-
1
-
-
77952944272
-
-
accessed November 7, 2011
-
"Facebook statistics," http://www.facebook.com/press/ info.php?statistics, accessed November 7, 2011.
-
Facebook Statistics
-
-
-
4
-
-
80051876759
-
Statements of rights and responsibilities
-
accessed November 7, 2011
-
Facebook, "Statements of rights and responsibilities," http://www.facebook.com/terms.php, accessed November 7, 2011.
-
Facebook
-
-
-
5
-
-
84861560663
-
Eagles employee fired for Facebook post
-
March 10
-
T. Monkovic, "Eagles employee fired for Facebook post," New York Times, March 10, 2009.
-
(2009)
New York Times
-
-
Monkovic, T.1
-
6
-
-
70349811111
-
Prying data out of a social network
-
J. Bonneau, J. Anderson, and G. Danezis, "Prying data out of a social network," in ASONAM, 2009, pp. 249-254.
-
(2009)
ASONAM
, pp. 249-254
-
-
Bonneau, J.1
Anderson, J.2
Danezis, G.3
-
8
-
-
34848911641
-
Social phishing
-
T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer, "Social phishing," Commun. ACM, vol. 50, no. 10, pp. 94-100, 2007.
-
(2007)
Commun. ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
9
-
-
78650224951
-
Using social networks to harvest email addresses
-
I. Polakis, G. Kontaxis, S. Antonatos, E. Gessiou, T. Petsas, and E. P. Markatos, "Using social networks to harvest email addresses," in WPES, 2010, pp. 11-20.
-
(2010)
WPES
, pp. 11-20
-
-
Polakis, I.1
Kontaxis, G.2
Antonatos, S.3
Gessiou, E.4
Petsas, T.5
Markatos, E.P.6
-
11
-
-
77950275127
-
Detecting spam in a twitter network
-
S. Yardi, D. M. Romero, G. Schoenebeck, and D. Boyd, "Detecting spam in a twitter network," First Monday, vol. 15, no. 1, 2010.
-
(2010)
First Monday
, vol.15
, Issue.1
-
-
Yardi, S.1
Romero, D.M.2
Schoenebeck, G.3
Boyd, D.4
-
12
-
-
84900565522
-
Triggers and barriers to customizing software
-
W. E. Mackay, "Triggers and barriers to customizing software," in CHI, 1991, pp. 153-160.
-
(1991)
CHI
, pp. 153-160
-
-
Mackay, W.E.1
-
13
-
-
70450193106
-
Eight friends are enough: Social graph approximation via public listings
-
J. Bonneau, J. Anderson, F. Stajano, and R. Anderson, "Eight friends are enough: Social graph approximation via public listings," in SNS, 2009.
-
(2009)
SNS
-
-
Bonneau, J.1
Anderson, J.2
Stajano, F.3
Anderson, R.4
-
16
-
-
78649302941
-
Inferring private information using social network data
-
J. Lindamood, R. Heatherly, M. Kantarcioglu, and B. M. Thuraisingham, "Inferring private information using social network data," in WWW, 2009, pp. 1145-1146.
-
(2009)
WWW
, pp. 1145-1146
-
-
Lindamood, J.1
Heatherly, R.2
Kantarcioglu, M.3
Thuraisingham, B.M.4
-
17
-
-
77049099362
-
Imagined communities: Awareness, information sharing, and privacy on the facebook
-
A. Acquisti and R. Gross, "Imagined communities: Awareness, information sharing, and privacy on the facebook," in Privacy Enhancing Technologies, 2006, pp. 36-58.
-
(2006)
Privacy Enhancing Technologies
, pp. 36-58
-
-
Acquisti, A.1
Gross, R.2
-
18
-
-
33749016498
-
Information revelation and privacy in online social networks
-
R. Gross, A. Acquisti, and H. J. H. III, "Information revelation and privacy in online social networks," in WPES, 2005, pp. 71-80.
-
(2005)
WPES
, pp. 71-80
-
-
Gross, R.1
Acquisti, A.2
H III, H.J.3
-
21
-
-
84861543206
-
Where you did sleep last night?...thank you, i already know!
-
A. Dhingra, "Where you did sleep last night? ...thank you, i already know!" iSChannel, vol. 3, no. 1, 2008.
-
(2008)
ISChannel
, vol.3
, Issue.1
-
-
Dhingra, A.1
-
22
-
-
84861560666
-
-
accessed July 15, 2011
-
J. Bonneau, "New facebook photo hacks," http://www. lightbluetouchpaper.org/2009/02/11/newfacebook- photo-hacks/, 2009, accessed July 15, 2011.
-
(2009)
New Facebook Photo Hacks
-
-
Bonneau, J.1
-
23
-
-
84855692796
-
The socialbot network: When bots socialize for fame and money
-
Sep
-
Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu, "The socialbot network: When bots socialize for fame and money," ACSAC, Sep 2011.
-
(2011)
ACSAC
-
-
Boshmaf, Y.1
Muslukhov, I.2
Beznosov, K.3
Ripeanu, M.4
-
24
-
-
84865622599
-
All your contacts are belong to us: Automated identity theft attacks on social networks
-
L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, "All your contacts are belong to us: automated identity theft attacks on social networks," in WWW, 2009, pp. 551-560.
-
(2009)
WWW
, pp. 551-560
-
-
Bilge, L.1
Strufe, T.2
Balzarotti, D.3
Kirda, E.4
-
27
-
-
85184122968
-
To observe and protect? how digital rights management systems threaten privacy and what policy makers should do about it
-
I. Kerr, "To observe and protect? how digital rights management systems threaten privacy and what policy makers should do about it," Intellectual Property and Information Wealth: Copyright and Related Rights, vol. 1, no. 1, 2007.
-
(2007)
Intellectual Property and Information Wealth: Copyright and Related Rights
, vol.1
, Issue.1
-
-
Kerr, I.1
|