{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T17:51:56Z","timestamp":1740160316422,"version":"3.37.3"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,6,23]],"date-time":"2020-06-23T00:00:00Z","timestamp":1592870400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,23]],"date-time":"2020-06-23T00:00:00Z","timestamp":1592870400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1007\/s13278-020-00662-7","type":"journal-article","created":{"date-parts":[[2020,6,23]],"date-time":"2020-06-23T06:03:36Z","timestamp":1592892216000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["AppMonitor: restricting information leakage to third-party applications"],"prefix":"10.1007","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5062-8707","authenticated-orcid":false,"given":"Nemi Chandra","family":"Rathore","sequence":"first","affiliation":[]},{"given":"Somanath","family":"Tripathy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,23]]},"reference":[{"key":"662_CR1","doi-asserted-by":"crossref","unstructured":"Aldhafferi N, Watson C, Sajeev ASM (2013) Personal information privacy settings of online social networks and their suitability for mobile internet devices. Int J Securi Privacy Trust Manag 2(2):1\u201317. ISSN: 2277-5498","DOI":"10.5121\/ijsptm.2013.2201"},{"key":"662_CR2","doi-asserted-by":"crossref","unstructured":"Anthonysamy P, Rashid A, Walkerdine J, Greenwood P, Larkou G (2012) Collaborative privacy management for third-party applications in online social networks. In: Proceedings of the 1st workshop on privacy and security in Online Social Media. PSOSM \u201912 ISBN: 978-1-4503-1236-3 5:1\u20135:4","DOI":"10.1145\/2185354.2185359"},{"key":"662_CR3","doi-asserted-by":"publisher","DOI":"10.1142\/11433","volume-title":"Secure-social: secure cloud-based social network","author":"PK Atrey","year":"2019","unstructured":"Atrey PK, Senevirathna K (2019) Secure-social: secure cloud-based social network. World Scientific, Singapore"},{"key":"662_CR4","unstructured":"Beaumont C (2010) Facebook admits \u2018inadvertent\u2019 privacy breach. https:\/\/www.telegraph.co.uk\/technology\/facebook\/8070513\/Facebook-admits-inadvertent-privacy-breach.html. Accessed 18 Oct 2010"},{"key":"662_CR5","unstructured":"Buckle C (2019) Trends 19: the trends to know for 2019. https:\/\/www.globalwebindex.com\/hubfs\/Downloads\/Trends-19-report.pdf. Accessed 10 Jan 2020"},{"key":"662_CR6","unstructured":"BullGuard (2017) Privacy violations\u2014the dark side of social media. Sept 2017. http:\/\/www.bullguard.com\/bullguard-security-center\/internet-security\/social-media-dangers\/privacy-violations-in-social-media.aspx"},{"key":"662_CR7","unstructured":"Business-Standard (2019) Data breach: Third party apps leak personal information from FB, Twitter. https:\/\/www.business-standard.com\/article\/pti-stories\/malicious-3rd-party-apps-leak-personal-data-from-facebook-twitter-119112801503_1.html. Accessed 28 Nov 2019"},{"key":"662_CR8","doi-asserted-by":"crossref","unstructured":"Carminati B et al (2011) Semantic web-based social network access control. Comput Secur 30(2\u20133):108\u2013115. ISSN: 01674048","DOI":"10.1016\/j.cose.2010.08.003"},{"key":"662_CR9","unstructured":"Carolyn DM (2012) 15 worst Internet privacy scandals of all time, Network World. https:\/\/www.networkworld.com\/article\/2185187\/security\/15-worst-internet-privacy-scandals-of-all-time.html"},{"key":"662_CR10","doi-asserted-by":"crossref","unstructured":"Chaabane A et al (2014) A Closer Look at Third-Party