Fake identities in social media: A case study on the sustainability of the Facebook business model (original) (raw)
References
Adolph S, Hall W., & Kruchten P (2006) Using grounded theory to study the experience of software development. In: Empirical Software Engineering 16(4):487–513. DOI 10. 1007/s10664-010-9152-6. Article Google Scholar
Agichtein E, Castillo C, Donato D, Gionis A, & Mishne G (2008) Finding high-quality content in social media. In: Proceedings of the international conference on Web search and web data mining, WSDM’ 08, ACM, New York, NY, USA:183–194. DOI 10.1145/1341531.1341557.
von Ahn L, Maurer B, McMillen C, Abraham D, & Blum M (2008) recaptcha: Human-based character recognition via web security measures. In: Science 321(5895):1465–1468. Article Google Scholar
Altman I (1975) The Environment and Social Behavior: Privacy, Personal Space, Territory, Crowding. In: Brooks/-Cole Pub. Co, Monterey, California. Google Scholar
Asuncion AU, Goodrich MT (2010) Turning privacy leaks into floods: Surreptitious discovery of social network friendships and other sensitive binary attribute vectors. In: Proceedings of the 9th annual ACM workshop on Privacy in the electronic society, WPES’ 10. ACM, New York, NY, USA:21–30. DOI 10.1145/1866919.1866923. Chapter Google Scholar
Baden R, Bender A, Spring N, Bhattacharjee B, & Starin, D (2009) Persona: An online social network with user-defined privacy. In: Proceedings of the ACM SIGCOMM’ 09 conference on Data communication, SIGCOMM’ 09. ACM, New York, NY, USA: 135–146. DOI 10.1145/1592568.1592585. Chapter Google Scholar
Besmer A, Richter LH (2010) Moving beyond untagging: Photo privacy in a tagged world. In: Proceedings of the 28th international conference on Human factors in computing systems, CHI’ 10. ACM, New York, NY, USA:1563–1572. DOI 10.1145/1753326.175 3560. Chapter Google Scholar
Bilge L, Strufe T, Balzarotti D, & Kirda E (2009) All your contacts are belong to us: Automated identity theft attacks on social networks. In: Proceedings of the 18th international conference on World wide web, www’ 09. ACM, New York, NY, USA: 551–560. DOI 10.1145/1526709.1526784. Chapter Google Scholar
Bortz J, Döring N (2006) Forschungsmethoden und Evaluation: für Human- und Sozialwissenschaftler, überarb. edn. Springer, Heidelberg 4. Book Google Scholar
Boshmaf Y, Muslukhov I, Beznosov K, & Ripeanu M (2011) The socialbot network: When bots socialize for fame and money. In: Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC’ 11. ACM, New York, NY, USA: 93–102. Google Scholar
Dorfman R (1943) The detection of defective members of large populations. In: Annals of Mathematical Statistics 14:436–440, Lee J, Lee J, & Feick L (2001) The impact of switching costs on the customer satisfaction-loyalty link: Mobile phone service in France. Journal of Services Marketing 15(1):35–48. Article Google Scholar
Fruchterman TMJ, Reingold EM (1991) Graph drawing by force-directed placement. In: Software: Practice and Experience 21(11):1129–1164. DOI 10.1002/spe.4380211102. Article Google Scholar
Gao H, Hu J, Wilson C, Li Z, Chen Y, & Zhao B Y (2010) Detecting and characterizing social spam campaigns. In: Proceedings of the 17th ACMConference on Computer and Communications Security, CCS’ 10. ACM, New York, NY, USA:681–683. DOI 10.1145/1866307.1866396. Chapter Google Scholar
Gross R, Acquisti A (2005) Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES’ 05. ACM, New York, NY, USA:71–80. DOI 10.1145/1102199.1102214. Chapter Google Scholar
Huber M, Mulazzani M, Leithner M, Schrittwieser S, Wondracek G, & Weippl E (2011) Social snapshots: Digital forensics for online social networks. In: Proceedings of 27th Annual Computer Security Applications Conference (ACSAC):113–122.
