Potential Threats of Information Disclosure in Social Media: a Systematic Literature Review

Authors

  • Budi Yulianto Bina Nusantara University
  • Fredy Purnomo Bina Nusantara University
  • Evaristus Didik Madyatmadja Bina Nusantara University
  • Meyliana Meyliana Bina Nusantara University
  • Harjanto Prabowo Bina Nusantara University

DOI:

https://doi.org/10.21512/comtech.v7i3.2499

Keywords:

social media, information disclosure, systematic literature review, social threat, identity threat

Abstract

Along with the growth of social media, a variety of potential threats to users is also increasing. These kinds of threats often occur because the users accidentally or unknowingly disclose their information or identity on social media. Threats resulted from the disclosure of information are needed to be known so that the users can understand the risks that arise and take precautions. This research was aimed to summarize the potential threats arising from the information disclosure in social media. The research method used was a systematic literature review to explore and summarize the literatures that discuss the specific topic. The research results show that the potential threats are mostly social threats and identity theft. 

Dimensions

Plum Analytics

Author Biographies

Budi Yulianto, Bina Nusantara University

Computer Science Department, School of Computer Science

Fredy Purnomo, Bina Nusantara University

Computer Science Department, School of Computer Science

Evaristus Didik Madyatmadja, Bina Nusantara University

Information Systems Department, School of Information Systems

Meyliana Meyliana, Bina Nusantara University

Information Systems Department, School of Information Systems

Harjanto Prabowo, Bina Nusantara University

Management Department, School of Business Management

References

Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. Privacy Enhancing Technologies, 4258, 36-58. doi: 10.1007/11957454_3

Aiello, L. M., & Ruffo, G. (2012). Lotus Net: Tunable privacy for distributed online social network services. Computer Communications, 35(1), 75-88. doi: 10.1016/j.comcom.2010.12.006

BBC. (2014). Rapes increase by 29% as overall crime falls in England and Wales. Retrieved in March, 2016 from http://www.bbc.com/news/uk-29642455

Bishop, E. (2013). 5 Threats To Your Security When Using Social Media. Retrieved in October, 2015 from http://www.adweek.com/socialtimes/5-social-media-threats/493325

Bonneau, J., & Preibusch, S. (2010). The privacy jungle: On the market for data protection in social networks. Economics of Information Security and Privacy, 121-167. doi: 10.1007/978-1-4419-6967-5_8

Boyd, D. (2008). Facebook's Privacy Trainwreck. Convergence: The International Journal of Research into New Media Technologies, 14(1), 13-20. doi: 10.1177/1354856507084416

Broaddus, M. R., DiFranceisco, W. J., Kelly, J. A., Lawrence, J. S. S., Amirkhanian, Y. A., & Dickson-Gomez, J. D. (2015). Social media use and high-risk sexual behavior among black men who have sex with men: a three-city study. AIDS and Behavior, 19(2), 90-97. doi: 10.1007/s10461-014-0980-z

Chena, R., & Sharma, S. K. (2013). Understanding Member Use of Social Networking Sites from a Risk Perspective. Procedia Technology, 9, 331-339. doi:10.1016/j.protcy.2013.12.037

Chiu, C. J., & Young, S. D. (2015). The relationship between online social network use, sexual risk behaviors, and HIV sero-status among a sample of predominately African American and Latino men who have sex with men (MSM) social media users. AIDS and Behavior, 19(2), 98-105. doi: 10.1007/s10461-014-0986-6

Christofides, E., Desmarais, S., & Muise, A. (2010). Privacy and Disclosure on Facebook: Youth and Adult's Information Disclosure and Perceptions of Privacy Risks. Retrieved in October, 2015 from https://www.ontariosciencecentre.ca/Uploads/researchlive/documents/OPC-FinalReport-FacebookPrivacy.pdf

De Souza, Z., & Dick, G. N. (2009). Disclosure of information by children in social networking—Not just a case of “you show me yours and I’ll show you mine”. International Journal of Information Management, 29(4), 255-261. doi: 10.1016/j.ijinfomgt.2009.03.006

De Choudhury, M. (2015). Social Media for Mental Illness Risk Assessment, Prevention and Support. Proceedings of the 1st ACM Workshop on Social Media World Sensors, 1-1. doi: 10.1145/2806655.2806659

Ebizmba. (2016). Top 15 Most Popular Social Networking Sites. Retrieved in March, 2016 from http://www.ebizmba.com/articles/social-networking-websites

Elmaghraby, A. S., & Losavio, M. M. (2014). Cyber security challenges in Smart Cities: Safety, security and privacy. Journal of advanced research, I(4), 491-497. doi: 10.1016/j.jare.2014.02.006

Factslides. (2015). Facebook Facts. Retrieved in October, 2015 from http://www.factslides.com/s-Facebook

Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in human behavior, 25(1), 153-160. doi: 10.1016/j.chb.2008.08.006

Frankowski, D., Cosley, D., Sen, S., Terveen, L., & Riedl, J. (2006). You are what you say: privacy risks of public mentions. Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval, 565-572. doi: 10.1145/1148170.1148267

Gangopadhyay, D. S., & Dhar, M. D. (2014). Social Networking Sites and Privacy Issues Concerning Youths. Article-2 Global Media Journal-Indian Edition, 5(1).

