Fig. 14From: Social network data analysis to highlight privacy threats in sharing dataAttributes reconstruction by exploring all analyzed social except for LinkedinBack to article page