S. Gurses, R. Rizk, and O. Gunther, Privacy design in online social networks: learning from privacy breaches and community feedback, Proceedings of 29th International Conference on Information Systems, pp.1-10, 2008.

. Mixi, Infographics for finding out the newest data of mixi

A. Narayanan and V. Shmatikov, De-anonymizing Social Networks, 2009 30th IEEE Symposium on Security and Privacy, pp.173-187, 2009.
DOI : 10.1109/SP.2009.22

O. Goga and H. Lei, On exploiting innocuous user activity for correlating accounts across social network sites, 2012.
DOI : 10.1145/2488388.2488428

M. Almishari and M. Kaafar, Stylometric Linkability of Tweets, Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES '14, pp.205-208, 2014.
DOI : 10.1145/2665943.2665966

A. Narayanan and H. Paskov, On the Feasibility of Internet-Scale Author Identification, 2012 IEEE Symposium on Security and Privacy, pp.300-314, 2012.
DOI : 10.1109/SP.2012.46

R. Backstrom, C. Dwork, and J. Kleinberg, Wherefore art thou R3579X? anonymized social networks, hidden patterns, and structural steganography, Proceedings of 16th International World Wide Web Conference, pp.181-190, 2007.

I. Lam, K. Chen, and L. Chen, Involuntary Information Leakage in Social Network Services, Proceedings of the 3rd International Workshop on Security, pp.167-183, 2008.
DOI : 10.1007/0-387-33406-8_13

URL : http://mmnet.iis.sinica.edu.tw/pub/lam08_sns.pdf

H. Mao, X. Shuai, and A. Kapadia, Loose tweets, Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, WPES '11, 2011.
DOI : 10.1145/2046556.2046558

G. Kótyuk and L. Buttyan, A machine learning based approach for predicting undisclosed attributes in social networks, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, pp.361-366, 2012.
DOI : 10.1109/PerComW.2012.6197511

I. Polakis and G. Kontaxis, Using social networks to harvest email addresses, Proceedings of the 9th annual ACM workshop on Privacy in the electronic society, WPES '10, pp.11-20, 2010.
DOI : 10.1145/1866919.1866922

URL : http://www.ics.forth.gr/dcs/Activities/papers/wpes2010.pdf

. Twipro, Searching profiles of Twitter users

A. Caliskan-islam, J. Walsh, and R. Greenstadt, Privacy Detective, Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES '14, pp.35-46, 2014.
DOI : 10.1145/2046556.2046558

M. Hart, P. Manadhata, and R. Johnson, Text Classification for Data Loss Prevention, Proceedings of 11th Privacy Enhancing Technologies Symposium, pp.18-37, 2011.
DOI : 10.1007/978-3-642-22263-4_2

J. Burger and J. Henderson, Discriminating Gender on Twitter, Proceedings of Conference on Empirical Methods in Natural Language Processing, pp.1301-1309, 2011.

Z. Cheng, J. Caverlee, and K. Lee, You are where you tweet, Proceedings of the 19th ACM international conference on Information and knowledge management, CIKM '10, pp.759-768, 2010.
DOI : 10.1145/1871437.1871535

M. Pennacchiotti and A. Popescu, A Machine Learning Approach to Twitter User Classification, Proceedings of 5th International AAAI Conference on Weblogs and Social Media, pp.281-288, 2011.