Skip to main content

Youtube User and Usage Profiling: Stories of Political Horror and Security Success

  • Conference paper
  • First Online:
E-Business and Telecommunications (ICETE 2013)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 456))

Included in the following conference series:

  • 918 Accesses

Abstract

Social media and Web 2.0 have enabled internet users to contribute online content, which may be crawled and utilized for a variety of reasons, from personalized advertising to behaviour prediction/profiling. In this paper, our goal is to present a horror and a success story from the digital world of Social Media, in order to: (a). present a political affiliation profiling method, the Panopticon method, in order to reveal this threat and contribute in raising the social awareness over it. (b). describe an insider threat prediction method by evaluating the predisposition towards law enforcement and authorities, a personal psychosocial trait closely connected to the manifestation of malevolent insiders. The experimental test case of both methodologies is an extensive Greek community of YouTube users. In order to demonstrate our cases, we performed graph theoretic and content analysis of the collected dataset and showed how and what kind of personal data can be derived via data mining on publicly available YouTube data. As both methodologies set user’s privacy and dignity at stake, we provide the reader with an analysis of the legal means for each case, so as to effectively be prevented from a privacy violation threat and also present the exceptional cases, such as the selection of security officers of critical infrastructures, where such methodologies could be used.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Tokunaga, R.: Social networking site or social surveillance site? Understanding the use of interpersonal electronic surveillance in romantic relationships. Comput. Human Behav. 27, 705–713 (2011)

    Article  Google Scholar 

  2. Brignall, T.: The new Panopticon: The internet viewed as a structure of social control. Theory Sci. 3(1), 335–348 (2002)

    MathSciNet  Google Scholar 

  3. Foucault, M., Surveiller et punir: Naissance de la prison, Paris: Gallimard. A. Sheridan (Trans.), Discipline and punish: The birth of the prison: Penguin (1975)

    Google Scholar 

  4. Allmer, T.: Towards a Critical Theory of Surveillance in Informational Capitalism. P. Lang, Frankfurt am Main (2012)

    Google Scholar 

  5. Jurgenson, N.: Review of Ondi Timoner’s we live in public. Surveill. Soc. 8(3), 374–378 (2010)

    Google Scholar 

  6. Beyer, A., Kirchner, M., Kreuzberger, G., Schmeling, J.: Privacy im Social Web Zum kompetenten Umgang mit persοnlichen Daten im Web 2. Datenschutz und Datensicherung (DuD) 9(2008), 597–600 (2008)

    Article  Google Scholar 

  7. Whitaker, R., 1999. The End of Privacy: How Total Surveillance Is Becoming a Reality

    Google Scholar 

  8. Fuchs, C.: New Media, Web 2.0 and Surveillance. In: Sociology Compass 5/2, pp. 134–147 (2011)

    Google Scholar 

  9. Gibson, S.: Open source intelligence. RUSI J. 149(1), 16–22 (2004)

    Article  Google Scholar 

  10. Gritzalis, D.: A digital seal solution for deploying trust on commercial transactions. Inf. Manag. Comput. Secur. 9(2), 71–79 (2001)

    Google Scholar 

  11. Lambrinoudakis, C., Gritzalis, D., Tsoumas, V., Karyda, M., Ikonomopoulos, S.: Secure electronic voting: the current landscape. In: Gritzalis, D. (ed.) Secure Electronic Voting, pp. 101–122. Springer, New York (2003)

    Chapter  Google Scholar 

  12. Marias, J., Dritsas, S., Theoharidou, M., Mallios, J. Gritzalis, D.: SIP vulnerabilities and anti-spit mechanisms assessment. In: Proceedings of the 16th IEEE International Conference on Computer Communications and Networks, pp. 597–604. IEEE (2007)

    Google Scholar 

  13. Mitrou, L., Gritzalis, D., Katsikas, S., Quirchmayr, G.: Electronic voting: Constitutional and legal requirements, and their technical implications. Secure Electron. Voting 7, 43–60 (2003)

    Article  Google Scholar 

  14. Spinellis, D., Gritzalis, S., Iliadis, J., Gritzalis, D., Katsikas, S.: Trusted third party services for deploying secure telemedical applications over the web. Comput. Secur. 18(7), 627–639 (1999)

    Article  Google Scholar 

  15. Shaw, E., Ruby, K., Post, J.: The insider threat to information systems: the psychology of the dangerous insider. Secur. Aware. Bull. 2(98), 1–10 (1998)

    Google Scholar 

  16. Pang, B., Lee, L.: Opinion mining and sentiment analysis. Found. Trends Inf. Retrieval 2(12), 11–35 (2008)

    Google Scholar 

  17. De Choudhury, M., Counts, S.: The nature of emotional expression in social media: measurement, inference and utility. In: Human Computer Interaction Consortium Workshop (2012)

