Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  百年期刊
Journal of Tsinghua University(Science and Technology)    2014, Vol. 54 Issue (3) : 402-406     DOI:
Orginal Article |
Research on quantifying user privacy on social networking sites
Hanyu ZHU1,Lianren WU2,Tingjie LU1
1. School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing 100876, China
2. School of Hospitality Management, Beijing International Studies University, Beijing 100024, China
Download: PDF(1041 KB)   HTML
Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks     Supporting Info
Guide   
Abstract  

The popularity of social networks puts forward new challenges on the user's privacy protection. In this paper, the methods of human dynamics and statistical physics were used to study the relationship of user's network behaviors and user's privacy value. Current domestic popular social networking sites, Renren and Sina Weibo, were used as the research objects, with the user's actual data then obtained and a privacy quantitative model proposed. The results show that the user's behaviors on the network have an important impact on the value of privacy. Renren's sharing behavior in the user's geographic location has great impact on privacy, while Sina microblogging sending private messages has the greatest impact on the value of privacy. Conclusions of this study have theoretical and practical significance.

Keywords privacy protection      privacy quantification      human dynamics      social networks      user network behavior     
ZTFLH:     
Fund: 
Issue Date: 15 March 2014
Service
E-mail this article
E-mail Alert
RSS
Articles by authors
Hanyu ZHU
Lianren WU
Tingjie LU
Cite this article:   
Hanyu ZHU,Lianren WU,Tingjie LU. Research on quantifying user privacy on social networking sites[J]. Journal of Tsinghua University(Science and Technology), 2014, 54(3): 402-406.
URL:  
http://jst.tsinghuajournals.com/EN/     OR     http://jst.tsinghuajournals.com/EN/Y2014/V54/I3/402
设置 AM AC AG
权值 42.21% 33.97% 23.82%
  
  
设置 AA AM AG
权值 56.27% 18.82% 24.91%
  
  
[1] 胡启平,陈霞.试析社交网络环境中个人隐私保护[J].信息网络安全, 2010(8): 43-44. HU Qiping, CHEN Xia. Protection of privacy on social networking environments[J]. Information Network Security, 2010(8): 43-44. (in Chinese)
[2] Ziegele M, Quiring O. Privacy in social network sites[M]// Perspectives on Privacy and Self-Disclosure in the Social Web. Springer, 2011.
[3] Røssvoll T H, Fritsch L. Trustworthy and inclusive identity management for applications in social media[M]// Human-Computer Interaction. Users and Contexts of Use. Springer Berlin Heidelberg, 2013: 68-77.
[4] Liu Y, Gummadi K P, Krishnamurhy B, et al. Analyzing facebook privacy settings: User expectations vs. reality [C]// Proc of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference. New York, NY, USA: ACM, 2011: 61-70.
[5] Strater K, Lipford H R. Strategies and struggles with privacy in an online social networking community [C]// Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction-Volume 1. UK: British Computer Society, 2008: 111-119.
[6] Lewis K, Kaufman J, Christakis N. The taste for privacy: An analysis of college student privacy settings in an online social network[J]. Journal of Computer-mediated Communication, 2008, 14(1): 79-100.
url: http://dx.doi.org/10.1111/j.1083-6101.2008.01432.x
[7] Zhou T. Human activity pattern on on-line movie watching[J]. Complex Systems and Complexity Science, 2008(3): 1-5.
[8] Wu Y, Zhou C, Chen M, et al.Human comment dynamics in on-line social systems[J]. Physica A, 2010, 389(24): 5832-5837.
url: http://dx.doi.org/10.1016/j.physa.2010.08.049
[9] Wang X G. Empirical analysis on behavior characteristics and relation characteristics of micro-blog users: Take “Sina Micro-blog” for example[J]. Library and Information Service, 2010, 54(14): 66-70.
[10] 闫强,吴联仁,郑兰. 微博社区中用户行为特征及其机理研究[J]. 电子科技大学学报, 2013, 42(3): 328-333. YAN Qiang, WU Lianren, ZHENG Lan. Research on user behavior characters and mechanism in microblog communities[J]. Journal of University of Electronic Science and Technology of China, 2013, 42(3): 328-333. (in Chinese)
[11] Dezso Z, Almaas E, Lukacs A, et al.Dynamics of information access on the web[J]. Physical Review E, 2006, 73(6): 066132.
url: http://dx.doi.org/10.1103/PhysRevE.73.066132
[12] Gao X R, Yang K. Factors affecting internet users' information privacy protection[J]. Journal of Intelligence, 2011(4): 39-42.
[13] Jiang X, Ji S B. Conceptual model of the factors influencing consumer online privacy concern and behavior intention[J]. Science Technology and Management, 2009, 11(5): 71-74.
[14] Zhang Z J, Lv T J. Empirical study of users' acceptance model on mobile LBS[J]. Journal of Beijing University of Posts and Telecommunications: Social Sciences Edition, 2012, 14(1): 56-61.
[15] Wang B, Duan Y X. Research on information privacy quantization method facing ubiquitous computing environment[J]. Computer Engineering and Applications, 2011, 47(27): 1-5.
[16] Jing L, Ng M K, Huang J Z. An entropy weighting k-means algorithm for subspace clustering of high-dimensional sparse data[J]. Knowledge and Data Engineering, IEEE Transactions on, 2007, 19(8): 1026-1041.
url: http://dx.doi.org/10.1109/TKDE.2007.1048
[17] Liu X. Parameterized defuzzification with maximum entropy weighting function: Another view of the weighting function expectation method[J]. Mathematical and Computer Modelling, 2007, 45(1): 177-188.
url: http://dx.doi.org/10.1016/j.mcm.2006.04.014
[1] ZHU Weiyi, ZHANG Xueqin, GU Chunhua. Social network information leakage node probability prediction based on the EDLATrust algorithm[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(2): 355-366.
[2] TU Shouzhong, YANG Jing, ZHAO Lin, ZHU Xiaoyan. Filtering Chinese microblog topics noise algorithm based on a semi-supervised model[J]. Journal of Tsinghua University(Science and Technology), 2019, 59(3): 178-185.
[3] YAN Surong, FENG Xiaoqing, LIAO Yixing. Matrix factorization based social recommender model[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(7): 793-800.
[4] SUN Liyuan, GUAN Xiaohong. Measurements of the competitive characteristics of multi-topic propagation in online social networks[J]. Journal of Tsinghua University(Science and Technology), 2015, 55(11): 1157-1162.
[5] Xinhui HAN, Xianquan XIAO, Jianyu ZHANG, Bingshuang LIU, Yuan ZHANG. Sybil defenses in DHT networks based on social relationships[J]. Journal of Tsinghua University(Science and Technology), 2014, 54(1): 1-7.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd