<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Privacy Protection Model for Online Social Networks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Javed Ahmed</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Luxembourg</institution>
          ,
          <country country="LU">Luxembourg</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Online Social Networks (OSNs) have become an important part of daily digital interactions for more than half a billion users around the world. Unconstrained by physical spaces, OSNs o er to web users new interesting means to communicate, interact, and socialize. While these networks make frequent data sharing and inter-user communications instantly possible, privacy-related issues are their obvious much discussed immediate consequences. Recent research identi es a growing privacy problem that exists within OSNs. Several studies have shown how easily strangers can extract personal data about users from the OSNs. There is need for automatic and easy to use privacy protection mechanism. We propose social interaction based audience segregation model for online social networks. Our model uses type, frequency, and initiation factor of social interactions to calculate relationship strength. This model mimics real life interaction patterns and makes online social networks more privacy friendly.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        analyzed, manipulated, systematized, formalized, classi ed, and aggregated [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
This poses a serious privacy threat to OSN users, and that is the main reason
privacy is hotly debated topic in research literature [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. After an
extensive analysis of the articles on privacy issues in online social networks, we
conclude that OSNs users are unable to control privacy vulnerabilities due to
following reasons:
In exible Privacy Tools: Privacy tools in online social networks are not
exible enough to protect user data. Most online social networks only allow
users to make their data either public or private. Facebook is one of the few
online social networks that provide detailed privacy settings. However,
privacy interface is too complicated to most of the normal users. The current
interface has limited visual feedback, confusing language, and promotes a
poor mental model of how the settings a ect the pro le. Even after
modifying settings, users can experience di culty in ensuring that their settings
match the actual desired outcome [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        Risky Friends: Although friends can enrich the social graph of users, they can
also be a source of privacy risk, because a new relationship always implies the
release of some personal information to the new friend as well as to friends of
the new friend, which are strangers for the user. Online social network users
cannot control what others reveal about them. It is possible for information
to be passed on without one's consent [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. For example, Javed and
Serena are friends in online social network. Serena is very careful about the
privacy. She adopts a policy that conceals all her friends from public. On
the other hand, Javed uses a weaker policy that allows any users to view
his friends. In this case, Serena's relationship with Javed can still be learned
through Javed. We say that privacy con ict occurs as Serena's restrictive
policy is violated by Javed's weaker privacy policy. This shows that the user
can only control one direction of an inherently bidirectional relationship.
Third Party Applications: Online social networks o er open platforms to
enable third party developers to build applications which provide seamless
integration of pro le data to third party applications. These applications
pose serious privacy risk for online social network users because installed
applications receive the privileges equal to owner of the pro le and can access
user's pro le data. Third party application developers have access to user's
data regardless of the actual application needs. Facebook additionally gives
social applications second degree access which means if Javed installs a social
application then the application can also request information about Javed's
friends and fellow network members. Moreover, users have no control over
how third party companies use their personal information [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]
OSN Service Providers: OSN service providers have too much control over
user information. The individuals accept terms of privacy policy before
creating account on such services. By accepting the terms of the policy, OSN
user volunteer to relinquish some known right or privileges they may have.
OSN users are unaware of how their personal information is being used, and
it is unclear to the users if the OSN is respecting its privacy policy.
Moreover, personal information of the user is retained even after the user decide
to delete his account. Some of the privacy threat related to OSN service
providers are data retention, targeted marketing, selling of data etc [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
We are addressing risky friends threat to privacy of OSNs users, and propose
interaction based audience segregation model for online social networks. The main
motivation for this research is providing users with audience segregation model
which mimic real life interaction patterns. In everyday life individuals have ne
grain control over what kind of information is presented to di erent audiences.
Mirroring similar strategy for online social networks can enhance privacy and
give user more control on his personal information. The binary nature of a
relationship in OSNs make privacy uncontrollable. The relationship strength is
crucial factor to decide what to reveal and whom to reveal. This research is step
towards providing OSN users with tools to manage their relationship in similar
ways as they do in real life. This doctoral synopsis is organized as follows.
Section 2 discusses research problem and identify research questions to address this
problem. Section 3 presents preliminary interactions based audience segregation
model, and Section 4 covers state of art related to the privacy problem of OSNs.