    Google Scholar 

  18. Benevenuto, F., Rodrigues, T., Cha, M., Almeida, V.: Characterizing user behavior in online social networks. In: Proceedings of the 9th ACM Conference on Internet Measurement, pp. 49–62. ACM Press (2009)

    Google Scholar 

  19. Park, N., Kee, K., Valenzuela, S.: Being immersed in social networking environment: Facebook groups, uses and gratifications, and social outcomes. Cyber Psychol. Behav. 12(6), 729–733 (2009)

    Article  Google Scholar 

  20. Balduzzi, M., Platzer, C., Holz, T., Kirda, E., Balzarotti, D., Kruegel, C.: Abusing social networks for automated user profiling. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 422–441. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  21. Kandias, M., Virvilis, N., Gritzalis, D.: The insider threat in cloud computing. In: Bologna, S., Hämmerli, B., Gritzalis, D., Wolthusen, S. (eds.) CRITIS 2011. LNCS, vol. 6983, pp. 93–103. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  22. Kandias, M., Mylonas, A., Theoharidou, M., Gritzalis, D.: Exploitation of auctions for outsourcing security-critical projects. In: Proceedings of the 16th IEEE Symposium on Computers and Communications, pp. 646–651. IEEE (2011)

    Google Scholar 

  23. Magklaras, G., Furnell, S.: Insider threat prediction tool: evaluating the probability of IT misuse. Comput. Secur. 21(1), 62–73 (2011)

    Article  Google Scholar 

  24. Kandias, M., Mylonas, A., Virvilis, N., Theoharidou, M., Gritzalis, D.: An insider threat prediction model. In: Katsikas, S., Lopez, J., Soriano, M. (eds.) TrustBus 2010. LNCS, vol. 6264, pp. 26–37. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  25. FBI, The Insider Threat: An introduction to detecting and deterring an insider spy (2012). http://www.fbi.gov/about-us/investigate/counterintelligence/the-insider-threat

  26. Kandias, M., Galbogini, K., Mitrou, L., Gritzalis, D.: Insiders trapped in the mirror reveal themselves in social media. In: Lopez, J., Huang, X., Sandhu, R. (eds.) NSS 2013. LNCS, vol. 7873, pp. 220–235. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  27. Kandias, M., Mitrou, L., Stavrou, V., Gritzalis, D.: Which side are you on? A new panopticon vs. privacy. In: Proceedings of the 10th International Conference on Security and Cryptography, SciTekPress, pp. 98–110 (2013)

    Google Scholar 

  28. Sebastiani, F.: Machine learning in automated text categorization. ACM Comput. Surv. 34(1), 1–47 (2002)

    Article  Google Scholar 

  29. McCallum, A., Nigam, K.: A comparison of event models for naive Bayes text classification. In: Work-shop on learning for text categorization, vol. 752, pp. 41–48 (1998)

    Google Scholar 

  30. Joachims, T.: Text categorization with support vector machines: Learning with many relevant features. In: Nédellec, C., Rouveirol, C. (eds.) ECML 1998. LNCS, vol. 1398. Springer, Heidelberg (1998)

    Google Scholar 

  31. Anderson, J.: Logistic regression. In: Handbook of Statistics. NorthHolland, Amsterdam, pp. 169–191 (1982)

    Google Scholar 

  32. Manning, C., Raghavan, P., Schütze, H.: Introduction to Information Retrieval. Cambridge University Press, New York (2008)

    Book  MATH  Google Scholar 

  33. Kandias, M., Stavrou, V., Bosovic, N., Gritzalis, D.: Predicting the insider threat via social media: The YouTube case. In: Proceedings of the 12th ACM Workshop on Privacy in the Electronic Society, pp. 261–266. ACM Press (2013)

    Google Scholar 

  34. Kandias, M., Stavrou, V., Bozovic, N., Mitrou, L., Gritzalis, D.: Can we trust this user? Predicting insider’s attitude via YouTube usage profiling. In: Proceedings of the 10th IEEE International Conference on Autonomic and Trusted Computing, pp. 347–354 (2013)

    Google Scholar 

  35. Castelluccia, C., Druschel, P., Hübner, S., Pasic, A., Preneel, B., Tschofenig, H.: Privacy, accountability and Trust-Challenges and opportunities, Technical report, ENISA (2011)

    Google Scholar 

  36. Hildebrandt, M.: Who is profiling who? Invisible visibility. In: Gutwirth, S., Poullet, Y., De Hert, P., de Terwangne, C., Nouwt, S. (eds.) Reinventing Data Protection, pp. 239–252. Springer, Netherlands (2009)

    Chapter  Google Scholar 

  37. Solove, D.: A taxonomy of privacy. Univ. Pa. Law Rev. 154(3), 477 (2006)

    Article  Google Scholar 

  38. Henderson, S.: Expectations of Privacy in Social Media. Mississippi College L. Rev., 31 (2012). http://works.bepress.com/stephen_henderson/10

