skip to main content
survey

A Systematic Mapping Study on Social Network Privacy: Threats and Solutions

Published:09 April 2024Publication History
Skip Abstract Section

Abstract

Online Social Networks (OSNs) are becoming pervasive in today’s world. Millions of people worldwide are involved in different forms of online networking. However, this ease of use of OSNs comes with a cost in terms of privacy. Users of OSNs become victims of identity theft, cyberstalking, and information leakage, which are real threats to privacy. These threats can obtain a user’s personal information and disclose it for malicious purposes. To understand how researchers are addressing this question, the state of the art of the existing privacy threats in OSNs described in the literature and the existing academic research-based solutions to address such threats were reviewed. To this end, we performed a systematic mapping study to identify, classify and analyze them. From the initial set of 1,117 papers, we selected and extracted 45 publications reporting different threats and solutions. Based on this, this is the first systematic mapping study, to provide: a) well-defined categories of specific privacy threats in the OSN domain; and b) the available academic solutions for preventing these threats. Our results serve as a guide for researchers and analysts in academia and industry to understand the most important privacy threats in OSNs and make moves towards mitigating them.

REFERENCES

  1. [1] Abawajy J. H., Ninggal M. I. H., Aghbari Z. A., Darem A. B., and Alhashmi A.. 2018. Privacy threat analysis of mobile social network data publishing. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST 239 (2018), 6068. DOI:cited By 0.Google ScholarGoogle ScholarCross RefCross Ref
  2. [2] Abawajy J. H., Ninggal M. I. H., and Herawan T.. 2016. Privacy preserving social network data publication. IEEE Communications Surveys and Tutorials 18, 3 (2016), 19741997. DOI:cited By 37.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Abawajy Jemal H., Ninggal Mohd Izuan Hafez, and Herawan Tutut. 2016. Privacy preserving social network data publication. IEEE Communications Surveys & Tutorials 18, 3 (2016), 19741997.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Abid Younes, Imine Abdessamad, and Rusinowitch Michael. 2018. Online testing of user profile resilience against inference attacks in social networks. In European Conference on Advances in Databases and Information Systems. Springer, 105117.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Abid Y., Imine A., and Rusinowitch M.. 2018. Online testing of user profile resilience against inference attacks in social networks. Communications in Computer and Information Science 909 (2018), 105117. DOI:cited By 0.Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Akcora C., Carminati B., and Ferrari E.. 2012. Privacy in social networks: How risky is your social graph? Proceedings - International Conference on Data Engineering (2012), 919. DOI:cited By 38.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Aktypi A., Nurse J. R. C., and Goldsmith M.. 2017. Unwinding Ariadne’s identity thread: Privacy risks with fitness trackers and online social networks. MPS 2017 - Proceedings of the 2017 Workshop on Multimedia Privacy and Security, co-located with CCS 2017 January (2017), 111. DOI:cited By 6.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] Al-Asmari H. A. and Saleh M. S.. 2019. A conceptual framework for measuring personal privacy risks in Facebook online social network. 2019 International Conference on Computer and Information Sciences (ICCIS’19) (2019). DOI:cited By 0.Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Alemany J., Val E. Del, Alberola J. M., and Garcia-Fornes A.. 2019. Metrics for privacy assessment when sharing information in online social networks. IEEE Access 7 (2019), 143631143645. DOI:cited By 0.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Alemany J., Val E. del, Alberola J., and García-Fornes A.. 2019. Enhancing the privacy risk awareness of teenagers in online social networks through soft-paternalism mechanisms. International Journal of Human Computer Studies 129 (2019), 2740. DOI:cited By 0.