The insider on the outside: a novel system for the detection of information leakers in social networks

G Cascavilla, M Conti, DG Schwartz… - European Journal of …, 2018 - Taylor & Francis
Confidential information is all too easily leaked by naive users posting comments. In this
paper we introduce DUIL, a system for Detecting Unintentional Information Leakers. The …

Detecting unintentional information leakage in social media news comments

I Yahav, DG Schwartz… - Proceedings of the 2014 …, 2014 - ieeexplore.ieee.org
This paper is concerned with unintentional information leakage (UIL) through social
networks, and in particular, Facebook Organizations often use forms of self censorship in …

Personally identifiable information leakage through online social networks

C Louw, S Von Solms - Proceedings of the South African Institute for …, 2013 - dl.acm.org
Information sharing on the Internet has become a streamlined process through services
such as e-mail, blogs and recently also Online Social Networks (OSNs). The speed of …

Crowdsourcing leakage of personally identifiable information via sina microblog

C Fu, Z Shaobin, S Guangjun, G Mengyuan - International Conference on …, 2014 - Springer
Abstract Since Edward Snowden's leaks about the scale and scope of US electronic
surveillance, it has become apparent that security services are just as fascinating as what …

The dark side of Web 2.0

A Labuschagne, M Eloff, N Veerasamy - … and Society: 10th IFIP TC 9 …, 2012 - Springer
Social networking sites have increased in popularity and are utilized for many purposes
which include connecting with other people, sharing information and creating content. Many …

Privacy awareness about information leakage: Who knows what about me?

D Malandrino, A Petta, V Scarano, L Serra… - Proceedings of the 12th …, 2013 - dl.acm.org
The task of protecting users' privacy is made more difficult by their attitudes towards
information disclosure without full awareness and the economics of the tracking and …

[HTML][HTML] Combating disinformation on social media: A computational perspective

K Shu - BenchCouncil Transactions on Benchmarks, Standards …, 2022 - Elsevier
The use of social media has accelerated information sharing and instantaneous
communications. The low barrier to enter social media enables more users to participate …

Social information leakage: Effects of awareness and peer pressure on user behavior

M Nouh, A Almaatouq, A Alabdulkareem… - Human Aspects of …, 2014 - Springer
Today, users share large amounts of information about themselves on their online social
networks. Besides the intended information, this sharing process often also “leaks” sensitive …

On the leakage of personally identifiable information via online social networks

B Krishnamurthy, CE Wills - Proceedings of the 2nd ACM workshop on …, 2009 - dl.acm.org
For purposes of this paper, we define" Personally identifiable information"(PII) as information
which can be used to distinguish or trace an individual's identity either alone or when …

The Veracity Problem: Detecting False Information and its Propagation on Online Social Media Networks

S Condran - arXiv preprint arXiv:2409.03948, 2024 - arxiv.org
Detecting false information on social media is critical in mitigating its negative societal
impacts. To reduce the propagation of false information, automated detection provide …