Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2808797.2809280acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Public Information Exposure Detection: Helping Users Understand Their Web Footprints

Published: 25 August 2015 Publication History

Abstract

To help users better understand the potential risks associated with publishing data publicly, as well as the quantity and sensitivity of information that can be obtained by combining data from various online sources, we introduce a novel information exposure detection framework that generates and analyzes the web footprints users leave across the social web. Web footprints are the traces of one's online social activities represented by a set of attributes that are known or can be inferred with a high probability by an adversary who has basic information about a user from his/her public profiles. Our framework employs new probabilistic operators, novel pattern-based attribute extraction from text, and a population-based inference engine to generate web footprints. Using a web footprint, the framework then quantifies a user's level of information exposure relative to others with similar traits, as well as with regard to others in the population. Evaluation over public profiles from multiple sites (Google+, LinkeIn, FourSquare, and Twitter) shows that the proposed framework effectively detects and quantifies information exposure using a small amount of initial knowledge.

References

[1]
J. Anderson, C. Diaz, J. Bonneau, and F. Stajano. Privacy-enabling Social Networking over Untrusted Networks. In WOSN, 2009.
[2]
L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore Art Thou r3579x?: Anonymized Social Networks, Hidden Patterns, and Structural Steganography. In WWW, 2007.
[3]
R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin. Persona: An Online Social Network with User-defined Privacy. In SIGCOMM, 2009.
[4]
O. Goga, H. Lei, S. H. K. Parthasarathi, G. Friedland, R. Sommer, and R. Teixeira. Exploiting Innocuous Activity for Correlating Users Across Sites. In WWW, 2013.
[5]
R. Gross and A. Acquisti. Information Revelation and Privacy in Online Social Networks. In WPES, 2005.
[6]
M. A. Hearst. Automatic Acquisition of Hyponyms from Large Text Corpora. In COLING, 1992.
[7]
M. Humbert, T. Studer, M. Grossglauser, and J.-P. Hubaux. Nowhere to Hide: Navigating around Privacy in Online Social Networks. In ESORICS, 2013.
[8]
T. Iofciu, P. Fankhauser, F. Abel, and K. Bischoff. Identifying Users Across Social Tagging Systems. In ICWSM, 2011.
[9]
D. Irani, S. Webb, K. Li, and C. Pu. Large Online Social Footprints--An Emerging Threat. In International Conference on Computational Science and Engineering, 2009.
[10]
P. Jain, P. Kumaraguru, and A. Joshi. @I Seek 'fb.me': Identifying Users Across Multiple Online Social Networks. In WoLE, 2013.
[11]
A. Malhotra, L. Totti, W. Meira Jr., P. Kumaraguru, and V. Almeida. Studying User Footprints in Different Online Social Networks. In ASONAM, 2012.
[12]
B. Moore, Y. Wei, A. Orshefsky, M. Sherr, L. Singh, and H. Yang. Understanding Site-Based Inference Potential for Identifying Hidden Attributes. In PASSAT, 2013.
[13]
A. Narayanan and V. Shmatikov. De-anonymizing Social Networks. In IEEE Symposium on Security and Privacy, 2009.
[14]
A. Ramachandran, L. Singh, E. Porter, and F. Nagle. Exploring Re-identification Risks in Public Domains. In IPST, 2012.
[15]
D. Ravichandran and E. Hovy. Learning Surface Text Patterns for a Question Answering System. In ACL, 2002.
[16]
J. Song, S. Lee, and J. Kim. I Know the Shortened URLs you Clicked on Twitter: Inference Attack using Public Click Analytics and Twitter Metadata. In WWW, 2013.
[17]
B. H. Spitzberg and G. Hoobler. Cyberstalking and the Technologies of Interpersonal Terrorism. New Media and Society, 4:71--92, February 2002.
[18]
L. Sweeney. k-anonymity: A Model for Protecting Privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10:557--570, October 2002.
[19]
L. Sweeney. Protecting Job Seekers from Identity Theft. IEEE Internet Computing, 10(2), Mar. 2006.
[20]
C. Warren. 10 People Who Lost Jobs Over Social Media Mistakes, 2011. Mashable. Available at http://mashable.com/2011/06/16/weinergate-social-media-job-loss/.
[21]
H. Yang and J. Callan. A Metric-based Framework for Automatic Taxonomy Induction. In ACL, 2009.

Cited By

View all
  • (2023)Social Media Data for Firearms Research: Promise and PerilsThe ANNALS of the American Academy of Political and Social Science10.1177/00027162231174320704:1(267-291)Online publication date: 20-Jun-2023
  • (2020)Information Exposure From Relational Background Knowledge on Social Media2020 IEEE 7th International Conference on Data Science and Advanced Analytics (DSAA)10.1109/DSAA49011.2020.00041(282-291)Online publication date: Oct-2020
  • (2019)Oh, the Places You've Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and InferencingProceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security10.1145/3319535.3363200(149-166)Online publication date: 6-Nov-2019
  • Show More Cited By
  1. Public Information Exposure Detection: Helping Users Understand Their Web Footprints

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ASONAM '15: Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015
      August 2015
      835 pages
      ISBN:9781450338547
      DOI:10.1145/2808797
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 25 August 2015

      Permissions

      Request permissions for this article.

      Check for updates

      Badges

      • Honorable Mention

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      ASONAM '15
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 116 of 549 submissions, 21%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)10
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 15 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Social Media Data for Firearms Research: Promise and PerilsThe ANNALS of the American Academy of Political and Social Science10.1177/00027162231174320704:1(267-291)Online publication date: 20-Jun-2023
      • (2020)Information Exposure From Relational Background Knowledge on Social Media2020 IEEE 7th International Conference on Data Science and Advanced Analytics (DSAA)10.1109/DSAA49011.2020.00041(282-291)Online publication date: Oct-2020
      • (2019)Oh, the Places You've Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and InferencingProceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security10.1145/3319535.3363200(149-166)Online publication date: 6-Nov-2019
      • (2018)CyberActivist: Tool for Raising Awareness on Privacy and Security of Social Media Use for ActivistsSocial Computing and Social Media. User Experience and Behavior10.1007/978-3-319-91521-0_36(498-510)Online publication date: 31-May-2018
      • (2016)Privacy-Preserving IR 2016Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval10.1145/2911451.2917763(1247-1248)Online publication date: 7-Jul-2016
      • (2016)Data Ethics—Attaining Personal Privacy on the WebEthical Reasoning in Big Data10.1007/978-3-319-28422-4_7(81-90)Online publication date: 23-Apr-2016

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media