Abstract
AbstractSocial media plays an important role for a vast majority in one’s internet life. Likewise, sharing, publishing, and posting content through social media has nearly become effortless. This unleashes new threats as unintentionally shared information may be used against oneself or loved ones. With open-source intelligence data and methods, we show how unindented published data can be revealed and further analyze possibilities that can potentially compromise one’s privacy. This is backed up by a popular view of interviewed experts from various fields of expertise. We were able to show that only 2 hours of manually fetching data are sufficient to unveil private, personal information that was not intended to be published by the person. Two distinctive methods are described with several approaches. From our results, we were able to describe a 14-step awareness guideline and proposed a change of the law within Austrian legislation. Our work has shown that awareness among persons on social media needs to be raised. Critical reflections on our work has revealed several ethical implications that have made countermeasures necessary; however, it can be assumed that criminals do not to these.
Funder
Graz University of Technology
Publisher
Springer Fachmedien Wiesbaden GmbH
Subject
Anesthesiology and Pain Medicine
Reference36 articles.
1. Wolf SM, Lawrenz FP, Nelson CA, Kahn JP, Cho MK, Clayton EW, Fletcher JG, Georgieff MK, Hammerschmidt D, Hudson K, Illes J, Kapur V, Keane MA, Koenig BA, LeRoy BS, McFarland EG, Paradise J, Parker LS, Terry SF, Van Ness B, Wilfond BS (2008) Managing Incidental Findings in Human Subjects Research: Analysis and Recommendations. J Law Med Ethics 36(2):219–248. https://doi.org/10.1111/j.1748-720X.2008.00266.x
2. Casanovas P, Morris N, González-Conejero J, Teodoro E, Adderley R (2018) Minimisation of Incidental Findings, and Residual Risks for Security Compliance: the SPIRIT Project. In TERECOM@JURIX (Vol-2309), pp 97–110. ISSN 1613-0073. Online: http://ceur-ws.org/Vol-2309/09.pdf. Accessed 15 Aug 2022
3. Kutschera S (2021) Incidental Data: Detect and Process Personal Information from Social Media
Platforms. FH JOANNEUM GmbH, Kapfenberg, Austria
4. Pädagogik;P Mayring,2010
5. Ablon L (2018) Data thieves: the motivations of cyber threat actors and their use and monetization of stolen data. RAND Corporation, Santa Monica, California https://doi.org/10.7249/CT490
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献