OSN applications: are they leaking your personal information? In: Passive and active measurement: 15th international conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings. Springer, Cham, pp 235\u2013246","DOI":"10.1007\/978-3-319-04918-2_23"},{"key":"662_CR11","doi-asserted-by":"crossref","unstructured":"Cheng Y, Park J, Sandhu R (2012) Relationship-based access control for online social networks: beyond user-to-user relationships. In: 2012 International conference on privacy, security, risk and trust (PASSAT), and 2012 International Conference on Social Computing (SocialCom), pp. 646\u2013655","DOI":"10.1109\/SocialCom-PASSAT.2012.57"},{"key":"662_CR12","doi-asserted-by":"crossref","unstructured":"Cheng Y, Park R, Sandhu J (2014) Attribute-aware relationship-based access control for online social networks. In: Data and applications security and privacy XXVIII. Vol. 8566. Lecture Notes in Computer Science. Springer, Berlin, pp 292\u2013306. ISBN: 978-3-662-43935-7","DOI":"10.1007\/978-3-662-43936-4_19"},{"key":"662_CR13","doi-asserted-by":"crossref","unstructured":"Cheng Y, Park J, Sandhu R (2013) Preserving user privacy from third-party applications in Online Social Networks. In: Proceedings of the 22nd international conference on world wide web. WWW\u201913 Companion. Rio de Janeiro, Brazil: ACM, pp 723\u2013728. ISBN: 978-1-4503-2038-2","DOI":"10.1145\/2487788.2488032"},{"key":"662_CR14","unstructured":"CISOMAG (2019) Twitter Inadvertently Exposes Users\u2019 Email and Contact Details. https:\/\/www.cisomag.com\/twitter-inadvertently-exposes-users-email-and-contact-details\/"},{"key":"662_CR15","doi-asserted-by":"crossref","unstructured":"Cutillo LA, Molva R, Strufe T (2009) Safebook: a privacy-preserving online social network leveraging on real-life trust. Commun. Mag. 47(12):94\u2013101. ISSN: 0163-6804","DOI":"10.1109\/MCOM.2009.5350374"},{"key":"662_CR17","doi-asserted-by":"crossref","unstructured":"Debatin B et al (2009) Facebook and Online privacy: attitudes, behaviors, and unintended consequences. J. Comput. Mediat. Commun. 15(1):83\u2013108. ISSN: 1083-6101","DOI":"10.1111\/j.1083-6101.2009.01494.x"},{"key":"662_CR18","unstructured":"Eckersley P (2009) How Online tracking companies know most of what you do online (and What Social Networks Are Doing to Help Them), Electronic Frontier Foundation. https:\/\/www.eff.org\/deeplinks\/2009\/09\/online-trackers-and-social-networks. Accessed 21 Sep 2009"},{"issue":"12","key":"662_CR20","doi-asserted-by":"publisher","first-page":"1507","DOI":"10.1016\/j.comcom.2012.04.016","volume":"35","author":"M Egele","year":"2012","unstructured":"Egele M et al (2012) PoX: Protecting users from malicious Facebook applications. Comput Commun 35(12):1507\u20131515 issn: 0140-3664","journal-title":"Comput Commun"},{"key":"662_CR21","unstructured":"Facebook (2020) Company Info. https:\/\/about.fb.com\/company-info\/. Accessed 10 Jan 2020"},{"key":"662_CR22","unstructured":"Felt A, Evans D (2008) Privacy protection for social networking APIs. In: Conjunction with 2008 IEEE symposium on security and privacy. Oakland, CA"},{"key":"662_CR23","doi-asserted-by":"crossref","unstructured":"Gebser M, Kaufmann B, Schaub T (2012) Con ICT-driven answer set solving: From theory to practice. Artif Intell 187\u2013188:52\u201389. ISSN: 0004-3702","DOI":"10.1016\/j.artint.2012.04.001"},{"key":"662_CR24","doi-asserted-by":"crossref","unstructured":"Gebser M et al (2011) Advances in gringo Series 3. In: Delgrande JP, Faber W (eds) Logic programming and nonmonotonic reasoning. Springer, Berlin, pp 345\u2013351. ISBN: 978-3-642- 20895-9","DOI":"10.1007\/978-3-642-20895-9_39"},{"key":"662_CR25","unstructured":"Giffin DB et al (2012) Hails: protecting data privacy in untrusted web applications. In: 10th USENIX symposium on operating systems design and implementation (OSDI 12). USENIX, Hollywood, CA, pp 47\u201360. ISBN: 978-1-931971-96-6"},{"key":"662_CR16","unstructured":"Hardt D (ed) (2012) The OAuth 2.0 authorization framework. RFC 6749. RFC Editor, pp 1\u201375. https:\/\/tools.ietf.org\/html\/draft-carpenter-rfc-citation-recs-01#section-5.2"},{"key":"662_CR27","doi-asserted-by":"crossref","unstructured":"Hu H, Ahn GJ, Jorgensen J (2013) Multiparty access control for online social networks: model and mechanisms. IEEE Trans Knowl Data Eng 25(7):1614\u20131627. ISSN: 1041-4347","DOI":"10.1109\/TKDE.2012.97"},{"key":"662_CR26","unstructured":"Internet Stats & Facts (2020) hostingfacts.com. https:\/\/hostingfacts.com\/internet-facts-stats\/"},{"key":"662_CR28","unstructured":"InternetWorldStats (2019) Internet usage statistics: the internet big picture. https:\/\/www.internetworldstats.com\/stats.htm. Accessed 10 Jan 2020"},{"key":"662_CR29","doi-asserted-by":"crossref","unstructured":"Joshi P, Kuo CCJ (2011) Security and privacy in online social networks: a survey. In: 2011 IEEE international conference on multimedia and Expo, pp 1\u20136","DOI":"10.1109\/ICME.2011.6012166"},{"key":"662_CR30","doi-asserted-by":"crossref","unstructured":"Kavianpour S, Tamimi A, Shanmugam B (2019) A privacy\u2013preserving model to control social interaction behaviors in social network sites. J Inf Secur Appl 49:102402. ISSN: 2214-2126","DOI":"10.1016\/j.jisa.2019.102402"},{"key":"662_CR31","doi-asserted-by":"crossref","unstructured":"Kayes I, Iamnitchi A (2017) Privacy and security in online social networks: a survey. Online Soc Netw Media 3\u20134:1\u201321. ISSN: 2468-6964","DOI":"10.1016\/j.osnem.2017.09.001"},{"key":"662_CR32","doi-asserted-by":"crossref","unstructured":"Kelbert F, Fromm A (2016) Compliance monitoring of third-party applications in online social networks. In: 2016 IEEE security and privacy workshops (SPW), pp 9\u201316","DOI":"10.1109\/SPW.2016.13"},{"key":"662_CR33","unstructured":"Kemp S (2019) Digital in 2019: global overview. https:\/\/wearesocial.com\/global-digital-report-2019. Accessed 28 Jan 2019"},{"key":"662_CR34","doi-asserted-by":"crossref","unstructured":"Klukovich E, Erdin E, Gunes MH (2016) POSN: a privacy preserving decentralized social network app for mobile devices. In: 2016 IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM), pp 1426\u20131429","DOI":"10.1109\/ASONAM.2016.7752436"},{"key":"662_CR35","doi-asserted-by":"crossref","unstructured":"Krishnamurthy B, Krishnamurthy and Wills CE (2009) \u201cOn the Leakage of Personally Identifiable Information via Online Social Networks\u201d. In: Proceedings of the 2Nd ACM Workshop on Online Social Networks. WOSN \u201909. Barcelona, Spain: ACM, pp. 7\u201312. ISBN: 978-1-60558-445-4","DOI":"10.1145\/1592665.1592668"},{"key":"662_CR36","unstructured":"Levin S (2018) Facebook suspends 200 apps as part of investigation into data misuse. https:\/\/www.theguardian.com\/technology\/2018\/may\/14\/facebook-apps-suspended-privacy-scandal-cambridge-analytica. Accessed 14 May 2018"},{"key":"662_CR37","doi-asserted-by":"crossref","unstructured":"Li T, Li N (2008) Towards optimal K-anonymization. Data Knowl Eng 65(1):22\u201339. ISSN: 0169-023X","DOI":"10.1016\/j.datak.2007.06.015"},{"key":"662_CR38","unstructured":"Lifschitz V 2008) What is answer set programming? In: Proceedings of the 23rd national conference on artificial intelligence\u2014vol 3. AAAI\u201908. AAAI Press, Chicago, IL, pp 1594\u20131597. ISBN: 978-1-57735-368-3"},{"key":"662_CR39","unstructured":"McGee MK (2016) 32.8 Million Twitter credentials may have been leaked. https:\/\/www.bankinfosecurity.com\/33-million-twitter-credentials-may-have-been-leaked-a-9187\/. Accessed 9 June 2016"},{"key":"662_CR40","doi-asserted-by":"crossref","unstructured":"Nilizadeh S et al (2012) Cachet: a decentralized architecture for privacy preserving social networking with caching. In: Proceedings of the 8th International conference on emerging networking experiments and technologies. CoNEXT\u201912. Nice, France, pp 337\u2013348. ISBN: 9781450317757","DOI":"10.1145\/2413176.2413215"},{"key":"662_CR41","unstructured":"Papamiltiadis K (2019) Changes to groups API access. https:\/\/developers.facebook.com\/blog\/post\/2019\/11\/05\/changes-groups-api-access\/. Accessed 6 Nov 2019"},{"key":"662_CR42","doi-asserted-by":"crossref","unstructured":"Patil VT, Shyamasundar RK (2017) Undoing of privacy policies on Facebook. In: Data and applications security and privacy XXXI. Springer, Cham, pp 239\u2013255. ISBN: 978-3-319-61176-1","DOI":"10.1007\/978-3-319-61176-1_13"},{"key":"662_CR44","unstructured":"Pierson D (2018) Facebook needed third-party apps to grow. Now it\u2019s left with a privacy crisis. https:\/\/phys.org\/news\/2018-03-facebook-third-party-apps-left-privacy.html. Accessed 23 Mar 2018"},{"key":"662_CR45","doi-asserted-by":"crossref","unstructured":"Rathore NC, Tripathy S (2017) A trust-based collaborative access control model with policy aggregation for online social networks. Soc Netw Anal Min 7(1):7. ISSN: 1869-5469","DOI":"10.1007\/s13278-017-0425-6"},{"key":"662_CR46","unstructured":"Sadler D (2019) Instagram hit by two privacy breaches in a week: the Facebook-owned company fails it users. https:\/\/ia.acs.org.au\/article\/2019\/instagram-hit-bytwo-privacy-breaches-in-a-week.html. Accessed 28 May 2019"},{"key":"662_CR47","doi-asserted-by":"crossref","unstructured":"Samarati P (2001) Protecting respondents identities in microdata release. IEEE Trans Knowl Data Eng 13(6):1010\u20131027. ISSN: 1041-4347","DOI":"10.1109\/69.971193"},{"key":"662_CR48","unstructured":"Samarati P, Sweeney L (1998) Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In: In Technical report"},{"key":"662_CR49","doi-asserted-by":"crossref","unstructured":"Shakimov A, et al (2009) Privacy, cost, and availability tradeoffs in decentralized OSNs. In: Proceedings of the 2nd ACM workshop on online social networks. WOSN\u201909. Barcelona, Spain, pp 13\u201318. ISBN: 9781605584454","DOI":"10.1145\/1592665.1592669"},{"key":"662_CR50","doi-asserted-by":"publisher","first-page":"11096","DOI":"10.1109\/ACCESS.2020.2963932","volume":"8","author":"F Shan","year":"2020","unstructured":"Shan F et al (2020) A smart access control method for online social networks based on support vector machine. IEEE Access 8:11096\u201311103","journal-title":"IEEE Access"},{"key":"662_CR51","doi-asserted-by":"crossref","unstructured":"Shehab M et al (2012) Access control for online social networks third party applications. Comput Secur 31(8):897\u2013911. ISSN: 0167-4048","DOI":"10.1016\/j.cose.2012.07.008"},{"key":"662_CR52","unstructured":"Singh K, Bhola SS, Lee W (2009) xBook: redesigning privacy control in social networking platforms. In: Proceedings of the 18th conference on USENIX security symposium. SSYM\u201909. Montreal, Canada: USENIX Association, pp 249\u2013266"},{"issue":"2","key":"662_CR53","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1108\/IJWIS-12-2015-0045","volume":"12","author":"S Tomy","year":"2016","unstructured":"Tomy S, Pardede E (2016) Controlling privacy disclosure of third party applications in online social networks. Int J Web Inf Syst 12(2):215\u2013241","journal-title":"Int J Web Inf Syst"},{"key":"662_CR54","doi-asserted-by":"crossref","unstructured":"Tucker R, Tucker C, Zheng J (2015) Privacy Pal: improving permission safety awareness of third party applications in Online Social Networks. In: 2015 IEEE 17th international conference on high performance computing and communications, 2015 IEEE 7th international symposium on cyberspace safety and security, and 2015 IEEE 12th international conference on embedded software and systems, pp 1268\u20131273","DOI":"10.1109\/HPCC-CSS-ICESS.2015.83"},{"key":"662_CR55","unstructured":"Tuunainen VK, Pitk\u00e4nen O, Hovi M (2009) Users\u2019 awareness of privacy on online social networking sites\u2014case Facebook. In: Bled eConference"},{"key":"662_CR59","unstructured":"Twitter Usage Statistics (2020) www.internetlivestats.com. https:\/\/www.internetlivestats.com\/twitter-statistics\/. Accessed 10 Jan 2020"},{"key":"662_CR19","doi-asserted-by":"crossref","unstructured":"Van Eecke P, Maarten T (2010) Privacy and social networks. Comput Law Secur Rev 26(5):535\u2013546. ISSN: 0267-3649","DOI":"10.1016\/j.clsr.2010.07.006"},{"key":"662_CR56","unstructured":"Vijayan J (2009) Social networking sites leaking personal information to third parties, study warns. https:\/\/www.computerworld.com\/article\/2527959\/data-privacy\/social-networking-sites-leaking-personal-information-to-third-parties-study-warns.html. Accessed 24 Sep 2009"},{"key":"662_CR57","doi-asserted-by":"crossref","unstructured":"Viswanath B, Kiciman E, Saroiu S (2012) Keeping information safe from social networking Apps. In: Proceedings of the 2012 ACM workshop on workshop on online social networks. WOSN\u201912. ACM, Helsinki, pp 49\u201354. ISSN: 978-1-4503-1480-0","DOI":"10.1145\/2342549.2342561"},{"key":"662_CR58","unstructured":"Wong JC, Lewis P, Davies H (2018) How academic at centre of Facebook scandal tried\u2014and failed\u2014to spin personal data into gold, Apr 2018. https:\/\/www.theguardian.com\/news\/2018\/apr\/24\/aleksandr-kogan-cambridge-analytica-facebook-data-business-ventures"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-020-00662-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13278-020-00662-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-020-00662-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T01:14:42Z","timestamp":1624410882000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13278-020-00662-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,23]]},"references-count":58,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["662"],"URL":"https:\/\/doi.org\/10.1007\/s13278-020-00662-7","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"type":"print","value":"1869-5450"},{"type":"electronic","value":"1869-5469"}],"subject":[],"published":{"date-parts":[[2020,6,23]]},"assertion":[{"value":"14 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 May 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 May 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 June 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"49"}}