Bibliography

Page 1 AAF+06
Casey Alt, Owen L. Astrachan, Jeffrey Forbes, Richard Lucic and Susan H. Rodger. Social networks generate interest in computer science. In SIGCSE, 2006.
Page 2 Add08a
Add Health. Deductive disclosure. [unc.edu], 2008.
Page 2 add08b
The National Longitudinal Study of Adolescent Health. [unc.edu], 2008.
Page 9 AKM08
Aris Anagnostopoulos, Ravi Kumar and Mohammad Mahdian. Influence and correlation in social networks. In KDD, 2008.
Page 2 And07
C. Anderson. Social networking is a feature, not a destination. [thelongtail.com], 2007.
Page 2 And08
M. Anderson. Mining social connections. Adweek. [adweekmedia.com], May 19 2008.
Page 2 Arr08
M. Arrington. Don't post the evidence unless it supports your case. Techcrunch. [techcrunch.com], 2008.
Page 1 BA99
Albert-Laszlo Barabasi and Reka Albert. Emergence of scaling in random networks. Science, 286:509-512, 1999.
Page 1 Bai75
Norman T. Bailey. The Mathematical Theory of Infectious Diseases (2nd edition). Hafner Press, 1975.
Pages 3, 7, 19 BDK07
Lars Backstrom, Cynthia Dwork and Jon M. Kleinberg. Wherefore art thou R3579X? Anonymized social networks, hidden patterns, and structural steganography. In WWW, 2007.
Pages 2, 3 BMS04
P. Bearman, J. Moody, and K. Stovel. Chains of affection: The structure of adolescent romantic and sexual networks. American Journal of Sociology, 110(1):44-91, 2004.
Pages 1, 17 Bon87
Phillip Bonacich. Power and centrality: A family of measures. American Journal of Sociology, 92(5):1170-1182, 1987.
Page 16 BZ06
Michael Barbaro and Tom Zeller, Jr.. A face is exposed for AOL searcher no. 4417749. New York Times. [nytimes.com], Aug 9 2006.
Page 15 cal02
California Senate Bill 1386. [ca.gov], 2002.
Page 15 Cal03
California Codes. Business and Professions Code Section 22575-22579. [ca.gov], 2003. Commonly known as the Online Privacy Protection Act of 2003.
Page 1 Car07
R. Carthy. Will IRSeeK have a chilling effect on IRC chat? [techcrunch.com], 2007. [Note: A privacy outcry erupted over a search engine for (public) IRC channels.].
Page 3 CBL08
M. Chew, D. Balfanz, and B. Laurie. (Under)mining privacy in social networks. In W2SP, 2008.
Page 9 CCH+08
David J. Crandall, Dan Cosley, Daniel P. Huttenlocher, Jon M. Kleinberg and Siddharth Suri. Feedback effects between similarity and social influence in online communities. In KDD, 2008.
Page 1 Cli08
S. Clifford. Web privacy on the radar in Congress. New York Times. [nytimes.com], Aug 10 2008.
Page 5 CT08
A. Campan and T. Truta. A clustering approach for data and structural anonymity in social networks. In PinKDD, 2008.
Page 2 D'A07
H. D'Andrade. MySpace and Facebook plan to use personal data for "targeted advertising". [eff.org], 2007.
Page 3 dat08
The DataPortability project. [dataportability.org], 2008.
Page 1 Dun92
R.I.M. Dunbar. Neocortex size as a constraint on group size in primates. Journal of Human Evolution, 22:469-493, 1992.
Page 16 Dwo06
Cynthia Dwork. Differential privacy. In ICALP, 2006.
Page 2 Eld08a
E. Eldon. VentureBeat: Adisn, another company that uses social data to target ads, raises $1.6 million. [venturebeat.com], 2008.
Page 2 Eld08b
E. Eldon. VentureBeat: MediaSixDegrees Targets Ads Using Social Graph Information. [venturebeat.com], 2008.
Pages 1, 15 Eur95
European Parliament. Directive 95/46/EC. [europa.eu], 1995.
Page 2 Fac07
Facebook. Facebook's privacy policy. [facebook.com], 2007.
Pages 2, 5 FE08
A. Felt and D. Evans. Privacy protection for social networking APIs. In W2SP, 2008.
Page 5 FG06
Keith B. Frikken and Philippe Golle. Private social network analysis: How to assemble pieces of a graph privately. In WPES, 2006.
Page 3 FR07
B. Fitzpatrick and D. Recordon. Thoughts on the social graph. [bradfitz.com], 2007.
Page 3 FRG07
D. Fono and K. Raynes-Goldie. Hyperfriends and beyond: Friendship and social norms on LiveJournal. In Internet Research Annual Volume 4: Selected Papers from the Association of Internet Researchers Conference, 2007.
Pages 3, 17 GAH05
Ralph Gross, Alessandro Acquisti and H. John Heinz III. Information revelation and privacy in online social networks. In WPES, 2005.
