Detecting unintentional information leakage in social media news comments

Inbal Yahav, David G. Schwartz, Gahl Silverman

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

This paper is concerned with unintentional information leakage (UIL) through social networks, and in particular, Facebook Organizations often use forms of self censorship in order to maintain security. Non-identification of individuals, products, or places is seen as a sufficient means of information protection. A prime example is the replacement of a name with a supposedly non-identifying initial. This has traditionally been effective in obfuscating the identity of military personnel, protected witnesses, minors, victims or suspects who need to be granted a level of protection through anonymity. We challenge the effectiveness of this form of censorship in light of current uses and ongoing developments in Social Networks showing that name-obfits cation mandated by court or military order can be systematically compromised through the unintentional actions of public social network commenters. We propose a qualitative method for recognition and characterization of UIL followed by a quantitative study that automatically detects UIL comments.

Original languageEnglish
Title of host publicationProceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration, IEEE IRI 2014
EditorsElisa Bertino, Bhavani Thuraisingham, Ling Liu, James Joshi
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages74-79
Number of pages6
ISBN (Electronic)9781479958801
DOIs
StatePublished - 27 Feb 2014
Event15th IEEE International Conference on Information Reuse and Integration, IEEE IRI 2014 - San Francisco, United States
Duration: 13 Aug 201415 Aug 2014

Publication series

NameProceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration, IEEE IRI 2014

Conference

Conference15th IEEE International Conference on Information Reuse and Integration, IEEE IRI 2014
Country/TerritoryUnited States
CitySan Francisco
Period13/08/1415/08/14

Bibliographical note

Publisher Copyright:
© 2014 IEEE.

Keywords

  • Censorship
  • Comments
  • Online news
  • Privacy
  • Social media
  • Social networks
  • Text mining
  • Unintentional information leakage

Fingerprint

Dive into the research topics of 'Detecting unintentional information leakage in social media news comments'. Together they form a unique fingerprint.

Cite this