Use & Abuse of Personal Information, Part II: Robust Generation of Fake IDs for Privacy Experimentation
Abstract
:1. Introduction
1.1. Motivation
Avoidance of Fake Account Detection
1.2. Ethical Considerations
1.3. Paper Outline
2. Use and Abuse of Personal Information Project
- How does our personal information propagate and spread on the internet after signing up to second-party organizations?
- Is it possible to predict the election winners based on an analysis of the amount and content of communications received from the candidates?
- Do airlines and travel companies target and market towards certain income or personal demographics differently?
- Do health and supplement companies target certain age or gender demographics differently than others?
- Is a certain gender, race, or ethnicity more likely to receive communications from a company after uploading their resume to a job board?
3. Literature Review
3.1. Determining Information Required to Create a Fake Account
3.2. Example of a Fake ID
4. Constructing Realistic Fake Identities
4.1. Derived Fields
- First Name: separate first name lists based on U.S. Census data were used for each of the male and female IDs. A larger list of female names was used than male names given what appears to be higher variability (particularly in spellings) in female names.
- Sex: these values were assigned 50/50 instead of 49.2 and 50.8; for any experiments where those distinctions are relevant, we anticipate more extreme sculpting of gender identities.
- Birthday/Age: the PRNG-based mapping creates a birthdate, while age is directly calculated with the current date at any usage of age.
- Address/State: state was selected first and an address was generated for that state.
- Address: uses the USPS API (usps-api 0.5) [114] to determine if a generated address is fake or not. Returns true or false, with all street numbers modified until the result is confirmed as false.
- Height/Weight: once Height has been selected from a percentile-based distribution [120], a conditional distribution was used to select a corresponding weight that is within two standard deviations of the height-adjusted median.
- Ethnicity/Nationality: these values used conditional distributions of the Hispanic ethnicity into the six racial categories employed by the US Census.
- Education Level/Education Major: Education Level was generated first and then if the education level was higher than a high school education, a major was assigned.
- Salutation: these values were originally mapped directly for salutations for males and females. Marriage and degree were not factored into these, but allow for distinctions for “Dr.” or between “Ms.” and “Mrs.” if needed for individual questions.
- Phone: we used only phone lines purchased and managed on FreePBX Trunking.
- Address: We invalidated addresses by USPS API, “re-rolling” the PRNG output in a controlled fashion to generate a new street address when an address number was returned as legitimate.
4.2. Tailoring Fake IDs to Meet Research Needs
4.3. Scope of Fake Identities
4.4. Pseudo Random Number Generation (PRNG)
4.5. Fake ID Example
4.6. Raw Data Distribution
4.7. Mapping RNG Outputs to ID Characteristics
4.8. Fake ID Construction Process
4.9. Storing and Managing Fake IDs
4.10. Preliminary Validation of Fake IDs
5. Use and Extension of Fake ID Generation
- Harness AI tools to create a fake person’s image/video and activity more realistic.
- Employ PO Box forwarding services provided by USPS to send and receive mail.
- Create an account interaction engine to automate identity behaviors.
- Use of fake IDs in social science research
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Michaels, A.J.; George, K.B. Use and Abuse of Personal Information. 2021. Available online: https://www.blackhat.com/us-21/briefings/schedule/#use–abuse-of-personal-information-22688 (accessed on 9 July 2024).
- Harrison, J.; Lyons, J.; Anderson, L.; Maunder, L.; O’Donnell, P.; George, K.B.; Michaels, A.J. Quantifying Use and Abuse of Personal Information. In Proceedings of the 2021 IEEE International Conference on Intelligence and Security Informatics (ISI), San Antonio, TX, USA, 2–3 November 2021; IEEE: Piscataway, New Jersey, USA; 2021; pp. 1–6. [Google Scholar] [CrossRef]
- Cranor, L.F.; LaMacchia, B.A. Spam! Commun. ACM 1998, 41, 74–83. [Google Scholar] [CrossRef]
- Roesner, F.; Kohno, T.; Wetherall, D. Detecting and Defending Against Third-Party Tracking on the Web. In Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12), San Jose, CA, USA, 25–27April 2012; pp. 155–168. Available online: https://www.usenix.org/conference/nsdi12/technical-sessions/presentation/roesner (accessed on 9 July 2024).
- Nguyen, T.; Yeates, G.; Ly, T.; Albalawi, U. A Study on Exploring the Level of Awareness of Privacy Concerns and Risks. Appl. Sci. 2023, 13, 3237. [Google Scholar] [CrossRef]
- Kost, E. 10 Biggest Data Breaches in Finance. 2023. Available online: https://www.upguard.com/blog/biggest-data-breaches-financial-services (accessed on 29 May 2024).
- Shoop, T. OPM To Send Data Breach Notifications to Federal Employees Next Week. 2015. Available online: https://www.govexec.com/technology/2015/06/opm-send-data-breach-notifications-federal-employees-next-week/114556/ (accessed on 29 May 2024).
- Ekran System. 7 Examples of Real-Life Data Breaches Caused by Insider Threats. 2023. Available online: https://www.ekransystem.com/en/blog/real-life-examples-insider-threat-caused-breaches (accessed on 29 May 2024).
- Clement, N. M&A Effect on Data Breaches in Hospitals: 2010–2022. In Proceedings of the 22nd Workshop on the Economics of Information Security, Geneva, Switzerland, 5–8 July 2023; pp. 1–63. [Google Scholar]
- Ablon, L.; Heaton, P.; Lavery, D.C.; Romanosky, S. Consumer Attitudes towards Data Breach Notifications and Loss of Personal Information; Technical Report 1187; RAND Corporation: Santa Monica, CA, USA, 2016; Available online: https://www.rand.org/content/dam/rand/pubs/research_reports/RR1100/RR1187/RAND_RR1187.pdf (accessed on 9 July 2024).
- Rheault, E.; Nerayo, M.; Leonard, J.; Kolenbrander, J.; Henshaw, C.; Boswell, M.; Michaels, A. Design of a Scalable OSINT Collection Engine. J. Cybersecur. Privacy Spec. Issue Build. Community Good Pract. Cybersecur. 2024. [Google Scholar]
- Sigmund, T. Attention Paid to Privacy Policy Statements. Digit. Econ. Soc. Inf. Manag. 2021, 12, 144. [Google Scholar] [CrossRef]
- Barth, S.; Ionita, D.; Hartel, P. Understanding Online Privacy—A Systematic Review of Privacy Visualizations and Privacy by Design Guidelines. ACM Comput. Surv. 2022, 55, 63. [Google Scholar] [CrossRef]
- Fabian, B.; Ermakova, T.; Lentz, T. Large-scale readability analysis of privacy policies. In WI ’17: Proceedings of the International Conference on Web Intelligence, Leipzig, Germany, 23–26 August 2017; Association for Computing Machinery: New York, NY, USA, 2017; pp. 18–25. [Google Scholar] [CrossRef]
- National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. The Belmont Report. 1979. Available online: https://www.hhs.gov/ohrp/regulations-and-policy/belmont-report/read-the-belmont-report/index.html (accessed on 9 July 2024).
- World Medical Association. World Medical Association Declaration of Helsinki: Ethical principles for medical research involving human subjects. Bull. World Health Organ. 2001, 79, 373–374. Available online: https://www.wma.net/policies-post/wma-declaration-of-helsinki-ethical-principles-for-medical-research-involving-human-subjects/ (accessed on 9 July 2024).
- Favaretto, M.; De Clercq, E.; Gaab, J.; Elger, B.S. First do no harm: An exploration of researchers’ ethics of conduct in Big Data behavioral studies. PLoS ONE 2020, 15, e0241865. [Google Scholar] [CrossRef]
- Mittelstadt, B.D.; Floridi, L. The Ethics of Big Data: Current and Foreseeable Issues in Biomedical Contexts. Sci. Eng. Ethics 2016, 22, 303–341. [Google Scholar] [CrossRef] [PubMed]
- Daries, J.P.; Reich, J.; Waldo, J.; Young, E.M.; Whittinghill, J.; Ho, A.D.; Seaton, D.T.; Chuang, I. Privacy, anonymity, and big data in the social sciences. Commun. ACM 2014, 57, 56–63. [Google Scholar] [CrossRef]
- O’Donnell, P.; Harrison, J.; Lyons, J.; Anderson, L.; Maunder, L.; Ramboyong, S.; Michaels, A.J. Quantitative Rubric for Privacy Policy Analysis. In Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2021 International Workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, 8 October 2021; Revised Selected Papers, Berlin/Heidelberg, Germany, 2021. pp. 39–54. [Google Scholar] [CrossRef]
- Burattin, A.; Cascavilla, G.; Conti, M. SocialSpy: Browsing (Supposedly) Hidden Information in Online Social Networks. In Proceedings of the Risks and Security of Internet and Systems; Lopez, J., Ray, I., Crispo, B., Eds.; Springer: Cham, Switzerland, 2015; pp. 83–99. [Google Scholar] [CrossRef]
- Elovici, Y.; Herzberg, A.; Fire, M. Ethical Considerations when Employing Fake Identities in Online Social Networks for Research. Sci. Eng. Ethics 2014, 20, 1027–1043. [Google Scholar] [CrossRef]
- Luo, W.; Xie, Q.; Hengartner, U. FaceCloak: An Architecture for User Privacy on Social Networking Sites. In Proceedings of the 2009 International Conference on Computational Science and Engineering, Vancouver, BC, Canada, 29–31 August 2009; Volume 3, pp. 26–33. [Google Scholar] [CrossRef]
- Sarikakis, K.; Winter, L. Social Media Users’ Legal Consciousness About Privacy. Soc. Media Soc. 2017, 3, 1–14. [Google Scholar] [CrossRef]
- Fahmy, S.G.; Abdelgaber, K.M.; Karam, O.H.; Elzanfaly, D.S. Modeling the Influence of Fake Accounts on User Behavior and Information Diffusion in Online Social Networks. Informatics 2023, 10, 27. [Google Scholar] [CrossRef]
- Adewole, K.S.; Anuar, N.B.; Kamsin, A.; Varathan, K.D.; Razak, S.A. Malicious accounts: Dark of the social networks. J. Netw. Comput. Appl. 2017, 79, 41–67. [Google Scholar] [CrossRef]
- Kantartopoulos, P.; Pitropakis, N.; Mylonas, A.; Kylilis, N. Exploring Adversarial Attacks and Defences for Fake Twitter Account Detection. Technologies 2020, 8, 64. [Google Scholar] [CrossRef]
- Breuer, A.; Khosravani, N.; Tingley, M.; Cottel, B. Preemptive Detection of Fake Accounts on Social Networks via Multi-Class Preferential Attachment Classifiers. In KDD ’23 Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Long Beach, CA, USA, 6–10 August 2023; Association for Computing Machinery: New York, NY, USA, 2023; pp. 105–116. [Google Scholar] [CrossRef]
- Elishar, A.; Fire, M.; Kagan, D.; Elovici, Y. Organizational Intrusion: Organization Mining Using Socialbots. In Proceedings of the 2012 International Conference on Social Informatics, Alexandria, VA, USA, 14–16 December 2012; pp. 7–12. [Google Scholar] [CrossRef]
- Bos, N.; Karahalios, K.; Musgrove-Chávez, M.; Poole, E.S.; Thomas, J.C.; Yardi, S. Research ethics in the facebook era. In CHI ’09: Proceedings of the CHI Conference on Human Factors in Computing Systems, Boston, MA, USA, 4–9 April 2009; Association for Computing Machinery: New York, NY, USA, 2009; pp. 2767–2770. [Google Scholar] [CrossRef]
- Bilge, L.; Strufe, T.; Balzarotti, D.; Kirda, E. All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In Proceedings of the 18th International Conference on World Wide Web, Madrid, Spain, 20–24 April 2009; Association for Computing Machinery: New York, NY, USA, 2009. WWW ’09. pp. 551–560. [Google Scholar] [CrossRef]
- Moreno, M.A.; Goniu, N.; Moreno, P.S.; Diekema, D. Ethics of Social Media Research: Common Concerns and Practical Considerations. Cyberpsychol. Behav. Soc. Netw. 2013, 16, 708–713. [Google Scholar] [CrossRef] [PubMed]
- Homeland Security Public-Private Analytic Exchange Program. Ethics & OSINT Scorecard. Available online: https://www.dhs.gov/sites/default/files/2023-09/23_0829_oia_Ethics-OSINT-Scorecard_508.pdf (accessed on 8 July 2024).
- Ma, X.; Andalibi, N.; Barkhuus, L.; Naaman, M. “People Are Either Too Fake or Too Real”: Opportunities and Challenges in Tie-Based Anonymity. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, Denver, CO, USA, 5–11 May 2017; Association for Computing Machinery: New York, NY, USA, 2017. CHI ’17. pp. 1781–1793. [Google Scholar] [CrossRef]
- Chang, K.C.; Barber, S. Personalized Privacy Assistant: Identity Construction and Privacy in the Internet of Things. Entropy 2023, 25, 717. [Google Scholar] [CrossRef] [PubMed]
- Aïmeur, E.; Schőnfeld, D. The ultimate invasion of privacy: Identity theft. In Proceedings of the 2011 Ninth Annual International Conference on Privacy, Security and Trust, Montreal, QC, Canada, 19–21 July 2011; pp. 24–31. [Google Scholar] [CrossRef]
- Shafahi, M.; Kempers, L.; Afsarmanesh, H. Phishing Through Social Bots on Twitter. In Proceedings of the IEEE International Conference on Big Data, Amsterdam, Orlando, FL, USA, 5–9 December 2016; pp. 3703–3712. [Google Scholar] [CrossRef]
- EU Panel for the Future of Science and Technology. Polarisation and the Use of Technology in Political Campaigns and Communication. Technical Report PE 634.414. 2019. Available online: https://www.europarl.europa.eu/thinktank/en/document/EPRS_STU(2019)634414 (accessed on 9 July 2024).
- Zannettou, S.; Caulfield, T.; Bradlyn, B.; De Cristofaro, E.; Stringhini, G.; Blackburn, J. Characterizing the Use of Images in State-Sponsored Information Warfare Operations by Russian Trolls on Twitter. Proc. Int. AAAI Conf. Web Soc. Media 2020, 14, 774–785. [Google Scholar] [CrossRef]
- Hakak, S.; Khan, W.; Bhattacharya, S.; Gadekallu, T.; Choo, K.K.R. Propagation of Fake News on Social Media: Challenges and Opportunities. Computational Data and Social Networks: 9th International Conference, CSoNet 2020, Dallas, TX, USA, 11–13 December 2020; Proceedings 9. Springer: Cham, Switzerland, 2020; pp. 345–353. [Google Scholar] [CrossRef]
- Puleri, J. Law Enforcement and Open Source Intelligence: Evolution, Technologies, and Privacy Issues. Ph.D. Thesis, Utica College, Utica, NY, USA, 2021. [Google Scholar]
- Suriadi, S.; Foo, E.; Smith, J. Chapter 4—Enhancing Privacy to Defeat Open Source Intelligence. In Automating Open Source Intelligence; Layton, R., Watters, P.A., Eds.; Syngress: Boston, MA, USA, 2016; pp. 61–78. [Google Scholar] [CrossRef]
- Hayes, D.R.; Cappa, F. Open-source intelligence for risk assessment. Bus. Horizons 2018, 61, 689–697. [Google Scholar] [CrossRef]
- Shaikh, O. Detection and Classification of Personally Identifiable Information in Images Using Artificial Intelligence. TechRxiv 2024, 1–6. [Google Scholar] [CrossRef]
- Arefi, M.N.; Alexander, G.; Crandall, J.R. PIITracker: Automatic Tracking of Personally Identifiable Information in Windows. In Proceedings of the 11th European Workshop on Systems Security, Porto, Portugal, 23–26 April 2018. EuroSec’18. [Google Scholar] [CrossRef]
- Fugkeaw, S.; Worapaluk, K.; Tuekla, A.; Namkeatsakul, S. Design and Development of a Dynamic and Efficient PII Data Loss Prevention System. In Proceedings of the Recent Advances in Information and Communication Technology 2021; Meesad, P., Sodsee, D.S., Jitsakul, W., Tangwannawit, S., Eds.; Springer: Cham, Switzerland, 2021; pp. 23–33. [Google Scholar]
- Dao, H.; Fukuda, K. Alternative to third-party cookies: Investigating persistent PII leakage-based web tracking. In Proceedings of the 17th International Conference on Emerging Networking EXperiments and Technologies, Virtual Event, Germany, 7–10 December 2021; CoNEXT ’21. pp. 223–229. [Google Scholar] [CrossRef]
- Ren, J.; Rao, A.; Lindorfer, M.; Legout, A.; Choffnes, D. ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic. In Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, Singapore, 26–30 June 2016; MobiSys ’16. pp. 361–374. [Google Scholar] [CrossRef]
- Krishnamurthy, B.; Wills, C.E. On the leakage of personally identifiable information via online social networks. In Proceedings of the 2nd ACM Workshop on Online Social Networks, Barcelona, Spain, 17 August 2009; WOSN ’09. pp. 7–12. [Google Scholar] [CrossRef]
- Venkatadri, G.; Andreou, A.; Liu, Y.; Mislove, A.; Gummadi, K.P.; Loiseau, P.; Goga, O. Privacy Risks with Facebook’s PII-Based Targeting: Auditing a Data Broker’s Advertising Interface. In Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 20–24 May 2018; pp. 89–107. [Google Scholar] [CrossRef]
- Malheiros, M.; Jennett, C.; Patel, S.; Brostoff, S.; Sasse, M.A. Too close for comfort: A study of the effectiveness and acceptability of rich-media personalized advertising. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Austin, TX, USA, 5–10 May 2012; CHI ’12. pp. 579–588. [Google Scholar] [CrossRef]
- Gates, M. Frankenstein Fraud: How Synthetic Identities Became the Fastest-Growing Fraud Trend. Security Management. 2021. Available online: https://www.asisonline.org/security-management-magazine/articles/2021/05/frankenstein-fraud-how-synthetic-identities-became-the-fastest-growing-fraud-trend/ (accessed on 9 July 2024).
