Abstract
Social media and Web 2.0 have enabled internet users to contribute online content, which may be crawled and utilized for a variety of reasons, from personalized advertising to behaviour prediction/profiling. In this paper, our goal is to present a horror and a success story from the digital world of Social Media, in order to: (a). present a political affiliation profiling method, the Panopticon method, in order to reveal this threat and contribute in raising the social awareness over it. (b). describe an insider threat prediction method by evaluating the predisposition towards law enforcement and authorities, a personal psychosocial trait closely connected to the manifestation of malevolent insiders. The experimental test case of both methodologies is an extensive Greek community of YouTube users. In order to demonstrate our cases, we performed graph theoretic and content analysis of the collected dataset and showed how and what kind of personal data can be derived via data mining on publicly available YouTube data. As both methodologies set user’s privacy and dignity at stake, we provide the reader with an analysis of the legal means for each case, so as to effectively be prevented from a privacy violation threat and also present the exceptional cases, such as the selection of security officers of critical infrastructures, where such methodologies could be used.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Tokunaga, R.: Social networking site or social surveillance site? Understanding the use of interpersonal electronic surveillance in romantic relationships. Comput. Human Behav. 27, 705–713 (2011)
Brignall, T.: The new Panopticon: The internet viewed as a structure of social control. Theory Sci. 3(1), 335–348 (2002)
Foucault, M., Surveiller et punir: Naissance de la prison, Paris: Gallimard. A. Sheridan (Trans.), Discipline and punish: The birth of the prison: Penguin (1975)
Allmer, T.: Towards a Critical Theory of Surveillance in Informational Capitalism. P. Lang, Frankfurt am Main (2012)
Jurgenson, N.: Review of Ondi Timoner’s we live in public. Surveill. Soc. 8(3), 374–378 (2010)
Beyer, A., Kirchner, M., Kreuzberger, G., Schmeling, J.: Privacy im Social Web Zum kompetenten Umgang mit persοnlichen Daten im Web 2. Datenschutz und Datensicherung (DuD) 9(2008), 597–600 (2008)
Whitaker, R., 1999. The End of Privacy: How Total Surveillance Is Becoming a Reality
Fuchs, C.: New Media, Web 2.0 and Surveillance. In: Sociology Compass 5/2, pp. 134–147 (2011)
Gibson, S.: Open source intelligence. RUSI J. 149(1), 16–22 (2004)
Gritzalis, D.: A digital seal solution for deploying trust on commercial transactions. Inf. Manag. Comput. Secur. 9(2), 71–79 (2001)
Lambrinoudakis, C., Gritzalis, D., Tsoumas, V., Karyda, M., Ikonomopoulos, S.: Secure electronic voting: the current landscape. In: Gritzalis, D. (ed.) Secure Electronic Voting, pp. 101–122. Springer, New York (2003)
Marias, J., Dritsas, S., Theoharidou, M., Mallios, J. Gritzalis, D.: SIP vulnerabilities and anti-spit mechanisms assessment. In: Proceedings of the 16th IEEE International Conference on Computer Communications and Networks, pp. 597–604. IEEE (2007)
Mitrou, L., Gritzalis, D., Katsikas, S., Quirchmayr, G.: Electronic voting: Constitutional and legal requirements, and their technical implications. Secure Electron. Voting 7, 43–60 (2003)
Spinellis, D., Gritzalis, S., Iliadis, J., Gritzalis, D., Katsikas, S.: Trusted third party services for deploying secure telemedical applications over the web. Comput. Secur. 18(7), 627–639 (1999)
Shaw, E., Ruby, K., Post, J.: The insider threat to information systems: the psychology of the dangerous insider. Secur. Aware. Bull. 2(98), 1–10 (1998)
Pang, B., Lee, L.: Opinion mining and sentiment analysis. Found. Trends Inf. Retrieval 2(12), 11–35 (2008)
De Choudhury, M., Counts, S.: The nature of emotional expression in social media: measurement, inference and utility. In: Human Computer Interaction Consortium Workshop (2012)
