skip to main content
research-article

Exploring the Risks to Identity Security and Privacy in Cyberspace

Published: 27 March 2015 Publication History

Abstract

Cyberspace, a world of great promise, but also, of great peril. Pirates, predators, and hackers galore, are you and your online identity at risk in this wild frontier?

References

[1]
Orland, K. Staples Says 1.16 Million Cards Affected in Breach. Bloomberg. December 19, 2014; http://www.bloomberg.com/news/articles/2014-12-19/staples-says-1-16-million-cards-affected-in-breach
[2]
Viviani, N. Burglars Use Social Media to Target Wichita Homes. WIBW.com. May 9, 2014; http://www.wibw.com/home/headlines/Burglars-Use-Social-Media-To-Target-Wichita-Homes-258705321.html
[3]
Creese, S., Goldsmith, M., Nurse, J.R.C., and Phillips, E. A data-reachability model for elucidating privacy and security risks related to the use of online social networks. In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012). IEEE, 2012, 1124--1131.
[4]
James. J. Data Never Sleeps 2.0. Domo Inc. April 23, 2014; http://www.domo.com/blog/2014/04/data-never-sleeps-2-0/
[5]
Nurse, J.R.C., Erola, A., Goldsmith, M. and Creese, S. Investigating the leakage of sensitive personal and organizational information in email headers. Journal of Internet Services and Information Security 5, 1 (2014).
[6]
Cunche, M., Kaafar, M. A. and Boreli, R. I know who you will meet this evening! Linking wireless devices using Wi-Fi probe requests. In Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2012). IEEE, 2012, 1--9.
[7]
Nurse, J.R.C., Pumphrey, J., Gibson-Robinson, T., Goldsmith, M., and Creese, S. Inferring social relationships from technology-level device connections. In Proceedings of the 12th International Conference on Privacy, Security and Trust (PST 2014). IEEE, 2014, 40--47.

Cited By

View all
  • (2024)Cybersecurity of Distance Education2024 9th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM)10.1109/SEEDA-CECNSM63478.2024.00029(115-120)Online publication date: 20-Sep-2024
  • (2020)IoT Devices in the WorkplaceProceedings of the 2020 Computers and People Research Conference10.1145/3378539.3393863(52-58)Online publication date: 19-Jun-2020
  • (2017)A Study into the Cybersecurity Awareness Initiatives for School Learners in South Africa and the UKInformation Security Education for a Global Digital Society10.1007/978-3-319-58553-6_10(110-120)Online publication date: 4-May-2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image XRDS: Crossroads, The ACM Magazine for Students
XRDS: Crossroads, The ACM Magazine for Students  Volume 21, Issue 3
Cryptography
Spring 2015
55 pages
ISSN:1528-4972
EISSN:1528-4980
DOI:10.1145/2752549
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 March 2015
Published in XRDS Volume 21, Issue 3

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Popular
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)1
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Cybersecurity of Distance Education2024 9th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM)10.1109/SEEDA-CECNSM63478.2024.00029(115-120)Online publication date: 20-Sep-2024
  • (2020)IoT Devices in the WorkplaceProceedings of the 2020 Computers and People Research Conference10.1145/3378539.3393863(52-58)Online publication date: 19-Jun-2020
  • (2017)A Study into the Cybersecurity Awareness Initiatives for School Learners in South Africa and the UKInformation Security Education for a Global Digital Society10.1007/978-3-319-58553-6_10(110-120)Online publication date: 4-May-2017
  • (2016)Baiting the hookHuman-centric Computing and Information Sciences10.1186/s13673-016-0065-26:1(1-20)Online publication date: 1-Dec-2016
  • (2016)Optional Data Disclosure and the Online Privacy Paradox: A UK PerspectiveHuman Aspects of Information Security, Privacy, and Trust10.1007/978-3-319-39381-0_17(186-197)Online publication date: 21-Jun-2016
  • (2015)Smart InsidersProceedings of the 2015 International Workshop on Secure Internet of Things10.1109/SIOT.2015.10(5-14)Online publication date: 21-Sep-2015

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Digital Edition

View this article in digital edition.

Digital Edition

Magazine Site

View this article on the magazine site (external)

Magazine Site

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media