- Teixeira da Silva, J.A. Fake peer reviews, fake identities, fake accounts, fake data: Beware! AME Med. J. 2017, 2, 1–4. [Google Scholar] [CrossRef]
- Boshmaf, Y.; Muslukhov, I.; Beznosov, K.; Ripeanu, M. The socialbot network: When bots socialize for fame and money. In Proceedings of the 27th Annual Computer Security Applications Conference, Orlando, FL, USA, 5–9 December 2011; ACSAC ’11. pp. 93–102. [Google Scholar] [CrossRef]
- Pathak, A. An Analysis of Various Tools, Methods and Systems to Generate Fake Accounts for Social Media. Master’s Thesis, Northeastern University, Boston, MA, USA, 2014. [Google Scholar]
- Fatema, A.S.; Mattar, E.A. Recent advances in artificial intelligence techniques for identifying fake accounts: A review. In Proceedings of the 6th Smart Cities Symposium (SCS 2022), Hybrid Conference, Bahrain, 6–8 December 2022; Volume 2022, pp. 504–507. [Google Scholar] [CrossRef]
- Masood, F.; Ammad, G.; Almogren, A.; Abbas, A.; Khattak, H.A.; Ud Din, I.; Guizani, M.; Zuair, M. Spammer Detection and Fake User Identification on Social Networks. IEEE Access 2019, 7, 68140–68152. [Google Scholar] [CrossRef]
- Baccarella, C.V.; Wagner, T.F.; Kietzmann, J.H.; McCarthy, I.P. Social media? It’s serious! Understanding the dark side of social media. Eur. Manag. J. 2018, 36, 431–438. [Google Scholar] [CrossRef]
- Anklesaria, K.; Desai, Z.; Kulkarni, V.; Balasubramaniam, H. A Survey on Machine Learning Algorithms for Detecting Fake Instagram Accounts. In Proceedings of the 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), Greater Noida, India, 17–18 December 2021; pp. 141–144. [Google Scholar] [CrossRef]
- Gurajala, S.; White, J.; Hudson, B.; Voter, B.; Matthews, J. Profile characteristics of fake Twitter accounts. Big Data Soc. 2016, 3. [Google Scholar] [CrossRef]
- Xiao, C.; Freeman, D.M.; Hwa, T. Detecting Clusters of Fake Accounts in Online Social Networks. In Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, Denver, CO, USA, 16 October 2015; AISec ’15. pp. 91–101. [Google Scholar] [CrossRef]
- Sarode, A.J.; Mishra, A. Audit and Analysis of Impostors: An experimental approach to detect fake profile in online social network. In Proceedings of the Sixth International Conference on Computer and Communication Technology 2015, Allahabad, India, 25–27 September 2015; ICCCT ’15. pp. 1–8. [Google Scholar] [CrossRef]
- Kozlov, F.; Yuen, I.; Kowalczyk, J.; Bernhardt, D.; Freeman, D.; Pearce, P.; Ivanov, I. Evaluating Changes to Fake Account Verification Systems. In Proceedings of the 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020), San Sebastian, Spain, 14–16 October 2020; pp. 135–148. Available online: https://www.usenix.org/conference/raid2020/presentation/kozlov (accessed on 9 July 2024).
- Staddon, J.; Huffaker, D.; Brown, L.; Sedley, A. Are privacy concerns a turn-off? engagement and privacy in social networks. In Proceedings of the Eighth Symposium on Usable Privacy and Security, Washington, DC, USA, 11–13 July 2012. SOUPS ’12. [Google Scholar] [CrossRef]
- Kulkarni, V.; Aashritha Reddy, D.; Sreevani, P.; Teja, R. Fake profile identification using ANN. In Proceedings of the 4th Smart Cities Symposium (SCS 2021), Online, 21–23 November 2021; Volume 2021, pp. 375–380. [Google Scholar] [CrossRef]
- Fire, M.; Kagan, D.; Elyashar, A.; Elovici, Y. Friend or foe? Fake profile identification in online social networks. Soc. Netw. Anal. Min. 2013, 4, 194. [Google Scholar] [CrossRef]
- Gross, R.; Acquisti, A. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, Alexandria, VA, USA, 7 November 2005; WPES ’05. pp. 71–80. [Google Scholar] [CrossRef]
- Borkar, B.S.; Patil, D.R.; Markad, A.V.; Sharma, M. Real or Fake Identity Deception of Social Media Accounts using Recurrent Neural Network. In Proceedings of the 2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP), Uttarakhand, India, 23–24 November 2022; pp. 80–84. [Google Scholar] [CrossRef]
- Jain, P.; Gyanchandani, M.; Khare, N. Big data privacy: A technological perspective and review. J. Big Data 2016, 3, 25. [Google Scholar] [CrossRef]
- Boshmaf, Y.; Ripeanu, M.; Beznosov, K.; Santos-Neto, E. Thwarting Fake OSN Accounts by Predicting their Victims. In Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, Denver, CO, USA, 16 October 2015; AISec ’15. pp. 81–89. [Google Scholar] [CrossRef]
- Elyusufi, Y.; Elyusufi, Z.; Kbir, M.A. Social networks fake profiles detection based on account setting and activity. In Proceedings of the 4th International Conference on Smart City Applications, Casablanca, Morocco, 2–4 October 2019. SCA ’19. [Google Scholar] [CrossRef]
- Sowmya, P.; Chatterjee, M. Detection of Fake and Clone accounts in Twitter using Classification and Distance Measure Algorithms. In Proceedings of the 2020 International Conference on Communication and Signal Processing (ICCSP), Chennai, India, 28–30 July 2020; pp. 0067–0070. [Google Scholar] [CrossRef]
- Wanda, P. RunMax: Fake profile classification using novel nonlinear activation in CNN. Soc. Netw. Anal. Min. 2022, 12, 158. [Google Scholar] [CrossRef]
- Kuhn, M.L. 147 Million Social Security Numbers for Sale: Developing Data Protection Legislation after Mass Cybersecurity Breaches. Iowa Law Rev. 2018, 104. Available online: https://ilr.law.uiowa.edu/print/volume-103-issue-6/147-million-social-security-numbers-for-sale-developing-data-protection-legislation-after-mass-cybersecurity-breaches (accessed on 9 July 2024).
