On the Leakage of Personally Identifiable Information Via Online Social Networks

被引:0
|
作者
Krishnamurthy, Balachander [1 ]
Wills, Craig E. [1 ]
机构
[1] AT&T Labs Res, Florham Pk, NJ USA
关键词
Online Social Networks; Privacy; Personally Identifiable Information;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
For purposes of this paper, we define "Personally identifiable information" (PIT) as information which can be used to distinguish or trace an individual's identity either alone or when combined with other information that is linkable to a specific individual. The popularity of Online Social Networks (OSN) has accelerated the appearance of vast amounts of personal information on the Internet. Our research shows that it is possible for third-parties to link PIE, which is leaked via OSNs, with user actions both within OSN sites and elsewhere on non-OSN sites. We refer to this ability to link PII and combine it with other information as "leakage". We have identified multiple ways by which such leakage occurs and discuss measures to prevent it.
引用
收藏
页码:7 / 12
页数:6
相关论文
共 50 条
  • [31] Removing Personally Identifiable Information from Shared Dataset for Keystroke Authentication Research
    Huang, Jiaju
    Klee, Bryan
    Schuckers, Daniel
    Hou, Daqing
    Schuckers, Stephanie
    [J]. 2019 5TH IEEE INTERNATIONAL CONFERENCE ON IDENTITY, SECURITY, AND BEHAVIOR ANALYSIS (ISBA 2019), 2019,
  • [32] Estimating Age Privacy Leakage in Online Social Networks
    Dey, Ratan
    Tang, Cong
    Ross, Keith
    Saxena, Nitesh
    [J]. 2012 PROCEEDINGS IEEE INFOCOM, 2012, : 2836 - 2840
  • [33] PIILO: an open-source system for personally identifiable information labeling and obfuscation
    Holmes, Langdon
    Crossley, Scott
    Sikka, Harshvardhan
    Morris, Wesley
    [J]. INFORMATION AND LEARNING SCIENCES, 2023, 124 (9/10) : 266 - 284
  • [34] Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem
    Zaeifi, Mehrnoosh
    Kalantari, Faezeh
    Oest, Adam
    Sun, Zhibo
    Ahn, Gail-Joon
    Shoshitaishvili, Yan
    Bao, Tiffany
    Wang, Ruoyu
    Doupe, Adam
    [J]. PROCEEDINGS OF THE FOURTEENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2024, 2024, : 55 - 65
  • [35] Risk Identification of Personally Identifiable Information from Collective Mobile App Data
    Onik, Md Mehedi Hassan
    Al-Zaben, Nasr
    Yang, Jinhong
    Lee, Nam-Yong
    Kim, Chul-Soo
    [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2018, : 71 - 76
  • [36] Rainbow: reliable personally identifiable information retrieval across multi-cloud
    Zishuai Song
    Hui Ma
    Shuzhou Sun
    Yansen Xin
    Rui Zhang
    [J]. Cybersecurity, 6
  • [37] Information Attacks on Online Social Networks
    Franchi, Enrico
    Poggi, Agostino
    Tomaiuolo, Michele
    [J]. JOURNAL OF INFORMATION TECHNOLOGY RESEARCH, 2014, 7 (03) : 54 - 71
  • [38] Discovering Personally Identifiable Information in Textual Data - A Case Study with Automated Concatenation of Embeddings
    Shahriar, Md Hasan
    Kamal, Abrar Hasin
    Kayem, Anne V. D. M.
    [J]. ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 4, AINA 2024, 2024, 202 : 145 - 158
  • [39] General Data Protection Regulation Complied Blockchain Architecture for Personally Identifiable Information Management
    Al-Zaben, Nasr
    Onik, Md Mehedi Hassan
    Yang, Jinhong
    Lee, Nam-Yong
    Kim, Chul-Soo
    [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2018, : 77 - 82
  • [40] Mismanagement of personally identifiable information and the reaction of interested parties to safeguarding privacy in South Korea
    Song, Dong Hyun
    Son, Chang Yong
    [J]. INFORMATION RESEARCH-AN INTERNATIONAL ELECTRONIC JOURNAL, 2017, 22 (04):