TY - GEN
T1 - Socialspy
T2 - 9th International Conference on Risks and Security of Internet and Systems, CRiSIS 2014
AU - Burattin, Andrea
AU - Cascavilla, Giuseppe
AU - Conti, Mauro
N1 - Publisher Copyright:
© Springer International Publishing Switzerland 2015.
PY - 2015
Y1 - 2015
N2 - Online Social Networks are becoming the most important “places” where people share information about their lives. With the increasing concern that users have about privacy, most social networks offer ways to control the privacy of the user. Unfortunately, we believe that current privacy settings are not as effective as users might think. In this paper, we highlight this problem focusing on one of the most popular social networks, Facebook. In particular, we show how easy it is to retrieve information that a user might have set as (and hence thought as) “private”. As a case study, we focus on retrieving the list of friends for users that did set this information as “hidden” (to non-friends). We propose four different strategies to achieve this goal, and we evaluate them. The results of our thorough experiments show the feasibility of our strategies as well as their effectiveness: our approach is able to retrieve a significant percentage of the names of the “hidden” friends: i.e., some 25% on average, and more than 70% for some users.
AB - Online Social Networks are becoming the most important “places” where people share information about their lives. With the increasing concern that users have about privacy, most social networks offer ways to control the privacy of the user. Unfortunately, we believe that current privacy settings are not as effective as users might think. In this paper, we highlight this problem focusing on one of the most popular social networks, Facebook. In particular, we show how easy it is to retrieve information that a user might have set as (and hence thought as) “private”. As a case study, we focus on retrieving the list of friends for users that did set this information as “hidden” (to non-friends). We propose four different strategies to achieve this goal, and we evaluate them. The results of our thorough experiments show the feasibility of our strategies as well as their effectiveness: our approach is able to retrieve a significant percentage of the names of the “hidden” friends: i.e., some 25% on average, and more than 70% for some users.
UR - http://www.scopus.com/inward/record.url?scp=84942540338&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-17127-2_6
DO - 10.1007/978-3-319-17127-2_6
M3 - Conference contribution
AN - SCOPUS:84942540338
SN - 9783319171265
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 83
EP - 99
BT - Risks and Security of Internet and Systems - 9th International Conference, CRiSIS 2014, Revised Selected Papers
A2 - Ray, Indrajit
A2 - Crispo, Bruno
A2 - Lopez, Javier
PB - Springer Verlag
Y2 - 27 August 2014 through 29 August 2014
ER -