2022
DOI: 10.3991/ijim.v16i01.27763
|View full text |Cite
|
Sign up to set email alerts
|

User Behavior in Social Networks Toward Privacy and Trust: Literature Review

Abstract: Social networks (SNs) have become a significant part of daily life. It has become one of the most effective ways in which people communicate with each other. Huge amounts of data are generated and shared through SNS worldwide, where users share their personal and sensitive information. Therefore, disclosure of private information or identity and the loss of trust among users are among the most prominent and widespread privacy concerns. The main target of this study is to investigate the relationship between pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…And when K is too large, there will be additional computational cost and more noise may be introduced. We implemented our proposed method using Python-3.7 4 and Pytorch-1.6 5 . All the experiments were conducted on the same machine with Linux system (Ubuntu 5.4.0), Intel(R) Xeon(R) CPU E5-2680, 128GB RAM and 2 NVIDIA 1080Ti GPUs.…”
Section: ) Parameter Settingsmentioning
confidence: 99%
“…And when K is too large, there will be additional computational cost and more noise may be introduced. We implemented our proposed method using Python-3.7 4 and Pytorch-1.6 5 . All the experiments were conducted on the same machine with Linux system (Ubuntu 5.4.0), Intel(R) Xeon(R) CPU E5-2680, 128GB RAM and 2 NVIDIA 1080Ti GPUs.…”
Section: ) Parameter Settingsmentioning
confidence: 99%
“…Theme 2-data privacy. Under the technological challenge, data privacy [20]- [21] is one of the biggest concerns for telecommunication providers that adopt big data. The the challenge requires the telecommunication provider to explore the techniques and mechanisms to protect the privacy of the data while catering to the business needs and profit.…”
Section: Technological Challengesmentioning
confidence: 99%
“…In Figure 2, five new edges have been introduced to change the structure of G for privacy preservation. Recently, many solutions have been proposed to preserve the privacy of SN users in G publishing [15][16][17][18][19][20][21]. These solutions have been used to preserve either nodes' or edges' privacy in the release of G. Recently, differential privacy-based solutions have also been proposed to alter the G's structure for privacy preservation [22].…”
Section: Introductionmentioning
confidence: 99%