- Singh, V.; Shanmugam, R.; Awasthi, S. Preventing Fake Accounts on Social Media Using Face Recognition Based on Convolutional Neural Network. In Proceedings of the Sustainable Communication Networks and Application; Karuppusamy, P., Perikos, I., Shi, F., Nguyen, T.N., Eds.; Springer: Singapore, 2021; pp. 227–241. [Google Scholar] [CrossRef]
- Benabbou, F.; Boukhouima, H.; Sael, N. Fake accounts detection system based on bidirectional gated recurrent unit neural network. Int. J. Electr. Comput. Eng. (IJECE) 2022, 12, 3129. [Google Scholar] [CrossRef]
- Khaled, S.; El-Tazi, N.; Mokhtar, H.M.O. Detecting Fake Accounts on Social Media. In Proceedings of the 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA, 10–13 December 2018; pp. 3672–3681. [Google Scholar] [CrossRef]
- Caruccio, L.; Desiato, D.; Polese, G. Fake Account Identification in Social Networks. In Proceedings of the 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA, 10–13 December 2018; pp. 5078–5085. [Google Scholar] [CrossRef]
- Muñoz, S.D.; Paul Guillén Pinto, E. A dataset for the detection of fake profiles on social networking services. In Proceedings of the 2020 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 16–18 December 2020; pp. 230–237. [Google Scholar] [CrossRef]
- Asghari, S.; Chehreghani, M.H.; Chehreghani, M.H. On Using Node Indices and Their Correlations for Fake Account Detection. In Proceedings of the 2022 IEEE International Conference on Big Data (Big Data), Osaka, Japan, 17–20 December 2022; pp. 5656–5661. [Google Scholar] [CrossRef]
- Liang, X.; Yang, Z.; Wang, B.; Hu, S.; Yang, Z.; Yuan, D.; Gong, N.Z.; Li, Q.; He, F. Unveiling Fake Accounts at the Time of Registration: An Unsupervised Approach. In Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, Singapore, 14–18 August 2021; KDD ’21. pp. 3240–3250. [Google Scholar] [CrossRef]
- McDonald, A.; Sugatan, C.; Guberek, T.; Schaub, F. The Annoying, the Disturbing, and the Weird: Challenges with Phone Numbers as Identifiers and Phone Number Recycling. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, Yokohama, Japan, 8–13 May 2021. CHI ’21. [Google Scholar] [CrossRef]
- Mulliner, C. Privacy leaks in mobile phone internet access. In Proceedings of the 2010 14th International Conference on Intelligence in Next Generation Networks, Berlin, Germany, 11–14 October 2010; pp. 1–6. [Google Scholar] [CrossRef]
- Baglioni, E.; Becchetti, L.; Bergamini, L.; Colesanti, U.; Filipponi, L.; Vitaletti, A.; Persiano, G. A lightweight privacy preserving SMS-based recommendation system for mobile users. In Proceedings of the Fourth ACM Conference on Recommender Systems, Barcelona, Spain, 26–30 September 2010; RecSys ’10. pp. 191–198. [Google Scholar] [CrossRef]
- Lucas, M.M.; Borisov, N. FlyByNight: Mitigating the privacy risks of social networking. In Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society, Alexandria, VA, USA, 27 October 2008; WPES ’08. pp. 1–8. [Google Scholar] [CrossRef]
- Akyon, F.C.; Esat Kalfaoglu, M. Instagram Fake and Automated Account Detection. In Proceedings of the 2019 Innovations in Intelligent Systems and Applications Conference (ASYU), Izmir, Turkey, 31 October–2 November 2019; pp. 1–7. [Google Scholar] [CrossRef]
- El Haddad, G.; Aïmeur, E.; Hage, H. Understanding Trust, Privacy and Financial Fears in Online Payment. In Proceedings of the 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing And Communications/12th IEEE International Conference on Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018; pp. 28–36. [Google Scholar] [CrossRef]
- Sahi, A.M.; Khalid, H.; Abbas, A.F.; Zedan, K.; Khatib, S.F.A.; Al Amosh, H. The Research Trend of Security and Privacy in Digital Payment. Informatics 2022, 9, 32. [Google Scholar] [CrossRef]
- Antoniou, G.; Batten, L.; Narayan, S.; Parampalli, U. A Privacy Preserving E-Payment Scheme. In Proceedings of the Intelligent Distributed Computing III; Papadopoulos, G.A., Badica, C., Eds.; Springer: Berlin/Heidelberg, Germany, 2009; pp. 197–202. [Google Scholar]
- Florencio, D.; Herley, C. A large-scale study of web password habits. In Proceedings of the 16th International Conference on World Wide Web, Banff, AB, Canada, 8–12 May 2007; WWW ’07. pp. 657–666. [Google Scholar] [CrossRef]
- Bhagavatula, S.; Bauer, L.; Kapadia, A. “Adulthood is trying each of the same six passwords that you use for everything”: The Scarcity and Ambiguity of Security Advice on Social Media. Proc. ACM Hum.-Comput. Interact. (PACM HCI) 2022, 6, 1–27. [Google Scholar] [CrossRef]
- Darrow, J.J.; Lichtenstein, S.D. Do You Really Need My Social Security Number—Data Collection Practices in the Digital Age. N. Carol. J. Law Technol. 2008, 1–59. Available online: https://scholarship.law.unc.edu/ncjolt/vol10/iss1/2 (accessed on 9 July 2024).
