Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2487788.2488160acmotherconferencesArticle/Chapter ViewAbstractPublication PageswebconfConference Proceedingsconference-collections
research-article

@i seek 'fb.me': identifying users across multiple online social networks

Published: 13 May 2013 Publication History
  • Get Citation Alerts
  • Abstract

    An online user joins multiple social networks in order to enjoy different services. On each joined social network, she creates an identity and constitutes its three major dimensions namely profile, content and connection network. She largely governs her identity formulation on any social network and therefore can manipulate multiple aspects of it. With no global identifier to mark her presence uniquely in the online domain, her online identities remain unlinked, isolated and difficult to search. Literature has proposed identity search methods on the basis of profile attributes, but has left the other identity dimensions e.g. content and network, unexplored. In this work, we introduce two novel identity search algorithms based on content and network attributes and improve on traditional identity search algorithm based on profile attributes of a user. We apply proposed identity search algorithms to find a user's identity on Facebook, given her identity on Twitter. We report that a combination of proposed identity search algorithms found Facebook identity for 39% of Twitter users searched while traditional method based on profile attributes found Facebook identity for only 27.4%. Each proposed identity search algorithm access publicly accessible attributes of a user on any social network. We deploy an identity resolution system, Finding Nemo, which uses proposed identity search methods to find a Twitter user's identity on Facebook. We conclude that inclusion of more than one identity search algorithm, each exploiting distinct dimensional attributes of an identity, helps in improving the accuracy of an identity resolution process.

    References

    [1]
    M. Motoyama and G. Varghese, "I seek you: searching and matching individuals in social networks," in Proceedings of the eleventh international workshop on Web information and data management, ser. WIDM, 2009.
    [2]
    C. Grier, K. Thomas, V. Paxson, and M. Zhang, "@spam: the underground on 140 characters or less," in Proceedings of the ACM conference on Computer and communications security, ser. CCS, 2010.
    [3]
    F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida, "Detecting spammers on Twitter," in Proceedings of the Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), 2010.
    [4]
    Z. Chu, S. Gianvecchio, H. Wang, and S. Jajodia, "Who is tweeting on Twitter: human, bot, or cyborg?" in Proceedings of the 26th Annual Computer Security Applications Conference, ser. ACSAC, 2010.
    [5]
    F. Benevenuto, T. Rodrigues, V. Almeida, J. Almeida, and M. Gonçalves, "Detecting spammers and content promoters in online video social networks," in Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval, ser. SIGIR, 2009.
    [6]
    D. Irani, S. Webb, and C. Pu, "Study of Static Classification of Social Spam Profiles in MySpace," in ICWSM, 2010.
    [7]
    B. Krishnamurthy and C. E. Wills, "On the leakage of personally identifiable information via online social networks," ser. SIGCOMM, 2010.
    [8]
    T. Chen, M. A. Kaafar, A. Friedman, and R. Boreli, "Is More always Merrier?: a Deep Dive into Online Social Footprints," in Proceedings of the ACM Workshop on online social networks, ser. WOSN, 2012.
    [9]
    E. Zheleva and L. Getoor, "To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles," in Proceedings of the 18th international conference on World wide web, ser. WWW, 2009.
    [10]
    O. Goga, H. Lei, S. H. K. Parthasarathi, G. Friedland, RobinSommer, and R. Teixeira, "On exploiting Innocuous User Activity for Correlating Accounts across Social Network Sites," 2012.
    [11]
    M. Shehab, M. N. Ko, and H. Touati, "Social networks Profile Mapping using Games," in Proceedings of the 3rd USENIX conference on Web Application Development, ser. WebApps, 2012.
    [12]
    A. Malhotra, L. Totti, W. Meira, P. Kumaraguru, and V. Almeida, "Studying User Footprints in Different Online Social Networks," International Workshop on Cybersecurity of Online Social Network (CSOSN), 2012.
    [13]
    D. Irani, S. Webb, K. Li, and C. Pu, "Large Online Social Footprints - An Emerging Threat," in Proceedings of the 2009 International Conference on Computational Science and Engineering, ser. CSE, 2009.
    [14]
    D. Perito, C. Castelluccia, M. A. Kâafar, and P. Manils, "How Unique and Traceable Are Usernames?" in PETS, 2011.
    [15]
    M. Szomszor, I. Cantador, E. P. Superior, and H. Alani, "Correlating user profiles from multiple folksonomies," in In Proceedings of International Conference Hypertext (HT '08), 2008.
    [16]
    T. Iofciu, P. Fankhauser, F. Abel, and K. Bischoff, "Identifying Users Across Social Tagging Systems," in ICWSM, 2011.
    [17]
    E. Raad, R. Chbeir, and A. Dipanda, "User Profile Matching in Social Networks," in Network-Based Information Systems (NBiS), 2010 13th International Conference on, 2010.
    [18]
    K. Cortis, S. Scerri, I. Rivera, and S. Handschuh, "Discovering semantic equivalence of people behind online profiles," in In Proceedings of the Resource Discovery (RED) Workshop, ser. ESWC, 2012.
    [19]
    A. Doan and A. Y. Halevy, "Semantic-integration research in the database community," AI Magazine., 2005.
    [20]
    J. Golbeck and M. Rothstein, "Linking social networks on the web with FOAF: a semantic web case study," in Proceedings of the National conference on Artificial intelligence -, ser. AAAI, 2008.
    [21]
    A. Narayanan and V. Shmatikov, "De-anonymizing Social Networks," in Proceedings of IEEE Symposium on Security and Privacy, ser. SP, 2009.
    [22]
    S. Bartunov, A. Korshunov, S. Park, W. Ryu, and H. Lee, "Joint Link-Attribute User Identity Resolution in Online Social Networks," in SNAKDD, 2012.
    [23]
    D. Correa, A. Sureka, and R. Sethi, "WhACKY! - What anyone could know about you from Twitter," in PST, 2012.
    [24]
    P. Jain, T. Rodrigues, G. Magno, P. Kumaraguru, and V. Almeida, "Cross-Pollination of Information in Online Social Media: A Case Study on Popular Social Networks," in SocialCom/PASSAT, 2011.
    [25]
    M. Rowe, "The credibility of digital identity information on the social web: a user study," in WICOW, 2010.
    [26]
    M. A. Jaro, Unimatch: A record linkage system: Users manual. Bureau of the Census, 1978.
    [27]
    "We're getting less friendly on Facebook," 2012. {Online}. Available: Accessed on 02/24/2013 - http://www.boston.com/business/technology/articles/2012/02/24/study_were_getting_less_friendly_on_facebook/
    [28]
    P. Kumaraguru and N. Sachdeva, "Privacy in India: Attitudes and Awareness V 2.0," PreCog-TR-12-001, PreCog@IIIT-Delhi, Tech. Rep., 2012, http://precog.iiitd.edu.in/research/privacyindia/.

