T. Aura, T. A. Kuhn, and M. Roe, Scanning electronic documents for personally identifiable information, Proceedings of the 5th ACM workshop on Privacy in electronic society , WPES '06, 2006.
DOI : 10.1145/1179601.1179608

H. Berghel, Identity theft, social security numbers, and the Web, Communications of the ACM, vol.43, issue.2, pp.17-21, 2000.
DOI : 10.1145/328236.328114

B. M. Bowen, S. Hershkop, A. D. Keromytis, and S. J. Stolfo, Baiting Inside Attackers Using Decoy Documents, Proceedings of the 5th International ICST Conference on Security and Privacy in Communication Networks, 2009.
DOI : 10.1007/978-3-540-74320-0_8

S. Byers, Information leakage caused by hidden data in published documents, IEEE Security & Privacy Magazine, vol.2, issue.2, pp.23-27, 2004.
DOI : 10.1109/MSECP.2004.1281241

S. Garfinkel, Risks of social security numbers, Communications of the ACM, vol.38, issue.10, p.146, 1995.
DOI : 10.1145/226239.226269

E. Gessiou, A. Labrinidis, and S. Ioannidis, A Greek (privacy) tragedy, Proceedings of the 8th ACM workshop on Privacy in the electronic society, WPES '09, 2009.
DOI : 10.1145/1655188.1655203

E. Gessiou, S. Volanis, E. Athanasopoulos, E. P. Markatos, and S. Ioannidis, Digging up social structures from documents on the web, 2012 IEEE Global Communications Conference (GLOBECOM), 2012.
DOI : 10.1109/GLOCOM.2012.6503202

S. Glenn, Marijuana bust shines light on utilities, 2012.

T. Keenan, Are They Making Our Privates Public??Emerging Risks of Governmental Open Data Initiatives. Privacy and Identity Management for Life, pp.1-13, 2012.

B. Krishnamurthy and C. E. Wills, On the Leakage of Personally Identifiable Information via Online Social Networks, Proceedings of the 2nd ACM Workshop on Online Social Networks, 2009.

H. Mao, X. Shuai, and A. Kapadia, Loose tweets, Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, WPES '11, 2011.
DOI : 10.1145/2046556.2046558

A. Narayanan and V. Shmatikov, Myths and fallacies of "personally identifiable information", Communications of the ACM, vol.53, issue.6, pp.24-26, 2010.
DOI : 10.1145/1743546.1743558

I. Polakis, G. Kontaxis, S. Antonatos, E. Gessiou, T. Petsas et al., Using social networks to harvest email addresses, Proceedings of the 9th annual ACM workshop on Privacy in the electronic society, WPES '10, 2010.
DOI : 10.1145/1866919.1866922

A. Simpson, On Privacy and Public Data: A study of data.gov.uk, Journal of Privacy and Confidentiality, vol.3, issue.1, p.4, 2011.

S. Whang and H. Garcia-molina, A model for Quantifying Information Leakage. Secure Data Management, pp.25-44, 2012.

G. Wondracek, T. Holz, E. Kirda, and C. Kruegel, A Practical Attack to De-anonymize Social Network Users, 2010 IEEE Symposium on Security and Privacy, 2010.
DOI : 10.1109/SP.2010.21