Sciweavers

170 search results - page 7 / 34
» A Practical Attack to De-anonymize Social Network Users
Sort
View
HICSS
2009
IEEE
195views Biometrics» more  HICSS 2009»
14 years 2 months ago
Cyber Migration: An Empirical Investigation on Factors that Affect Users' Switch Intentions in Social Networking Sites
In recent years, Social Networking Sites (SNSs) have increasingly gained popularity. With the existence of hundreds of such sites, it is not uncommon to have users switching betwe...
Zengyan Cheng, Yinping Yang, John Lim
WSDM
2010
ACM
214views Data Mining» more  WSDM 2010»
14 years 5 months ago
You are who you know: Inferring user profiles in Online Social Networks
Online social networks are now a popular way for users to connect, express themselves, and share content. Users in today's online social networks often post a profile, consis...
Alan Mislove, Bimal Viswanath, P. Krishna Gummadi,...
IH
2001
Springer
14 years 1 days ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn
BCSHCI
2008
13 years 9 months ago
Representing location in location-based social awareness systems
We analyze the results of a survey distributed to heavy users of social networking website on current mobile communications practices regarding location disclosure. We discovered ...
Michael Voong, Russell Beale
SOCIALCOM
2010
13 years 5 months ago
Bonding vs. Bridging Social Capital: A Case Study in Twitter
Online communities are connecting large numbers of individuals and generating rich social network data, opening the way for empirical studies of social behavior. In this paper, we ...
Matthew S. Smith, Christophe G. Giraud-Carrier