user-generated contents required for providing accu-
rate privacy policy recommendations.
ACKNOWLEDGEMENTS
Funding for this research was provided by the Na-
tional Research Foundation (NRF) of South Africa
and the Norwegian National Research Council.
REFERENCES
Acquisti, A., Carrara, E., Stutzman, F., Callas, J., Schim-
mer, K., Nadjm, M., Gorge, M., Ellison, N., King, P.,
Gross, R., and Golder, S. (2007). Security Issues and
Recommendations for Online Social Networks. Tech-
nical Report 1, European Network and Information
Security Agency.
Alsalibi, B. and Zakaria, N. (2013). CFPRS : Collabora-
tive Filtering Privacy Recommender System for On-
line Social Networks. Journal of Engineering Re-
search and Applications, 3(5):1850–1858.
Ang, C. and Zaphiris, P. (2009). Simulating social networks
of online communities: Simulation as a method for
sociability design. In Human-Computer Interaction,
volume 5727 of Lecture Notes in Computer Science,
pages 443–456. Springer Berlin Heidelberg.
Bakshy, E., Eckles, D., Yan, R., and Rosenn, I. (2012).
Social influence in social advertising: Evidence from
field experiments. In Proceedings of the 13th ACM
Conference on Electronic Commerce, EC ’12, pages
146–161, New York, NY, USA. ACM.
Facebook Inc. (09-2015). Statistics.
https://newsroom.fb.com/company-info/.
Fang, L. and LeFevre, K. (2010). Privacy wizards for social
networking sites. In Proceedings of the 19th Inter-
national Conference on World Wide Web, WWW ’10,
pages 351–360, New York, NY, USA. ACM.
Fire, M., Goldschmidt, R., and Elovici, Y. (2014). Online
social networks: Threats and solutions. Communica-
tions Surveys Tutorials, IEEE, 16(4):2019–2036.
Gao, H., Hu, J., Huang, T., Wang, J., and Chen, Y. (2011).
Security issues in online social networks. Internet
Computing, IEEE, 15(4):56–63.
Ghazinour, K., Matwin, S., and Sokolova, M. (2013a).
Monitoring and recommending privacy settings in
social networks. In Proceedings of the Joint
EDBT/ICDT 2013 Workshops, EDBT ’13, pages 164–
168, New York, NY, USA. ACM.
Ghazinour, K., Matwin, S., and Sokolova, M. (2013b).
YourPrivacyProtector: A Recommender System for
Privacy Settings in Social Networks. International
Journal of Security, 2(4):11–25.
Gross, R. and Acquisti, A. (2005). Information revelation
and privacy in online social networks. In Proceedings
of the 2005 ACM Workshop on Privacy in the Elec-
tronic Society, WPES ’05, pages 71–80, New York,
NY, USA. ACM.
Gross, R., Stutzman, F., and Acquisti, A. (2013). Silent
Listeners: The Evolution of Privacy and Disclosure
on Facebook. Journal of Privacy and Confidentiality,
4(2):7–41.
Gundecha, P., Barbier, G., and Liu, H. (2011). Ex-
ploiting vulnerability to secure user privacy on a so-
cial networking site. In Proceedings of the 17th
ACM SIGKDD International Conference on Knowl-
edge Discovery and Data Mining, KDD ’11, pages
511–519, New York, NY, USA. ACM.
Guo, S. and Chen, K. (2012). Mining privacy settings to
find optimal privacy-utility tradeoffs for social net-
work services. In International Confernece on Social
Computing (SocialCom), pages 656–665. IEEE.
Klimek, P. and Thurner, S. (2013). Triadic closure dynamics
drives scaling laws in social multiplex networks. New
Journal of Physics, 15(6):063008.
Liu, Y., Gummadi, K. P., Krishnamurthy, B., and Mislove,
A. (2011). Analyzing facebook privacy settings: User
expectations vs. reality. In Proceedings of the 2011
ACM SIGCOMM Conference on Internet Measure-
ment Conference, IMC ’11, pages 61–70, New York,
NY, USA. ACM.
Macal, C. M. and North, M. J. (2011). Introductory tuto-
rial: Agent-based modeling and simulation. In Pro-
ceedings of the 2011 Winter Simulation Conference
(WSC), pages 1451–1464. IEEE.
Madejski, M., Johnson, M., and Bellovin, S. (2012). A
study of privacy settings errors in an online social net-
work. In Pervasive Computing and Communications
Workshops (PERCOM Workshops), 2012 IEEE Inter-
national Conference on, pages 340–345. IEEE.
Mitchell, T. M. (1997). Decision Tree Learning. In Tucker,
C. L. B., editor, Machine Learning, chapter 3, pages
52–80. McGraw-Hill, Inc., New York, NY, USA, 1
edition.
S
´
anchez, D. and Viejo, A. (2015). Privacy risk assessment
of textual publications in social networks. In Proceed-
ings of the International Conference on Agents and
Artificial Intelligence, pages 236–241.
Sebastiani, F. (2002). Machine learning in automated text
categorization. ACM Comput. Surv., 34(1):1–47.
Shehab, M., Cheek, G., Touati, H., Squicciarini, A. C., and
Cheng, P.-C. (2010). Learning based access control
in online social networks. In Proceedings of the 19th
International Conference on World Wide Web, WWW
’10, pages 1179–1180, New York, NY, USA. ACM.
Sinha, A., Li, Y., and Bauer, L. (2013). What you want
is not what you get: Predicting Sharing Policies for
Text-based Content on Facebook. In Proceedings of
the 2013 ACM workshop on Artificial intelligence and
security - AISec ’13, pages 13–24, New York, New
York, USA. ACM Press.
Squicciarini, A. C., Sundareswaran, S., Lin, D., and Wede,
J. (2011). A3p: Adaptive policy prediction for shared
images over popular content sharing sites. In Proceed-
ings of the 22Nd ACM Conference on Hypertext and
ICISSP 2016 - 2nd International Conference on Information Systems Security and Privacy
136