Fig. 3From: Social network data analysis to highlight privacy threats in sharing dataArchitecture of SODABack to article page