Contents

Bibliography

ref1
Add Health. Deductive disclosure.
[unc.edu], 2008.

ref2
The National Longitudinal Study of Adolescent Health. [unc.edu] , 2008.

ref3
Aris Anagnostopoulos, Ravi Kumar and Mohammad Mahdian. Influence and correlation in social networks.
In KDD, 2008.

ref4
C. Anderson. Social networking is a feature, not a destination.
[thelongtail.com], 2007.

ref5
M. Anderson. Mining social connections.
Adweek. [adweekmedia.com], May 19 2008.

ref6
M. Arrington. Don't post the evidence unless it supports your case.
Techcrunch. [techcrunch.com], 2008.

ref-1 | ref-2 | ref-3 | ref-4 | ref-5 | ref-6 | ref-77
Lars Backstrom, Cynthia Dwork and Jon M. Kleinberg. Wherefore art thou R3579X? Anonymized social networks, hidden patterns, and structural steganography.
In WWW, 2007.

ref8
Norman T. Bailey. The Mathematical Theory of Infectious Diseases (2nd edition) .
Hafner Press, 1975.

ref9
Albert-Laszlo Barabasi and Reka Albert. Emergence of scaling in random networks.
Science, 286:509-512, 1999.

ref10
Michael Barbaro and Tom Zeller, Jr.. A face is exposed for AOL searcher no. 4417749.
New York Times. [nytimes.com], Aug 9 2006.

ref-1 | ref-2 | ref-311
P. Bearman, J. Moody, and K. Stovel. Chains of affection: The structure of adolescent romantic and sexual networks.
American Journal of Sociology, 110(1):44-91, 2004.

ref-1 | ref-212
Phillip Bonacich. Power and centrality: A family of measures.
American Journal of Sociology, 92(5):1170-1182, 1987.

ref13
California Senate Bill 1386. [ca.gov], 2002.

ref14
California Codes. Business and Professions Code Section 22575-22579.
[ca.gov], 2003.
Commonly known as the Online Privacy Protection Act of 2003.

ref15
A. Campan and T. Truta. A clustering approach for data and structural anonymity in social networks.
In PinKDD, 2008.

ref16
R. Carthy. Will IRSeeK have a chilling effect on IRC chat?
[techcrunch.com], 2007.
[Note: A privacy outcry erupted over a search engine for (public) IRC channels.].

ref17
M. Chew, D. Balfanz, and B. Laurie. (Under)mining privacy in social networks.
In W2SP, 2008.

ref18
S. Clifford. Web privacy on the radar in Congress.
New York Times. [nytimes.com], Aug 10 2008.

ref19
David J. Crandall, Dan Cosley, Daniel P. Huttenlocher, Jon M. Kleinberg and Siddharth Suri. Feedback effects between similarity and social influence in online communities.
In KDD, 2008.

ref20
H. D'Andrade. MySpace and Facebook plan to use personal data for ``targeted advertising''.
[eff.org], 2007.

ref21
The DataPortability project. [dataportability.org] , 2008.

ref22
R.I.M. Dunbar. Neocortex size as a constraint on group size in primates.
Journal of Human Evolution, 22:469-493, 1992.

ref23
Cynthia Dwork. Differential privacy.
In ICALP, 2006.

ref24
E. Eldon. VentureBeat: Adisn, another company that uses social data to target ads, raises $1.6 million.
[venturebeat.com], 2008.

ref25
E. Eldon. VentureBeat: MediaSixDegrees Targets Ads Using Social Graph Information.
[venturebeat.com], 2008.

ref-1 | ref-226
European Parliament. Directive 95/46/EC.
[europa.eu], 1995.

ref27
Facebook. Facebook's privacy policy.
[facebook.com], 2007.

ref-1 | ref-2 | ref-328
A. Felt and D. Evans. Privacy protection for social networking APIs.
In W2SP, 2008.

ref29
B. Fitzpatrick and D. Recordon. Thoughts on the social graph.
[bradfitz.com], 2007.

ref30
D. Fono and K. Raynes-Goldie. Hyperfriends and beyond: Friendship and social norms on LiveJournal.
In Internet Research Annual Volume 4: Selected Papers from the Association of Internet Researchers Conference, 2007.

ref31
Keith B. Frikken and Philippe Golle. Private social network analysis: How to assemble pieces of a graph privately.
In WPES, 2006.

ref32
Mark Granovetter. The strength of weak ties.
American Journal of Sociology, 78:1360-1382, 1983.

ref33
M. Granovetter. Economic action and social structure: The problem of embeddedness.
American Journal of Sociology, 91:481-510, 1985.

