메뉴 건너뛰기




Volumn , Issue , 2011, Pages 177-186

Who's your best friend? Targeted privacy attacks in location-sharing social networks

Author keywords

location sharing; privacy; privacy attacks

Indexed keywords

PRIVACY ATTACKS; PRIVACY POLICIES; REAL-TIME LOCATION; SOCIAL GRAPHS; SOCIAL NETWORKS;

EID: 80054056884     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2030112.2030138     Document Type: Conference Paper
Times cited : (21)

References (37)
  • 1
    • 77049099362 scopus 로고    scopus 로고
    • Imagined communities: Awareness, information sharing, and privacy on the Facebook
    • Springer
    • Acquisti, A. and Gross, R. (2006). Imagined communities: awareness, information sharing, and privacy on the Facebook. Proc. PET 2006, Springer, 36-56.
    • (2006) Proc. PET 2006 , pp. 36-56
    • Acquisti, A.1    Gross, R.2
  • 2
    • 84993894931 scopus 로고
    • Privacy Regulation: Culturally Universal or Culturally Specific?
    • Altman, I. (1977). Privacy Regulation: Culturally Universal or Culturally Specific? Journal of Social Issues, 33 (3), 66-84.
    • (1977) Journal of Social Issues , vol.33 , Issue.3 , pp. 66-84
    • Altman, I.1
  • 6
    • 70450193106 scopus 로고    scopus 로고
    • Eight Friends Are Enough: Social Graph Approximation via Public Listings
    • Bonneau, J., Anderson, J., Anderson, R. and Stajano, F. (2009) Eight Friends Are Enough: Social Graph Approximation via Public Listings. SNS'09.
    • (2009) SNS'09
    • Bonneau, J.1    Anderson, J.2    Anderson, R.3    Stajano, F.4
  • 7
    • 46449097423 scopus 로고    scopus 로고
    • Criminal Exploitation of Online Systems by Organised Crime Groups
    • (2008)
    • Choo, K-K. R. and Smith, R. G. (2008). Criminal Exploitation of Online Systems by Organised Crime Groups. Asian Criminology (2008) 3:37-59
    • (2008) Asian Criminology , vol.3 , pp. 37-59
    • Choo, K.-K.R.1    Smith, R.G.2
  • 8
    • 44249122799 scopus 로고    scopus 로고
    • The collective dynamics of smoking in a large social network
    • DOI 10.1056/NEJMsa0706154
    • Christakis, N., Fowler, J.H. (2008). The collective dynamics of smoking in a large social network. The New England journal of medicine 358(21): 2249-58. (Pubitemid 351724454)
    • (2008) New England Journal of Medicine , vol.358 , Issue.21 , pp. 2249-2258
    • Christakis, N.A.1    Fowler, J.H.2
  • 9
    • 80054071473 scopus 로고    scopus 로고
    • Criminal Intelligence Service Canada. Available At: [Last Accessed 25th October 2010]. ISBN 978-1-100-51931-9
    • CISC (2010) Report on Organized Crime. Criminal Intelligence Service Canada. Available At: http:// www.cisc.gc.ca [Last Accessed 25th October 2010]. ISBN 978-1-100-51931-9.
    • (2010) Report on Organized Crime
  • 14
    • 4544259863 scopus 로고    scopus 로고
    • An architecture for privacy-sensitive ubiquitous computing
    • Hong, J. I. and Landay, J. A. (2004) An architecture for privacy-sensitive ubiquitous computing. MobiSys '04, 177-189.
    • (2004) MobiSys '04 , pp. 177-189
    • Hong, J.I.1    Landay, J.A.2
  • 15
    • 79958164126 scopus 로고    scopus 로고
    • Feasibility of structural network clustering for group-based privacy control in social networks
    • ACM, New York, NY, USA, Article 9
    • Jones, S., and O'Neill, E. (2010). Feasibility of structural network clustering for group-based privacy control in social networks. In Proceedings of the Sixth Symposium on Usable Privacy and Security (SOUPS '10). ACM, New York, NY, USA, Article 9, 13 pages
    • (2010) Proceedings of the Sixth Symposium on Usable Privacy and Security (SOUPS '10) , pp. 13
    • Jones, S.1    O'Neill, E.2
  • 16
  • 18
    • 80054066068 scopus 로고    scopus 로고
    • Designing Trustworthy Situated Services: An Implicit and Explicit Assessment of Locative Images' Effect on Trust
    • Kostakos, V. and Oakley, I. (2009). Designing Trustworthy Situated Services: an Implicit and Explicit Assessment of Locative Images' Effect on Trust. CHI, Boston, USA, pp. 329-332.
    • (2009) CHI, Boston, USA , pp. 329-332
    • Kostakos, V.1    Oakley, I.2
  • 19
    • 78649287427 scopus 로고    scopus 로고
    • Making friends in life and online: Equivalence, microcorrelation and value in spatial and transpatial social networks
    • Kostakos, V. and Venkatanathan, J. (2010). Making friends in life and online: Equivalence, microcorrelation and value in spatial and transpatial social networks. IEEE SocialCom, Minneapolis, USA, pp. 587-594.
    • (2010) IEEE SocialCom, Minneapolis, USA , pp. 587-594
    • Kostakos, V.1    Venkatanathan, J.2
  • 20
    • 84869078915 scopus 로고    scopus 로고
    • Who wants to know what when? Privacy preference determinants in ubiquitous computing
    • ACM Press
    • Lederer, S., Mankoff, J., and Dey, A. K. (2003). Who wants to know what when? privacy preference determinants in ubiquitous computing. CHI 2003, ACM Press, 724-725.
    • (2003) CHI 2003 , pp. 724-725
    • Lederer, S.1    Mankoff, J.2    Dey, A.K.3
  • 23
    • 33847382472 scopus 로고    scopus 로고
    • The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors
    • Norberg, Patricia A, Daniel R. Horne, and David A. Horne (2007). The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors. Journal of Consumer Affairs, 41(1):100-126.
    • (2007) Journal of Consumer Affairs , vol.41 , Issue.1 , pp. 100-126
    • Norberg, P.A.1    Horne, D.R.2    Horne, D.A.3
  • 26
    • 0001615157 scopus 로고
    • Effects of a favor and liking on compliance
    • Regan, D.T. (1971). Effects of a favor and liking on compliance. Journal of Experimental Social Psychology, 7(6):627-639.
    • (1971) Journal of Experimental Social Psychology , vol.7 , Issue.6 , pp. 627-639
    • Regan, D.T.1
  • 27
  • 28
    • 67650293214 scopus 로고    scopus 로고
    • Understanding and capturing people's privacy policies in a mobile social networking application
    • Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M., and Rao, J. (2008). Understanding and capturing people's privacy policies in a mobile social networking application. Personal and Ubiquitous Computing 13, 6, 401-412.
    • (2008) Personal and Ubiquitous Computing , vol.13 , Issue.6 , pp. 401-412
    • Sadeh, N.1    Hong, J.2    Cranor, L.3    Fette, I.4    Kelley, P.5    Prabaker, M.6    Rao, J.7
  • 33
    • 84892447976 scopus 로고    scopus 로고
    • Who's viewed you?: The impact of feedback in a mobile location-sharing application
    • Tsai, J.Y., Kelley, P., Drielsma, P., Cranor, L.F., Hong, J., and Sadeh, N. (2009). Who's viewed you?: the impact of feedback in a mobile location-sharing application. CHI '09, 2003-2012.
    • (2009) CHI '09 , pp. 2003-2012
    • Tsai, J.Y.1    Kelley, P.2    Drielsma, P.3    Cranor, L.F.4    Hong, J.5    Sadeh, N.6
  • 34
    • 47549115596 scopus 로고    scopus 로고
    • Can You See Me Now? Audience and Disclosure Management in Online Social Network Sites
    • June 2008
    • Tufekci Z. (2008). Can You See Me Now? Audience and Disclosure Management in Online Social Network Sites. Bulletin of Science and Technology Studies. Volume 11, Number 4, June 2008, pp. 544-564(21).
    • (2008) Bulletin of Science and Technology Studies , vol.11 , Issue.4
    • Tufekci, Z.1
  • 36
    • 84936823640 scopus 로고
    • Different Strokes from Different Folks: Community Ties and Social Support
    • Wellman, B. and Wortley, S. (1990). Different Strokes from Different Folks: Community Ties and Social Support. American Journal of Sociology 96, 3, 558-588.
    • (1990) American Journal of Sociology , vol.96 , Issue.3 , pp. 558-588
    • Wellman, B.1    Wortley, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.