In the last decade, the advertisement market spread significantly in the web and mobile app system. Its effectiveness is also due thanks to the possibility to target the advertisement on …
In this work we study information leakage through discussions in online social networks. In particular, we focus on articles published by news pages, in which a person's name is …
Abstract Online Social Networks (OSNs), such as Facebook, provide users with tools to share information along with a set of privacy controls preferences to regulate the spread of …
Confidential information is all too easily leaked by naive users posting comments. In this paper we introduce DUIL, a system for Detecting Unintentional Information Leakers. The …
C Liu, P Mittal - arXiv preprint arXiv:1501.01361, 2015 - arxiv.org
Social network based trust relationships present a critical foundation for designing trustworthy systems, such as Sybil defenses, secure routing, and anonymous …
Perus-ja ihmisoikeusnäkökulma on korostuneessa roolissa salaisissa tiedonhankinta-ja pakkokeinoissa. Tietoverkoissa kotirauhan suoja ei ole merkittävässä roolissa, mutta …
The paper presents a method, based on graph and network theory, which allows to detect cloned user profiles on Online Social Networks. Moreover, an idea of similarity containers …
This paper considers online news censorship and it concentrates on censorship of identities. Obfuscating identities may occur for disparate reasons, from military to judiciary ones. In the …
Over the last decade online services have penetrated the market and for many of us became an integral part of our software portfolio. On the one hand online services offer flexibility in …