Finally, Section 5 concludes the doctoral synopsis providing directions for future
work.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Research Problem</title>
      <p>
        Exponential growth of online social networks resulted in fundamental shift in
status of end users. Individual end users become content managers instead of
just being content consumers. Today, for every single piece of data shared on
OSNs, the uploader must decide which of his friends should be able to access
the data. In OSNs, term "friend" has become all-encompassing, it has become
increasingly di cult for users to control which friends get to see what personal
information. Several studies on Facebook usage have shown that the average
number of friends per user is approximately 150. Anyone can make a request to
join a user's friend circle{family members, colleagues, classmates, acquaintances,
strangers etc. Current literature support the claim that users are willing to add
strangers to their friend circle [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. However, allowing strangers to join user's
friend circle can lead to a number of privacy risks [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Most of the OSNs
provide users with binary relational ties (e.g., friends or stranger) [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. This binary
indicator provides only a coarse indication of the nature of the relationship. In
reality human relationships are much more complicated than a single binary
relational tie. There is need for segregation of friends according to the strength of
relational ties. Some of the social networking sites have begun providing
friendlists feature, in order to help users in organizing a large friend network into
groups. Grouping several hundred friends into di erent lists, however, can be
a laborious process; on what basis should users construct the friend-lists? And
even if the user were to group friends into lists, are these lists meaningful for
setting privacy policies? To alleviate the burden of constructing meaningful lists
manually, we propose interaction based audience segregation model for online
social networks. The estimation of friendship interaction intensity among OSN
users and its classi cation based on di erent level of intensity can be quite
useful for identifying privacy threat from individuals added as friends. The social
web is kind of virtual society that exhibits many of the characteristics of real
societies in term of forming relationships and how those relationships are
utilized. In real societies, the relationship strength is a crucial factor for individuals
while deciding the boundaries of their privacy. Moreover, this subjective feeling
is quite e ciently utilized by humans to decide various other privacy related
aspects such as what to reveal and whom to reveal. The main question for this
research is how interactions of users determine tie strength and implement
privacy in online social networks. More speci cally, we want to explore whether a
user's interaction with his friends can be used as a basis for making data access
decision for that user. To answer this question, we need to understand nature of
privacy in online social networks and dynamics of interactions intensity for OSN
users. We break main research question into three sub questions:
{ How to measure privacy risk associated with social graph of OSN users?
{ How to construct interaction graph by quantifying users interactions in OSN?
{ How to segregate audience on the basis of interaction graph in OSN?
From our rst research question, we quantify the privacy risk attributed to friend
relationship in online social networks. We show that risky friends can reveal user
personal information unintentionally in online social networks. Second research
question deals with user's interaction patterns in online social networks. We
show that users tend to interact mostly with small subset of friends, often
having no interactions with majority of their friends in online social networks. This
cast doubts on the practice of extracting meaningful relationships from social
graphs. We suggest interaction based model for validating user relationships in
online social networks. Third research question deals with audience segregation.
We consider social interactions as currency to estimate friendship strength and
perform audience segregation. Providing users with audience segregation
mechanism would improve the quality of interactions and self presentations.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Our Approach</title>
      <p>We propose interaction based audience segregation model for online social
networks. We consider interaction intensity as a proxy for relationship quality. It
is used as currency for making data access decisions in online social networks.
Current online social networks assume binary, symmetric relationship of equal
value between all directly connected OSN users. In real world an individual has
relationships of vary quality with his friends. Providing OSN users a
mechanism which mimic real life interaction patterns to larger extent would improve
self presentation, and reduce privacy risks. It will also enable users to avoid
social convergence, and provide users opportunity to present di erent sides of
themselves to di erent audiences. Our model considers several factors to
identify relationship quality such as type, frequency and interaction initiation. We
describe in detail all these aspects of interactions to understand the usefulness
of our approach.</p>
      <p>The type of interaction is quite important in order to calculate friendship
strength because an individual choose an interaction type according to the
nature of relationship with its target audience. Hence, the interaction type de nes
the intimacy, openness, sensitivity as well as strength of relationship between
communicating parties. Some of the interaction types are preferred to
communicate with close friends, whereas the others to interact with ordinary friends.
Hence, all interaction types cannot be given similar weight in estimation of
relationship strength. Each interaction type is given a numerical weight in order to
increase or decrease its contribution in development relationship strength. Our
computation model take into considerations latent as well as active interaction
types. The latent interactions are non-reciprocal in nature such as pro le visits,
whereas active interactions are visible actions such as wall posts and comments.
The active interactions can be further classi ed into real time as well as non-real
time interactions. The real time interaction requires the presence of interacting
parties and examples of such interaction is chatting. Private messaging and
status updates can be classi ed as non-real time interactions. Apart from active
interactions based measures, we can use latent interactions to calculate
friendship strength. Latent interactions are more prevalent and frequent in online social
networks. Pro le visits is a latent interaction and it is very frequent in nature
in online social networks. It can be a measure for friendship strength
estimation. Mutual friends can be another important measure for friendship strength
estimation. Many common friends lead to the fact that individuals are strongly
connected with each other, or they share same context such colleagues, family
etc.</p>
      <p>The interaction count refer to the total number of interactions between an
individual and his friends within certain period of time. The frequency of
interaction demonstrates the willingness of the user to communicate with his friends.
The interaction initiation aspect is very important to understand relationship
strength. Some times an individual user is spammed with a lot of interactions
initiated by his friends, but his response to that communication determines his
willingness to interact. So, we categorize interactions initiation factor in following
two ways.</p>
      <p>Initiated Interactions These interactions are initiated by the user with his
friends. These interactions have more weight in developing relationship strength
because the user is willing to communicate and collaborate with his friends.
Received Interactions These interactions are received by the user from his
social circle. These interactions have less weight in developing relationship
strength because willingness of communication and collaboration is coming
from friends. We chose to focus on interactions initiated by the user to limit
the in ationary e ect of message senders. Some users can arti cially boost
their status with a particular friend by frequently interact with him.</p>
      <p>We consider interactions as a very strong indicator for audience segregation.
Our model calculates interaction intensity that can be useful in audience
segregation.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Related Work</title>
      <p>
        The development of usable, ne grained tools for protecting personal data is
serious emerging problem in online social networks. Kelley et al. [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] have done
preliminary work towards investigating how users create friend groups in
Facebook. They have examined four di erent methods of friend grouping and their
results show that the type of mechanism used, a ects the groups created. Their
ndings lead to a number of recommendations for designing group-based
privacy controls for online social networks. Adu-Oppong et al. [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] have proposed
partitioning a user's friends into lists based on communities extracted
automatically from the network, as a way to simplify the speci cation of privacy policies.
Mazzia et al. [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] built a policy visualization tool that extracts and presents the
user's communities to help him in managing his group based privacy policies.
Squicciarini et al. [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] propose an approach to facilitate online social
network users to group their contacts into social circles with common interests. The
authors design a multi-criteria model that takes into account multiple aspects of
user's pro les, and automatically groups each user's contacts into social circles
with common characteristics. Users in the same social circle (group) have
similar behavior, such as similar education background, hobbies, and similar privacy
preferences. The authors further propose an approach to recommend privacy
policies for newly uploaded data items or newly added contacts. Fang et al. [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]
[
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] propose the privacy wizard for social networking sites. The goal of the wizard
is to automatically con gure a user's privacy settings with minimal e ort from
the user. The wizard is based on the underlying observation that real users
conceive their privacy preferences based on an implicit structure. Thus, after asking
the user a limited number of carefully chosen questions, it is usually possible
to build a machine learning model that accurately predicts the user's privacy
preferences. Cetto et al.[
        <xref ref-type="bibr" rid="ref23">23</xref>
        ] introduce a serious game that allows its users to
playfully increase their privacy awareness on Facebook. The conceptual design
of the game is based on two foundations: rstly, an in-depth understanding of
privacy awareness as the match or mismatch between perceived and actual
visibility of shared items. Secondly, an inductive learning approach that allows its
users to experiment and play with their own Facebook data in order to actively
learn about the visibility of their personal items.
      </p>
      <p>
        One of the research studies closely related to our work is done by Lerone
et al. [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. The authors have introduced interaction count based approach to
determine relationship strength. In this approach, the authors simply take into
consideration three types of interactions and count them in order to calculate
relationship strength. The interaction intensity model by Lerone et al. [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] do
not di erentiate interactions on the basis of initiative, so it is possible that a
malicious user intentionally perform larger number of interactions to get access to
user's sensitive pro le information. Our model takes into consideration this issue
and resolve it by assign more weight to interactions initiated by user himself.
