2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications 2012
DOI: 10.1109/trustcom.2012.22
|View full text |Cite
|
Sign up to set email alerts
|

A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks

Abstract: Abstract-Privacy and security within Online Social Networks (OSNs) has become a major concern over recent years. As individuals continue to actively use and engage with these mediums, one of the key questions that arises pertains to what unknown risks users face as a result of unchecked publishing and sharing of content and information in this space. There are numerous tools and methods under development that claim to facilitate the extraction of specific classes of personal data from online sources, either di… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
25
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
2
2

Relationship

5
4

Authors

Journals

citations
Cited by 24 publications
(26 citation statements)
references
References 19 publications
(34 reference statements)
1
25
0
Order By: Relevance
“…Assuming the individual were then to post the photograph online, they would be sharing potentially sensitive identity data and would be oblivious to it; we do note, however, that some sites (e.g., Facebook) strip metatadata to reduce file size. This highlights some of the many privacy risks associated with the use of these devices and the unchecked publishing of information; further details are available in several articles (e.g., [17,18]). …”
Section: Related Workmentioning
confidence: 97%
“…Assuming the individual were then to post the photograph online, they would be sharing potentially sensitive identity data and would be oblivious to it; we do note, however, that some sites (e.g., Facebook) strip metatadata to reduce file size. This highlights some of the many privacy risks associated with the use of these devices and the unchecked publishing of information; further details are available in several articles (e.g., [17,18]). …”
Section: Related Workmentioning
confidence: 97%
“…Previous research has considered this issue of oversharing and modeled how social media data could be used to place individuals at great risk, both online and offline [15,50]. There are also greater impacts on security and privacy as this data is combined with that from IoT devices such as fitness trackers and smart watches [1].…”
Section: Identity-related Cybercrimementioning
confidence: 99%
“…Society uses cyber-space for everything from very personal activities (such as engaging with friends, documenting our lives, expressing our creativity), to learning and developing opinions, to very practical concepts such as travel planning, commerce, and banking [19]. All online activities leave a trail of identity pieces scattered throughout cyber-space, whether through conscious disclosures (e.g., on social networks), subconscious disclosures (such as exploited in textual-content analysis), or through technology-level leakages (e.g., through cookies) [20]. Meta-data associated with online activities also exists, such as IP addresses, account names, etc., which can all be related to an individual's identity.…”
Section: Superidentity Model and Visualizationmentioning
confidence: 99%