Fig. 12From: Social network data analysis to highlight privacy threats in sharing dataAttributes reconstruction by exploring all analyzed social except for TwitterBack to article page