Acknowledgement
We are grateful to the students, teachers, and staff who helped us collect data, as well as the social network users who were willing to contribute their personal information and the school for their support in our research work.
References
- Z. He, Z. Cai, and J. Yu, Latent-data privacy preserving with customized data utility for social network data, IEEE Trans. Veh. Technol. 67 (2018), 665-673. https://doi.org/10.1109/tvt.2017.2738018
- Z. He, Z. Cai, and X. Wang, Modeling propagation dynamics and developing optimized countermeasures for rumor spreading in online social networks, in Proc. IEEE Int. Conf. Distrib. Comput. Syst. (ICDCS) (Columbus, OH, USA), July 2015, pp. 205-214.
- M. Bartsch and T. Dienlin, Control your facebook: An analysis of online privacy literacy, Comput. Hum. Behav. 56 (2016), 147-154. https://doi.org/10.1016/j.chb.2015.11.022
- J. Ge, J. Peng, and Z. Chen, Your privacy information are leaking when you surfing on the social networks: A survey of the degree of online self-disclosure (DOSD), in Proc. IEEE Int. Conf. Cogn. Inf. Cogn. Comput. (ICCI* CC) (London, UK), Aug. 2014, pp. 329-336.
- J. Jiang, Personal information leakage on the rise in China: Report, 2017, available at http://en.people.cn/n3/2017/0331/c9000 0-9197748.html [last accessed 31 March 2017].
- C. Joshi and U. K. Singh, Information security risks management framework- A step towards mitigating security risks in university network, J. Inf. Sec. Appl. 35 (2017), 128-137. https://doi.org/10.1016/j.jisa.2017.06.006
- T. Dienlin and S. Trepte, Is the privacy paradox a relic of the past? an in-depth analysis of privacy attitudes and privacy behaviors, Eur. J. Soc. Psychol. 45 (2015), 285-297. https://doi.org/10.1002/ejsp.2049
- K. M. Altenburger and J Ugander, Monophily in social networks introduces similarity among friends-of-friends, Nat. Hum. Behav. 2 (2018), no. 4, 284. https://doi.org/10.1038/s41562-018-0321-8
- A. De Salve et al., Discovering homophily in online social networks, Mob. Netw. Appl. 23 (2018), 1715-1726. https://doi.org/10.1007/s11036-018-1067-2
- Q. Fang et al., Relational user attribute inference in social media, IEEE Trans. Multimedia 17 (2015), 1031-1044. https://doi.org/10.1109/TMM.2015.2430819
- R. K. Wong and B. S. Vidyalakshmi, Privacy leakage via attribute inference in directed social networks, in Information and Communications Security, Springer, Cham, Switzerland, 2016, pp. 333-346.
- F. Al Zamal, W. Liu, and D. Ruths, Homophily and latent attribute inference: Inferring latent attributes of twitter users from neighbors, in Proc. Int. AAAI Conf. Weblogs Soc. Media (Dublin, Ireland), June 2012.
- N. Z. Gong and B. Liu, You are who you know and how you behave: Attribute inference attacks via users' social friends and behaviors, in Proc. USENIX Sec. Symp. (Austin, TX, USA), Aug. 2016, pp. 979- 995.
- K. Thomas, C. Grier, and D. M. Nicol, Unfriendly: Multi-party privacy risks in social networks, in Privacy Enhancing Technologies, vol. 6205, Springer, Berlin, Heidelberg, 2010, pp. 236-252.
- N. Z. Gong et al., Joint link prediction and attribute inference using a social-attribute network, ACM Trans. Intell. Syst. Technol. (TIST) 5 (2014), 27.
- N. Z. Gong and B. Liu, Attribute inference attacks in online social networks, ACM Trans. Priv. Sec. 21 (2018), 1-30, article no. 3.
- M. B. Islam et al., A greater understanding of social networks privacy requirements: The user perspective, J. Inf. Sec. Appl. 33 (2017), 30-44. https://doi.org/10.1016/j.jisa.2017.01.004
- I. F. Lam, K. T. Chen, and L. J. Chen, Involuntary information leakage in social network services, in International Workshop on Security, vol. 5312, Springer, Berlin, Germany, 2008, pp. 167 -183.
- C. Patsakis et al., Distributing privacy policies over multimedia content across multiple online social networks, Comput. Netw. 75 (2014), 531-543. https://doi.org/10.1016/j.comnet.2014.08.023
- R. Dey et al., Estimating age privacy leakage in online social networks, in Proc. INFOCOM (Orlando, FL, USA), Mar. 2012, pp. 2836-2840.
- K. Liang et al., Privacy concerns for photo sharing in online social networks, IEEE Internet Comput. 19 (2015), 58-63.
- A. Srivastava and G. Geethakumari, Measuring privacy leaks in online social networks, in Proc. Int. Conf. Adv. Comput, Comm. Inf. (ICACCI), (Mysore, India), Aug. 2013, pp. 2095-2100.
- E. M. Maximilien et al., Privacy-as-a-service: Models, algorithms, and results on the Facebook platform, in Proc. Web 2.0 Sec. Priv. Workshop, vol. 2, 2009.
- K. Liu and E. Terzi, A framework for computing the privacy scores of users in online social networks, ACM Trans. Knowl. Discov. Data 5 (2010), 6.
- L. Fang and K. LeFevre, Privacy wizards for social networking sites, in Proc. Int. Conf. World Wide Web (Raleigh, NC, USA), Apr. 2010, pp. 351-360.
- K. Li, X. Lin, and X. Wang, An empirical analysis of users' privacy disclosure behaviors on social network sites, Inf. Manag. 52 (2015), 882-891. https://doi.org/10.1016/j.im.2015.07.006
- S. Jain and S. K. Raghuwanshi, Fine grained privacy measuring of user's profile over online social network, in Intelligent Communication and Computational Technologies, vol. 19, Springer, Singapore, Singapore, pp. 371-379.
- Y. Zeng et al., Trust-aware privacy evaluation in online social networks, in Proc. IEEE Int. Conf. Commun. (ICC) (Sydney, Australia), June 2014, pp. 932-938.
- M. Li, Z. Liu, and K. Dong, Privacy preservation in social network against public neighborhood attacks, in Proc. Trustcom/BigDataSE/ISPA (Tianjin, China), Aug. 2016, pp. 1575-1580.
- J. L. Becker and H. Chen, Measuring privacy risk in online social networks, Int. J. Secur., Priv. Trust Manag. 4 (2009), 2095-2100.
- Y. Wang, R. K. Nepali, and J. Nikolai, Social network privacy measurement and simulation, in Proc. Int. Conf. Comput., Netw. Commun. (ICNC) (Honolulu, HI, USA), Feb. (2014), 802-806.
- Y. Alsarkal, N. Zhang, and H. Xu, Your privacy is your friend's privacy: examining interdependent information disclosure on online social networks, in Proc. Hawaii Int. Conf. Syst. Sci. (Waikoloa, HI, USA), Jan. 2018.
- R. G. Pensa and G. Di Blasi, A privacy self-assessment framework for online social networks, Expert Syst. Appl. 86 (2017), 18-31. https://doi.org/10.1016/j.eswa.2017.05.054
- E. Aghasian et al., Scoring users' privacy disclosure across multiple online social networks, IEEE Access 5 (2017), 13118-13130. https://doi.org/10.1109/ACCESS.2017.2720187
- K. Renaud and S. Flowerday, Contemplating human-centred security & privacy research: Suggesting future directions, J. Inf. Sec. Appl. 34 (2017), 76-81. https://doi.org/10.1016/j.jisa.2017.05.006
- W Wang et al., Coevolution spreading in complex networks, Phy. Rev. 820 (2019), 1-51.
- W. Wang, H. E. Stanley, and L. A. Braunstein, Effects of time-delays in the dynamics of social contagions, New J. Phy. 20 (2017), 013034. https://doi.org/10.1088/1367-2630/20/1/013034
- W. Wang et al., Containing misinformation spreading in temporal social networks, Chaos 29 (2019), 123131. https://doi.org/10.1063/1.5114853
- G. Jeh and J. Widom, SimRank: A measure of structural-context similarity, in Proc. ACM SIGKDD Int. Conf. Knowl. Discov. Data Min. (Edmonton, Canada), July 2019, pp. 538-543.
- K. Lei et al., Understanding user behavior in sina weibo online social network: A Community Approach, IEEE Access 6 (2018), 13302-13316. https://doi.org/10.1109/access.2018.2808158
- X. Li et al., A privacy measurement framework for multiple online social networks against social identity linkage, Appl. Sci. 8 (2018), 1790. https://doi.org/10.3390/app8101790