Papers

This list of papers for the course is being under active construction. It changes almost every day, for now.

  1. Boyd, D. M. and Ellison, N. B. (2008), “Social Network Sites: Definition, History, and Scholarship,” Journal of Computer-Mediated Communication, 13: 210–230. doi: 10.1111/j.1083- 6101.2007.00393.x

  2. Ralph Gross and Alessandro Acquisti. 2005. “Information revelation and privacy in online social networks,” In Proceedings of the 2005 ACM workshop on Privacy in the electronic society (WPES ’05). ACM, New York, NY, USA, 71-80.
  3. Lars Backstrom, Cynthia Dwork, and Jon Kleinberg. 2007. “Herefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography,” In Proceedings of the 16th international conference on World Wide Web (WWW ’07). ACM, New York, NY, USA, 181-190.

  4. Narayanan, Arvind, and Vitaly Shmatikov. “De-anonymizing social networks,” In Security and Privacy, 2009 30th IEEE Symposium on, pp. 173-187. IEEE, 2009.

  5. Tao Stein, Erdong Chen, and Karan Mangla. 2011. “Facebook Immune System,” In Proceedings of the 4th Workshop on Social Network Systems (SNS ’11). ACM, New York, NY, USA.

  6. Randy Baden, Adam Bender, Neil Spring, Bobby Bhattacharjee, and Daniel Starin. 2009. “Persona: an online social network with user-defined privacy,” In Proceedings of the ACM SIGCOMM 2009 conference on Data communication (SIGCOMM ’09). ACM, New York, NY, USA, 135-146.

  7. Zhi Yang, Christo Wilson, Xiao Wang, Tingting Gao, Ben Y. Zhao, and Yafei Dai. 2011. “Uncovering social network sybils in the wild,” In Proceedings of the 2011 ACM SIGCOMM conference on Internet Measurement Conference (IMC ’11). ACM, New York, NY, USA, 259-268.

  8. Felt, Adrienne, and David Evans. “Privacy protection for social networking APIs,” 2008 Web 2.0 Security and Privacy (W2SP’08) (2008).

  9. Yang Wang, Gregory Norcie, Saranga Komanduri, Pedro Giovanni Leon, Lorrie Faith Cranor, Alessandro Acquisti. I regretted the minute I pressed share”: A Qualitative Study of Regrets on Facebook” SOUPS 2011.

  10. Fred Stutzman, Jacob Kramer-Duffield. “Friends Only: Examining a Privacy-Enhancing Behavior in Facebook” CHI 2010.

  11. Serge Egelman, Andrew Oates, Shriram Krishnamurthi. “Oops, I Did It Again: Mitigating Repeated Access Control Errors on Facebook” CHI 2011

  12. Airi Lampinen, Vilma Lehtinen, Asko Lehmuskallio, Sakari Tamminen. “We’re in It Together: Interpersonal Management of Disclosure in Social Network Services” CHI 2011

  13. A. Besmer, H. Lipford, M. Shehab, and G. Cheek. “Social Applications: Exploring A More Secure Framework,” SOUPS 2009.

  14. Mudhakar Srivatsa and Mike Hicks. 2012. “Deanonymizing mobility traces: using social network as a side-channel,” In Proceedings of the 2012 ACM conference on Computer and communications security (CCS ’12). ACM, New York, NY, USA, 628-637. DOI=10.1145/2382196.2382262

  15. Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, and Edward W. Felten. 2012. “Social networking with frientegrity: privacy and integrity with an untrusted provider,” In Proceedings of the 21st USENIX conference on Security symposium (Security’12). USENIX Association, Berkeley, CA, USA, 31-31.

  16. Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, and Evangelos P. Markatos. 2012. “Privacy-preserving social plugins,” In Proceedings of the 21st USENIX conference on Security symposium (Security’12). USENIX Association, Berkeley, CA, USA, 30-30.

  17. Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, and Michalis Faloutsos. 2012. “Efficient and scalable socware detection in online social networks,” In Proceedings of the 21st USENIX conference on Security symposium (Security’12). USENIX Association, Berkeley, CA, USA, 32-32.

  18. Cao, Qiang, et al. “Aiding the detection of fake accounts in large scale social online services,” Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation. USENIX Association, 2012.

  19. Gao, Hongyu, et al. “Detecting and characterizing social spam campaigns,” Proceedings of the 10th annual conference on Internet measurement. ACM, 2010.

  20. Bonneau, Joseph, and Sören Preibusch, “The privacy jungle: On the market for data protection in social networks,” Economics of information security and privacy (2010): 121-167.

  21. Liu, Yabing, et al. “Analyzing Facebook privacy settings: User expectations vs. reality,” Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. ACM, 2011.

  22. Wondracek, G., Holz, T., Kirda, E., Kruegel, C., “A Practical Attack to De-Anonymize Social Network Users,” In: IEEE Symposium on Security and Privacy (S & P), 2010.

    Maritza Johnson, Serge Egelman, and Steven M. Bellovin. “Facebook and privacy: It’s complicated,” In Symposium On Usable Privacy and Security (SOUPS), 2012.

    Pan Shi, Dr. Heng Xu and Dr. Yunan Chen, “Using Contextual Integrity to Examine Interpersonal Information Boundary on Social Network Sites” ACM Conference on Human Factors in Computing Systems (CHI 2013).

Leave a Reply