ref-1 | ref-2 | ref-334
Ralph Gross, Alessandro Acquisti and H. John Heinz III. Information revelation and privacy in online social networks.
In WPES, 2005.

ref35
S. Guha, K. Tang, and P. Francis. NOYB: Privacy in online social networks.
In WOSN, 2008.

ref36
Peter Haggett and Richard J. Chorley. Network analysis in geography .
Hodder & Stoughton, 1969.

ref37
R. Hanneman and M. Riddle. Introduction to social network methods. Chapter 10: Centrality and power.
[ucr.edu], 2005.

ref38
M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava. Anonymizing social networks.
Technical Report 07-19, University of Massachusetts Amherst, 2007.

ref-1 | ref-239
B. Hayes. Connecting the dots: Can the tools of graph theory and social-network studies unravel the next big plot?
American Scientist, 94(5):400-404, 2006.

ref40
Woochang Hwang, Taehyong Kim, Murali Ramanathan and Aidong Zhang. Bridging centrality: Graph mining from element level to group level.
In KDD, 2008.

ref41
Tom N. Jagatic, Nathaniel A. Johnson, Markus Jakobsson and Filippo Menczer. Social phishing.
Commun. ACM, 50(10):94-100, 2007.

ref42
Testimony of Chris Kelly before the United States Senate Committee On Commerce, Science, and Transportation, ``Privacy implications of online advertising'' hearing. [senate.gov], 2008.

ref43
Florian Kerschbaum and Andreas Schaad. Privacy-preserving social network analysis for criminal investigations.
In WPES, 2008.

ref-1 | ref-244
Aleksandra Korolova, Rajeev Motwani, Shubha U. Nabar and Ying Xu. Link privacy in social networks.
In ICDE, 2008.

ref-1 | ref-245
Gueorgi Kossinets, Jon M. Kleinberg and Duncan J. Watts. The structure of information pathways in a social communication network.
In KDD, 2008.

ref46
B. Krishnamurthy and C. Willis. Characterizing privacy in online social networks.
In WOSN, 2008.

ref47
M. Kurucz, A. Benczúr, K. Csalogány, and L. Lukács. Spectral clustering in telephone call graphs.
In WebKDD/SNA-KDD, 2007.

ref48
Renaud Lambiotte, Vincent D. Blondel, Cristobald de Kerchove, Etienne Huens, Christophe Prieur, Zbigniew Smoreda and Paul Van Dooren. Geographical dispersal of mobile communication networks.
[arxiv.org], 2008.

ref49
K. Lewis, J. Kaufman, M. Gonzales, A. Wimmer, and N. Christakis. Tastes, ties, and time: a new social network dataset using Facebook.com.
Social Networks, 30:330-342, 2008.
[Note: six research assistants were paid to download friends-only information from Facebook].

ref50
David Liben-Nowell and Jon M. Kleinberg. The link prediction problem for social networks.
In CIKM, 2003.

ref51
Kun Liu and Evimaria Terzi. Towards identity anonymization on graphs.
In SIGMOD, 2008.

ref52
Matthew M. Lucas and Nikita Borisov. flyByNight: Mitigating the privacy risks of social networking.
In WPES, 2008.

ref53
C. Maag. A hoax turned fatal draws anger but no charges.
New York Times. [nytimes.com], Nov 28 2007.

ref54
Mary McGlohon, Leman Akoglu and Christos Faloutsos. Weighted graphs and disconnected components: Patterns and a generator.
In KDD, 2008.

ref55
Medical News Today. WellNet launches online social networking program for health care coordination.
[medicalnewstoday.com], 2008.

ref56
Microformats. [microformats.org] , 2008.

ref57
E. Mills. Facebook suspends app that permitted peephole.
[cnet.com], 2008.

ref-1 | ref-2 | ref-3 | ref-4 | ref-558
Alan Mislove, Massimiliano Marcon, P. Krishna Gummadi, Peter Druschel and Bobby Bhattacharjee. Measurement and analysis of online social networks.
In IMC, 2007.

ref59
C. Morrison. VentureBeat: Lotame raises $13M for customizable social media ads.
[venturebeat.com], 2008.

ref60
Amit Anil Nanavati, Siva Gurumurthy, Gautam Das, Dipanjan Chakraborty, Koustuv Dasgupta, Sougata Mukherjea and Anupam Joshi. On the structural properties of massive telecom call graphs: findings and implications.
In CIKM, 2006.

ref-1 | ref-261
Arvind Narayanan and Vitaly Shmatikov. Robust de-anonymization of large sparse datasets.
In S&P, 2008.

