Data Mining and Privacy of Social Network Sites’ Users: Implications of the Data Mining Problem
暂无分享,去创建一个
[1] Sharon Nielsen,et al. Self-disclosure on Facebook among female users and its relationship to feelings of loneliness , 2014, Comput. Hum. Behav..
[2] Kristopher Welsh,et al. The danger of big data: Social media as computational social science , 2012, First Monday.
[3] Md Zahidul Islam,et al. Knowledge Discovery through SysFor - a Systematically Developed Forest of Multiple Decision Trees , 2011, AusDM.
[4] Md Zahidul Islam,et al. Privacy preserving data mining: A noise addition framework using a novel clustering technique , 2011, Knowl. Based Syst..
[5] Md Zahidul Islam,et al. Seed-Detective: A Novel Clustering Technique Using High Quality Seed for K-Means on Categorical and Numerical Attributes , 2011, AusDM.
[6] Md Zahidul Islam,et al. Irrigation Water Demand Forecasting - A Data Pre-Processing and Data Mining Approach based on Spatio-Temporal Data , 2011, AusDM.
[7] Salvatore Catanese,et al. Crawling Facebook for social network analysis purposes , 2011, WIMS '11.
[8] Daniel Neagu,et al. Online social network profile data extraction for vulnerability analysis , 2011 .
[9] Md Zahidul Islam,et al. EXPLORE: A Novel Decision Tree Classification Algorithm , 2010, BNCOD.
[10] Eileen Wood,et al. All about me: Disclosure in online social networking profiles: The case of FACEBOOK , 2010, Comput. Hum. Behav..
[11] Bernhard Debatin,et al. Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences , 2009, J. Comput. Mediat. Commun..
[12] George Danezis,et al. Prying Data out of a Social Network , 2009, 2009 International Conference on Advances in Social Network Analysis and Mining.
[13] Anabel Quan-Haase,et al. Information revelation and internet privacy concerns on social network sites: a case study of facebook , 2009, C&T.
[14] I-Hsien Ting,et al. Web mining techniques for on-line social networks analysis , 2008, 2008 International Conference on Service Systems and Service Management.
[15] Lilian Edwards,et al. Data Control and Social Networking: Irreconcilable Ideas? , 2008 .
[16] J. Hoven,et al. Information technology, privacy and the protection of personal data , 2008 .
[17] Ira S. Rubinstein,et al. Data Mining and Internet Profiling: Emerging Regulatory and Technological Approaches , 2008 .
[18] Frans A. J. Birrer,et al. Data Mining to Combat Terrorism and the Roots of Privacy Concerns , 2005, Ethics and Information Technology.
[19] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[20] Chris Clifton,et al. Privacy-preserving outlier detection , 2004, Fourth IEEE International Conference on Data Mining (ICDM'04).
[21] Lambèr M. M. Royakkers,et al. Ethical issues in web data mining , 2004, Ethics and Information Technology.
[22] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[23] Chris Clifton,et al. Tools for privacy preserving distributed data mining , 2002, SKDD.
[24] Trevor Darrell,et al. Privacy in Context , 2001, Hum. Comput. Interact..
[25] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2000, Journal of Cryptology.
[26] Hendrik Blockeel,et al. Web mining research: a survey , 2000, SKDD.
[27] Eve M. Caudill,et al. Consumer Online Privacy: Legal and Ethical Issues , 2000 .
[28] Herman T. Tavani,et al. Informational privacy, data mining, and the Internet , 1998, Ethics and Information Technology.
[29] H. Nissenbaum. Toward an Approach to Privacy in Public: Challenges of Information Technology , 1997 .
[30] James H. Moor,et al. Towards a theory of privacy in the information age , 1997, CSOC.
[31] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[32] J. Rachels. Why privacy is important , 1985 .
[33] Danah Boyd,et al. Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..
[34] Contextual Integrity’s decision heuristic and social network sites tracking , 2013 .
[35] Zahidul Islam,et al. Privacy in Social Network Sites (SNS): the threats from Data Mining , 2012 .
[36] Junbin Gao,et al. CAIRAD: A Novel Technique for Incorrect Records and Attribute-values Detection, In Proc. of IEEE International Joint Conference on Neural Networks , 2012 .
[37] Mark Zuckerberg,et al. One Billion People on Facebook , 2012 .
[38] Tanveer A. Zia,et al. You are what you type: Privacy in Online Social Networks , 2012 .
[39] H. Tavani,et al. Ethics and technology : controversies, questions, and strategies for ethical computing , 2011 .
[40] Yeslam Al‐Saggaf. Saudi Females on Facebook: An Ethnographic Study , 2011 .
[41] Xing Jiang,et al. Testing the trade-off between productivity and quality in research activities , 2010 .
[42] M. Kirkpatrick. Facebook's Zuckerberg Says The Age of Privacy is Over , 2010 .
[43] Mireille Hildebrandt,et al. Who is Profiling Who? Invisible Visibility , 2009 .
[44] David Evans,et al. Privacy Protection for Social Networking Platforms , 2008 .
[45] Zahidul Islam,et al. Privacy Preservation in Data Mining Through Noise Addition , 2008 .
[46] Milan Petkovic,et al. Security, Privacy, and Trust in Modern Data Management , 2007, Data-Centric Systems and Applications.
[47] J. Moor. The ethics of privacy protection , 1990 .