<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>ijiss</journal-id>
            <journal-title-group>
                                                                                    <journal-title>International Journal of Information Security Science</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">2147-0030</issn>
                                                                                            <publisher>
                    <publisher-name>Şeref SAĞIROĞLU</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.55859/ijiss.1599063</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Cybersecurity and Privacy (Other)</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Siber Güvenlik ve Gizlilik (Diğer)</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <article-title>A Supervised Evaluation Framework for Privacy  Risk Scoring Models</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0001-9666-3746</contrib-id>
                                                                <name>
                                    <surname>Kılıç</surname>
                                    <given-names>Yasir</given-names>
                                </name>
                                                                    <aff>ADANA ALPARSLAN TURKES SCIENCE AND TECHNOLOGY UNIVERSITY</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20250623">
                    <day>06</day>
                    <month>23</month>
                    <year>2025</year>
                </pub-date>
                                        <volume>14</volume>
                                        <issue>2</issue>
                                        <fpage>1</fpage>
                                        <lpage>17</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20241210">
                        <day>12</day>
                        <month>10</month>
                        <year>2024</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20250424">
                        <day>04</day>
                        <month>24</month>
                        <year>2025</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2012, International Journal of Information Security Science</copyright-statement>
                    <copyright-year>2012</copyright-year>
                    <copyright-holder>International Journal of Information Security Science</copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>The rise of online social networks (OSNs) has heightened concerns regarding user privacy, as sensitive attributes disclosed on profiles are increasingly susceptible to misuse, including identity theft and targeted manipulation. Each user&#039;s privacy risk varies based on the nature of the shared data and its intended audience. To quantify these risks, researchers have introduced privacy risk scores, inspired by credit scoring systems, to measure vulnerability to privacy violations. However, despite the proliferation of scoring models, their evaluation frameworks often rely on unsupervised methods, such as goodness-of-fit tests, which limit their practical reliability. To address the limitation, we propose SPR-EVAL, a supervised evaluation framework that systematically assesses the performance of privacy scoring models using various real-world attack scenarios, offering a more robust and actionable approach to privacy risk assessment. SPR-EVAL integrates simulations of various real-world privacy attacks as a core evaluation mechanism. The framework is adaptable to any OSN dataset and supports the incorporation of diverse privacy risk scoring models and privacy attacks. To validate the proposed framework, we conducted experiments on a real-world Facebook OSN dataset. The results highlight the effectiveness of SPR-EVAL in evaluating and comparing popular privacy scoring models under supervised conditions. By offering a rigorous supervised evaluation metric, SPR-EVAL overcomes the limitations of traditional unsupervised methods, representing a notable advancement in the domain of privacy risk scoring for OSNs.</p></abstract>
                                                            
            
                                                            <kwd-group>
                                                    <kwd>privacy risk scoring</kwd>
                                                    <kwd>  online social networks (OSNs)</kwd>
                                                    <kwd>  privacy</kwd>
                                                    <kwd>  attribute disclosure attacks</kwd>
                                                    <kwd>  point multiserial correlation(PMS)</kwd>
                                            </kwd-group>
                            
                                                                                                                        </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">Anonymous, “Digital 2024: 5 billion social media users,” , 2024. Accessed on September, 1, 2024</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">Wang, Cheng and Yang, Bo and Cui, Jipeng and Wang, Chaodong, “Fusing behavioral projection models for identity theft detection in online social networks,” IEEE Transactions on Computational Social Systems, vol. 6, no. 4, pp. 637–648, 2019.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">Wang, Cheng and Zhu, Hangyu and Yang, Bo, “Composite behavioral modeling for identity theft detection in online social networks,” IEEE Transactions on Computational Social Sys- tems, vol. 9, no. 2, pp. 428–439, 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">Tucker, Catherine E, “Social networks, personalized advertising, and privacy controls,” Journal of marketing research, vol. 51, no. 5, pp. 546–562, 2014.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">Zhang, Kunpeng and Bhattacharyya, Siddhartha and Ram, Sudha, “Large-scale network analysis for online social brand advertising,” Mis Quarterly, vol. 40, no. 4, pp. 849–868, 2016.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">Ali, Ahmad and Malik, Ahmad Kamran and Ahmed, Mansoor and Raza, Basit and Ilyas, Muhammad, “Privacy concerns in online social networks: A users’ perspective,” International Journal of Advanced Computer Science and Applications, vol. 10, no. 7, pp. 601–613, 2019.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">Jain, Ankit Kumar and Sahoo, Somya Ranjan and Kaubiyal, Jyoti, “Online social networks security and privacy: compre- hensive review and analysis,” Complex &amp; Intelligent Systems, vol. 7, no. 5, pp. 2157–2177, 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">Confessore, Nicholas, “Cambridge Analytica and Facebook: The scandal and the fallout so far,” The New York Times, vol. 4, pp. 2018, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">Paulina Okunyt˙ e, “Almost 500 million Instagram users had their data scraped, hackers claim,” Access: https://cybernews.com/news/instagram-user-data-scraping/, 2024.