Our interaction intensity model has another advantage over Lerone's model that
we consider all possible type of interactions.
      </p>
      <p>
        Waqar et al. [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] extend work of Lerone et al. by applying data mining
model to calculate relationship strength for online social networks, Whereas,
this data mining model is not validated on real OSNs data. The authors also
conduct online survey to analyze Facebook user's interaction behavior with their
friends. Xiang et al. [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] propose a model to infer relationship strength based on
pro le similarity and interaction activity. The authors compute three features to
determine pro le similarity. These features are: common group, common friends,
and logarithms of the normalized counts of common networks. In addition to
pro le similarity features, the authors consider wall posting, and photo tagging
for interaction activity. Our approach is di erent from their approach because
of two reasons: 1. We take into consideration broader set of interactions types.
2. We develop intensity scale for all interaction types. This intensity scale has
vital role in computation of relationship strength.
      </p>
      <p>
        Lizi et al. [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] propose interaction ranking based trustworthy friend
recommendation model. This model is able to e ectively recommend trustworthy
friends to community members by taking into consideration four interaction
attributes: reply frequency, comment length, time di erence, and domain
similarity. Another interesting work by the authors [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ] propose trust ranking based
recommendation model for suggesting the most trustworthy community
members. The authors investigate four new interaction attributes that in uence trust
in virtual communities. These interaction attributes are interaction quality,
seriousness in interactions, consistency over a long period, and common interest.
The author's hypothesis is validated by processing real data collected from
Slashdot. A recent work related to friend recommendation is done by Zhao et al. [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ].
The authors propose scalable and explainable friend recommendation model for
social network systems. This model takes multiple relationship factors into
account such as common friends, common followed users, common followers, and
common joined groups of the target user and the candidate for friend
recommendation. Our research work is not focused on recommending new friends, but
identifying the strength of relationship among existing friends.
      </p>
      <p>
        The majority of online social networks o er second degree access which means
a friend of a friend is able to access the user's personal information. According to
Cuneyt et al. [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] friends can be source of privacy risk because this relationship
always implies the release of some personal information not only to friends, but
also to friends of a friend, which are strangers for the users. Akcora et al.[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]
propose a risk measure for OSNs. The aim is to associate a risk level with social
network users in order to provide other users with a measure of how much it
might be risky, in terms of disclosure of private information, to have interactions
with them. The authors compute risk levels based on similarity and bene t
measures, by also taking into account the user risk attitudes. In particular, The
authors adopt an active learning approach for risk estimation, where user risk
attitude is learned from few required user interactions. Another interesting fact
demonstrated by Frank et al. [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] that more users are willing to divulge personal
details to an adversary if there is a mutual friend connected to the adversary
and the user. Christo et al. [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ] show that users tend to interact mostly with
small subset of friends, often having no interactions with up to 50 percent of
their friends. The authors suggest a model for representing user relationships
based on user interactions. Existing research literature supports our idea that
all friends should not be give equal access to user personal information, but
access to personal information should be administrated based on relationship
strength among online social network users.
5
      </p>
    </sec>
    <sec id="sec-5">
      <title>Conclusion and Future Work</title>
      <p>We propose social interaction based audience segregation model which mimic
real life interaction patterns to larger extent. We also identify the impact of
various social interactions available to users in online social networks. There are
three main innovative aspects of our model. First of all, it consider all possible
of set interactions among friends. Secondly, the model considers the direction of
interaction either from user to friend or vice versa. Finally, all interaction types
are assigned a numerical weight in order to increase or decrease its contribution
in interaction intensity calculation based on its importance in the development
of relationship ties.</p>
      <p>In future, we plan to conduct formal study of user interaction behavior and
sharing patterns. This study will provide us basis for assigning di erent weight
to social interactions and ranking pro le items on the basis of their sensitivity.
In the next phase, we will develop formal model and proof of concept prototype
to validate of our hypothesis.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>James</given-names>
            <surname>Grimmelmann</surname>
          </string-name>
          .
          <article-title>Facebook and the social dynamics of privacy</article-title>
          .