Benevenuto, F., Rodrigues, T., Cha, M., Almeida, V.: Characterizing user behavior in online social networks. In: Proceedings of the 9th ACM Conference on Internet Measurement, pp. 49–62. ACM Press (2009)
Park, N., Kee, K., Valenzuela, S.: Being immersed in social networking environment: Facebook groups, uses and gratifications, and social outcomes. Cyber Psychol. Behav. 12(6), 729–733 (2009)
Balduzzi, M., Platzer, C., Holz, T., Kirda, E., Balzarotti, D., Kruegel, C.: Abusing social networks for automated user profiling. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 422–441. Springer, Heidelberg (2010)
Kandias, M., Virvilis, N., Gritzalis, D.: The insider threat in cloud computing. In: Bologna, S., Hämmerli, B., Gritzalis, D., Wolthusen, S. (eds.) CRITIS 2011. LNCS, vol. 6983, pp. 93–103. Springer, Heidelberg (2013)
Kandias, M., Mylonas, A., Theoharidou, M., Gritzalis, D.: Exploitation of auctions for outsourcing security-critical projects. In: Proceedings of the 16th IEEE Symposium on Computers and Communications, pp. 646–651. IEEE (2011)
Magklaras, G., Furnell, S.: Insider threat prediction tool: evaluating the probability of IT misuse. Comput. Secur. 21(1), 62–73 (2011)
Kandias, M., Mylonas, A., Virvilis, N., Theoharidou, M., Gritzalis, D.: An insider threat prediction model. In: Katsikas, S., Lopez, J., Soriano, M. (eds.) TrustBus 2010. LNCS, vol. 6264, pp. 26–37. Springer, Heidelberg (2010)
FBI, The Insider Threat: An introduction to detecting and deterring an insider spy (2012). http://www.fbi.gov/about-us/investigate/counterintelligence/the-insider-threat
Kandias, M., Galbogini, K., Mitrou, L., Gritzalis, D.: Insiders trapped in the mirror reveal themselves in social media. In: Lopez, J., Huang, X., Sandhu, R. (eds.) NSS 2013. LNCS, vol. 7873, pp. 220–235. Springer, Heidelberg (2013)
Kandias, M., Mitrou, L., Stavrou, V., Gritzalis, D.: Which side are you on? A new panopticon vs. privacy. In: Proceedings of the 10th International Conference on Security and Cryptography, SciTekPress, pp. 98–110 (2013)
Sebastiani, F.: Machine learning in automated text categorization. ACM Comput. Surv. 34(1), 1–47 (2002)
McCallum, A., Nigam, K.: A comparison of event models for naive Bayes text classification. In: Work-shop on learning for text categorization, vol. 752, pp. 41–48 (1998)
Joachims, T.: Text categorization with support vector machines: Learning with many relevant features. In: Nédellec, C., Rouveirol, C. (eds.) ECML 1998. LNCS, vol. 1398. Springer, Heidelberg (1998)
Anderson, J.: Logistic regression. In: Handbook of Statistics. NorthHolland, Amsterdam, pp. 169–191 (1982)
Manning, C., Raghavan, P., Schütze, H.: Introduction to Information Retrieval. Cambridge University Press, New York (2008)
Kandias, M., Stavrou, V., Bosovic, N., Gritzalis, D.: Predicting the insider threat via social media: The YouTube case. In: Proceedings of the 12th ACM Workshop on Privacy in the Electronic Society, pp. 261–266. ACM Press (2013)
Kandias, M., Stavrou, V., Bozovic, N., Mitrou, L., Gritzalis, D.: Can we trust this user? Predicting insider’s attitude via YouTube usage profiling. In: Proceedings of the 10th IEEE International Conference on Autonomic and Trusted Computing, pp. 347–354 (2013)
Castelluccia, C., Druschel, P., Hübner, S., Pasic, A., Preneel, B., Tschofenig, H.: Privacy, accountability and Trust-Challenges and opportunities, Technical report, ENISA (2011)
Hildebrandt, M.: Who is profiling who? Invisible visibility. In: Gutwirth, S., Poullet, Y., De Hert, P., de Terwangne, C., Nouwt, S. (eds.) Reinventing Data Protection, pp. 239–252. Springer, Netherlands (2009)
Solove, D.: A taxonomy of privacy. Univ. Pa. Law Rev. 154(3), 477 (2006)
Henderson, S.: Expectations of Privacy in Social Media. Mississippi College L. Rev., 31 (2012). http://works.bepress.com/stephen_henderson/10
