2022
DOI: 10.1186/s40537-022-00566-7
|View full text |Cite
|
Sign up to set email alerts
|

Social network data analysis to highlight privacy threats in sharing data

Abstract: Social networks are a vast source of information, and they have been increasing impact on people’s daily lives. They permit us to share emotions, passions, and interactions with other people around the world. While enabling people to exhibit their lives, social networks guarantee their privacy. The definitions of privacy requirements and default policies for safeguarding people’s data are the most difficult challenges that social networks have to deal with. In this work, we have collected data concerning peopl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 36 publications
(6 citation statements)
references
References 34 publications
0
6
0
Order By: Relevance
“…Similarly, Li et al [49] categorized information disclosure on social network platforms in voluntary and mandatory disclosure, and they argued that the results of studies focusing on voluntary information sharing may not be extended to mandatory information disclosure behavior, as there is a fundamental difference in both approaches. In another work, Cerruto et al [50] investigated user profiles on different social network platforms to highlight the vulnerability of user data present in social network applications to provide more awareness to social networking users regarding security threats.…”
Section: Security In Social Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…Similarly, Li et al [49] categorized information disclosure on social network platforms in voluntary and mandatory disclosure, and they argued that the results of studies focusing on voluntary information sharing may not be extended to mandatory information disclosure behavior, as there is a fundamental difference in both approaches. In another work, Cerruto et al [50] investigated user profiles on different social network platforms to highlight the vulnerability of user data present in social network applications to provide more awareness to social networking users regarding security threats.…”
Section: Security In Social Networkmentioning
confidence: 99%
“…In another work, Cerruto et al [50] investigated user profiles on different social network platforms to highlight the vulnerability of user data present in social network applications to provide more awareness to social networking users regarding security threats.…”
Section: Theory Of Planned Behavior In Security Researchmentioning
confidence: 99%
“…The second is the PDP model proposed in [8], which supports efficient verification for the data integrity on cloud servers with sampling inspection. Since PDP is considered to be much more flexible and efficient [9], many public PDP schemes have been successively proposed in many literatures to address the data integrity checking problems with various features like data dynamic [10], multi replicas [11][12], privacy preserving [13][14] and so on.…”
Section: Related Workmentioning
confidence: 99%
“…We evaluated the influence of nodes by analyzing network structure and node characteristics, and ranked nodes according to their influence values, considering the top-ranked nodes as influential spreaders. In recent years, identifying influential spreaders has received extensive attention [1,2]. The following provides an overview of the current state of research on algorithms for identifying influential spreaders.…”
Section: Introductionmentioning
confidence: 99%