Abstract
Since Edward Snowden’s leaks about the scale and scope of US electronic surveillance, it has become apparent that security services are just as fascinating as what they might learn from our data exhaust. At the time, cybercrime is becoming a global threat now. Cybercriminals may engage in criminal activities with personal privacy data from microblog. Identity theft is probably an example. In this paper we examine the characteristics of privacy leakage in microblog and its potential threats to the Internet community. Research found that a large number of privacy information in social network space was leaked unintentionally. Users often share too much significant personal information. Our study found that the accumulated privacy information may bring huge spam into Internet space. We examined over 20 million nodes profile information and extracted the name, location, gender, and email from these nodes profiles. After basic analysis and processing, we shown that all these personal information is enough to launch spam storm or other criminal activities. The result suggests that each node in the microblog should protect its privacy information carefully.
Supported by the National Natural Science Foundation of China under Grant No.61170209,61370132;Program for New Century Excellent Talents in University No.NCET-13-0676; Shenzhen strategic emerging industry development funds Grant No.JCYJ20120821162230172; Guangdong Natural Science Foundation Grant No. S2013040012895, Foundation for Distinguished Young Talents in Higher Education of Guangdong, China, Grant No. 2013LYM_0076, the Major Fundamental Research Project in the Science and Technology Plan of Shenzhen Grant No. JCYJ2013032910203205.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Johnson III, C.: Protection of Sensitive Agency Information, US Office of Management and Budget (2006), http://www.whitehouse.gov/sites/default/files/omb/assets/omb/memoranda/fy2006/m06-16.pdf
Irani, D., Webb, S., Pu, C., Li, K.: Modeling Unintended Personal-Information Leakage from Multiple Online Social Networks. IEEE Internet Computing 15(3), 13–19 (2011)
Debatin, B., Lovejoy, J.P., Horn, A.-K., Hughes, B.N.: Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences. Journal of Computer-Mediated Communication 15, 83–108 (2009)
Boyd, D.: Facebook’s privacy trainwreck: Exposure, invasion, and social convergence. Convergence: The International Journal of Research into Media Technologies 14(1), 13–20 (2008)
Krishnamurthy, B., Naryshkin, K., Wills, C.: Privacy leakage vs. Protection measures: the growing disconnect. Web 2.0 Security and Privacy Workshop (May 2011), Is it really about me message content in social awareness streams
Beach, A., Gartrell, M., Han, R.: Solutions to Security and Privacy Issues in Mobile Social Networking. In: 2009 International Conference on Computational Science and Engineering, CSE, vol. 4, pp. 1036–1042 (2009)
Balduzzi, M., Platzer, C., Holz, T., Kirda, E., Balzarotti, D., Kruegel, C.: Abusing Social Networks for Automated User Profiling. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 422–441. Springer, Heidelberg (2010)
Parra-Arnau, J., Rebollo-Monedero, D., Forné, J.: Measuring the Privacy of User Profiles in Personalized Information Systems. (Elsevier) Future Gen. Comput. Sys. (FGCS), Special Issue Data Knowl. Eng. 33, 53–63 (2014)
http://www.ft.com/cms/s/2/21a6e7d8-b479-11e3-a09a-00144feabdc0.html#axzz2xifNsxvT
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Fu, C., Shaobin, Z., Guangjun, S., Mengyuan, G. (2014). Crowdsourcing Leakage of Personally Identifiable Information via Sina Microblog. In: Hsu, R.CH., Wang, S. (eds) Internet of Vehicles – Technologies and Services. IOV 2014. Lecture Notes in Computer Science, vol 8662. Springer, Cham. https://doi.org/10.1007/978-3-319-11167-4_26
Download citation
DOI: https://doi.org/10.1007/978-3-319-11167-4_26
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11166-7
Online ISBN: 978-3-319-11167-4
eBook Packages: Computer ScienceComputer Science (R0)