Privacy Threats from Social Networking Service Aggregators

被引:2
|
作者
Jaafor, Omar [1 ]
Birregah, Babiga [1 ]
Lemercier, Marc [1 ]
Perez, Charles [2 ]
机构
[1] Univ Technol Troyes, Charles Delaunay Inst, UMR CNRS 6281, Troyes, France
[2] ESG Management Sch, Paris, France
关键词
Social networking service; social aggregators; social network classification; social networking based data disclosure; decision tree algorithm;
D O I
10.1109/CTC.2014.12
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Social networking services (SNS) have increased in popularity over the last decade. They have become major platforms for e-commerce, personal branding, socialization and information. The success of social networking services like Facebook and Twitter as well as LinkedIn, LiveJournal and Foursquare and the variety of their usages leads their users to create a set of profiles on different SNS. Recently, social networking service aggregators have proposed centralizing the multiple social networking profiles of a given user in order to facilitate his interactions with social networking services. Such aggregators allow the messages received by a profile over multiple SNS to be retrieved, edited and posted with much less effort. Despite their obvious advantages, we highlight in this paper the risk of potential data leaks due to the inexperienced use of such tools. For this purpose, we provide a classification of online SNS and present their specificities with regard to the publicly exposed data of a user. Based on this classification, we investigate the possible insecure use of aggregators with an inappropriate set of SNS, which could lead to rendering sensitive data accessible to people it wasn't intended for. We present a decision tree approach for identifying a possible data leak based on the three following criteria: opinion, interest and location. We finally show the result of this approach on popular social networking aggregators.
引用
收藏
页码:30 / 37
页数:8
相关论文
共 50 条
  • [1] A Reference Model for Privacy Protection in Social Networking Service
    Deng, Xiaoguang
    Bispo, Caue
    Zeng, Yong
    [J]. JOURNAL OF INTEGRATED DESIGN & PROCESS SCIENCE, 2014, 18 (02) : 23 - 44
  • [2] An Analysis of Social Networking Threats
    Kahimise, Jennyphar
    Shava, Fungal Bhunu
    [J]. PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2020), 2020, : 576 - 583
  • [3] Privacy in Content-Oriented Networking: Threats and Countermeasures
    Chaabane, Abdelberi
    De Cristofaro, Emiliano
    Kaafar, Mohamed Ali
    Uzun, Ersin
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2013, 43 (03) : 26 - 33
  • [4] Privacy and Social Networking Technology
    Spinello, Richard A.
    [J]. INTERNATIONAL REVIEW OF INFORMATION ETHICS, 2011, 16 : 41 - 46
  • [5] Modeling Social Networking Privacy
    Dania, Carolina
    Clavel, Manuel
    [J]. 2014 THEORETICAL ASPECTS OF SOFTWARE ENGINEERING CONFERENCE (TASE), 2014, : 50 - 57
  • [6] Privacy preserving social networking
    Babu, Korra Sathya
    Hota, Jhalak
    Jena, Sanjay Kumar
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2014, 9 (03) : 165 - 176
  • [7] Handling Consumer Messages on Social Networking Sites: Customer Service or Privacy Infringement?
    Demmers, Joris
    Van Dolen, Willemijn M.
    Weltevreden, Jesse W. J.
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE, 2018, 22 (01) : 8 - 35
  • [8] Social Networking Privacy: Understanding the Disconnect from Policy to Controls
    Anthonysamy, Pauline
    Greenwood, Phil
    Rashid, Awais
    [J]. COMPUTER, 2013, 46 (06) : 60 - 67
  • [9] Social Networking Without Sacrificing Privacy
    Yu, Cui
    Ginsberg, Avi
    [J]. 2018 INTERNATIONAL CONFERENCE ON SYSTEM SCIENCE AND ENGINEERING (ICSSE), 2018,
  • [10] Besieged privacy in social networking services
    Dong, Shujun
    Li, Xingan
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2016, 8 (03) : 224 - 233