          <source>Iowa Law Review</source>
          ,
          <volume>95</volume>
          (
          <issue>4</issue>
          ):1{
          <fpage>52</fpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2. Bibi van den Berg, Stefanie Potzsch, Ronald Leenes,
          <article-title>Katrin Borcea-P tzmann, and Filipe Beato. Privacy in social software</article-title>
          .
          <source>In Privacy and Identity Management for Life</source>
          , pages
          <volume>33</volume>
          {
          <fpage>60</fpage>
          . Springer,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Justin</given-names>
            <surname>Lee</surname>
          </string-name>
          Becker and
          <string-name>
            <given-names>Hao</given-names>
            <surname>Chen</surname>
          </string-name>
          .
          <article-title>Measuring privacy risk in online social networks</article-title>
          .
          <source>PhD thesis</source>
          , University of California, Davis,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Ai</surname>
            <given-names>Ho</given-names>
          </string-name>
          , Abdou Maiga, and
          <article-title>Esma Ameur. Privacy protection issues in social networking sites</article-title>
          .
          <source>In Computer Systems and Applications</source>
          ,
          <year>2009</year>
          .
          <article-title>AICCSA 2009</article-title>
          . IEEE/ACS International Conference on, pages
          <volume>271</volume>
          {
          <fpage>278</fpage>
          . IEEE,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>Giles</given-names>
            <surname>Hogben</surname>
          </string-name>
          .
          <article-title>Security issues and recommendations for online social networks</article-title>
          .
          <source>ENISA position paper</source>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>Balachander</given-names>
            <surname>Krishnamurthy</surname>
          </string-name>
          and
          <string-name>
            <given-names>Craig E</given-names>
            <surname>Wills</surname>
          </string-name>
          .
          <article-title>Characterizing privacy in online social networks</article-title>
          .
          <source>In Proceedings of the rst workshop on Online social networks</source>
          , pages
          <volume>37</volume>
          {
          <fpage>42</fpage>
          . ACM,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>Chi</given-names>
            <surname>Zhang</surname>
          </string-name>
          , Jinyuan Sun, Xiaoyan Zhu, and
          <string-name>
            <given-names>Yuguang</given-names>
            <surname>Fang</surname>
          </string-name>
          .
          <article-title>Privacy and security for online social networks: challenges and opportunities</article-title>
          . Network, IEEE,
          <volume>24</volume>
          (
          <issue>4</issue>
          ):
          <volume>13</volume>
          {
          <fpage>18</fpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>Heather</given-names>
            <surname>Richter</surname>
          </string-name>
          <string-name>
            <surname>Lipford</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Andrew</given-names>
            <surname>Besmer</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Jason</given-names>
            <surname>Watson</surname>
          </string-name>
          .
          <article-title>Understanding privacy settings in facebook with an audience view</article-title>
          .
          <source>UPSEC</source>
          ,
          <volume>8</volume>
          :
          <issue>1</issue>
          {
          <issue>8</issue>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>Cuneyt</given-names>
            <surname>Gurcan</surname>
          </string-name>
          Akcora and
          <string-name>
            <given-names>Elena</given-names>
            <surname>Ferrari</surname>
          </string-name>
          .
          <article-title>Graphical user interfaces for privacy settings</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10. Cuneyt Gurcan Akcora, Barbara Carminati, and
          <string-name>
            <given-names>Elena</given-names>
            <surname>Ferrari</surname>
          </string-name>
          .
          <article-title>Risks of friendships on social networks</article-title>
          .
          <source>arXiv preprint arXiv:1210.3234</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11. Cuneyt Gurcan Akcora, Barbara Carminati, and
          <string-name>
            <given-names>Elena</given-names>
            <surname>Ferrari</surname>
          </string-name>
          .
          <article-title>Privacy in social networks: How risky is your social graph? In Data Engineering (ICDE</article-title>
          ),
          <source>2012 IEEE 28th International Conference on, pages</source>
          <volume>9</volume>
          {
          <fpage>19</fpage>
          . IEEE,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <article-title>Javed Ahmed and Zubair Ahmed Shaikh</article-title>
          .
          <article-title>Privacy issues in social networking platforms: comparative study of facebook developers platform and opensocial</article-title>
          .
