M. Balduzzi, C. Platzer, T. Holz, E. Kirda, D. Balzarotti et al., Abusing Social Networks for Automated User Profiling, Recent Advances in Intrusion Detection, pp.422-441, 2010.
DOI : 10.1007/978-3-642-15512-3_22

URL : http://www.iseclab.org/papers/raid2010.pdf

L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, All your contacts are belong to us, Proceedings of the 18th international conference on World wide web, WWW '09, 2009.
DOI : 10.1145/1526709.1526784

J. Bollen, H. Mao, and X. Zeng, Twitter mood predicts the stock market, Journal of Computational Science, vol.2, issue.1, 1010.
DOI : 10.1016/j.jocs.2010.12.007

URL : http://arxiv.org/pdf/1010.3003

R. Dey, C. Tang, K. Ross, and N. Saxena, Estimating age privacy leakage in online social networks, 2012 Proceedings IEEE INFOCOM, 2012.
DOI : 10.1109/INFCOM.2012.6195711

URL : http://cis.poly.edu/~ratan/facebookusersagepapershort.pdf

J. He, W. W. Chu, and Z. Liu, Inferring Privacy Information from Social Networks, IEEE Intl. Conf. on Intelligence and Security Informatics, pp.154-165, 2006.
DOI : 10.1007/11760146_14

URL : http://nrl.iis.sinica.edu.tw/Web2.0/presentation/1225-present.pdf

S. Huang, M. Chen, B. Luo, and D. Lee, Predicting aggregate social activities using continuous-time stochastic process, Proceedings of the 21st ACM international conference on Information and knowledge management, CIKM '12, 2012.
DOI : 10.1145/2396761.2396885

URL : http://pike.psu.edu/publications/cikm12.pdf

B. A. Huberman, E. Adar, and L. R. Fine, Valuating Privacy, IEEE Security and Privacy Magazine, vol.3, issue.5, pp.22-25, 2005.
DOI : 10.1109/MSP.2005.137

F. Li, J. Y. Chen, X. Zou, and P. Liu, New privacy threats in healthcare informatics: When medical records join the web, BIOKDD, 2010.

H. Liu, B. Luo, and D. Lee, Location Type Classification Using Tweet Content, 2012 11th International Conference on Machine Learning and Applications, pp.232-237, 2012.
DOI : 10.1109/ICMLA.2012.47

URL : http://pike.psu.edu/publications/icmla12.pdf

B. Luo and D. Lee, On Protecting Private Information in Social Networks: A Proposal, 2009 IEEE 25th International Conference on Data Engineering, 2009.
DOI : 10.1109/ICDE.2009.158

M. Madejski, M. Johnson, and S. M. Bellovin, The failure of online social network privacy settings, 2011.

J. Mahmud, J. Nichols, and C. Drews, Home Location Identification of Twitter Users, ACM Transactions on Intelligent Systems and Technology, vol.5, issue.3, p.2014
DOI : 10.1007/BF00058655

H. Mao, X. Shuai, and A. Kapadia, Loose tweets, Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, WPES '11, 2011.
DOI : 10.1145/2046556.2046558

A. Mislove, B. Viswanath, K. P. Gummadi, and P. Druschel, You are who you know, Proceedings of the third ACM international conference on Web search and data mining, WSDM '10, 2010.
DOI : 10.1145/1718487.1718519

D. Quercia, M. Kosinski, D. Stillwell, and J. Crowcroft, Our Twitter Profiles, Our Selves: Predicting Personality with Twitter, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing, 2011.
DOI : 10.1109/PASSAT/SocialCom.2011.26

G. Wondracek, T. Holz, E. Kirda, and C. Kruegel, A practical attack to deanonymize social network users, IEEE Security & Privacy, 2010.
DOI : 10.1109/sp.2010.21

URL : http://www.iseclab.org/papers/sonda.pdf

Y. Yang, J. Lutes, F. Li, B. Luo, and P. Liu, Stalking online, Proceedings of the second ACM conference on Data and Application Security and Privacy, CODASKY '12, 2012.
DOI : 10.1145/2133601.2133607

E. Zheleva and L. Getoor, To join or not to join, Proceedings of the 18th international conference on World wide web, WWW '09, 2009.
DOI : 10.1145/1526709.1526781