Skip to main content

Tagged Data Breaches in Online Social Networks

  • Conference paper
  • First Online:
Book cover E-Democracy – Citizen Rights in the World of the New Computing Paradigms (e-Democracy 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 570))

Included in the following conference series:

Abstract

Tagged information in Online Social Networks (OSNs) is considered to be the basis of the semantic network that connects online resources based on their characteristics, and not only their URLs. The semantic interoperability creates difficulties in enforcing privacy control mechanisms that will solve authorization conflicts when accessing the tagged sharing content. In this paper we investigate whether the visibility levels in tagged content are applied according to the OSN users’ intentions. Based on the visibility choices that are offered by the privacy setting menus in OSNs, we performed all the possible visibility combinations in a two-level social relationship scale for different user profiles and we examined whether these settings provide the requested privacy-aware access control mechanisms in social networks or whether there exist security gaps that let users’ Personal Identifiable Information (PII) exposed to unintended audiences. The results indicate that the protection of OSN users’ tagged PII lacks privacy controls that can fully protect the tagged sharing content and that the current mechanisms support access control for selected pieces of resources with selected groups of users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rangiha, M.E., Karakostas, B.: Social business process management and social tagging. In: Proceedings of Org2 Workshop - Towards Organization 2.0: Advancements in Enterprise Social Networks (In conjunction with the 15th International Conference on Web Information Systems Engineering – WISE 2014), Thessaloniki, Greece (2014)

    Google Scholar 

  2. Hu, H., Ahn, G.-J., Jorgensen, J.: Multiparty access control for online social networks: model and mechanisms. Int J. IEEE Trans. Knowl. Data Eng. Arch. 25(7), 1614–1627 (2013)

    Article  Google Scholar 

  3. Iofciu, T., Fankhauser, P., Abel, F., Bischoff, K.: Identifying users across social tagging systems. In: Proceedings of 5th International AAAI Conference on Weblogs and Social Media - ICWSM, Barcelona, Spain (2011)

    Google Scholar 

  4. Gross, R., Acquisti, A., Stutzman, F.: Faces of facebook: privacy in the age of augmented reality. In: BlackHat, USA (2011)

    Google Scholar 

  5. Krishnamurthy, B.: I know what you will do next summer. ACM SIGCOMM Comput. Commun. Rev. 40(5), 65–70 (2010)

    Article  Google Scholar 

  6. Madejski, M., Johnson, M., Bellovin, S.: The failure of online social network privacy settings. Technical report CUCS-010-11, Columbia University, NY, USA (2011)

    Google Scholar 

  7. Squicciarini, A., Shehab, M., Paci, F.: Collective privacy management in social networks. In: Proceedings of the 18th International Conference on World Wide Web, pp. 521–530. ACM (2009)

    Google Scholar 

  8. Hogg, M.: Social categorization, depersonalization, and group behavior. In: Hogg, M., Tinsdale, T.S. (eds.) Blackwell Handbook of Social Psychology: Group Processes, pp. 57–85. Blackwell, Malden (2001)

    Chapter  Google Scholar 

  9. Lampe, C., Ellison, N., Steinfeld, C.: A familiar Face(book): profile elements as signals in an online social network. In: Proceedings of CHI 2007, pp. 435–444. ACM Press (2007)

    Google Scholar 

  10. Chow, C.-Y., Bao, J., Mokbel, M.F.: Towards location-based social networking services. In: Proceedings of the 2nd ACM SIGSPATIAL International Workshop on Location Based Social Networks (LBSN 2010), pp. 31–38. ACM, New York, USA (2010)

    Google Scholar 

  11. Facebook. www.facebook.com

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alexandra K. Michota .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Michota, A.K., Katsikas, S.K. (2015). Tagged Data Breaches in Online Social Networks. In: Katsikas, S., Sideridis, A. (eds) E-Democracy – Citizen Rights in the World of the New Computing Paradigms. e-Democracy 2015. Communications in Computer and Information Science, vol 570. Springer, Cham. https://doi.org/10.1007/978-3-319-27164-4_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27164-4_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27163-7

  • Online ISBN: 978-3-319-27164-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics