Download Introduction Motivation Data Extraction Methods Facebook Then

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
SIS SNDA – BITS Pilani, Hyderabad – 15th & 16th November, 2013
Website: http://sis.netclique.in
Privacy Issues in Social Networking Websites:
Is Facebook Revealing Our Social Life?
Somdip Dey
School of Computer Science,
The University of Manchester.
United Kingdom.
Sayak Sen
Department of Computer Science,
Sikkim Manipal University.
India.
Introduction
Data Extraction Methods
In our technologically saturated and digitally
enhanced environment, almost everything
can be sourced from the internet, and OSN
users spend most part of their life in social
networking websites like facebook, google +,
etc.
But at the same time these social networking
websites leak different data related to OSN
users and hence, jeopardising the privacy of
the users.
• 
• 
• 
• 
• 
Public Listings
False Profiles
Profile Compromise and Phishing
Malicious Applications
Facebook Query Language (FQL)
Facebook Then (2009)
Motivation
Facebook is now inevidently the mostly used
online social networking website with more
than 1.11 billion active users. So privacy of
the users are of upmost importance.
Source: Bonneau, J., Anderson, J., Anderson, R., and Stajano, F., Eight Friends Are Enough: Social Graph Approximation via Public Listings.
In Proceedings of the Second ACM EuroSys Workshop on Social Network Systems (2009), pp. 13-18.
Facebook Now (2013)
Type Of Extractable Data on Facebook
• 
Profile Data
• 
The Social Graph
• 
Traffic Data
Conclusion:
ê
Even after restricted public listing, there
are still many ways to leak OSN user’s
social data to third parties.
References:
Any Kind of
Data Exploitation
è Ex: Targeted Phishing,
Product Design, etc.
[1] Bonneau, J., Anderson, J., Anderson, R., and Stajano, F., Eight
Friends Are Enough: Social Graph Approximation via Public Listings. In
Proceedings of the Second ACM EuroSys Workshop on Social Network
Systems (2009), pp. 13-18.
[2] Bonneau, J., Anderson, J., and Denezis, G., Prying Data Out of a
Social Network. In Proceedings of the 2009 International Conference on
Advances in Social Network Analysis and Mining, 2009, pp. 249-254.
[3] Wasserman, S., and Faust, K., Social Network Analysis. Cam- bridge
University Press, 1994.
[4] “Facebook Privacy Policy,” www.facebook.com/policy.php, 2012.
[Online][Viewed on 23rd October, 2013].
[5] Xu, W., Zhou, X., and Li, L., Inferring Privacy Information via Social
Relations. In Proceedings of IEEE 24th International Conference on Data
Engineering Workshop, ICDEW 2008, pp. 525-530.
[6] Javed, Y., Shehab, M., How Do Facebookers Use Friendlists. In
Proceedings of the 2012 International Conference on Advances in Social
Network Analysis and Mining (ASONAM), 2012, pp. 343- 347.
[7] Squicciarini, A., Karumanchi, S., Lin, D., DeSisto, N., Identifying
hidden social circles for advanced privacy configuration. Computers &
Security, 2013 – Elsevier. Available online 13 August 2013.