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">Liu, Kun and Terzi, Evimaria, “A Framework for Computing the Privacy Scores of Users in Online Social Networks,” Pro- ceedings of the 2009 Ninth IEEE International Conference on Data Mining, pp. 288–297, 2009.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">Liu, Kun and Terzi, Evimaria, “A framework for computing the privacy scores of users in online social networks,” ACM Transactions on Knowledge Discovery from Data (TKDD), vol. 5, no. 1, pp. 6, 2010.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">Srivastava, Agrima and Geethakumari, G, “Measuring privacy leaks in online social networks,” 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2095–2100, 2013.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">Domingo-Ferrer, Josep, “Rational privacy disclosure in social networks,” International Conference on Modeling Decisions for Artificial Intelligence, pp. 255–265, 2010.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">Nepali, Raj Kumar and Wang, Yong, “Sonet: A social network model for privacy monitoring and ranking,” 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops, pp. 162–166, 2013.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">Sramka, Michal, “Evaluating Privacy Risks in Social Networks from the User’s Perspective,” Advanced Research in Data Privacy, pp. 251–267, 2015.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">Petkos, Georgios and Papadopoulos, Symeon and Kompatsiaris, Yiannis, “PScore: a framework for enhancing privacy awareness in online social networks,” 2015 10th International Conference on Availability, Reliability and Security, pp. 592–600, 2015.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">Kilic, Yasir and Inan, Ali, “Privacy Scoring over OSNs: Shared Data Granularity as a Latent Dimension,” ACM Transactions on the Web, vol. 17, no. 4, pp. 1–28, 2023.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">Bioglio, Livio and Pensa, Ruggero G, “Impact of neighbors on the privacy of individuals in online social networks,” Procedia Computer Science, vol. 108, pp. 28–37, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">Pensa, Ruggero G and Di Blasi, Gianpiero and Bioglio, Livio, “Network-aware privacy risk estimation in online social net- works,” Social Network Analysis and Mining, vol. 9, no. 1, pp. 15, 2019.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">Alemany, J and del Val, E and Alberola, J and Garc´ ıa-Fornes, Ana, “Estimation of privacy risk through centrality metrics,” Future Generation Computer Systems, vol. 82, pp. 63–76, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">De, Sourya Joyee and Imine, Abdessamad, “Privacy Risk Analysis of Online Social Networks,” Synthesis Lectures on Information Security, Privacy, and Trust, vol. 10, no. 1, pp. 1–109, 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">Braunstein, Alex and Granka, Laura and Staddon, Jessica, “Indirect content privacy surveys: measuring privacy without 16 INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Y. Kilic. ,Vol.14, No.2, pp.1-17. doi asking about it,” Proceedings of the Seventh Symposium on Usable Privacy and Security, pp. 15, 2011.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">Pensa, Ruggero G and Di Blasi, Gianpiero, “A centrality-based measure of user privacy in online social networks,” Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 1438–1439, 2016.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">Bioglio, Livio and Capecchi, Sara and Peiretti, Federico and Sayed, Dennis and Torasso, Antonella and Pensa, Ruggero G, “A social network simulation game to raise awareness of privacy among school children,” IEEE Transactions on Learning Technologies, vol. 12, no. 4, pp. 456–469, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">Wang, Haizhou and Song, Mingzhou, “Ckmeans. 1d. dp: opti- mal k-means clustering in one dimension by dynamic program- ming,” The R journal, vol. 3, no. 2, pp. 29, 2011.</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">Gupta, S Das, “Point biserial correlation coefficient and its generalization,” Psychometrika, vol. 25, no. 4, pp. 393–408, 1960.</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">Bartlett, Maurice Stevenson, “Properties of sufficiency and statistical tests,” Proceedings of the Royal Society of London. Series A-Mathematical and Physical Sciences, vol. 160, no. 901, pp. 268–282, 1937.</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">Tamhane, Ajit C, “Multiple comparisons in model I one-way ANOVA with unequal variances,” Communications in Statistics- Theory and Methods, vol. 6, no. 1, pp. 15–32, 1977.</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">Kruskal, William H and Wallis, W Allen, “Use of ranks in one- criterion variance analysis,” Journal of the American statistical Association, vol. 47, no. 260, pp. 583–621, 1952.</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">Coban, Onder and Inan, Ali and Ozel, Selma Ayse, “Towards the design and implementation of an OSN crawler: A case of Turkish Facebook users,” International Journal of Information Security Science, vol. 9, no. 2, pp. 76–93, 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">Thomas, Kurt and Grier, Chris and Nicol, David M, “unfriendly: Multi-party privacy risks in social networks,” Privacy Enhanc- ing Technologies: 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings 10, pp. 236– 252, 2010.</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">Chaabane, Abdelberi and Acs, Gergely and Kaafar, Mohamed Ali and others, “You are what you like! information leakage through users’ interests,” Proceedings of the 19th annual net- work &amp; distributed system security symposium (NDSS), 2012.</mixed-citation>
                    </ref>
                                    <ref id="ref33">
                        <label>33</label>
                        <mixed-citation publication-type="journal">Kosinski, Michal and Stillwell, David and Graepel, Thore, “Private traits and attributes are predictable from digital records of human behavior,” Proceedings of the national academy of sciences, vol. 110, no. 15, pp. 5802–5805, 2013.</mixed-citation>
                    </ref>
                                    <ref id="ref34">
                        <label>34</label>
                        <mixed-citation publication-type="journal">De Ayala, Ralph J, “An introduction to polytomous item re- sponse theory models.,” Measurement and evaluation in Coun- seling and Development, 1993.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