- Roy, P.K.; Chahar, S. Fake Profile Detection on Social Networking Websites: A Comprehensive Review. IEEE Trans. Artif. Intell. 2020, 1, 271–285. [Google Scholar] [CrossRef]
- Chen, Y.C.; Wu, S.F. FakeBuster: A Robust Fake Account Detection by Activity Analysis. In Proceedings of the 2018 9th International Symposium on Parallel Architectures, Algorithms and Programming (PAAP), Taipei, Taiwan, 26–28 December 2018; pp. 108–110. [Google Scholar] [CrossRef]
- Erşahin, B.; Aktaş, d.; Kılınç, D.; Akyol, C. Twitter fake account detection. In Proceedings of the 2017 International Conference on Computer Science and Engineering (UBMK), Antalya, Turkey, 5–8 October 2017; pp. 388–392. [Google Scholar] [CrossRef]
- Swe, M.M.; Nyein Myo, N. Fake Accounts Detection on Twitter Using Blacklist. In Proceedings of the 2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS), Singapore, 6–8 June 2018; pp. 562–566. [Google Scholar] [CrossRef]
- Chakraborty, M.; Das, S.; Mamidi, R. Detection of Fake Users in Twitter Using Network Representation and NLP. In Proceedings of the 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS), Bangalore, India, 4–8 January 2022; pp. 754–758. [Google Scholar] [CrossRef]
- Bharti, K.K.; Pandey, S. Fake account detection in twitter using logistic regression with particle swarm optimization. Soft Comput. 2021, 25, 11333–11345. [Google Scholar] [CrossRef]
- Nikhitha, K.V.; Bhavya, K.; Nandini, D.U. Fake Account Detection on Social Media using Random Forest Classifier. In Proceedings of the 2023 7th International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, 17–19 May 2023; pp. 806–811. [Google Scholar] [CrossRef]
- Das, S.; Saha, S.; Vijayalakshmi, S.; Jaiswal, J. An Effecient Approach to Detect Fraud Instagram Accounts Using Supervised ML Algorithms. In Proceedings of the 2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), Greater Noida, India, 16–17 December 2022; pp. 760–764. [Google Scholar] [CrossRef]
- Goyal, B.; Gill, N.S.; Gulia, P.; Prakash, O.; Priyadarshini, I.; Sharma, R.; Obaid, A.J.; Yadav, K. Detection of Fake Accounts on Social Media Using Multimodal Data With Deep Learning. IEEE Trans. Comput. Soc. Syst. 2023; early access. [Google Scholar] [CrossRef]
- Stolbova, A.; Ganeev, R.; Ivaschenko, A. Intelligent Identification of Fake Accounts on Social Media. In Proceedings of the 2021 30th Conference of Open Innovations Association FRUCT, Oulu, Finland, 27–29 October 2021; pp. 279–284. [Google Scholar] [CrossRef]
- Breuer, A.; Eilat, R.; Weinsberg, U. Friend or Faux: Graph-Based Early Detection of Fake Accounts on Social Networks. In Proceedings of the Web Conference 2020, Taipei, Taiwan, 20–24 April 2020; WWW ’20. pp. 1287–1297. [Google Scholar] [CrossRef]
- Brook, C. PII Data Classification: 4 Best Practices. 2023. Available online: https://www.digitalguardian.com/blog/pii-data-classification-4-best-practices (accessed on 29 May 2024).
- Michaels, A.J. A maximal entropy digital chaotic circuit. In Proceedings of the 2011 IEEE International Symposium of Circuits and Systems (ISCAS), Rio de Janeiro, Brazil, 15–18 May 2011; pp. 717–720. [Google Scholar] [CrossRef]
- Michaels, A.J. Improved RNS-Based PRNGs. In Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany, 27–30 August 2018. ARES 2018. [Google Scholar] [CrossRef]
- Vennos, A.; Michaels, A. Shannon Entropy Loss in Mixed-Radix Conversions. Entropy 2021, 23, 967. [Google Scholar] [CrossRef] [PubMed]
- US Census Bureau. Age and Sex Composition: 2010. Available online: https://www.census.gov/content/dam/Census/library/publications/2011/dec/c2010br-03.pdf (accessed on 29 May 2024).
- US Social Security Administration. Popular Baby Names by Decade. Available online: https://www.ssa.gov/oact/babynames/limits.html (accessed on 29 May 2024).
- US Census Bureau. Frequently Occurring Surnames. Available online: https://www.census.gov/topics/population/genealogy/data/2010_surnames.html (accessed on 29 May 2024).
- US Census Bureau. National Population. Available online: https://www.census.gov/data/tables/time-series/demo/popest/2020s-national-detail.html (accessed on 29 May 2024).
- US Census Bureau. State Population Totals. Available online: https://www.census.gov/data/tables/time-series/demo/popest/2020s-state-total.html (accessed on 29 May 2024).
- OpenAddresses. Open Street Addresses. Available online: https://batch.openaddresses.io/data (accessed on 29 May 2024).
- US Census Bureau. USPS. Available online: https://pypi.org/project/usps-api/ (accessed on 29 May 2024).
- UC Santa Barbara. 2020 Election. Available online: https://www.presidency.ucsb.edu/statistics/elections/2020 (accessed on 29 May 2024).
- Statista Research Department. Household Income 2021. Available online: https://www.statista.com/statistics/203183/percentage-distribution-of-household-income-in-the-us/ (accessed on 29 May 2024).
- US Census Bureau. Educational Attainment Data. Available online: https://www.census.gov/newsroom/press-releases/2022/educational-attainment.html (accessed on 29 May 2024).
- Statista. College Majors. Available online: https://cew.georgetown.edu/wp-content/uploads/Economic-Value-of-College-Majors-Full-Report-v2.compressed.pdf (accessed on 29 May 2024).
- Gallup. Sexualities by Generation. Available online: https://news.gallup.com/poll/389792/lgbt-identification-ticks-up.aspx (accessed on 29 May 2024).