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] Ali S., Rauf A., Islam N., and Farman H.. 2019. A framework for secure and privacy protected collaborative contents sharing using public OSN. Cluster Computing 22 (2019), 72757286. DOI:cited By 0.Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Alrayes F. S., Abdelmoty A. I., El-Geresy W. B., and Theodorakopoulos G.. 2020. Modelling perceived risks to personal privacy from location disclosure on online social networks. International Journal of Geographical Information Science 34, 1 (2020), 150176. DOI:cited By 0.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] Altman Irwin. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. ERIC, (1975).Google ScholarGoogle Scholar
  14. [14] Kitchenham B. and Charters S.. 2007. Guidelines for Performing Systematic Literature Reviews in Software Engineering. Technical report, Ver. 2.3 EBSE Technical Report.Google ScholarGoogle Scholar
  15. [15] Basili Victor R. and Rombach H. Dieter. 1988. The TAME project: Towards improvement-oriented software environments. IEEE Transactions on Software Engineering 14, 6 (1988), 758773.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. [16] Biega J., Mele I., and Weikum G.. 2014. Probabilistic prediction of privacy risks in user search histories. PSBD 2014 - Proceedings of the 1st International Workshop on Privacy and Security of Big Data, co-located with CIKM 2014 (2014), 2936.DOI:cited By 5.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] Bioglio L., Capecchi S., Peiretti F., Sayed D., Torasso A., and Pensa R. G.. 2019. A social network simulation game to raise awareness of privacy among school children. IEEE Transactions on Learning Technologies 12, 4 (2019), 456469. DOI:cited By 1.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Brakemeier H., Widjaja T., and Buxmann P.. 2016. Calculating with different goals in mind - The moderating role of the regulatory focus in the privacy calculus. 24th European Conference on Information Systems, ECIS 2016 (2016). cited By 1.Google ScholarGoogle Scholar
  19. [19] Winkelman Sloane Burke, Oomen-Early Jody, Walker Ashley D., Chu Lawrence, and Yick-Flanagan Alice. 2015. Exploring cyber harassment among women who use social media. Universal Journal of Public Health 3, 5 (2015), 194.Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Casas I., Hurtado J., and Zhu X.. 2015. Social network privacy: Issues and measurement. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 9419 (2015), 488502. DOI:cited By 2.Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Davies Harry. 2015. Ted Cruz using firm that harvested data on millions of unwitting Facebook users. The Guardian 11 (2015), 2015.Google ScholarGoogle Scholar
  22. [22] De S. J. and Imine A.. 2018. Privacy scoring of social network user profiles through risk analysis. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10694 LNCS (2018), 227243. DOI:cited By 0.Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] De S. J. and Imine A.. 2018. To reveal or not to reveal: Balancing user-centric social benefit and privacy in online social networks. Proceedings of the ACM Symposium on Applied Computing (2018), 11571164. DOI:cited By 3.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. [24] Deliri Sepideh and Albanese Massimiliano. 2015. Security and privacy issues in social networks. In Data Management in Pervasive Systems. Springer, 195209.Google ScholarGoogle ScholarCross RefCross Ref
  25. [25] Derlega Valerian J. and Chaikin Alan L.. 1977. Privacy and self-disclosure in social relationships. Journal of Social Issues 33, 3 (1977), 102115.Google ScholarGoogle ScholarCross RefCross Ref
  26. [26] Dong C. and Zhou B.. 2016. Privacy inference analysis on event-based social networks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10047 LNCS (2016), 421438. DOI:cited By 0.Google ScholarGoogle ScholarCross RefCross Ref
