Next Article in Journal
Inefficiency of IDS Static Anomaly Detectors in Real-World Networks
Previous Article in Journal
Participatory Design to Enhance ICT Learning and Community Attachment: A Case Study in Rural Taiwan
Article Menu

Export Article

Open AccessArticle
Future Internet 2015, 7(1), 67-93; doi:10.3390/fi7010067

Social Networking Privacy—Who’s Stalking You?

CSAFE Centre, Department of Computing & Information Systems, Faculty of Architecture, Computing and Humanities, University of Greenwich, London SE10 9LS, UK
First presented at CFET 2014—7th International Conference on Cybercrime, Forensics, Education and Training, Christ Church Canterbury, UK, 10–11 July 2014, ISBN:97801909067158.
These authors contributed equally to this work.
*
Author to whom correspondence should be addressed.
Academic Editor: Steven Furnell
Received: 25 August 2014 / Revised: 9 February 2015 / Accepted: 13 March 2015 / Published: 23 March 2015
View Full-Text   |   Download PDF [13372 KB, uploaded 23 March 2015]   |  

Abstract

This research investigates the privacy issues that exist on social networking sites. It is reasonable to assume that many Twitter users are unaware of the dangers of uploading a tweet to their timeline which can be seen by anyone. Enabling geo-location tagging on tweets can result in personal information leakage, which the user did not intend to be public and which can seriously affect that user’s privacy and anonymity online. This research demonstrates that key information can easily be retrieved using the starting point of a single tweet with geo-location turned on. A series of experiments have been undertaken to determine how much information can be obtained about a particular individual using only social networking sites and freely available mining tools. The information gathered enabled the target subjects to be identified on other social networking sites such as Foursquare, Instagram, LinkedIn, Facebook and Google+, where more personal information was leaked. The tools used are discussed, the results of the experiments are presented and the privacy implications are examined. View Full-Text
Keywords: Twitter; Tweets; StreamdIn; Twitonomy; Creepy; geo-location; stalking; identity theft; data leakage; Facebook; Foursquare Twitter; Tweets; StreamdIn; Twitonomy; Creepy; geo-location; stalking; identity theft; data leakage; Facebook; Foursquare
Figures

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Gan, D.; Jenkins, L.R. Social Networking Privacy—Who’s Stalking You? Future Internet 2015, 7, 67-93.

Show more citation formats Show less citations formats

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Future Internet EISSN 1999-5903 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top