- Centers for Disease Control. Body Measurements. Available online: https://www.cdc.gov/nchs/fastats/body-measurements.htm (accessed on 29 May 2024).
- US Bureau of Labor Statistics. Employment by Detailed Occupation. Available online: https://www.bls.gov/emp/tables/emp-by-detailed-occupation.htm (accessed on 29 May 2024).
- US Census Bureau. QuickFacts United States. Available online: https://www.census.gov/quickfacts/fact/table/US# (accessed on 29 May 2024).
- Pew Research Center. Afro-Latino. Available online: https://www.pewresearch.org/short-reads/2022/05/02/about-6-million-u-s-adults-identify-as-afro-latino/ (accessed on 29 May 2024).
- Pew Research Center. Key Facts about Asian Americans. Available online: https://www.pewresearch.org/short-reads/2021/04/29/key-facts-about-asian-americans/ (accessed on 29 May 2024).
- Smarty. USPS and International Address Verification. 2023. Available online: https://www.smarty.com/articles/usps-address-verification (accessed on 29 May 2024).
- Melissa Lookup. Address Search Tools. 2023. Available online: https://lookups.melissa.com/home/mapcart/zipcode/ (accessed on 29 May 2024).
- Apostol, T.M. Introduction to Analytic Number Theory; Undergraduate Texts in Mathematics; Springer: Berlin/Heidelberg, Germany, 2010; pp. 1–352. [Google Scholar]
- Abdulkader, H.; Samir, R.; Hussien, R. Improved RSA security using Chinese Remainder Theorem and Multiple Keys. Future Comput. Inform. J. 2019, 4, 1–60. [Google Scholar] [CrossRef]
- Michaels, A.J.; Palukuru, V.S.S.; Fletcher, M.J.; Henshaw, C.; Williams, S.; Krauss, T.; Lawlis, J.; Moore, J.J. CAN Bus Message Authentication via Co-Channel RF Watermark. IEEE Trans. Veh. Technol. 2022, 71, 3670–3686. [Google Scholar] [CrossRef]
- McGinthy, J.M.; Michaels, A.J. Semi-Coherent Transmission Security for Low Power IoT Devices. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018; pp. 170–177. [Google Scholar] [CrossRef]
- Social Security Administration. Top Names of the 2010s. Available online: https://www.ssa.gov/oact/babynames/decades/names2010s.html (accessed on 29 May 2024).
- US Census Bureau. County Population Totals and Components of Change: 2020–2023. 2023. Available online: https://www.census.gov/data/tables/time-series/demo/popest/2020s-counties-total.html (accessed on 29 May 2024).
- Fryar, C.D.; Carroll, M.D.; Gu, Q.; Afful, J.; Ogden, C. Anthropometric Reference Data for Children and Adults: United States, 2015–2018. Technical Report, National Center For Health Statistics, Hayattsville, Maryland, 2021. Available online: https://stacks.cdc.gov/view/cdc/100478. (accessed on 9 July 2024).
- Statista Research Department. Major Political Party Identification U.S. 2000–2023. Technical Report, Statista Research, 2024. Available online: https://www.statista.com/statistics/1078383/political-party-identification-in-the-us/ (accessed on 29 May 2024).
- Kamruzzaman, M. Impact of Social Media on Geopolitics and Economic Growth: Mitigating the Risks by Developing Artificial Intelligence and Cognitive Computing Toolss. Comput. Intell. Neurosci. 2022, 1, 1–12. [Google Scholar] [CrossRef]
- Yang, K.C.; Varol, O.; Davis, C.A.; Ferrara, E.; Flammini, A.; Menczer, F. Arming the public with artificial intelligence to counter social bots. Hum. Behav. Emerg. Technol. 2019, 1, 48–61. [Google Scholar] [CrossRef]
Website Category | Example Items | Notes | Acronym | |
---|---|---|---|---|
1 | Identification Required | Investment Brokerages, Banks, Gambling Websites, Insurance Brokers | Websites or organizations that require an individual to provide identification numbers such as social security or tax identification numbers and/or websites that require an individual to upload a driver’s license or passport documents. | ID |
2 | Social Media | Instagram, Facebook, Twitter, Snapchat, etc. | Social media websites that require an individual to create an account to engage in sharing and interaction of content on the platform. | SM |
3 | Streaming | Netflix, Hulu, HBO, YoutubeTV, Peacock, etc. | Websites and companies that require an individual to pay a fee regularly to engage with and watch content on the platform. | SW |
4 | Online Shopping | Amazon, eBay, Home Depot, Nordstrom, H&M, etc. | Websites that allow users to purchase goods and services but require an individual to provide a shipping destination and payment method. | OS |
5 | Paywall | New York Times, Wall Street Journal, The Washington Post, etc. | Websites that allow a user to view content after making an account and providing a payment method. | PW |
6 | Blogs and Chat Boards | Reddit, Discord, Quora | Websites that allow many individuals to engage with each other and browse/share content | BL |
7 | Email and Online Communication | Gmail, Outlook, etc. | Websites that allow a user to create and utilize an e-mail platform to communicate with individuals and groups. | E |
8 | Free Access | Wikipedia, Encyclopedia, News Websites, etc. | Websites that allow users to read and see content and information without the requirement of creating an account to do so. | FA |
Internet Applications | |||||||||
---|---|---|---|---|---|---|---|---|---|
Characteristic | FA | E | BL | PW | OS | SW | SM | ID | Relevant Citations |
Sensitive PII | |||||||||
Education | [61,62] | ||||||||
