skip to main content
10.1145/2539150.2539186acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiiwasConference Proceedingsconference-collections
research-article

Account Reachability: A Measure of Privacy Risk for Exposure of a User's Multiple SNS Accounts

Authors Info & Claims
Published:02 December 2013Publication History

ABSTRACT

With the increased worldwide popularity of social networking services (SNSs), the leakage of a user's private information is becoming a serious problem. An increased number of users now have multiple accounts on various social networks and they tend to use each account to write different user experiments. Aggregating information from different accounts leads to the unintended leakage of personal information. Therefore, we argue that SNS users should be vigilant in protecting the relationship between multiple accounts.

In this paper, we propose the use of Account Reachability, a measure of privacy risk which demonstrates the possibility of a stranger finding a user's private account based on information in their public account. In addition, we present ARChecker, a tool to calculate the value of account reachability. ARChecker also provides advice on how to modify the user's profiles and messages to decrease the privacy risk. By checking the privacy measure and modifying the profiles and messages of their SNS accounts, users can protect their multiple accounts from the risk of an unintended leakage of personal information.

References

  1. Connecting the Social Graph: Member Overlap at OpenSocial and Facebook. https://blog.compete.com/2007/11/12/connecting-the-social-graph-member-overlap-at-opeusocial-and-facebook/.Google ScholarGoogle Scholar
  2. Multiple Personalities And Social Media: The Many Faces of Me. http://www.forbes.com/sites/meghaucasserly/2011/01/26/multiple-personalities-and-social-media-the-many-faces-of-me/.Google ScholarGoogle Scholar
  3. C. G. Akcora, B. Carminati, and E. Ferrari. Privacy in social networks: How risky is your social graph? In ICDE, pages 9--19. IEEE Computer Society, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D. Boyd and E. Hargittai. Facebook privacy settings: Who cares? First Monday, 15(8), 2010.Google ScholarGoogle Scholar
  5. B. Carminati, E. Ferrari, S. Morasca, and D. Taibi. A probability-based approach to modeling the risk of unauthorized propagation of information in on-line social networks. In Proceedings of the first ACM conference on Data and application security and privacy, CODASPY '11, pages 51--62. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. A. Dubrawski, P. Sarkar, and L. Chen. Trade-offs between agility and reliability of predictions in dynamic social networks used to model risk of microbial contamination of food. In Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, ASONAM '09, pages 125--130. IEEE Computer Society, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. Irani, S. Webb, C. Pu, and K. Li. Modeling unintended personal-information leak age from multiple online social networks. IEEE Internet Computing, 15(3):13--19, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. N. Joinson. Looking at, looking up or keeping up with people?: motives and use of facebook. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '08, pages 1027--1036. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. R. Li, S. Wang, H. Deng, R. Wang, and K. C.-C. Chang. Towards social user profiling: unified and discriminative influence model for inferring home locations. In Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '12, pages 1023--1031. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. L-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data, 1(1), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Mislove, B. Viswanath, K. P. Gummadi, and P. Druschel. You are who you know: inferring user profiles in online social networks. In Proceedings of the third ACM international conference on Web search and data mining, WSDM '10, pages 251--260. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. Narayanan and V Shmatikov. De-anonymizing social networks. In Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, SP'09, pages 173--187. IEEE Computer Society, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. D. Rao, D. Yarowsky, A. Shreevats, and M. Gupta. Classifying latent user attributes in twitter. In Proceedings of the 2nd international workshop on Search and mining user-generated contents, SMUC '10, pages 37--44. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Sadilek, H. Kautz, and J. P. Bigham. Finding your friends and following them to where you are. In Proceedings of the fifth ACM international conference on Web search and data mining, WSDM'12, pages 723--732. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. E. Stamatatos. A survey of modern authorship attribution methods. J. Am. Soc. Inf Sci. Technol., 60(3):538--556, mar 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. L. Sweeney. k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl-Based Syst., 10(5):557--570, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. T. Wang, M. Srivatsa, D. Agrawal, and L. Liu. Modeling data flow in socio-information networks: a risk estimation approach. In Proceedings of the 16th ACM symposium on Access control models and technologies, SACMAT '11, pages 113--122. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. E. Zheleva and L. Getoor. Privacy in social networks: a survey. In C. Aggarwal, editor, Social Network Data Analytics, chapter 9, pages 247--276. Springer, March 2011.Google ScholarGoogle Scholar

Index Terms

  1. Account Reachability: A Measure of Privacy Risk for Exposure of a User's Multiple SNS Accounts

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      IIWAS '13: Proceedings of International Conference on Information Integration and Web-based Applications & Services
      December 2013
      753 pages
      ISBN:9781450321136
      DOI:10.1145/2539150

      Copyright © 2013 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 2 December 2013

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader