Filters








1,562 Hits in 7.5 sec

Minimizing information disclosure to third parties in social login platforms

Georgios Kontaxis, Michalis Polychronakis, Evangelos P. Markatos
2012 International Journal of Information Security  
In this paper, we mitigate this problem by designing and developing a framework for minimum information disclosure in social login interactions with thirdparty sites.  ...  This enables users to disclose the minimum possible amount of personal information during their browsing experience on third-party Web sites.  ...  Motivated by this issue, in the rest of this paper, we present the design and implementation of a framework for minimum information disclosure across third parties in social login platforms.  ... 
doi:10.1007/s10207-012-0173-6 fatcat:obvbmz2ywzcd3hk3445twgjpse

Message from the Guest Editors

Jianying Zhou, Xuejia Lai, Hui Li
2012 International Journal of Information Security  
In the paper Minimizing Information Disclosure to Third Parties in Social Login Platforms, which received the best student paper award in ISC 2011, Kontaxis et al. designed and developed a framework for  ...  minimum information disclosure in social login interactions with third-party sites.  ... 
doi:10.1007/s10207-012-0172-7 fatcat:cuxhis6trzcanfp3j6uero6brq

Assessment of the Data Sharing and Privacy Practices of Smartphone Apps for Depression and Smoking Cessation

Kit Huckvale, John Torous, Mark E. Larsen
2019 JAMA Network Open  
Understanding the scope of this discrepancy is particularly important in mental health, given enhanced privacy concerns relating to stigma and negative impacts of inadvertent disclosure.  ...  Because most health apps fall outside government regulation, up-to-date technical scrutiny is essential for informed decision making by consumers and health care professionals wishing to prescribe health  ...  In a post hoc analysis, apps installed on each platform were reviewed to identify those implementing social login functions.  ... 
doi:10.1001/jamanetworkopen.2019.2542 pmid:31002321 pmcid:PMC6481440 fatcat:dnzjqg536na5hat5jgyatxvmxe

No boundaries: data exfiltration by third parties embedded on web pages

Gunes Acar, Steven Englehardt, Arvind Narayanan
2020 Proceedings on Privacy Enhancing Technologies  
in via Facebook login.  ...  We discuss the lessons learned from the responses to the initial disclosure of our findings and fixes that were deployed by the websites, browser vendors, third-party libraries and privacy protection tools  ...  leaks to our attention.  ... 
doi:10.2478/popets-2020-0070 fatcat:4x64dhnc5nagxbsfnlcyi3oqgy

SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-on Platforms [chapter]

Georgios Kontaxis, Michalis Polychronakis, Evangelos P. Markatos
2011 Lecture Notes in Computer Science  
In this paper we mitigate this problem by designing and developing a framework for minimum information disclosure across third-party sites with single sign-on interactions.  ...  This enables users to disclose the minimum possible amount of personal information during their browsing experience on third-party Web sites.  ...  Facebook Social Plug-ins Facebook has implemented a platform of social plug-ins on top of the OAuth protocol to allow third-party sites to integrate the functionality of Facebook's social experience to  ... 
doi:10.1007/978-3-642-24861-0_14 fatcat:nbf46msi25apvdkai7dsohkazm

Access control for online social networks third party applications

Mohamed Shehab, Anna Squicciarini, Gail-Joon Ahn, Irini Kokkinou
2012 Computers & security  
Current related research has focused on mainly user-to-user interactions in social networks, and seems to ignore the third party applications.  ...  In this paper, we present an access control framework to manage third party applications.  ...  The social network application architecture includes three interacting parties namely the user, social network server, and the third party application server.  ... 
doi:10.1016/j.cose.2012.07.008 fatcat:x44b7qavhzghbnpk437mppybte

Digital Identity Management on Social Media Exploring the Factors that Influence Personal Information Disclosure on Social Media

Joseph Kwame Adjei, Samuel Adams, Isaac Kofi Mensah, Peter Ebo Tobbin, Solomon Odei-Appiah
2020 Sustainability  
Secondly, we observed that users' ability to establish the legitimacy of parties to social media interactions are fundamental requirements in how individuals engage social media.  ...  However, the phenomenon raises the challenge of digital identity management on such platforms in order to maintain reputations and ensure information privacy preservation.  ...  Thus, concerns about possible loss of privacy as a result of personal information disclosure to third parties is what underpins privacy concerns [76, 77] .  ... 
doi:10.3390/su12239994 fatcat:42na4f5wtnhlrceoh5iwr6y3bu

Digital Inequality Through the Lens of Self-Disclosure

Jooyoung Lee, Sarah Rajtmajer, Eesha Srivatsavaya, Shomir Wilson
2021 Proceedings on Privacy Enhancing Technologies  
We do find that gender and education predict rate of self-disclosure, or voluntary sharing of personal information.  ...  Recent work has brought to light disparities in privacy-related concerns based on socioeconomic status, race and ethnicity.  ...  Acknowledgments This research was supported in part by an Accelerator Award from the Center for Social Data Analytics at the Pennsylvania State University.  ... 
doi:10.2478/popets-2021-0052 fatcat:7qbic4e3jncf3cyi2qtboqdk5y

CanaryTrap: Detecting Data Misuse by Third-Party Apps on Online Social Networks

Shehroze Farooqi, Maaz Musa, Zubair Shafiq, Fareed Zaffar
2020 Proceedings on Privacy Enhancing Technologies  
AbstractOnline social networks support a vibrant ecosystem of third-party apps that get access to personal information of a large number of users.  ...  Despite several recent high-profile incidents, methods to systematically detect data misuse by third-party apps on online social networks are lacking.  ...  This work is supported in part by the National Science Foundation (grants 1715152, 1815131, and 1954224) and a grant from the Higher Education Commission (HEC) Pakistan.  ... 
doi:10.2478/popets-2020-0076 fatcat:3cf6anvddjcqhihebykh5zh76u

CanaryTrap: Detecting Data Misuse by Third-Party Apps on Online Social Networks [article]

Shehroze Farooqi and Maaz Musa and Zubair Shafiq and Fareed Zaffar
2020 arXiv   pre-print
Online social networks support a vibrant ecosystem of third-party apps that get access to personal information of a large number of users.  ...  Despite several recent high-profile incidents, methods to systematically detect data misuse by third-party apps on online social networks are lacking.  ...  This work is supported in part by the National Science Foundation (grants 1715152, 1815131, and 1954224) and a grant from the Higher Education Commission (HEC) Pakistan.  ... 
arXiv:2006.15794v1 fatcat:o5r2vduhkndyfmdnyk74frnyta

Towards an Understanding of Privacy Management Architecture in Big Data: An Experimental Research

Nick Hajli, Farid Shirazi, Mina Tajvidi, Nurul Huda
2020 British Journal of Management  
In this paper, we investigate information privacy through an experiment using large-scale disclosure of personal web activity data to track fragments of personal information released over a period of time  ...  Big data analytics provide valuable information allowing organizations to gain insights that grant them a competitive advantage in the market.  ...  leak it to a third party.  ... 
doi:10.1111/1467-8551.12427 fatcat:3howqslgcng4hfh6lfg4c3u7sy

Identity Management Frameworks for Cloud

Roshni Bhandari, Upendra Bhoi, Dhiren Patel
2013 International Journal of Computer Applications  
In this identity system three parties are involved: Identity provider: It issues digital identities (as trusted third-party).  ...  Minimal Disclosure for a Constrained use: The solution which discloses the minimum amount of identifying information and it is the long-term solution.  ... 
doi:10.5120/14501-2310 fatcat:nsuwfjnurvg67blgauu7dpva44

Major Security Issue That Facing Social Networks with Its Main Defense Strategies

Abdullah Safhi, Adel Al-Zahrani, Mohammed Alhibbi
2022 Tehnički glasnik  
We extracted and analyzed seminal papers to add to the corpus of literature by focusing on several critical challenges in the social network service domain and shedding light on how these challenges affect  ...  It is critical to address and evaluate social network service challenges, as they vary according to the variety of SNS sites.  ...  In SNSs, users can securely store and retrieve data without exposing it to a third-party service provider, such as a cloud-based service provider.  ... 
doi:10.31803/tg-20220124140610 fatcat:yym42v4lbrdyheiuz5dib7ncpq

iShield: A Framework for Preserving Privacy of iOS App User

Arpita Jadhav Bhatt, Chetna Gupta, Sangeeta Mittal
2019 Journal of Cyber Security and Mobility  
In this paper, we have proposed iShield - a privacy preserving framework that can be easily integrated by developers at the time of app creation to enforce privacy with minimal performance overhead.  ...  Some methods have been proposed to preserve user's privacy of specific data like location and health information.  ...  There are three entities involved in communication [2] (i) platform provider that provides s third-party apps, hardware and OS software. iPhone/iPad/iPod are some platforms provided by Apple (ii) Users  ... 
doi:10.13052/2245-1439.845 fatcat:subym6a6c5dibao6amndrh3dcy

Challenges in Protecting Data for Modern Enterprises

Mohammad M. Nur, Beacom College of Computer & Cyber Sciences, Dakota State University, Madison, South Dakota 57042, USA, Houssain Kettani
2020 Journal of Economics Business and Management  
Having an in-depth understanding of the points of failures and identifying the effectiveness of the defense methods are crucial factors to fight against data breaches and to minimize the aftermath impacts  ...  implementing them in enterprises.  ...  INTRODUCTION Data breach generally refers to an unauthorized exposure, disclosure or loss of an organization's sensitive information, which may include its financial state, its future plans and products  ... 
doi:10.18178/joebm.2020.8.2.615 fatcat:al5bvjsu5vgzvooalf65xtzzru
« Previous Showing results 1 — 15 out of 1,562 results