    Cited By

    View all
    • (2024)Network alignment based on multiple hypernetwork attributesThe European Physical Journal Special Topics10.1140/epjs/s11734-024-01144-z233:4(843-861)Online publication date: 14-Mar-2024
    • (2023)Social Re-Identification Assisted RTO Detection for E-CommerceCompanion Proceedings of the ACM Web Conference 202310.1145/3543873.3587620(854-858)Online publication date: 30-Apr-2023
    • (2023)Identifying Users Across Social Media Networks for Interpretable Fine-Grained Neighborhood Matching by Adaptive GATIEEE Transactions on Services Computing10.1109/TSC.2023.328887216:5(3453-3466)Online publication date: Sep-2023
    • Show More Cited By

    Index Terms

    1. @i seek 'fb.me': identifying users across multiple online social networks

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM Other conferences
          WWW '13 Companion: Proceedings of the 22nd International Conference on World Wide Web
          May 2013
          1636 pages
          ISBN:9781450320382
          DOI:10.1145/2487788
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Sponsors

          • NICBR: Nucleo de Informatcao e Coordenacao do Ponto BR
          • CGIBR: Comite Gestor da Internet no Brazil

          In-Cooperation

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 13 May 2013

          Permissions

          Request permissions for this article.

          Check for updates

          Author Tags

          1. digital footprint
          2. identity resolution
          3. identity search
          4. online social networks
          5. privacy

          Qualifiers

          • Research-article

          Conference

          WWW '13
          Sponsor:
          • NICBR
          • CGIBR
          WWW '13: 22nd International World Wide Web Conference
          May 13 - 17, 2013
          Rio de Janeiro, Brazil

          Acceptance Rates

          WWW '13 Companion Paper Acceptance Rate 831 of 1,250 submissions, 66%;
          Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)32
          • Downloads (Last 6 weeks)6

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)Network alignment based on multiple hypernetwork attributesThe European Physical Journal Special Topics10.1140/epjs/s11734-024-01144-z233:4(843-861)Online publication date: 14-Mar-2024
          • (2023)Social Re-Identification Assisted RTO Detection for E-CommerceCompanion Proceedings of the ACM Web Conference 202310.1145/3543873.3587620(854-858)Online publication date: 30-Apr-2023
          • (2023)Identifying Users Across Social Media Networks for Interpretable Fine-Grained Neighborhood Matching by Adaptive GATIEEE Transactions on Services Computing10.1109/TSC.2023.328887216:5(3453-3466)Online publication date: Sep-2023
          • (2023)Interlayer Link Prediction in Multiplex Social Networks Based on Multiple Types of Consistency Between Embedding VectorsIEEE Transactions on Cybernetics10.1109/TCYB.2021.312013453:4(2426-2439)Online publication date: Apr-2023
          • (2023)SiMAIM: identifying sockpuppets and puppetmasters on a single forum-oriented social media siteThe Journal of Supercomputing10.1007/s11227-023-05376-z79:16(18667-18698)Online publication date: 17-May-2023
          • (2022)Investigation of Cross-Social Network User Identification2021 International Conference on Advanced Computing and Endogenous Security10.1109/IEEECONF52377.2022.10013328(1-7)Online publication date: 21-Apr-2022
          • (2022)Multidimensional Assignment Problem for Multipartite Entity ResolutionJournal of Global Optimization10.1007/s10898-022-01141-384:2(491-523)Online publication date: 1-Oct-2022
          • (2022)FEUI: Fusion Embedding for User Identification across social networksApplied Intelligence10.1007/s10489-021-02716-552:7(8209-8225)Online publication date: 1-May-2022
          • (2021)From Symbols to Embeddings: A Tale of Two Representations in Computational Social ScienceJournal of Social Computing10.23919/JSC.2021.00112:2(103-156)Online publication date: Jun-2021
          • (2021)Real-time privacy risk quantification in online social networksProceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining10.1145/3487351.3488272(74-81)Online publication date: 8-Nov-2021
          • Show More Cited By

          View Options

          Get Access

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media