Fig. 8From: Social network data analysis to highlight privacy threats in sharing dataDistribution diagram of the analyzed usersBack to article page