King J, Lampinen A, & Smolen A (2011) Privacy: Is there an app for that? In: Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS’ 11. ACM, New York, NY, USA:12.1–12.20. DOI 10.1145/2078827.2078843. Google Scholar
Krasnova H, Günther OSS, & Koroleva K (2009) Privacy concerns and identity in online social networks. In: Identity in the Information Society 2(1):39–63. Article Google Scholar
Lipford H R, Besmer A, Watson J (2008) Understanding privacy settings in facebook with an audience view. In: Proceedings of the 1st Conference on Usability, Psychology, and Security, UPSEC ′08. USENIX Association, Berkeley, CA, USA:2.1–2.8. Google Scholar
Liu Y, Gummadi K, Krishnamurthy B, & Mislove A (2011) Analyzing facebook privacy settings: User expectations vs. reality. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC’ 11. ACM, New York, NY, USA:61–70. DOI 10.1145/2068816.2068823. Chapter Google Scholar
Mao H, Shuai X, & Kapadia A (2011) Loose tweets: an analysis of privacy leaks on twitter. In: Proceedings of the 10th annual ACM Workshop on Privacy in the Electronic Society, WPES’ 11. ACM, New York, NY, USA:1–12. DOI 10.1145/2046556.2046558. Chapter Google Scholar
Matavire R, Brown I (2008) Investigating the use of’ grounded theory’ in information systems research. In: Proceedings of the 2008 annual research conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries: Riding the Wave of Technology, SAICSIT’ 08. ACM, New York, NY, USA:139–147. DOI 10.1145/1456659.1456676. Google Scholar
Narayanan A, Shmatikov V (2009) De-anonymizing social networks. In: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, SP’ 09. IEEE Computer Society, Washington, DC, USA:173–187. DOI 10.1109/SP.2009.22. Chapter Google Scholar
Puttaswamy KPN, Sala A, & Zhao BY (2009) Starclique: Guaranteeing user privacy in social networks against intersection attacks. In: Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, CoNEXT’ 09. ACM, New York, NY, USA:157–168. DOI 10.1145/1658939.1658958. Chapter Google Scholar
Smith A, O’Hara K, & Lewis P (2011) Visualising the past: Annotating a life with linked open data. In: Web Science Conference’ 11. URL http://eprints.ecs.soton.ac.uk/22324/.
Stanton JM (2003) Socio-technical and human cognition elements of information systems. In: S Clarke, E Coakes, GM Hunter, A Wenn (eds.) Information Technology and Privacy, chap. Information technology and privacy: a boundary management perspective. IGI Publishing, Hershey, PA, USA:79–103. Google Scholar
Stein T, Chen E, & Mangla K (2011) Facebook immune system. In: Proceedings of the 4th Workshop on Social Network Systems, SNS’ 11. ACM, New York, NY, USA:8.1–8.8. DOI 10.1145/1989656.1989664. Google Scholar
Strater K, Lipford HR (2008) Strategies and struggles with privacy in an online social networking community. In: Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction, BCS-HCI’ 08. British Computer Society, Swinton, UK, UK 1:111–119. Google Scholar
Stutzman F, Capra R, & Thompson J (2011) Factors mediating disclosure in social network sites. Computers in Human Behavior 27(1):590–598. DOI 10.1016/j.chb.2010.10.017. Article Google Scholar
Stutzman F, Kramer-Duffield J (2010) Friends only: Examining a privacy-enhancing behavior in Facebook. In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI’ 10, ACM, New York, NY, USA:1553–1562. DOI 10.1145/1753326.1753559. Chapter Google Scholar
Sun X, Sun L, & Wang H (2011) Extended k-anonymity models against sensitive attribute disclosure. In: Computer Communications 34(4):526–535. DOI 10.1016/j.comcom.2010. 03.020. Article Google Scholar
Thomas JC (2001) Qualitative vs. quantitative: Myths of the culture and practical experience. In: Proceedings of the 34th Annual Hawaii International Conference on System Sciences: 10.
Wang N, Xu H, & Grossklags J (2011) Third-party apps on Facebook: Privacy and the illusion of control. In: Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology, CHIMIT’ 11. ACM, New York, NY, USA:4.1–4.10. DOI 10.1145/2076444.2076448. Google Scholar
Wang Y, Norcie G, Komanduri S, Acquisti A, Leon PG, & Cranor L (2011) I regretted the minute I pressed share: a qualitative study of regrets on Facebook. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS’ 11. ACM, New York, NY, USA:10.1–10.16. DOI 10.1145/2078827.2078841. Google Scholar
Zheleva E, Getoor L (2009) To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles. In: Proceedings of the 18th International Conference on World Wide Web, www’ 09. ACM, New York, NY, USA:531–540. DOI 10.1145/1526709.1526781. Chapter Google Scholar