Email Address | [23,63,64,65] | ||||||||
Employer | [61,66,67] | ||||||||
Gender | [23,62,68,69,70] | ||||||||
Name | [61,67,71,72,73] | ||||||||
Characteristic | FA | E | BL | PW | OS | SW | SM | ID | Relevant Citations |
Confidential PII | |||||||||
Address | [64,65,74] | ||||||||
Age | [68,75] | ||||||||
Birthdate | [65,66,74,76] | ||||||||
Geographic Location | [68,72,77,78,79] | ||||||||
IP Address | [61,80,81] | ||||||||
Phone Number | [66,73,81,82,83] | ||||||||
Relationship Status | [23,62,66] | ||||||||
Religion | [23,69] | ||||||||
SMS Number | [84,85] | ||||||||
Username | [56,67,73,78,86] | ||||||||
High-Risk PII | |||||||||
Drivers License or Passport | [74] | ||||||||
Facial Recognition | [61,75] | ||||||||
Medical Records | [69] | ||||||||
One Time Payment Information | [87,88,89] | ||||||||
Password | [90,91] | ||||||||
Saved Payment Information | [87,88,89] | ||||||||
Social Security Number | [74,92] | ||||||||
Digital Behaviors and Identity | |||||||||
Activity Time | [80] | ||||||||
Accounts Followed | [71,78,79,80,86] | ||||||||
Comments | [76,80,93,94] | ||||||||
Followers | [71,77,80,93,95] | ||||||||
Friendships | [67,71,77,93,96] | ||||||||
Hashtags/Threads | [86,96,97] | ||||||||
Likes/Favorites | [56,70,94,95,98] | ||||||||
Posts | [70,72,79,93,94,96] | ||||||||
Profile Banner | [77,78,95] | ||||||||
Profile Description | [98,99,100,101] | ||||||||
Profile Image | [68,99,100,101,102] | ||||||||
Tags/Mentions | [79,86,96,97] | ||||||||
Digital Metadata | |||||||||
Account Age | [56,97] | ||||||||
Increase in Friendships/Connections | [63,95,103] | ||||||||
Time of Account Creation | [61,68,98,101,102] | ||||||||
Timing of Posts | [76,102] | ||||||||
URLs Present in Profile | [99,100] |
PRNG Output | ID Characteristic | Distribution Shaping | Rationale |
---|---|---|---|
0 | Sex and | Male: 50%, Female 50% | 2010 Census [108] |
Preferred Pronoun | Pronouns assigned to sex | ||
1–2 | First Name | Weighted 15 k (male) and 20 k (female) | Social Security |
most common names | Administration [109] | ||
3–4 | Last Name | Weighted 20 k most common surnames | 2010 Census [110] |
5–7 | Birthdate | Adult Ages (18–74), 5-Year Bracketed | Census [111] |
Frequencies by Sex | |||
8–9 | Email Password | Unique per ID | |
10 | Email Username | Unique per ID | |
11–17 | Address | Unweighted, Pseudo-random Street | 2020 Census [112] |
(split into 5 columns) | Assignment based on Geographical Frequency | Open Address [113] | |
by State, Invalided by the USPS API | USPS [114] | ||
18 | Security Response 1 | Uniformly Assigned List of Popular Movies | |
19 | Security Response 2 | Uniformly Assigned List of Cities | |
20 | Security Response 3 | Uniformly Assigned List of Colors | |
21 | Political Affiliation | Democratic 51%, Republican 47%, | 2020 election [115] |
Third-Party 2% | |||
22–24 | Income | $15 k–$25 k : 10%, $25 k–$35 k: 11%, | Statistica [116] |
$35 k–$50 k: 14%, $50 k–$75 k: 20%, | |||
$75 k–$100 k: 15%, $100 k–$150 k: 20%, | |||
$150 k–$200 k: 10% | |||
25 | Education Level | Weighted Educational Attainment Brackets | Census Bureau [117] |
26 | Education Major | Weighted Educational Major Brackets | Statistica [118] |
27 | Sexuality | Sexual Orientation and | Gallup [119] |
Identity by Generation | |||
28 | Salutation | Associated by Sex | |
29–33 | Reserved | ||
34–35 | Height | Gaussian with U.S. mean ± | CDC 2015-2018 [120] |
36–37 | Weight | Gaussian with U.S. mean ± | CDC 2015-2018 [120] |
38 | Job Title | Weighted National Employment Matrix | U.S. Bureau of |
Labor Statistics 2021 [121] | |||
39 | Race | White 75.80%, Black 13.60%, Asian 6.10%, | U.S. Census Bureau |
Other 4.50% | Population Estimates [122] | ||
40 | Nationality White | Hispanic 18.90%, Non-Hispanic 81.10% | U.S. Census Bureau |
Population Estimates [122] | |||
40 | Nationality Black | Hispanic 2%, Non-Hispanic 98% | Pew Research [123] |
40 | Nationality Asian | Hispanic 0.002%, Non-Hispanic 99.998% | Pew Research [124] |
41 | Website | Assigned based on Research Question | |
42–255 | Reserved |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kolenbrander, J.; Husmann, E.; Henshaw, C.; Rheault, E.; Boswell, M.; Michaels, A.J. Use & Abuse of Personal Information, Part II: Robust Generation of Fake IDs for Privacy Experimentation. J. Cybersecur. Priv. 2024, 4, 546-571. https://doi.org/10.3390/jcp4030026
Kolenbrander J, Husmann E, Henshaw C, Rheault E, Boswell M, Michaels AJ. Use & Abuse of Personal Information, Part II: Robust Generation of Fake IDs for Privacy Experimentation. Journal of Cybersecurity and Privacy. 2024; 4(3):546-571. https://doi.org/10.3390/jcp4030026
Chicago/Turabian StyleKolenbrander, Jack, Ethan Husmann, Christopher Henshaw, Elliott Rheault, Madison Boswell, and Alan J. Michaels. 2024. "Use & Abuse of Personal Information, Part II: Robust Generation of Fake IDs for Privacy Experimentation" Journal of Cybersecurity and Privacy 4, no. 3: 546-571. https://doi.org/10.3390/jcp4030026
APA StyleKolenbrander, J., Husmann, E., Henshaw, C., Rheault, E., Boswell, M., & Michaels, A. J. (2024). Use & Abuse of Personal Information, Part II: Robust Generation of Fake IDs for Privacy Experimentation. Journal of Cybersecurity and Privacy, 4(3), 546-571. https://doi.org/10.3390/jcp4030026