  39. Bruns, A.: Towards produsage: Futures for user-led content production. In: Proceedings of Cultural Attitudes towards Communication and Technology Conference, pp. 275–284 (2006)

    Google Scholar 

  40. Ziegele, M., Quiring, O.: Privacy in social network sites. In: Trepte, S., Reinecke, L. (eds.) Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web, pp. 175–189. Springer, Berlin (2011)

    Chapter  Google Scholar 

  41. Mitrou, L.: The commodification of the individual in the internet era: informational self-determination or “self-alienation”. In: Proceedings of the 8th International Conference of Computer Ethics Philosophical Enquiry, pp. 466–485 (2009)

    Google Scholar 

  42. Schermer, B.: The limits of privacy in automated profiling and data mining. Comput. Law Secur. Rev. 27, 45–52 (2011)

    Article  Google Scholar 

  43. Mitrou, L.: The impact of communications data retention on fundamental rights and democracy: The case of the EU Data Retention Directive. In: Haggerty/Samatas, pp. 127–147 (2010)

    Google Scholar 

  44. Cohen, J.: Examined lives: informational privacy and the subject as object. Stanf. Law Rev. 52, 1373–1438 (2000)

    Article  Google Scholar 

  45. Cas, I.: Ubiquitous computing, privacy and data protection: options and limitations to reconcile the unprecedented contradictions. In: Gutwirth, S., Poullet, Y., De Hert, P., Leenes, R. (eds.) Computers, Privacy and Data Protection: An Element of Choice, pp. 139–170. Springer, Netherlands (2011)

    Chapter  Google Scholar 

  46. Fazekas, C.: 1984 is still fiction: electronic monitoring in the workplace and US privacy law. Duke L. Technol. Rev. 15–25 (2004)

    Google Scholar 

  47. Gutwirth, S., De Hert, P.: Regulating profiling in a democratic constitutional State. In: Hildebrandt, M., Gutwirth, S. (eds.) Profiling the European citizen: Cross-Disciplinary Perspectives, pp. 271–302. Springer, Netherlands (2008)

    Chapter  Google Scholar 

  48. Αbril-Sánchez, P., Levin, A., Del Riego, A.: Blurred boundaries: social media privacy and the 21st century employee. Am. Bus. Law J. 49(1), 63–124 (2012)

    Article  Google Scholar 

  49. Dumortier, F.: Facebook and Risks of “de-contextualization” of information. In: Gutwirth, S., Poullet, Y., De Hert, P. (eds.) Data Protection in a Profiled World, pp. 119–137. Springer, Netherlands (2010)

    Chapter  Google Scholar 

  50. Mylonas, A., Tsoumas, B., Dritsas, S., Gritzalis, D.: A secure smartphone applications roll-out scheme. In: Furnell, S., Lambrinoudakis, C., Pernul, G. (eds.) TrustBus 2011. LNCS, vol. 6863, pp. 49–61. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  51. Mylonas, Α., Kastania, A., Gritzalis, D.: Delegate the smartphone user? Security awareness in smartphone platforms. Comput. Secur. 34, 47–66 (2013)

    Article  Google Scholar 

  52. Theoharidou, M., Tsalis, N., Gritzalis, D.: In cloud we trust: risk-assessment-as-a-service. In: Fernández-Gago, C., Martinelli, F., Pearson, S., Agudo, I. (eds.) Trust Management VII. IFIP AICT, vol. 401, pp. 100–110. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  53. Kotzanikolaou, P., Theoharidou, M., Gritzalis, D.: Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects. In: Bologna, S., Hämmerli, B., Gritzalis, D., Wolthusen, S. (eds.) CRITIS 2011. LNCS, vol. 6983, pp. 104–115. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  54. Soupionis, Y., Basagiannis, S., Katsaros, P., Gritzalis, D.: A formally verified mechanism for countering SPIT. In: Xenakis, C., Wolthusen, S. (eds.) CRITIS 2010. LNCS, vol. 6712, pp. 128–139. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  55. Virvilis, N., Gritzalis, D.: The big four what we did wrong in advanced persistent threat detection? In: Proceedings of the 8th International Conference on Availability, Reliability and Security, pp. 248–254. IEEE (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Miltiadis Kandias .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kandias, M., Mitrou, L., Stavrou, V., Gritzalis, D. (2014). Youtube User and Usage Profiling: Stories of Political Horror and Security Success. In: Obaidat, M., Filipe, J. (eds) E-Business and Telecommunications. ICETE 2013. Communications in Computer and Information Science, vol 456. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44788-8_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-44788-8_16

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-44787-1

  • Online ISBN: 978-3-662-44788-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics