Return to Article Details Modelling the potential leakage of personally identifiable information through online social networks