Privacy Threats from Social Networking Service Aggregators

被引:2
|
作者
Jaafor, Omar [1 ]
Birregah, Babiga [1 ]
Lemercier, Marc [1 ]
Perez, Charles [2 ]
机构
[1] Univ Technol Troyes, Charles Delaunay Inst, UMR CNRS 6281, Troyes, France
[2] ESG Management Sch, Paris, France
关键词
Social networking service; social aggregators; social network classification; social networking based data disclosure; decision tree algorithm;
D O I
10.1109/CTC.2014.12
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Social networking services (SNS) have increased in popularity over the last decade. They have become major platforms for e-commerce, personal branding, socialization and information. The success of social networking services like Facebook and Twitter as well as LinkedIn, LiveJournal and Foursquare and the variety of their usages leads their users to create a set of profiles on different SNS. Recently, social networking service aggregators have proposed centralizing the multiple social networking profiles of a given user in order to facilitate his interactions with social networking services. Such aggregators allow the messages received by a profile over multiple SNS to be retrieved, edited and posted with much less effort. Despite their obvious advantages, we highlight in this paper the risk of potential data leaks due to the inexperienced use of such tools. For this purpose, we provide a classification of online SNS and present their specificities with regard to the publicly exposed data of a user. Based on this classification, we investigate the possible insecure use of aggregators with an inappropriate set of SNS, which could lead to rendering sensitive data accessible to people it wasn't intended for. We present a decision tree approach for identifying a possible data leak based on the three following criteria: opinion, interest and location. We finally show the result of this approach on popular social networking aggregators.
引用
收藏
页码:30 / 37
页数:8
相关论文
共 50 条
  • [21] Privacy management system using social networking
    Song, Ronggong
    Korba, Larry
    Yee, George
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 3814 - +
  • [22] Privacy Settings in Social Networking Sites: Is It Fair?
    Kuczerawy, Aleksandra
    Coudert, Fanny
    [J]. PRIVACY AND IDENTITY MANAGEMENT FOR LIFE, 2011, 352 : 231 - +
  • [23] Privacy policies for health social networking sites
    Li, Jingquan
    [J]. JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2013, 20 (04) : 704 - 707
  • [24] Privacy Protection Issues in Social Networking Sites
    Ho, Ai
    Maiga, Abdou
    Aimeur, Esma
    [J]. 2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 271 - 278
  • [25] Toward a Privacy Model for Social Networking Services
    Long, Daniel
    Cleveland, Simon
    [J]. IEEE SOUTHEASTCON 2015, 2015,
  • [26] Privacy Preserving Social Networking Through Decentralization
    Cutillo, Leucio Antonio
    Molva, Refik
    Strufe, Thorsten
    [J]. WONS 2009: SIXTH INTERNATIONAL CONFERENCE ON WIRELESS ON-DEMAND NETWORK SYSTEMS AND SERVICES, 2009, : 133 - 140
  • [27] Online Social Networking and the Right to Privacy: The Conflicting Rights of Privacy and Expression
    Marsoof, Althaf
    [J]. INTERNATIONAL JOURNAL OF LAW AND INFORMATION TECHNOLOGY, 2011, 19 (02): : 110 - 132
  • [28] Service Platform and Social Networking Service based on Peer-to-Peer Networking
    Lee, Il-Woo
    Park, Ho-Jin
    Park, Kwang-Roh
    [J]. 2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 791 - 792
  • [29] Associations between privacy, risk awareness, and interactive motivations of social networking service users, and motivation prediction from observable features
    Mvungi, Basilisa
    Iwaihara, Mizuho
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2015, 44 : 20 - 34
  • [30] Information privacy concerns, antecedents and privacy measure use in social networking sites: Evidence from Malaysia
    Mohamed, Norshidah
    Ahmad, Ili Hawa
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2012, 28 (06) : 2366 - 2375