publication . Preprint . 2011

Preliminary Analysis of Google+'s Privacy

Mahmood, Shah; Desmedt, Yvo;
Open Access English
  • Published: 15 Nov 2011
Comment: CCS'11, October 17-21, 2011, Chicago, Illinois, USA
free text keywords: Computer Science - Social and Information Networks, Computer Science - Cryptography and Security, K.4.1, K.6.5
Download from
19 references, page 1 of 2

[1] Circle hack., 2011.

[2] P. Adams. The real life social network v2., 2010.

[3] R. J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.). Wiley, 2008.

[4] D. Barret and M. H. Saul. "weiner now says he sent photos". The Wall Street Journal, June 7, 2011.

[5] H. Berghel. Identity Theft, Social Security Numbers, and the Web. Commun. ACM, 43(2):17{21, 2000.

[6] J. Bonneau. New facebook photo hacks. 2009.

[7] T. Bradshaw. The rst google+ privacy aw. The Financial Times, June 6, 2011.

[8] A. Dhingra. Where you did sleep last night? ...thank you, i already know! iSChannel, 3(1), 2008.

[9] A. M. Donald and L. F. Cranor. "how technology drives vehicular privacy". The Journal of Law and Policy for the Information Society, 2, 2006.

[10] A. Felt. Defacing facebook: A security case study., 2007.

[11] R. Gross, A. Acquisti, and H. J. H. III. Information revelation and privacy in online social networks. In WPES, pages 71{80, 2005. [OpenAIRE]

[12] N. Hotler and M. Seganish. Using identity theft to teach enterprise risk management - make it personal! Journal of Business Case Studies, 4(6), 2008. [OpenAIRE]

[13] T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer. Social phishing. Commun. ACM, 50(10):94{100, 2007.

[14] M. McGee. Facebook hits 750 million users; zuckerberg yawns.

[15] D. L. Michael Henderson, Melissa de Zwart and M. Phillips. Will u friend me? Legal Risks of Social Networking Sites. Monash University, 2011.

19 references, page 1 of 2
Any information missing or wrong?Report an Issue