  27. [27] Du Suguo, Li Xiaolong, Zhong Jinli, Zhou Lu, Xue Minhui, Zhu Haojin, and Sun Limin. 2018. Modeling privacy leakage risks in large-scale social networks. IEEE Access 6 (2018), 1765317665.Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Du S., Li X., Zhong J., Zhou L., Xue M., Zhu H., and Sun L.. 2018. Modeling privacy leakage risks in large-scale social networks. IEEE Access 6 (2018), 1765317665. DOI:cited By 4.Google ScholarGoogle ScholarCross RefCross Ref
  29. [29] Erlandsson F., Boldt M., and Johnson H.. 2012. Privacy threats related to user profiling in online social networks. Proceedings - 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust and 2012 ASE/IEEE International Conference on Social Computing, SocialCom/PASSAT 2012 (2012), 838842. DOI:cited By 11.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. [30] Ferreyra N. E. D., Meis R., and Heisel M.. 2017. Should user-generated content be a matter of privacy awareness? A position paper. IC3K 2017 - Proceedings of the 9th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management 3 (2017), 212216. cited By 2.Google ScholarGoogle Scholar
  31. [31] Fogues R., Such J. M., Espinosa A., and Garcia-Fornes A.. 2015. Open Challenges in Relationship-Based Privacy Mechanisms for Social Network Services. International Journal of Human-Computer Interaction 31, 5 (2015), 350370. DOI:cited By 30.Google ScholarGoogle ScholarCross RefCross Ref
  32. [32] Fung Benjamin C. M., Wang Ke, Chen Rui, and Yu Philip S.. 2010. Privacy-preserving data publishing: A survey of recent developments. ACM Computing Surveys (CSUR) 42, 4 (2010), 153.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. [33] Mayra Zurbarán, Liliana González, Pedro Wightman Rojas, and Miguel Labrador. 2014. A survey on privacy in location-based services. Ingeniería y Desarrollo 32, 2 (2014), 314–343.Google ScholarGoogle Scholar
  34. [34] Halevi Gali, Moed Henk, and Bar-Ilan Judit. 2017. Suitability of Google Scholar as a source of scientific information and as a source of data for scientific evaluation-review of the literature. Journal of Informetrics 11, 3 (2017), 823834.Google ScholarGoogle ScholarCross RefCross Ref
  35. [35] Islam Mohammad Badiul, Iannella Renato, Watson Jason, and Geva Shlomo. 2015. Privacy architectures in social networks’ state-of-the-art survey. International Journal of Information Privacy, Security and Integrity 2, 2 (2015), 102137.Google ScholarGoogle ScholarCross RefCross Ref
  36. [36] Jaafor Omar and Birregah Babiga. 2015. Multi-layered graph-based model for social engineering vulnerability assessment. In 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 14801488.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. [37] Jaafor O., Birregah B., Perez C., and Lemercier M.. 2015. Privacy threats from social networking service aggregators. Proceedings - 5th Cybercrime and Trustworthy Computing Conference, CTC 2014 (2015), 3037.DOI:cited By 2.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. [38] Jain Ankit Kumar, Sahoo Somya Ranjan, and Kaubiyal Jyoti. 2021. Online social networks security and privacy: Comprehensive review and analysis. Complex & Intelligent Systems 7, 5 (2021), 21572177.Google ScholarGoogle ScholarCross RefCross Ref
  39. [39] Jin L., Long X., and Joshi J. B. D.. 2012. Towards understanding residential privacy by analyzing users’ activities in Foursquare. Proceedings of the ACM Conference on Computer and Communications Security (2012), 2532. DOI:cited By 9.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. [40] De S. Joyee and Imine A.. 2019. On consent in online social networks: Privacy impacts and research directions (short paper). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 11391 LNCS (2019), 128135. DOI:cited By 0.Google ScholarGoogle ScholarCross RefCross Ref
  41. [41] Kagan Dima, Alpert Galit Fuhrmann, and Fire Michael. 2020. Zooming into video conferencing privacy and security threats. arXiv preprint arXiv:2007.01059 (2020).Google ScholarGoogle Scholar
  42. [42] Kavianpour S., Ismail Z., and Mohtasebi A.. 2011. Effectiveness of using integrated algorithm in preserving privacy of social network sites users. Communications in Computer and Information Science 167 CCIS, PART 2 (2011), 237249. DOI:cited By 0.Google ScholarGoogle ScholarCross RefCross Ref
  43. [43] Kayes Imrul and Iamnitchi Adriana. 2017. Privacy and security in online social networks: A survey. Online Social Networks and Media 3 (2017), 121.Google ScholarGoogle ScholarCross RefCross Ref
  44. [44] Kitchenham Barbara, Brereton O. Pearl, Budgen David, Turner Mark, Bailey John, and Linkman Stephen. 2009. Systematic literature reviews in software engineering–A systematic literature review. Information and Software Technology 51, 1 (2009), 715.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. [45] Kitchenham Barbara, Pretorius Rialette, Budgen David, Brereton O. Pearl, Turner Mark, Niazi Mahmood, and Linkman Stephen. 2010. Systematic literature reviews in software engineering–A tertiary study. Information and Software Technology 52, 8 (2010), 792805.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. [46] Kumar H., Jain S., and Srivastava R.. 2017. Risk analysis of online social networks. Proceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA 2016 (2017), 846851. DOI:cited By 1.Google ScholarGoogle ScholarCross RefCross Ref
  47. [47] Laorden Carlos, Sanz Borja, Alvarez Gonzalo, and Bringas Pablo G.. 2010. A threat model approach to threats and vulnerabilities in on-line social networks. In Computational Intelligence in Security for Information Systems 2010. Springer, 135142.Google ScholarGoogle ScholarCross RefCross Ref
  48. [48] Li J.. 2015. A privacy preservation model for health-related social networking sites. Journal of Medical Internet Research 17, 7 (2015). DOI:cited By 14.Google ScholarGoogle ScholarCross RefCross Ref
  49. [49] Li Y., Li Y., Yan Q., and Deng R. H.. 2015. Privacy leakage analysis in online social networks. Computers and Security 49 (2015), 239254. DOI:cited By 33.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. [50] Mahmood S.. 2012. New privacy threats for Facebook and Twitter users. Proceedings - 2012 7th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2012 (2012), 164169. DOI:cited By 10.Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. [51] Ninggal M. I. H. and Abawajy J.. 2011. Privacy threat analysis of social network data. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 7017 LNCS, PART 2 (2011), 165174. DOI:cited By 6.Google ScholarGoogle ScholarCross RefCross Ref
  52. [52] Nissenbaum Helen. 2004. Privacy as contextual integrity. Wash. L. Rev. 79 (2004), 119.Google ScholarGoogle Scholar
  53. [53] Nobari S., Karras P., Pang H., and Bressan S.. 2014. L-opacity: Linkage-aware graph anonymization. Advances in Database Technology - EDBT 2014: 17th International Conference on Extending Database Technology, Proceedings (2014), 583594. DOI:cited By 9.Google ScholarGoogle ScholarCross RefCross Ref
  54. [54] Oukemeni Samia, Rifa-Pous Helena, and Puig Joan Manuel Marquès. 2019. Privacy analysis on microblogging online social networks: A survey. ACM Computing Surveys (CSUR) 52, 3 (2019), 136.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. [55] Parra-Arnau Javier, Rebollo-Monedero David, and Forné Jordi. 2014. Measuring the privacy of user profiles in personalized information systems. Future Generation Computer Systems 33 (2014), 5363.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. [56] Pensa R. G. and Blasi G. Di. 2017. A privacy self-assessment framework for online social networks. Expert Systems with Applications 86 (2017), 1831. DOI:cited By 10.Google ScholarGoogle ScholarCross RefCross Ref
  57. [57] Pensa Ruggero Gaetano and Bioglio Livio. 2017. Your privacy, my privacy? On leakage risk assessment in online social networks. In International Workshop on Personal Analytics and Privacy. Springer, 39.Google ScholarGoogle Scholar
  58. [58] Petersen Kai, Feldt Robert, Mujtaba Shahid, and Mattsson Michael. 2008. Systematic mapping studies in software engineering. In 12th International Conference on Evaluation and Assessment in Software Engineering (EASE) 12. 110.Google ScholarGoogle ScholarCross RefCross Ref
  59. [59] Petronio Sandra. 2002. Boundaries of Privacy: Dialectics of Disclosure. Suny Press.Google ScholarGoogle ScholarCross RefCross Ref
  60. [60] Puglisi S., Rebollo-Monedero D., and Forné J.. 2017. On the anonymity risk of time-varying user profiles. Entropy 19, 5 (2017), 116. DOI:cited By 0.Google ScholarGoogle ScholarCross RefCross Ref
  61. [61] Rathore N. C. and Tripathy S.. 2017. A trust-based collaborative access control model with policy aggregation for online social networks. Social Network Analysis and Mining 7, 1 (2017). DOI:cited By 9.Google ScholarGoogle ScholarCross RefCross Ref
  62. [62] Rathore S., Sharma P. K., Loia V., Jeong Y.-S., and Park J. H.. 2017. Social network security: Issues, challenges, threats, and solutions. Information Sciences 421 (2017), 4369. DOI:cited By 35.Google ScholarGoogle ScholarCross RefCross Ref
  63. [63] Sai Akshita Maradapu Vera Venkata and Li Yingshu. 2020. A survey on privacy issues in mobile social networks. IEEE Access 8 (2020), 130906130921.Google ScholarGoogle ScholarCross RefCross Ref
  64. [64] Shao Y., Liu J., Shi S., Zhang Y., and Cui B.. 2019. Fast de-anonymization of social networks with structural information. Data Science and Engineering (2019). DOI:cited By 0.Google ScholarGoogle ScholarCross RefCross Ref
  65. [65] Shokri Reza, Theodorakopoulos George, Troncoso Carmela, Hubaux Jean-Pierre, and Boudec Jean-Yves Le. 2012. Protecting location privacy: Optimal strategy against localization attacks. In Proceedings of the 2012 ACM Conference on Computer and Communications Security. 617627.Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. [66] Solon Olivia. 2018. Facebook says Cambridge Analytica may have gained 37m more users’ data. The Guardian 4 (2018).Google ScholarGoogle Scholar
  67. [67] Song X., Wang X., Nie L., He X., Chen Z., and Liu W.. 2018. A personal privacy preserving framework: I let you know who can see what. 41st International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2018 (2018), 295304. DOI:cited By 3.Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. [68] Sramka M.. 2012. Privacy scores: Assessing privacy risks beyond social networks. Infocommunications Journal 4, 4 (2012), 3641. cited By 1.Google ScholarGoogle Scholar
  69. [69] Taheri-Boshrooyeh Sanaz, Küpçü Alptekin, and Özkasap Öznur. 2015. Security and privacy of distributed online social networks. In 2015 IEEE 35th International Conference on Distributed Computing Systems Workshops. IEEE, 112119.Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. [70] Tang C., Wang Y., Xiong H., Yang T., Hu J., Shen Q., and Chen Z.. 2011. Need for symmetry: Addressing privacy risks in online social networks. Proceedings - International Conference on Advanced Information Networking and Applications, AINA (2011), 534541. DOI:cited By 4.Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. [71] Tucker R., Tucker C., and Zheng J.. 2015. Privacy Pal: Improving permission safety awareness of third party applications in online social networks. Proceedings - 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security and 2015 IEEE 12th International Conference on Embedded Software and Systems, HPCC-CSS-ICESS 2015 (2015), 12681273. DOI:cited By 2.Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. [72] Vu H. Q., Law R., and Li G.. 2019. Breach of traveller privacy in location-based social media. Current Issues in Tourism 22, 15 (2019), 18251840. DOI:cited By 2.Google ScholarGoogle ScholarCross RefCross Ref
  73. [73] Wang Y. and Nepali R. K.. 2015. Privacy threat modeling framework for online social networks. 2015 International Conference on Collaboration Technologies and Systems, CTS 2015 (2015), 358363. DOI:cited By 5.Google ScholarGoogle ScholarCross RefCross Ref
  74. [74] Wen G., Liu H., Yan J., and Wu Z.. 2018. A privacy analysis method to anonymous graph based on Bayes rule in social networks. Proceedings - 14th International Conference on Computational Intelligence and Security, CIS 2018 (2018), 469472.DOI:cited By 0.Google ScholarGoogle ScholarCross RefCross Ref