          <source>In Computer Networks and Information Technology (ICCNIT)</source>
          , 2011 International Conference on, pages
          <volume>179</volume>
          {
          <fpage>183</fpage>
          . IEEE,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Michael</surname>
            <given-names>Beye</given-names>
          </string-name>
          ,
          <source>Arjan JP Jeckmans</source>
          , Zekeriya Erkin, Pieter Hartel, Reginald L Lagendijk, and
          <string-name>
            <given-names>Qiang</given-names>
            <surname>Tang</surname>
          </string-name>
          .
          <article-title>Privacy in online social networks</article-title>
          .
          <source>In Computational Social Networks</source>
          , pages
          <volume>87</volume>
          {
          <fpage>113</fpage>
          . Springer,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <given-names>Ralph</given-names>
            <surname>Gross</surname>
          </string-name>
          and
          <string-name>
            <given-names>Alessandro</given-names>
            <surname>Acquisti</surname>
          </string-name>
          .
          <article-title>Information revelation and privacy in online social networks</article-title>
          .
          <source>In Proceedings of the 2005 ACM workshop on Privacy in the electronic society</source>
          , pages
          <volume>71</volume>
          {
          <fpage>80</fpage>
          . ACM,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Rongjing</surname>
            <given-names>Xiang</given-names>
          </string-name>
          , Jennifer Neville, and
          <string-name>
            <given-names>Monica</given-names>
            <surname>Rogati</surname>
          </string-name>
          .
          <article-title>Modeling relationship strength in online social networks</article-title>
          .
          <source>In Proceedings of the 19th international conference on World wide web</source>
          , pages
          <volume>981</volume>
          {
          <fpage>990</fpage>
          . ACM,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16. Patrick Gage Kelley, Robin Brewer, Yael Mayer, Lorrie Faith Cranor, and
          <string-name>
            <given-names>Norman</given-names>
            <surname>Sadeh</surname>
          </string-name>
          .
          <article-title>An investigation into facebook friend grouping</article-title>
          .
          <source>In Human-Computer Interaction{INTERACT</source>
          <year>2011</year>
          , pages
          <fpage>216</fpage>
          {
          <fpage>233</fpage>
          . Springer,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Fabeah</surname>
          </string-name>
          Adu-Oppong,
          <article-title>Casey K Gardiner, Apu Kapadia, and Patrick P Tsang. Social circles: Tackling privacy in social networks</article-title>
          .
          <source>In Symposium on Usable Privacy and Security (SOUPS)</source>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Alessandra</surname>
            <given-names>Mazzia</given-names>
          </string-name>
          , Kristen LeFevre, and
          <string-name>
            <given-names>Eytan</given-names>
            <surname>Adar</surname>
          </string-name>
          .
          <article-title>The pviz comprehension tool for social network privacy settings</article-title>
          .
          <source>In Proceedings of the Eighth Symposium on Usable Privacy and Security, page 13. ACM</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19. Anna Cinzia Squicciarini, Dan Lin, Sushama
          <string-name>
            <surname>Karumanchi</surname>
          </string-name>
          , and Nicole DeSisto.
          <article-title>Automatic social group organization and privacy management</article-title>
          .
          <source>In CollaborateCom</source>
          , pages
          <volume>89</volume>
          {
          <fpage>96</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Anna</surname>
            <given-names>Squicciarini</given-names>
          </string-name>
          , Sushama Karumanchi,
          <string-name>
            <given-names>Dan</given-names>
            <surname>Lin</surname>
          </string-name>
          , and
          <string-name>
            <surname>Nicole DeSisto</surname>
          </string-name>
          .
          <article-title>Identifying hidden social circles for advanced privacy con guration</article-title>
          .
          <source>Computers &amp; Security</source>
          ,
          <volume>41</volume>
          :
          <fpage>40</fpage>
          {
          <fpage>51</fpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <article-title>Lujun Fang and Kristen LeFevre</article-title>
          .
          <article-title>Privacy wizards for social networking sites</article-title>
          .
          <source>In Proceedings of the 19th international conference on World wide web</source>
          , pages
          <volume>351</volume>
          {
          <fpage>360</fpage>
          . ACM,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Lujun</surname>
            <given-names>Fang</given-names>
          </string-name>
          , Heedo Kim, Kristen LeFevre, and
          <string-name>
            <given-names>Aaron</given-names>
            <surname>Tami</surname>
          </string-name>
          .
          <article-title>A privacy recommendation wizard for users of social networking sites</article-title>
          .
          <source>In Proceedings of the 17th ACM conference on Computer and communications security</source>
          , pages
          <volume>630</volume>
          {
          <fpage>632</fpage>
          . ACM,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Alexandra</surname>
            <given-names>Cetto</given-names>
          </string-name>
          , Michael Netter, Gunther Pernul, Christian Richthammer, Moritz Riesner,
          <string-name>
            <given-names>Christian</given-names>
            <surname>Roth</surname>
          </string-name>
          , and
          <article-title>Johannes Sanger. Friend inspector: A serious game to enhance privacy awareness in social networks</article-title>
          .
          <source>arXiv preprint arXiv:1402.5878</source>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <article-title>Lerone Banks and Shyhtsun Felix Wu</article-title>
          .
          <article-title>All friends are not created equal: An interaction intensity based approach to privacy in online social networks</article-title>
          .
          <source>In Computational Science and Engineering</source>
          ,
          <year>2009</year>
          . CSE'09. International Conference on, volume
          <volume>4</volume>
          , pages
          <fpage>970</fpage>
          {
          <fpage>974</fpage>
          . IEEE,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Waqar</surname>
            <given-names>Ahmad</given-names>
          </string-name>
          , Asim Riaz, Henric Johnson, and
          <string-name>
            <given-names>Niklas</given-names>
            <surname>Lavesson</surname>
          </string-name>
          .
          <article-title>Predicting friendship intensity in online social networks</article-title>
          .
          <source>In 21st International Tyrrhenian Workshop on Digital Communications</source>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Lizi</surname>
            <given-names>Zhang</given-names>
          </string-name>
          , Hui Fang, Wee Keong Ng, and Jie Zhang. Intrank:
          <article-title>Interaction rankingbased trustworthy friend recommendation</article-title>
          .
          <source>In Trust, Security and Privacy in Computing and Communications (TrustCom)</source>
          ,
          <year>2011</year>
          IEEE 10th International Conference on, pages
          <volume>266</volume>
          {
          <fpage>273</fpage>
          . IEEE,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Lizi</surname>
            <given-names>Zhang</given-names>
          </string-name>
          , Cheun Pin Tan,
          <string-name>
            <given-names>Siyi</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Hui</given-names>
            <surname>Fang</surname>
          </string-name>
          , Pramodh Rai, Yao Chen, Rohit Luthra, Wee Keong Ng,
          <string-name>
            <surname>and Jie Zhang.</surname>
          </string-name>
          <article-title>The in uence of interaction attributes on trust in virtual communities</article-title>
          .
          <source>In Advances in User Modeling</source>
          , pages
          <volume>268</volume>
          {
          <fpage>279</fpage>
          . Springer,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Zhao</surname>
            <given-names>Du</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lantao Hu</surname>
          </string-name>
          , Xiaolong Fu, and Yongqi Liu.
          <article-title>Scalable and explainable friend recommendation in campus social network system</article-title>
          .
          <source>In Frontier and Future Development of Information Technology in Medicine and Education</source>
          , pages
          <volume>457</volume>
          {
          <fpage>466</fpage>
          . Springer,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <given-names>Frank</given-names>
            <surname>Nagle</surname>
          </string-name>
          and
          <string-name>
            <given-names>Lisa</given-names>
            <surname>Singh</surname>
          </string-name>
          .
          <article-title>Can friends be trusted? exploring privacy in online social networks</article-title>
          .
          <source>In Social Network Analysis and Mining</source>
          ,
          <year>2009</year>
          . ASONAM'09. International Conference on Advances in, pages
          <volume>312</volume>
          {
          <fpage>315</fpage>
          . IEEE,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Christo</surname>
            <given-names>Wilson</given-names>
          </string-name>
          , Bryce Boe, Alessandra Sala, Krishna PN Puttaswamy, and
          <string-name>
            <surname>Ben</surname>
            <given-names>Y Zhao.</given-names>
          </string-name>
          <article-title>User interactions in social networks and their implications</article-title>
          .
          <source>In Proceedings of the 4th ACM European conference on Computer systems</source>
          , pages
          <volume>205</volume>
          {
          <fpage>218</fpage>
          .
          <string-name>
            <surname>Acm</surname>
          </string-name>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>