2008
DOI: 10.1007/978-3-540-89598-5_11
|View full text |Cite
|
Sign up to set email alerts
|

Involuntary Information Leakage in Social Network Services

Abstract: Abstract. Disclosing personal information in online social network services is a double-edged sword. Information exposure is usually a plus, even a must, if people want to participate in social communities; however, leakage of personal information, especially one's identity, may invite malicious attacks from the real world and cyberspace, such as stalking, reputation slander, personalized spamming and phishing. Even if people do not reveal their personal information online, others may do so. In this paper, we … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
32
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 44 publications
(34 citation statements)
references
References 11 publications
0
32
0
Order By: Relevance
“…The possibility for involuntary personal information leakage in current social networks is highlighted in [12], e.g. by means of certain OSN features like annotating or tagging user photos, and its effects are demonstrated in [4].…”
Section: Related Workmentioning
confidence: 99%
“…The possibility for involuntary personal information leakage in current social networks is highlighted in [12], e.g. by means of certain OSN features like annotating or tagging user photos, and its effects are demonstrated in [4].…”
Section: Related Workmentioning
confidence: 99%
“…It is hoped that this knowledge (to which a user-friendly interface can easily be developed) would be a key piece in the puzzle of making these risks more tangible to Internet users as they assess their profiles from the attack-centric view typically adopted by online criminals. In many ways, we regard our datareachability model as the natural progression from related work in the security and privacy of OSNs [3,[7][8][9][10][11], because it explicitly traces what data can reasonably be derived from what is currently shared. These derivations are based on an amalgamation and synthesis of current research and general knowledge of the field.…”
Section: Introductionmentioning
confidence: 99%
“…In [17] authors show that configuring privacy settings in the online social networks is a daunting task. The possibility for involuntary personal information leakage in current social networks is highlighted in [18], e.g., by means of certain OSN features like annotating or tagging user photos, and its effects are demonstrated in [3].…”
Section: Related Workmentioning
confidence: 99%