Abstract
This paper is concerned with unintentional information leakage (UIL) through social networks, and in particular, Facebook Organizations often use forms of self censorship in order to maintain security. Non-identification of individuals, products, or places is seen as a sufficient means of information protection. A prime example is the replacement of a name with a supposedly non-identifying initial. This has traditionally been effective in obfuscating the identity of military personnel, protected witnesses, minors, victims or suspects who need to be granted a level of protection through anonymity. We challenge the effectiveness of this form of censorship in light of current uses and ongoing developments in Social Networks showing that name-obfits cation mandated by court or military order can be systematically compromised through the unintentional actions of public social network commenters. We propose a qualitative method for recognition and characterization of UIL followed by a quantitative study that automatically detects UIL comments.
Original language | English |
---|---|
Title of host publication | Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration, IEEE IRI 2014 |
Editors | Elisa Bertino, Bhavani Thuraisingham, Ling Liu, James Joshi |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 74-79 |
Number of pages | 6 |
ISBN (Electronic) | 9781479958801 |
DOIs | |
State | Published - 27 Feb 2014 |
Event | 15th IEEE International Conference on Information Reuse and Integration, IEEE IRI 2014 - San Francisco, United States Duration: 13 Aug 2014 → 15 Aug 2014 |
Publication series
Name | Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration, IEEE IRI 2014 |
---|
Conference
Conference | 15th IEEE International Conference on Information Reuse and Integration, IEEE IRI 2014 |
---|---|
Country/Territory | United States |
City | San Francisco |
Period | 13/08/14 → 15/08/14 |
Bibliographical note
Publisher Copyright:© 2014 IEEE.
Keywords
- Censorship
- Comments
- Online news
- Privacy
- Social media
- Social networks
- Text mining
- Unintentional information leakage