Skip to main content

Using Profiling Techniques to Protect the User’s Privacy in Twitter

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7647))

Abstract

The emergence of microblogging-based social networks shows how important it is for common people to share information worldwide. In this environment, Twitter has set it apart from the rest of competitors. Users publish text messages containing opinions and information about a wide range of topics, including personal ones. Previous works have shown that these publications can be analyzed to extract useful information for the society but also to characterize the users who generate them and, hence, to build personal profiles. This latter situation poses a serious threat to users’ privacy. In this paper, we present a new privacy-preserving scheme that distorts the real user profile in front of automatic profiling systems applied to Twitter. This is done while keeping user publications intact in order to interfere the least with her followers. The method has been tested using Twitter publications gathered from renowned users, showing that it effectively obfuscates users’ profiles.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. McMillan, G.: Twitter Reveals Active User Number, How Many Actually Say Something. Time - Techland (September 2011)

    Google Scholar 

  2. Consumer Reports National Research Center, Annual State of the Net Survey, Consumer Reports 75(6) (2010)

    Google Scholar 

  3. Rui, H., Whinston, A.: Information or attention? An empirical study of user contribution on Twitter. Information Systems and E-Business Management, 1–16 (2011)

    Google Scholar 

  4. Zhang, C., Sun, J., Zhu, X., Fang, Y.: Privacy and Security for Online Social Networks: Challenges and Opportunities. IEEE Network 24(4), 13–18 (2010)

    Article  Google Scholar 

  5. TweetPsych (2011), http://tweetpsych.com

  6. Peerindex (2011), http://www.peerindex.com

  7. Ebner, M., Mühlburger, H., Schaffert, S., Schiefner, M., Reinhardt, W., Wheeler, S.: Getting Granular on Twitter: Tweets from a Conference and Their Limited Usefulness for Non-participants. Key Competencies in the Knowledge Society 324, 102–113 (2010)

    Article  Google Scholar 

  8. Zoltan, K., Johann, S.: Semantic Analysis of Microposts for Efficient People to People Interactions. In: Proc. of the Roedunet International Conference – RoEduNet 2011, pp. 1–4 (2011)

    Google Scholar 

  9. Michelson, M., Macskassy, S.A.: Discovering Users’ Topics of Interest on Twitter: a First Look. In: Proc. of the Fourth Workshop on Analytics for Noisy Unstructured Text Data (2010)

    Google Scholar 

  10. Abel, F., Gao, Q., Houben, G.-J., Tao, K.: Semantic Enrichment of Twitter Posts for User Profile Construction on the Social Web. In: Antoniou, G., Grobelnik, M., Simperl, E., Parsia, B., Plexousakis, D., De Leenheer, P., Pan, J. (eds.) ESWC 2011, Part II. LNCS, vol. 6644, pp. 375–389. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  11. DBpedia (2011), http://dbpedia.org/

  12. Luo, W., Xie, Q., Hengartner, U.: Facecloak: an Architecture for User Privacy on Social Networking Sites. In: Proc. of the 2009 International Conference on Computational Science and Engineering, pp. 26–33 (2009)

    Google Scholar 

  13. Abril, D., Navarro-Arribas, G., Torra, V.: On the Declassification of Confidential Documents. In: Torra, V., Narakawa, Y., Yin, J., Long, J. (eds.) MDAI 2011. LNCS, vol. 6820, pp. 235–246. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  14. Martínez, S., Sánchez, D., Valls, A.: Semantic adaptive microaggregation of categorical microdata. Computers & Security 31(5), 653–672 (2012)

    Article  Google Scholar 

  15. Sánchez, D., Batet, M.: Semantic similarity estimation in the biomedical domain: An ontology-based information-theoretic perspective. Journal of Biomedical Informatics 44(5), 749–759 (2011)

    Article  Google Scholar 

  16. Sánchez, D.: A methodology to learn ontological attributes from the Web. Data and Knowledge Engineering 69(6), 573–597 (2010)

    Article  Google Scholar 

  17. Martínez, S., Sánchez, D., Valls, A., Batet, M.: Privacy protection of textual attributes through a semantic-based masking method. Information Fusion 13(4), 304–314 (2012)

    Article  Google Scholar 

  18. Sánchez, D., Moreno, A.: Pattern-based automatic taxonomy learning from the Web. AI Communications 21(1), 27–48 (2008)

    MathSciNet  MATH  Google Scholar 

  19. Sánchez, D., Isern, D., Millan, M.: Content Annotation for the Semantic Web: an Automatic Web-based Approach. Knowledge and Information Systems 27(3), 393–418 (2011)

    Article  Google Scholar 

  20. Guarino, N.: Formal Ontology in Information Systems. In: Proc. of the 1st International Conference on Formal Ontology in Information Systems, FOIS 1998, pp. 3–15 (1998)

    Google Scholar 

  21. Open Directory Project (2012), http://www.dmoz.org/docs/en/about.html

  22. Twitter - WhoToFollow (2012), http://twitter.com/#!/who_to_follow

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Viejo, A., Sánchez, D., Castellà-Roca, J. (2012). Using Profiling Techniques to Protect the User’s Privacy in Twitter. In: Torra, V., Narukawa, Y., López, B., Villaret, M. (eds) Modeling Decisions for Artificial Intelligence. MDAI 2012. Lecture Notes in Computer Science(), vol 7647. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34620-0_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34620-0_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34619-4

  • Online ISBN: 978-3-642-34620-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics