Filters








13,764 Hits in 6.2 sec

Detecting and predicting privacy violations in online social networks

Özgür Kafalı, Akın Günay, Pınar Yolum
2013 Distributed and parallel databases  
We have developed PROT OSS, a run time tool for detecting and predicting PRivacy viOlaT ions in Online Social networkS.  ...  In addition to detection, PROT OSS can predict possible future violations by feeding in a hypothetical future world state.  ...  Accordingly, we propose PROT OSS, a run time tool to detect and predict possible privacy breaches in online social networks.  ... 
doi:10.1007/s10619-013-7124-8 fatcat:sooik3qdhfacxi2r5cabyxitva

Special issue on secure and privacy-aware data management

Elena Ferrari, Murat Kantarcioglu
2014 Distributed and parallel databases  
This special issue presents high quality solution ideas related to the secure and privacy-aware data management challenges occurring in different application domains, such as online social networks, location  ...  Many applications ranging from social networking to mobile phones create large amounts of potentially sensitive information related to individuals.  ...  The sixth paper: Detecting and Predicting Privacy Violations in Online Social Networks by Ozgur Kafali, Akin Gunay, and Pinar Yolum deals with detecting and preventing privacy violations in online social  ... 
doi:10.1007/s10619-014-7144-z fatcat:zmzwdba6yvfrpcv6gbzufizg6i

Automatic Generation of Explanations to Prevent Privacy Violations

Ramon Ruiz-Dolz, José Alemany, Stella Heras, Ana García-Fornes
2019 International Conference on Legal Knowledge and Information Systems  
With the massive use of online social environments and technologies, users' concern regarding the privacy of their own data has significantly increased.  ...  This method uses the available data from the network to anticipate any potential privacy violation, automatically generates explanations, and shows them to the user with the purpose of avoiding the detected  ...  Acknowledgements This work is partially supported by the Spanish Government project TIN2017-89156-R, the FPI grant BES-2015-074498, and the Valencian Government project PROME-TEO/2018/002.  ... 
dblp:conf/jurix/Ruiz-DolzAHG19 fatcat:wahbevqddze6jp3adty6anfz4q

PriGuard: A Semantic Approach to Detect Privacy Violations in Online Social Networks

Nadin Kokciyan, Pinar Yolum
2016 IEEE Transactions on Knowledge and Data Engineering  
Our categorization yields that the privacy violations in online social networks stem from intricate interactions and detecting these violations requires semantic understanding of events.  ...  Accordingly, this paper first categorizes the privacy violations that take place in online social networks.  ...  Using the meta-model, we formally define agent-based social networks, privacy requirements, and privacy violations in online social networks.  ... 
doi:10.1109/tkde.2016.2583425 fatcat:z3zufcz6nfdhnairer7y4vtz5i

Security techniques for intelligent spam sensing and anomaly detection in online social platforms

Monther Aldwairi, Loai Tawalbeh
2020 International Journal of Electrical and Computer Engineering (IJECE)  
In addition, we use the concept of social graphs and weighted cliques in the detection of suspicious behavior of certain online groups and to prevent further planned actions such as cyber/terrorist attacks  ...  Among the most powerful information spreading platforms are the Online Social Networks (OSN)s that allow Internet-connected users to share different information such as instant messages, tweets, photos  ...  CONCLUSION In this paper, we addressed the important issue of security and privacy in Online Social Networks.  ... 
doi:10.11591/ijece.v10i1.pp275-287 fatcat:hucpuhkbhfam5efmyjva3l2iki

GUEST EDITORIAL: Special Issue on Social Sensing and Privacy Computing in Intelligent Social Systems

Yulei Wu, Fei Hao, Juanjuan Li, Neil Y. Yen, Yi Pan, Victor C. M. Leung
2020 IEEE Transactions on Computational Social Systems  
The article entitled "Community Detection in Online Social Networks: A Differentially Private and Parsimonious Approach" by Ji et al. investigated community detection in social networks aiming to protect  ...  Community detection is an effective approach to unveil relationships among individuals in online social networks.  ... 
doi:10.1109/tcss.2020.2970304 fatcat:heirossfwbcafnzaz5gnqeaiqe

AI Model for Predicting Legal Judgments to Improve Accuracy and Explainability of Online Privacy Invasion Cases

Minjung Park, Sangmi Chai
2021 Applied Sciences  
Since there are growing concerns regarding online privacy, firms may have the risk of being involved in various privacy infringement cases resulting in legal causations.  ...  We also examined the relationship between privacy infringement factors and adjudications by applying network text analysis.  ...  Algorithms for Protecting Online Privacy Research on online privacy has focused on personal information that can be leaked in an e-commerce environment and online social networks [9] .  ... 
doi:10.3390/app112311080 fatcat:sq2hlz2w3bepfaetrv56smuuvm

Towards a Visual Privacy Advisor: Understanding and Predicting Privacy Risks in Images [article]

Tribhuvanesh Orekondy, Bernt Schiele, Mario Fritz
2017 arXiv   pre-print
Third, we propose models that predict user specific privacy score from images in order to enforce the users' privacy preferences.  ...  First, we categorize personal information in images into 68 image attributes and collect a dataset, which allows us to train models that predict such information directly from images.  ...  We thank Paarijaat Aditya, Philipp Müller and Julian Steil for advice on the user study. We also thank Dr. Mykhaylo Andriluka and Seong Joon Oh for valuable feedback on the paper.  ... 
arXiv:1703.10660v2 fatcat:7goroqiu35cghmj2hdfi7jxiqy

Pixel Privacy: Increasing Image Appeal while Blocking Automatic Inference of Sensitive Scene Information

Martha A. Larson, Zhuoran Liu, Simon Brugman, Zhengyu Zhao
2018 MediaEval Benchmarking Initiative for Multimedia Evaluation  
We introduce a new privacy task focused on images that users share online.  ...  The task benchmarks image transformation algorithms that are capable of blocking the ability of automatic classifiers to infer sensitive information in images.  ...  The motivation for the Pixel Privacy task is the growing concern about the information implicit in the user data that is shared online, and in particular, in the data accumulated by large social networks  ... 
dblp:conf/mediaeval/LarsonLBZ18 fatcat:xgl6zurmuvgangi4jutxqjbs4u

Methods of Profile Cloning Detection in Online Social Networks

Michał Zabielski, Rafał Kasprzyk, Zbigniew Tarapata, Krzysztof Szkółka, N. Mastorakis, V. Mladenov, A. Bulucea
2016 MATEC Web of Conferences  
In this paper an attempt was made to present a concept of profile cloning detection in Online Social Networks (OSN) using Graph and Networks Theory.  ...  With the arrival of online social networks, the importance of privacy on the Internet has increased dramatically.  ...  The complexity of the considerations about violating privacy in Online Social Networks intensifies the phenomenon of social network aggregation.  ... 
doi:10.1051/matecconf/20167604013 fatcat:33lpop6a7narpo4iagv4cdf6tu

Layering privacy on operating systems, social networks, and other platforms by design

Dawn N. Jutla
2010 Identity in the Information Society  
3) the evolution of the PeCAN (Personal Context Agent Networking) architecture to a platform for pervasively providing multiple contexts for user privacy preferences and online informational privacy services  ...  Pervasive, easy-to-use privacy services are keys to enabling users to maintain control of their private data in the online environment.  ...  Open Access This article is distributed under the terms of the Creative Commons Attribution Noncommercial License which permits any noncommercial use, distribution, and reproduction in any medium, provided  ... 
doi:10.1007/s12394-010-0057-8 fatcat:nxco3p2nfvenvfgizcdgt6qtoe

Conflict Detection Techniques for Preserving Privacy in Social Media

Fulpagare Priya K., Nitin N. Patil
2018 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
Multi-party privacy management is therefore of crucial importance for users to appropriately reserve their privacy in social media.  ...  Some users over CSS affect user's privacy on their personal contents, where some users keep on sending annoying comments and messages by taking advantage of the user's inherent trust in their relationship  ...  Strater et al. have evolved Online Social Network (OSN).  ... 
doi:10.32628/cseit183827 fatcat:4u3u22dtvfbpphtbkihbzyhrty

Survey on Privacy Policy Specification System for User Uploaded Images Over Popular Content Sharing Sites

Miss. Minal R Hirulkar
2017 International Journal for Research in Applied Science and Engineering Technology  
This information needs to remain private and each social network owns a privacy policy that describes in-depth how user's information is managed and published.  ...  The regular use of social networking websites and application encompasses the collection and retention of personal and very often sensitive information about users.  ...  Sharing images within online content sharing sites, therefore, may quickly lead to unwanted revelation and privacy violations.  ... 
doi:10.22214/ijraset.2017.2070 fatcat:a3uhplpq4jbftkx34x4f5ds3ca

Key Players Identification in Social Network for Preventing Private Information Leakage
English

T Priyanka
2014 International Journal of Computer Trends and Technology  
Online social networks namely Facebook, Twitter are highly utilized by various people.  ...  Current research uses key node identification framework in a network by using KPP-POS and KPP-NEG is described for finding sets of key players in a social network.  ...  The discovery of information and relationships from social network data without violating privacy is done by mining of data of privacy-preserving social network.  ... 
doi:10.14445/22312803/ijctt-v10p128 fatcat:owtntlwfxvezhokmleczeguvn4

Social Media Fake Account Detection for Afan Oromo Language using Machine Learning

2020 New Media and Mass Communication  
In this work we propose new model using machine learning and NLP (Natural Language Processing) techniques to enhance the accuracy rate in detecting the fake identities in online social networks.  ...  Smruthi, , February 2019).Online social networking sites became an important means in our daily life. Millions of users register and share personal information with others.  ...  As the expansion of greater security in online social networking sites it turned to be very hard to encroach into online social networks.  ... 
doi:10.7176/nmmc/90-01 fatcat:agdvymucizh7rm4rvejk3kd3ye
« Previous Showing results 1 — 15 out of 13,764 results