Personally identifiable information leakage through online social networks

Candice Louw, Sebastiaan Von Solms

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Citations (Scopus)

Abstract

Information sharing on the Internet has become a streamlined process through services such as e-mail, blogs and recently also Online Social Networks (OSNs). The speed of posting information in one central place and the convenience of this information reaching a vast audience at the same time is a great advantage of this style of communication, but at the same time also a danger. The aim of this article is thus to introduce a prototype software model that can analyse not only the Personally Identifiable Information (PII) that users share on OSNs, but with whom they share this. Such analysis will give users a good indication of how their private information is shared based on different settings within their OSN profiles. To successfully develop such a model, familiarity with the concepts of information sharing and PII is firstly investigated. Identifying information leakage within one of the most popular OSNs follows. In combination with our programming knowledge, a prototype model is introduced and an overview of preliminary results is given. Due to the generic nature of the model, we are able to visually introduce and explain the process of information deduction - an aspect of information sharing often overlooked due to its invisible nature. After analysing the information gathered from our model, we conclude that the immense popularity of Facebook on both a global and local scale contribute to its success, but at the same time make its users more prone to leak information and subsequently be the potential targets of cyber criminals. The ease, anonymity and borderless nature of the Internet in combination with the poor default security settings of our investigated OSN all contribute to the lucrative industry of cyber crime. Proper user awareness is crucial to preventing the leaking of any information in an online environment, but for many users this still equates to (a) PII in the sky.

Original languageEnglish
Title of host publicationSouth African Institute for Computer Scientists and Information Technologists
Subtitle of host publicationA Connected Society, SAICSIT 2013 - Proceedings
Pages68-71
Number of pages4
DOIs
Publication statusPublished - 2013
EventSouth African Institute for Computer Scientists and Information Technologists: A Connected Society, SAICSIT 2013 - East London, South Africa
Duration: 7 Oct 20139 Oct 2013

Publication series

NameACM International Conference Proceeding Series

Conference

ConferenceSouth African Institute for Computer Scientists and Information Technologists: A Connected Society, SAICSIT 2013
Country/TerritorySouth Africa
CityEast London
Period7/10/139/10/13

Keywords

  • Cyber security
  • Information access rights
  • Online social networks
  • Personally identifiable information
  • Social engineering

ASJC Scopus subject areas

  • Software
  • Human-Computer Interaction
  • Computer Vision and Pattern Recognition
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Personally identifiable information leakage through online social networks'. Together they form a unique fingerprint.

Cite this