Private algorithms for the protected in social network search

M Kearns, A Roth, ZS Wu… - Proceedings of the …, 2016 - National Acad Sciences
search in social networks. These algorithms are natural variants of common graph search
methods, … subpopulations of the fixed networks given by our social network data. By varying …

Privacy detective: Detecting private information and collective privacy behavior in a large social network

A Caliskan Islam, J Walsh, R Greenstadt - Proceedings of the 13th …, 2014 - dl.acm.org
… that focus on keyword searching or profile related properties. … are embedded in social
networks, we propose our method ‘… detect private content in similar but differently formatted data. …

A brief survey on anonymization techniques for privacy preserving publishing of social network data

B Zhou, J Pei, WS Luk - ACM Sigkdd Explorations Newsletter, 2008 - dl.acm.org
… The values in sensitive attributes are considered to be private for individuals. However, in …
By searching the degrees of vertices in the published network, the adversary may be able to …

Personalized social search based on the user's social network

D Carmel, N Zwerdling, I Guy, S Ofek-Koifman… - Proceedings of the 18th …, 2009 - dl.acm.org
… cial search to describe the search process over “socialdatamethods that are based on the
the user’s social network, and on … private: comparing public social network information with …

Public vs. private: comparing public social network information with email

I Guy, M Jacovi, N Meshulam, I Ronen… - Proceedings of the 2008 …, 2008 - dl.acm.org
… [20] find numerous ways in which the email social network is … , they too could be mined by
web searching [24]. Additional … social network information, extracted from eight different data

Virtual private social networks

M Conti, A Hasani, B Crispo - … of the first ACM conference on Data and …, 2011 - dl.acm.org
… on social networks through deanonymization techniques [28]… of Virtual Private Social Network
to the Social Network … , when the user searches someone’s profile in the search bar, we …

De-anonymizing social networks

A Narayanan, V Shmatikov - 2009 30th IEEE symposium on …, 2009 - ieeexplore.ieee.org
practices surrounding the sharing of social-network data. … , can collect data via surveillance
and court-authorized searches. … be considered private varies from network to network and …

Living a private life in public social networks: An exploration of member self-disclosure

R Chen - Decision support systems, 2013 - Elsevier
… The research model was validated through survey data collected from 222 social networking
site … this research will help networking service providers develop proper strategies to prompt …

Researching personal information on the public web: Methods and ethics

D Wilkinson, M Thelwall - Social science computer review, 2011 - journals.sagepub.com
… , forums, and social network sites has created spaces in which previously private topics are
… as many others could be searched using the method above. Individual forums can also be …

Searching for experts in the enterprise: combining text and social network analysis

K Ehrlich, CY Lin, V Griffiths-Fisher - Proceedings of the 2007 ACM …, 2007 - dl.acm.org
… Existing systems have focused on search algorithms or methods of acquiring data that can
… and reveal content and social network data from communication logs in a private and secure …