Bruns, A.: Towards produsage: Futures for user-led content production. In: Proceedings of Cultural Attitudes towards Communication and Technology Conference, pp. 275–284 (2006)
Ziegele, M., Quiring, O.: Privacy in social network sites. In: Trepte, S., Reinecke, L. (eds.) Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web, pp. 175–189. Springer, Berlin (2011)
Mitrou, L.: The commodification of the individual in the internet era: informational self-determination or “self-alienation”. In: Proceedings of the 8th International Conference of Computer Ethics Philosophical Enquiry, pp. 466–485 (2009)
Schermer, B.: The limits of privacy in automated profiling and data mining. Comput. Law Secur. Rev. 27, 45–52 (2011)
Mitrou, L.: The impact of communications data retention on fundamental rights and democracy: The case of the EU Data Retention Directive. In: Haggerty/Samatas, pp. 127–147 (2010)
Cohen, J.: Examined lives: informational privacy and the subject as object. Stanf. Law Rev. 52, 1373–1438 (2000)
Cas, I.: Ubiquitous computing, privacy and data protection: options and limitations to reconcile the unprecedented contradictions. In: Gutwirth, S., Poullet, Y., De Hert, P., Leenes, R. (eds.) Computers, Privacy and Data Protection: An Element of Choice, pp. 139–170. Springer, Netherlands (2011)
Fazekas, C.: 1984 is still fiction: electronic monitoring in the workplace and US privacy law. Duke L. Technol. Rev. 15–25 (2004)
Gutwirth, S., De Hert, P.: Regulating profiling in a democratic constitutional State. In: Hildebrandt, M., Gutwirth, S. (eds.) Profiling the European citizen: Cross-Disciplinary Perspectives, pp. 271–302. Springer, Netherlands (2008)
Αbril-Sánchez, P., Levin, A., Del Riego, A.: Blurred boundaries: social media privacy and the 21st century employee. Am. Bus. Law J. 49(1), 63–124 (2012)
Dumortier, F.: Facebook and Risks of “de-contextualization” of information. In: Gutwirth, S., Poullet, Y., De Hert, P. (eds.) Data Protection in a Profiled World, pp. 119–137. Springer, Netherlands (2010)
Mylonas, A., Tsoumas, B., Dritsas, S., Gritzalis, D.: A secure smartphone applications roll-out scheme. In: Furnell, S., Lambrinoudakis, C., Pernul, G. (eds.) TrustBus 2011. LNCS, vol. 6863, pp. 49–61. Springer, Heidelberg (2011)
Mylonas, Α., Kastania, A., Gritzalis, D.: Delegate the smartphone user? Security awareness in smartphone platforms. Comput. Secur. 34, 47–66 (2013)
Theoharidou, M., Tsalis, N., Gritzalis, D.: In cloud we trust: risk-assessment-as-a-service. In: Fernández-Gago, C., Martinelli, F., Pearson, S., Agudo, I. (eds.) Trust Management VII. IFIP AICT, vol. 401, pp. 100–110. Springer, Heidelberg (2013)
Kotzanikolaou, P., Theoharidou, M., Gritzalis, D.: Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects. In: Bologna, S., Hämmerli, B., Gritzalis, D., Wolthusen, S. (eds.) CRITIS 2011. LNCS, vol. 6983, pp. 104–115. Springer, Heidelberg (2013)
Soupionis, Y., Basagiannis, S., Katsaros, P., Gritzalis, D.: A formally verified mechanism for countering SPIT. In: Xenakis, C., Wolthusen, S. (eds.) CRITIS 2010. LNCS, vol. 6712, pp. 128–139. Springer, Heidelberg (2011)
Virvilis, N., Gritzalis, D.: The big four what we did wrong in advanced persistent threat detection? In: Proceedings of the 8th International Conference on Availability, Reliability and Security, pp. 248–254. IEEE (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kandias, M., Mitrou, L., Stavrou, V., Gritzalis, D. (2014). Youtube User and Usage Profiling: Stories of Political Horror and Security Success. In: Obaidat, M., Filipe, J. (eds) E-Business and Telecommunications. ICETE 2013. Communications in Computer and Information Science, vol 456. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44788-8_16
Download citation
DOI: https://doi.org/10.1007/978-3-662-44788-8_16
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-44787-1
Online ISBN: 978-3-662-44788-8
eBook Packages: Computer ScienceComputer Science (R0)