Fig. 2From: Social network data analysis to highlight privacy threats in sharing dataCross-social data extrapolation stepBack to article page