Page 1 Gra83
Mark Granovetter. The strength of weak ties. American Journal of Sociology, 78:1360-1382, 1983.
Page 1 Gra85
M. Granovetter. Economic action and social structure: The problem of embeddedness. American Journal of Sociology, 91:481-510, 1985.
Page 5 GTF08
S. Guha, K. Tang, and P. Francis. NOYB: Privacy in online social networks. In WOSN, 2008.
Page 2 Hay06
B. Hayes. Connecting the dots: Can the tools of graph theory and social-network studies unravel the next big plot? American Scientist, 94(5):400-404, 2006.
Page 1 HC69
Peter Haggett and Richard J. Chorley. Network analysis in geography. Hodder & Stoughton, 1969.
Page 9 HKRZ08
Woochang Hwang, Taehyong Kim, Murali Ramanathan and Aidong Zhang. Bridging centrality: Graph mining from element level to group level. In KDD, 2008.
Page 5 HMJ+07
M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava. Anonymizing social networks. Technical Report 07-19, University of Massachusetts Amherst, 2007.
Page 17 HR05
R. Hanneman and M. Riddle. Introduction to social network methods. Chapter 10: Centrality and power. [ucr.edu], 2005.
Page 7 JJJM07
Tom N. Jagatic, Nathaniel A. Johnson, Markus Jakobsson and Filippo Menczer. Social phishing. Commun. ACM, 50(10):94-100, 2007.
Page 2 KBCL07
M. Kurucz, A. Benczúr, K. Csalogány, and L. Lukács. Spectral clustering in telephone call graphs. In WebKDD/SNA-KDD, 2007.
Page 16 kel08
Testimony of Chris Kelly before the United States Senate Committee On Commerce, Science, and Transportation, "Privacy implications of online advertising" hearing. [senate.gov], 2008.
Pages 1, 9 KKW08
Gueorgi Kossinets, Jon M. Kleinberg and Duncan J. Watts. The structure of information pathways in a social communication network. In KDD, 2008.
Pages 3, 7 KMNX08
Aleksandra Korolova, Rajeev Motwani, Shubha U. Nabar and Ying Xu. Link privacy in social networks. In ICDE, 2008.
Page 5 KS08
Florian Kerschbaum and Andreas Schaad. Privacy-preserving social network analysis for criminal investigations. In WPES, 2008.
Page 17 KW08
B. Krishnamurthy and C. Willis. Characterizing privacy in online social networks. In WOSN, 2008.
Page 5 LB08
Matthew M. Lucas and Nikita Borisov. flyByNight: Mitigating the privacy risks of social networking. In WPES, 2008.
Page 2 LBd+08
Renaud Lambiotte, Vincent D. Blondel, Cristobald de Kerchove, Etienne Huens, Christophe Prieur, Zbigniew Smoreda and Paul Van Dooren. Geographical dispersal of mobile communication networks. [arxiv.org], 2008.
Page 7 LKG+08
K. Lewis, J. Kaufman, M. Gonzales, A. Wimmer, and N. Christakis. Tastes, ties, and time: a new social network dataset using Facebook.com. Social Networks, 30:330-342, 2008. [Note: six research assistants were paid to download friends-only information from Facebook].
Page 5 LNK03
David Liben-Nowell and Jon M. Kleinberg. The link prediction problem for social networks. In CIKM, 2003.
Page 5 LT08
Kun Liu and Evimaria Terzi. Towards identity anonymization on graphs. In SIGMOD, 2008.
Page 16 Maa07
C. Maag. A hoax turned fatal draws anger but no charges. New York Times. [nytimes.com], Nov 28 2007.
Page 9 MAF08
Mary McGlohon, Leman Akoglu and Christos Faloutsos. Weighted graphs and disconnected components: Patterns and a generator. In KDD, 2008.
Page 3 Med08
Medical News Today. WellNet launches online social networking program for health care coordination. [medicalnewstoday.com], 2008.
Page 3 mic08
Microformats. [microformats.org], 2008.
Page 2 Mil08
E. Mills. Facebook suspends app that permitted peephole. [cnet.com], 2008.
Pages 2, 10, 19, 20 MMG+07
Alan Mislove, Massimiliano Marcon, P. Krishna Gummadi, Peter Druschel and Bobby Bhattacharjee. Measurement and analysis of online social networks. In IMC, 2007.
Page 2 Mor08
C. Morrison. VentureBeat: Lotame raises $13M for customizable social media ads. [venturebeat.com], 2008.
Page 2 NGD+06
Amit Anil Nanavati, Siva Gurumurthy, Gautam Das, Dipanjan Chakraborty, Koustuv Dasgupta, Sougata Mukherjea and Anupam Joshi. On the structural properties of massive telecom call graphs: findings and implications. In CIKM, 2006.
Pages 16, 17 NS08
Arvind Narayanan and Vitaly Shmatikov. Robust de-anonymization of large sparse datasets. In S&P;, 2008.
