Skip to main content

The Need for Biometric Anti-spoofing Policies: The Case of Etsy

  • Conference paper
  • First Online:
Digital Forensics and Cyber Crime (ICDF2C 2022)

Abstract

Effective, safe, and fast identity recognition is crucial in today’s rapidly growing society. As a convenient and reliable alternative to traditional identification methods, biometric technologies are increasingly adopted for security applications, such as the verification of ID cards or passports and the authentication of computer and mobile devices. However, if spoofed, such technologies can create serious privacy and security risks, and the proliferation of high quality multimedia content on social media platforms facilitates such spoofing attacks. Unfortunately, many users are unaware of the risks of posting their biometric information online and social media companies are not taking appropriate action to protect them. In this paper, we make the case for biometric anti-spoofing policies by examining the social media enabled marketplace of Etsy. We demonstrate that biometric information can be collected from social media users and that the level of privacy concerns is not a predictor of a user’s biometric information sharing behavior.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)

    Article  Google Scholar 

  2. Wen, D., Han, H., Jain, A.K.: Face spoof detection with image distortion analysis. IEEE Trans. Inf. Forensics Secur. 10(4), 746–761 (2015)

    Article  Google Scholar 

  3. Mott, N.: Hacking fingerprints is actually pretty easy-and cheap, November 2021

    Google Scholar 

  4. Alnabhi, H., Al-naamani, Y., Al-madhehagi, M., Alhamzi, M.: Enhanced security methods of door locking based fingerprint. Int. J. Innov. Technol. Explor. Eng. 9(03), 1173–1178 (2020)

    Article  Google Scholar 

  5. Girelli, C.M.A., et al.: Application of a standard procedure to avoid errors when comparing fingerprints with their reversals in fake documents. J. Forensic Sci. Med. 2(1), 60 (2016)

    Article  Google Scholar 

  6. Boididou, C., et al.: Verifying information with multimedia content on twitter. Multimed. Tools Appl. 77(12), 15545–15571 (2018)

    Article  Google Scholar 

  7. Dean, B.: Social network usage & growth statistics: how many people use social media in 2021, vol. 2, p. 2021 (2021). Accessed July 2021

    Google Scholar 

  8. Gouert, C., Tsoutsos, N.G.: Dirty metadata: understanding a threat to online privacy. IEEE Secur. Priv. 01, 2–9 (2022)

    Google Scholar 

  9. Krämer, N.C., Schäwel, J.: Mastering the challenge of balancing self-disclosure and privacy in social media. Curr. Opin. Psychol. 31, 67–71 (2020)

    Article  Google Scholar 

  10. Kim, J., Tussyadiah, I.P.: Social networking and social support in tourism experience: the moderating role of online self-presentation strategies. J. Travel Tour. Mark. 30(1–2), 78–92 (2013)

    Article  Google Scholar 

  11. Sheth, S., Kim, J.: Social media marketing: the effect of information sharing, entertainment, emotional connection and peer pressure on the attitude and purchase intentions. GSTF J. Bus. Rev. (GBR) 5(1) (2017)

    Google Scholar 

  12. Berger, C.R., Calabrese, R.J.: Some explorations in initial interaction and beyond: toward a developmental theory of interpersonal communication. Hum. Commun. Res. 1(2), 99–112 (1974)

    Article  Google Scholar 

  13. Ellison, N.B., Steinfield, C., Lampe, C.: The benefits of Facebook “friends:” social capital and college students’ use of online social network sites. J. Comput.-Mediat. Commun. 12(4), 1143–1168 (2007)

    Article  Google Scholar 

  14. Ellison, N.B., Steinfield, C., Lampe, C.: Connection strategies: social capital implications of Facebook-enabled communication practices. New Media Soc. 13(6), 873–892 (2011)

    Article  Google Scholar 

  15. Kokolakis, S.: Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122–134 (2017)

    Article  Google Scholar 

  16. Hallam, C., Zanella, G.: Online self-disclosure: the privacy paradox explained as a temporally discounted balance between concerns and rewards. Comput. Hum. Behav. 68, 217–227 (2017)

    Article  Google Scholar 

  17. Westin, A.F.: Privacy and freedom. Wash. Lee Law Rev. 25(1), 166 (1968)

    Google Scholar 

  18. Mekovec, R., Hutinski, Ž.: The role of perceived privacy and perceived security in online market. In: 2012 Proceedings of the 35th International Convention MIPRO, pp. 1549–1554. IEEE (2012)

    Google Scholar 

  19. Flavián, C., Guinalíu, M.: Consumer trust, perceived security and privacy policy: three basic elements of loyalty to a web site. Ind. Manag. Data Syst. (2006)

    Google Scholar 

  20. De Veirman, M., Cauberghe, V., Hudders, L.: Marketing through instagram influencers: the impact of number of followers and product divergence on brand attitude. Int. J. Advert. 36(5), 798–828 (2017)

    Article  Google Scholar 

  21. Jozani, M., Ayaburi, E., Ko, M., Choo, K.-K.R.: Privacy concerns and benefits of engagement with social media-enabled apps: a privacy calculus perspective. Comput. Hum. Behav. 107, 106260 (2020)

    Article  Google Scholar 

  22. Madden, M.: Public perceptions of privacy and security in the post-snowden era, (2014)

    Google Scholar 

  23. Schuckers, S.A.: Spoofing and anti-spoofing measures. Inf. Secur. Tech. Rep. 7(4), 56–62 (2002)

    Article  Google Scholar 

  24. Cavusoglu, H., Phan, T.Q., Cavusoglu, H., Airoldi, E.M.: Assessing the impact of granular privacy controls on content sharing and disclosure on Facebook. Inf. Syst. Res. 27(4), 848–879 (2016)

    Article  Google Scholar 

  25. Devlin, J., Chang, M.-W., Lee, K., Toutanova, K.,: Bert: pre-training of deep bidirectional transformers for language understanding, arXiv preprint arXiv:1810.04805 (2018)

  26. Bradski, G., Kaehler, A.: Opencv. Dr. Dobb’s J. Softw. Tools 3, 2 (2000)

    Google Scholar 

  27. Liu, K., Terzi, E.: A framework for computing the privacy scores of users in online social networks. ACM Trans. Knowl. Discov. Data (TKDD) 5(1), 1–30 (2010)

    Article  Google Scholar 

  28. Alam, M.M., Islam, M.T., Rahman, S.M.: Unified learning approach for egocentric hand gesture recognition and fingertip detection. Pattern Recogn. 121, 108200 (2022)

    Article  Google Scholar 

  29. Lugaresi, C., et al. : Mediapipe: a framework for perceiving and processing reality. In: Third Workshop on Computer Vision for AR/VR at IEEE Computer Vision and Pattern Recognition (CVPR) 2019 (2019)

    Google Scholar 

  30. Patsakis, C., Zigomitros, A., Papageorgiou, A., Galván-López, E.: Distributing privacy policies over multimedia content across multiple online social networks. Comput. Netw. 75, 531–543 (2014)

    Article  Google Scholar 

  31. Ploeg, I.V.D., Lyon, D.: Biometrics and the body as information: normative issues of the socio-technical coding of the body. Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination. Londres e Nova Iorque, Routledge, pp. 57–73 (2002)

    Google Scholar 

  32. Agamben, G., Murray, S.J.: No to biopolitical tattooing. Commun. Crit. Cult. Stud. 5(2), 201–202 (2008)

    Article  Google Scholar 

  33. Rebera, A.P., Mordini, E.: Biometrics and ageing: social and ethical considerations. Age Factors Biom. Process. 37–58 (2013)

    Google Scholar 

  34. Goddard, M.: The EU general data protection regulation (GDPR): European regulation that has a global impact. Int. J. Mark. Res. 59(6), 703–705 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gokila Dorai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jozani, M., Zanella, G., Khanov, M., Dorai, G., Akbas, E. (2023). The Need for Biometric Anti-spoofing Policies: The Case of Etsy. In: Goel, S., Gladyshev, P., Nikolay, A., Markowsky, G., Johnson, D. (eds) Digital Forensics and Cyber Crime. ICDF2C 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 508. Springer, Cham. https://doi.org/10.1007/978-3-031-36574-4_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-36574-4_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-36573-7

  • Online ISBN: 978-3-031-36574-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics