Mining Social Networks and Security Informatics

  • Özyer T
  • Erdem Z
  • Rokne J
  • et al.
N/ACitations
Citations of this article
81Readers
Mendeley users who have this article in their library.

Abstract

This chapter addresses various aspects of analyzing privacy breaches in social networks. We first review literature that defines three types of privacy breaches in social networks: interactive, active, and passive. We then survey the various network anonymization schemes that have been constructed to address these privacy breaches. After exploring these breaches and anonymization schemes, we evaluate a measure for determining the level of anonymity inherent in a network graph based on its topological structure. Finally, we close by emphasizing the difficulty of anonymizing social network data while maintaining usability for research purposes and offering areas for future work.

Cite

CITATION STYLE

APA

Özyer, T., Erdem, Z., Rokne, J., & Khoury, S. (2013). Mining Social Networks and Security Informatics. Mining Social Networks and Security Informatics (pp. 183–202). Retrieved from http://link.springer.com/10.1007/978-94-007-6359-3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free