  75. [75] Williams James. 2010. Social networking applications in health care: Threats to the privacy and security of health information. In Proceedings of the 2010 ICSE Workshop on Software Engineering in Health Care. 3949.Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. [76] Wohlin Claes, Runeson Per, Höst Martin, Ohlsson Magnus C., Regnell Björn, and Wesslén Anders. 2012. Experimentation in Software Engineering. Springer Science & Business Media.Google ScholarGoogle ScholarCross RefCross Ref
  77. [77] Xu Chang, Xie Xuan, Zhu Liehuang, Sharif Kashif, Zhang Chuan, Du Xiaojiang, and Guizani Mohsen. 2020. PPLS: A privacy-preserving location-sharing scheme in mobile online social networks. Science China Information Sciences 63 (2020), 111.Google ScholarGoogle ScholarCross RefCross Ref
  78. [78] Xu Heng, Teo Hock-Hai, and Tan Bernard. 2005. Predicting the adoption of location-based services: The role of trust and perceived privacy risk. ICIS 2005 Proceedings (2005), 71.Google ScholarGoogle Scholar
  79. [79] Yadav Uma Shree, Gupta Brij B., Peraković Dragan, Peñalvo Francisco José García, and Cvitić Ivan. 2022. Security and privacy of cloud-based online online social media: A survey. In Sustainable Management of Manufacturing Systems in Industry 4.0. Springer, 213236.Google ScholarGoogle ScholarCross RefCross Ref
  80. [80] Yassein Muneer Bani, Aljawarneh Shadi, and Wahsheh Yarub A.. 2019. Survey of online social networks threats and solutions. In 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT). IEEE, 375380.Google ScholarGoogle ScholarCross RefCross Ref
  81. [81] Yi Yuzi, Zhu Nafei, He Jingsha, Jurcut Anca Delia, Ma Xiangjun, and Luo Yehong. 2023. A privacy-dependent condition-based privacy-preserving information sharing scheme in online social networks. Computer Communications (2023).Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. [82] Zeng Y., Sun Y., Xing L., and Vokkarane V.. 2014. Trust-aware privacy evaluation in online social networks. 2014 IEEE International Conference on Communications, ICC 2014 (2014), 932938. DOI:cited By 5.Google ScholarGoogle ScholarCross RefCross Ref
  83. [83] Zeng Y., Sun Y., Xing L., and Vokkarane V.. 2015. A study of online social network privacy via the TAPE framework. IEEE Journal on Selected Topics in Signal Processing 9, 7 (2015), 12701284. DOI:cited By 7.Google ScholarGoogle ScholarCross RefCross Ref
  84. [84] Zhang A., Gunter C. A., Xie X., Han J., Chang K. C.-C., and Wang X.. 2014. Privacy risk in anonymized heterogeneous information networks. Advances in Database Technology - EDBT 2014: 17th International Conference on Extending Database Technology, Proceedings (2014), 595606. DOI:cited By 7.Google ScholarGoogle ScholarCross RefCross Ref
  85. [85] Zhang X., Zhang L., and Gu C.. 2017. Security risk estimation of social network privacy issue. ACM International Conference Proceeding Series (2017), 8185. DOI:cited By 2.Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. [86] Zheleva Elena and Getoor Lise. 2009. To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles. In Proceedings of the 18th International Conference on World Wide Web. 531540.Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. [87] Zheleva Elena and Getoor Lise. 2011. Privacy in social networks: A survey. In Social Network Data Analytics. Springer, 277306.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. A Systematic Mapping Study on Social Network Privacy: Threats and Solutions

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Computing Surveys
        ACM Computing Surveys  Volume 56, Issue 7
        July 2024
        1006 pages
        ISSN:0360-0300
        EISSN:1557-7341
        DOI:10.1145/3613612
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 9 April 2024
        • Online AM: 7 February 2024
        • Accepted: 31 January 2024
        • Revised: 30 September 2023
        • Received: 23 July 2022
        Published in csur Volume 56, Issue 7

        Check for updates

        Qualifiers

        • survey
      • Article Metrics

        • Downloads (Last 12 months)230
        • Downloads (Last 6 weeks)61

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text