Data Mining and Privacy of Social Network Sites’ Users: Implications of the Data Mining Problem

[1]  Sharon Nielsen,et al.  Self-disclosure on Facebook among female users and its relationship to feelings of loneliness , 2014, Comput. Hum. Behav..

[2]  Kristopher Welsh,et al.  The danger of big data: Social media as computational social science , 2012, First Monday.

[3]  Md Zahidul Islam,et al.  Knowledge Discovery through SysFor - a Systematically Developed Forest of Multiple Decision Trees , 2011, AusDM.

[4]  Md Zahidul Islam,et al.  Privacy preserving data mining: A noise addition framework using a novel clustering technique , 2011, Knowl. Based Syst..

[5]  Md Zahidul Islam,et al.  Seed-Detective: A Novel Clustering Technique Using High Quality Seed for K-Means on Categorical and Numerical Attributes , 2011, AusDM.

[6]  Md Zahidul Islam,et al.  Irrigation Water Demand Forecasting - A Data Pre-Processing and Data Mining Approach based on Spatio-Temporal Data , 2011, AusDM.

[7]  Salvatore Catanese,et al.  Crawling Facebook for social network analysis purposes , 2011, WIMS '11.

[8]  Daniel Neagu,et al.  Online social network profile data extraction for vulnerability analysis , 2011 .

[9]  Md Zahidul Islam,et al.  EXPLORE: A Novel Decision Tree Classification Algorithm , 2010, BNCOD.

[10]  Eileen Wood,et al.  All about me: Disclosure in online social networking profiles: The case of FACEBOOK , 2010, Comput. Hum. Behav..

[11]  Bernhard Debatin,et al.  Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences , 2009, J. Comput. Mediat. Commun..

[12]  George Danezis,et al.  Prying Data out of a Social Network , 2009, 2009 International Conference on Advances in Social Network Analysis and Mining.

[13]  Anabel Quan-Haase,et al.  Information revelation and internet privacy concerns on social network sites: a case study of facebook , 2009, C&T.

[14]  I-Hsien Ting,et al.  Web mining techniques for on-line social networks analysis , 2008, 2008 International Conference on Service Systems and Service Management.

[15]  Lilian Edwards,et al.  Data Control and Social Networking: Irreconcilable Ideas? , 2008 .

[16]  J. Hoven,et al.  Information technology, privacy and the protection of personal data , 2008 .

[17]  Ira S. Rubinstein,et al.  Data Mining and Internet Profiling: Emerging Regulatory and Technological Approaches , 2008 .

[18]  Frans A. J. Birrer,et al.  Data Mining to Combat Terrorism and the Roots of Privacy Concerns , 2005, Ethics and Information Technology.

[19]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[20]  Chris Clifton,et al.  Privacy-preserving outlier detection , 2004, Fourth IEEE International Conference on Data Mining (ICDM'04).

[21]  Lambèr M. M. Royakkers,et al.  Ethical issues in web data mining , 2004, Ethics and Information Technology.

[22]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[23]  Chris Clifton,et al.  Tools for privacy preserving distributed data mining , 2002, SKDD.

[24]  Trevor Darrell,et al.  Privacy in Context , 2001, Hum. Comput. Interact..

[25]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2000, Journal of Cryptology.

[26]  Hendrik Blockeel,et al.  Web mining research: a survey , 2000, SKDD.

[27]  Eve M. Caudill,et al.  Consumer Online Privacy: Legal and Ethical Issues , 2000 .

[28]  Herman T. Tavani,et al.  Informational privacy, data mining, and the Internet , 1998, Ethics and Information Technology.

[29]  H. Nissenbaum Toward an Approach to Privacy in Public: Challenges of Information Technology , 1997 .

[30]  James H. Moor,et al.  Towards a theory of privacy in the information age , 1997, CSOC.

[31]  J. Ross Quinlan,et al.  C4.5: Programs for Machine Learning , 1992 .

[32]  J. Rachels Why privacy is important , 1985 .

[33]  Danah Boyd,et al.  Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..

[34]  Contextual Integrity’s decision heuristic and social network sites tracking , 2013 .

[35]  Zahidul Islam,et al.  Privacy in Social Network Sites (SNS): the threats from Data Mining , 2012 .

[36]  Junbin Gao,et al.  CAIRAD: A Novel Technique for Incorrect Records and Attribute-values Detection, In Proc. of IEEE International Joint Conference on Neural Networks , 2012 .

[37]  Mark Zuckerberg,et al.  One Billion People on Facebook , 2012 .

[38]  Tanveer A. Zia,et al.  You are what you type: Privacy in Online Social Networks , 2012 .

[39]  H. Tavani,et al.  Ethics and technology : controversies, questions, and strategies for ethical computing , 2011 .

[40]  Yeslam Al‐Saggaf Saudi Females on Facebook: An Ethnographic Study , 2011 .

[41]  Xing Jiang,et al.  Testing the trade-off between productivity and quality in research activities , 2010 .

[42]  M. Kirkpatrick Facebook's Zuckerberg Says The Age of Privacy is Over , 2010 .

[43]  Mireille Hildebrandt,et al.  Who is Profiling Who? Invisible Visibility , 2009 .

[44]  David Evans,et al.  Privacy Protection for Social Networking Platforms , 2008 .

[45]  Zahidul Islam,et al.  Privacy Preservation in Data Mining Through Noise Addition , 2008 .

[46]  Milan Petkovic,et al.  Security, Privacy, and Trust in Modern Data Management , 2007, Data-Centric Systems and Applications.

[47]  J. Moor The ethics of privacy protection , 1990 .