Return to Article Details Review of Privacy Violation Identification Methods for Social Networking Sites