risks so that the user may apply countermeasures. It
is worth mentioning that users do not require
technical knowledge to set their privacy
requirements, since they can be intuitively defined
by answering questions. Moreover, requirements can
be made coherent with legislations on data privacy.
Future research will focus on dealing with the
ambiguity (e.g., polysemy, synonymy, ellipsis) that
usually appears when syntactically analysing text
and when computing term’s IC from raw web-scale
statistics. Moreover, we also plan to engineer
questionnaires that are appropriate for the scope of
some of the most widely used social networks in
order to conduct additional experiments.
ACKNOWLEDGEMENTS
This work was partly supported by the European
Commission under FP7 project Inter-Trust, H2020
project CLARUS, by the Spanish Ministry of
Science and Innovation (through projects CO-
PRIVACY TIN2011-27076-C03-01, ICWT
TIN2012-32757 and BallotNext IPT-2012-0603-
430000) and by the Government of Catalonia (under
grant 2014 SGR 537). This work was also made
possible through the support of a grant from
Templeton World Charity Foundation. The opinions
expressed in this paper are those of the authors and
do not necessarily reflect the views of Templeton
World Charity Foundation.
REFERENCES
Abril, D., Navarro-Arribas, G. & Torra, V. On the
declassification of confidential documents. 8th
International Conference on Modeling Decision for
Artificial Intelligence, 2011. 235–246.
Akcora, C. G., Carminati, B. & Ferrari, E. Privacy in
Social Networks: How Risky is Your Social Graph?
IEEE 28th International Conference on Data
Engineering, 2012. 9-19.
Becker, J. & Chen, H. Measuring Privacy Risk in Online
Social Networks. Web 2.0 Security and Privacy
Conference, 2009.
Carminati, B., Ferrari, E. & Perego, A. 2009. Enforcing
access control in Web-based social networks. ACM
Transaction on Information and System Security,
13(1), pp 38.
Cilibrasi, R. L. & Vitányi, P. M. B. 2006. The Google
Similarity Distance. IEEE Transactions on Knowledge
and Data Engineering, 19(3), pp 370-383.
Consumer Reports National Research Center 2010.
Annual state of the net survey 2010. Consumer
Reports, 75(6), pp 1.
Chow, R., Golle, P. & Staddon, J. Detecting Privacy
Leacks Using Corpus-based Association Rules. 14th
Conference on Knowledge Discovery and Data
Mining, 2008. 893-901.
D'Arcy, J. 2011. Combating cyber bullying and
technology’s downside. The Washington Post.
Department of Health and Human Services. 2000. The
health insurance portability and accountability act.
Health Privacy Project. 2013. State Privacy Protections
[Online]. Available: https://www.cdt.org/issue/state-
privacy-protections.
Liu, K. & Terzi, E. 2010. A Framework for Computing the
Privacy Scores of Users in Online Social Networks.
ACM Transactions on Knowledge Discovery from
Data, 5(1), pp 30.
Resnik, P. Using Information Content to Evalutate
Semantic Similarity in a Taxonomy. 14th
International Joint Conference on Artificial
Intelligence, 1995. 448-453.
Sánchez, D., Batet, M. & Isern, D. 2011. Ontology-based
Information Content computation. Knowledge-Based
Systems, 24(2), pp 297-303.
Sánchez, D., Batet, M., Valls, A. & Gibert, K. 2010.
Ontology-driven web-based semantic similarity.
Journal of Intelligent Information Systems, 35(3), pp
383-413.
Sánchez, D., Batet, M. & Viejo, A. 2013a. Automatic
general-purpose sanitization of textual documents.
IEEE Transactions on Information Forensics and
Security, 8(6), pp 853-862.
Sánchez, D., Batet, M. & Viejo, A. 2013b. Minimizing the
disclosure risk of semantic correlations in document
sanitization. Information Sciences, 249(1), pp 110-
123.
Sánchez, D., Batet, M. & Viejo, A. 2014. Utility-
preserving sanitization of semantically correlated
terms in textual documents. Information Sciences,
279(1), pp 77–93.
Srivastava, A. & Geethakumari, G. Measuring Privacy
Leaks in Online Social Networks. International
Conference on Advances in Computing,
Communications and Informatics, 2013.
Talukder, N., Ouzzani, M., Elmagarmid, A. K.,
Elmeleegy, H. & Yakout, M. Privometer: Privacy
protection in social networks. IEEE 26th International
Conference on Data Engineering Workshops, 2010.
The European Parliament and the Council of the EU.
1995. Data Protection Directive 95/46/EC [Online].
Turney, P. D. Mining the Web for Synonyms: PMI-IR
versus LSA on TOEFL. 12th European Conference on
Machine Learning, ECML 2001, 2001. 491-502.
Wang, Y., Nepali, R. K. & Nikolai, J. Social network
privacy measurement and simulation. International
Conference on Computing, Networking and
Communications, 2014. 802-806.
Zhang, C., Sun, J., Zhu, X. & Fang, Y. 2010. Privacy and
security for online social networks: Challenges and
opportunities. IEEE Network, 24(4), pp 13-18.
PrivacyRiskAssessmentofTextualPublicationsinSocialNetworks
241