Page 2 O'N08
N. O'Neill. Senate begins discussing privacy implications of online advertising. [socialtimes.com], 2008.
Page 3 ope08
OpenID. [openid.net], 2008.
Page 2 OSH+06
J. -P. Onnela, J. Saramaki, J. Hyvonen, G. Szabo, D. Lazer, K. Kaski, J. Kertesz and A. -L. Barabasi. Structure and tie strengths in mobile communication networks. [arxiv.org], 2006.
Page 15 Par00
Parliament of Canada. Bill C-6. [gc.ca], 2000. Commonly known as the Personal Information Protection and Electronic Documents Act.
Page 12 Pat07
A. Patriquin. Compete: Connecting the social graph: member overlap at OpenSocial and Facebook. [compete.com], 2007.
Page 3 PCT04
Bogdan C. Popescu, Bruno Crispo and Andrew S. Tanenbaum. Safe and private data sharing with Turtle: Friends team-up and beat the system. In Cambridge Workshop on Security Protocols, 2004.
Page 3 Pla07
Plaxo. Building an open social graph. [plaxo.com], 2007.
Page 2 RD02
Matthew Richardson and Pedro Domingos. Mining knowledge-sharing sites for viral marketing. In KDD, 2002.
Page 2 Rec08
D. Recordon. Is SocialMedia overstepping Facebook's privacy line? [oreilly.com], 2008.
Page 2 RTZSH08
T. Rohan, T. Tunguz-Zawislak, S. Sheffer, and J. Harmsen. Network node ad targeting. U.S. Patent Application 0080162260, 2008.
Page 2 Rum07
R. Rumford. Facebook applications break 10000. [facereviews.com], 2007.
Page 5 Sch08
E. Schonfeld. Techcrunch: Twitter starts blacklisting spammers. [techcrunch.com], 2008.
Page 1 Sim08
Georg Simmel. Soziologie. Duncker & Humblot, 1908. [Note: Simmel proposed a new and quantitative approach to sociology, one that would fall under Social Network Analysis in modern terms.].
Page 2 Sog08
C. Soghoian. Widespread cell phone location snooping by NSA? [cnet.com], 2008.
Page 1 Sto08
L. Story. A company promises the deepest data mining yet. New York Times. [nytimes.com], Mar 20 2008.
Page 2 SWB+08
G. Swamynathan, C. Wilson, B. Boe, B. Zhao, and K. Almeroth. Can social networks improve e-commerce: a study on social marketplaces. In WOSN, 2008.
Page 1 Swe08
M. Sweney. Google and Viacom reach deal over YouTube user data. Guardian. [co.uk], Jul 15 2008.
Pages 3, 7 SZD08
Z. Stone, T. Zickler, and T. Darrell. Autotagging Facebook: Social network context improves photo annotation. In Workshop on Internet Vision, 2008.
Page 16 Tec08
Techdirt. Is a fake Facebook profile illegal? [techdirt.com], 2008.
Pages 1, 16 TM69
J. Travers and S. Milgram. An experimental study of the small world problem. Sociometry, 32(4):425-443, 1969.
Page 7 Top08
R. Topolski. NebuAd and partner ISPs: Wiretapping, forgery and browser hijacking. [freepress.net], 2008.
Page 15 Uni02a
United States Code. The Video Privacy Protection Act (VPPA). [epic.org], 2002.
Page 15 Uni02b
United States Department of Health and Human Services. Standards for Privacy of Individually Identifiable Health Information; Final Rule. [hhs.gov], 2002. Commonly known as the HIPAA Privacy Rule.
Page 15 Uni05a
United States Code. The Privacy Act of 1974 and Amendments. [epic.org], 2005.
Page 15 Uni05b
United States Senate. Text of the Consumer Privacy Protection Act of 2005. [govtrack.us], 2005.
Page 15 Uni05c
United States Senate. Text of the Online Privacy Protection Act of 2005. [govtrack.us], 2005.
Page 15 Uni05d
United States Senate. Text of the Privacy Act of 2005. [govtrack.us], 2005.
Page 19 Wei
E. Weinstein. Phase transition. [wolfram.com].
Page 2 Wil99
Graham J. Wills. NicheWorks - interactive visualization of very large graphs. Journal of Computational and Graphical Statistics, 8(2):190-212, 1999.
Page 3 Win08
J. Winter. Disgraced former NBA referee Tim Donaghy's phone calls to second ref raise questions. [foxnews.com], 2008.
Page 5 YGKX08
Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky and Feng Xiao. SybilLimit: A near-optimal social network defense against sybil attacks. In S&P;, 2008.
Page 7 Yu08
H. Yu. Freedom to Tinker: Bad Phorm on Privacy. [freedom-to-tinker.com], 2008.
Page 5 ZG07
Elena Zheleva and Lise Getoor. Preserving the privacy of sensitive relationships in graph data. In PinKDD, 2007.
Page 5 ZP08
Bin Zhou and Jian Pei. Preserving privacy in social networks against neighborhood attacks. In ICDE, 2008.