shen et al [20] illustrated that threats (e.g., malware, worm) can influence a lot more users after linking user accounts, resulting in user privacy leakage, as threats can be propagated across different OSNs. The surveys of privacy and security in OSNs can be found in [15,1]. However, the defense of these privacy issues still remains open and becomes an urgent need.…”
Section: Related Workmentioning
confidence: 99%