skip to main content
10.1145/1592665.1592668acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free Access

On the leakage of personally identifiable information via online social networks

Published:17 August 2009Publication History

ABSTRACT

For purposes of this paper, we define "Personally identifiable information" (PII) as information which can be used to distinguish or trace an individual's identity either alone or when combined with other information that is linkable to a specific individual. The popularity of Online Social Networks (OSN) has accelerated the appearance of vast amounts of personal information on the Internet. Our research shows that it is possible for third-parties to link PII, which is leaked via OSNs, with user actions both within OSN sites and else-where on non-OSN sites. We refer to this ability to link PII and combine it with other information as "leakage". We have identified multiple ways by which such leakage occurs and discuss measures to prevent it.

References

  1. James Abbatiello. Refcontrol. Firefox Add-on. https://addons.mozilla.org/en-US/firefox/addon/953.Google ScholarGoogle Scholar
  2. T. Berners-Lee, R. Fielding, and H. Frystyk. Hypertext Transfer Protocol - HTTP/1.0. RFC 1945, IETF, May 1996. Defines current usage of HTTP/1.0. http://www.rfc-editor.org/rfc/rfc1945.txt.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. The cafes: Privacy tip #3: Block referer headers in Firefox, October 2006. http://cafe.elharo.com/privacy/privacy-tip-3-block-referer-headers-in-firefox/.Google ScholarGoogle Scholar
  4. Online profiling: A report to congress, July 2000. Federal Trade Commission. http://www.ftc.gov/os/2000/07/onlineprofiling.htm.Google ScholarGoogle Scholar
  5. Clay Johnson III. Safeguarding against and responding to the breach of personally identifiable information, May 22 2007. Office of Management and Budget Memorandum. http://www.whitehouse.gov/omb/memoranda/fy2007/m07-16.pdf.Google ScholarGoogle Scholar
  6. Balachander Krishnamurthy and Craig E. Wills. Characterizing privacy in online social networks. In Proceedings of the Workshop on Online Social Networks, pages 37--42, Seattle, WA USA, August 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Balachander Krishnamurthy and Craig E. Wills. Privacy diffusion on the web: A longitudinal perspective. In Procs World Wide Web Conference, Madrid, Spain, April 2009. http://www.research.att.com/~bala/papers/www09.pdf. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Bradley Malin. Betrayed by my shadow: Learning data identify via trail matching. Journal of Privacy Technology, June 2005.Google ScholarGoogle Scholar
  9. Erika McCallister, Tim Grance, and Karen Scanfone. Guide to protecting the confidentiality of personally identifiable information (PII) (draft), January 2009. NIST Special Publication 800-122. http://csrc.nist.gov/publications/drafts/800-122/Draft-SP800-122.pdf.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Privacy guard. Facebook Application. http://apps.facebook.com/privacyguard/.Google ScholarGoogle Scholar
  11. Privacy protector. Facebook Application. http://apps.facebook.com/privacyprotector/.Google ScholarGoogle Scholar
  12. Privoxy. http://www.privoxy.org/.Google ScholarGoogle Scholar
  13. Proxify anonymous proxy. http://proxify.com/.Google ScholarGoogle Scholar
  14. Daniel Savard. LiveHTTPHeaders. Firefox Add-on. http://livehttpheaders.mozdev.org/.Google ScholarGoogle Scholar

Index Terms

  1. On the leakage of personally identifiable information via online social networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      WOSN '09: Proceedings of the 2nd ACM workshop on Online social networks
      August 2009
      74 pages
      ISBN:9781605584454
      DOI:10.1145/1592665

      Copyright © 2009 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 August 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate12of36submissions,33%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader