This chapter addresses various aspects of analyzing privacy breaches in social networks. We first review literature that defines three types of privacy breaches in social networks: interactive, active, and passive. We then survey the various network anonymization schemes that have been constructed to address these privacy breaches. After exploring these breaches and anonymization schemes, we evaluate a measure for determining the level of anonymity inherent in a network graph based on its topological structure. Finally, we close by emphasizing the difficulty of anonymizing social network data while maintaining usability for research purposes and offering areas for future work.
CITATION STYLE
Özyer, T., Erdem, Z., Rokne, J., & Khoury, S. (2013). Mining Social Networks and Security Informatics. Mining Social Networks and Security Informatics (pp. 183–202). Retrieved from http://link.springer.com/10.1007/978-94-007-6359-3
Mendeley helps you to discover research relevant for your work.