ref62
N. O'Neill. Senate begins discussing privacy implications of online advertising.
[socialtimes.com], 2008.

ref63
J. -P. Onnela, J. Saramaki, J. Hyvonen, G. Szabo, D. Lazer, K. Kaski, J. Kertesz and A. -L. Barabasi. Structure and tie strengths in mobile communication networks.
[arxiv.org], 2006.

ref64
OpenID. [openid.net] , 2008.

ref65
Parliament of Canada. Bill C-6.
[gc.ca], 2000.
Commonly known as the Personal Information Protection and Electronic Documents Act.

ref66
A. Patriquin. Compete: Connecting the social graph: member overlap at OpenSocial and Facebook.
[compete.com], 2007.

ref67
Plaxo. Building an open social graph.
[plaxo.com], 2007.

ref68
Bogdan C. Popescu, Bruno Crispo and Andrew S. Tanenbaum. Safe and private data sharing with Turtle: Friends team-up and beat the system.
In Cambridge Workshop on Security Protocols, 2004.

ref69
D. Recordon. Is SocialMedia overstepping Facebook's privacy line?
[oreilly.com], 2008.

ref70
Matthew Richardson and Pedro Domingos. Mining knowledge-sharing sites for viral marketing.
In KDD, 2002.

ref71
T. Rohan, T. Tunguz-Zawislak, S. Sheffer, and J. Harmsen. Network node ad targeting.
U.S. Patent Application 0080162260, 2008.

ref72
R. Rumford. Facebook applications break 10000.
[facereviews.com], 2007.

ref73
E. Schonfeld. Techcrunch: Twitter starts blacklisting spammers.
[techcrunch.com], 2008.

ref74
Georg Simmel. Soziologie .
Duncker & Humblot, 1908.
[Note: Simmel proposed a new and quantitative approach to sociology, one that would fall under Social Network Analysis in modern terms.].

ref75
C. Soghoian. Widespread cell phone location snooping by NSA?
[cnet.com], 2008.

ref-1 | ref-276
Z. Stone, T. Zickler, and T. Darrell. Autotagging Facebook: Social network context improves photo annotation.
In Workshop on Internet Vision, 2008.

ref77
L. Story. A company promises the deepest data mining yet.
New York Times. [nytimes.com], Mar 20 2008.

ref78
G. Swamynathan, C. Wilson, B. Boe, B. Zhao, and K. Almeroth. Can social networks improve e-commerce: a study on social marketplaces.
In WOSN, 2008.

ref79
M. Sweney. Google and Viacom reach deal over YouTube user data.
Guardian. [co.uk], Jul 15 2008.

ref80
Techdirt. Is a fake Facebook profile illegal?
[techdirt.com], 2008.

ref81
R. Topolski. NebuAd and partner ISPs: Wiretapping, forgery and browser hijacking.
[freepress.net], 2008.

ref-1 | ref-282
J. Travers and S. Milgram. An experimental study of the small world problem.
Sociometry, 32(4):425-443, 1969.

ref83
United States Code. The Video Privacy Protection Act (VPPA).
[epic.org], 2002.

ref84
United States Code. The Privacy Act of 1974 and Amendments.
[epic.org], 2005.

ref85
United States Department of Health and Human Services. Standards for Privacy of Individually Identifiable Health Information; Final Rule.
[hhs.gov], 2002.
Commonly known as the HIPAA Privacy Rule.

ref86
United States Senate. Text of the Consumer Privacy Protection Act of 2005.
[govtrack.us], 2005.

ref87
United States Senate. Text of the Online Privacy Protection Act of 2005.
[govtrack.us], 2005.

ref88
United States Senate. Text of the Privacy Act of 2005.
[govtrack.us], 2005.

ref89
E. Weinstein. Phase transition.
[wolfram.com].

ref90
Graham J. Wills. NicheWorks -- interactive visualization of very large graphs.
Journal of Computational and Graphical Statistics, 8(2):190-212, 1999.

ref91
J. Winter. Disgraced former NBA referee Tim Donaghy's phone calls to second ref raise questions.
[foxnews.com], 2008.

ref92
H. Yu. Freedom to Tinker: Bad Phorm on Privacy.
[freedom-to-tinker.com], 2008.

ref93
Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky and Feng Xiao. SybilLimit: A near-optimal social network defense against sybil attacks.
In S&P, 2008.

ref94
Elena Zheleva and Lise Getoor. Preserving the privacy of sensitive relationships in graph data.
In PinKDD, 2007.

ref95
Bin Zhou and Jian Pei. Preserving privacy in social networks against neighborhood attacks.
In ICDE, 2008.

Arvind Narayanan 2009-03-19