Fig. 15From: Social network data analysis to highlight privacy threats in sharing dataAttributes reconstruction by exploring all analyzed social except for VKontakteBack to article page