Gross, R., & Acquisti, A. (2005). Information revelation and privacy in online social networks. Proceedings of the 2005 ACM workshop on Privacy in the electronic society, 71-80.

Guo, R. M. (2008). Stranger danger and the online social network. Berkeley Technology Law Journal, 23(1), 617-644.

Haynes, D., Bawden, D., & Robinson, L. (2016). A regulatory model for personal data on social networking services in the UK. International Journal of Information Management, 36(6), 872-882.

He, J., Chu, W. W., & Liu, Z. V. (2006). Inferring privacy information from social networks. International Conference on Intelligence and Security Informatics, 154-165.

Jia, H., Wisniewski, P. J., Xu, H., Rosson, M. B., & Carroll, J. M. (2015). Risk-taking as a Learning Process for Shaping Teen’s Online Information Privacy Behaviors. Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 583-599. doi: 10.1145/2675133.2675287

Jones, H., & Soltren, J. H. (2005). Facebook: Threats to privacy. Project MAC: MIT Project on Mathematics and Computing, 1, 1-76.

Kandias, M., Stavrou, V., Bozovic, N., & Gritzalis, D. (2013). Proactive insider threat detection through social media: The YouTube case. Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society, 261-266. doi: 10.1145/2517840.2517865

Khan, I. (2015). Top 10 most Facebook User Country in the World. Retrieved in March, 2016 from http://worldknowing.com/top-10-most-facebook-user-country-in-the-world/

Koehorst, R. H. G. (2013). Personal information disclosure on online social networks: an empirical study on the predictors of adolescences’ disclosure of personal information on Facebook. Retrieved in March 2016 from http://essay.utwente.nl/63797/1/MSc_Ruud_H.G._Koehorst.pdf

Krasnova, H., Günther, O., Spiekermann, S., & Koroleva, K. (2009). Privacy concerns and identity in online social networks. Identity in the Information Society, 2(1), 39-63. doi: 10.1007/s12394-009-0019-1

Krishnamurthy, B., & Wills, C. E. (2009). On the leakage of personally identifiable information via online social networks. Proceedings of the 2nd ACM workshop on Online social networks, 7-12. doi: 10.1145/1592665.1592668

Kumar, S., Saravanakumar, K., & Deepa, K. (2016). On Privacy and Security in Social Media–A Comprehensive Study. Procedia Computer Science, 78, 114-119. doi: 10.1016/j.procs.2016.02.019

Lawstuff. (2015). Cyber Bullying. Retrieved in October, from http://www.lawstuff.org.au/sa_law/topics/bullying/cyber-bullying

Li, K., Lin, Z., & Wang, X. (2015). An empirical analysis of users’ privacy disclosure behaviors on social network sites. Information & Management, 52(7), 882-891.

Lucas, M. M., & Borisov, N. (2008). Flybynight: mitigating the privacy risks of social networking. Proceedings of the 7th ACM workshop on Privacy in the electronic society, 1-8. doi: 10.1145/1456403.1456405

Marques, J., & Serrão, C. (2013). Improving content privacy on social networks using open digital rights management solutions. Procedia Technology, 9, 405-410. doi: 10.1007/s12243-013-0388-1

Mathews, A. J., Lu, Y., Patton, M. T., Dede-Bamfo, N., & Chen, J. (2013). College students’ consumption, contribution, and risk awareness related to online mapping services and social media outlets: does geography and GIS knowledge matter?. Geo Journal, 78(4), 627-639. doi: 10.1007/s10708-012-9456-8

McMillan, R. (2015). Man arrested for using social media to lure, kidnap teen. Retrieved in March 2016 from http://abc7.com/news/man-arrested-for-using-social-media-to-lure-kidnap-teen/546961/

Milam, W. (2016). The 15 Craziest Deaths Caused by Social Media. Retrieved in March 2016 from http://www.ranker.com/list/the-13-craziest-deaths-caused-by-social-media/whitney-milam

Moore, A. (2016). I couldn’t save my child from being killed by an online predator. Retrieved in March, 2016 from http://www.theguardian.com/lifeandstyle/2016/jan/23/breck-bednar-murder-online-grooming-gaming-lorin-lafave

Munnukka, J., & Järvi, P. (2014). Perceived risks and risk management of social media in an organizational context. Electronic Markets, 24(3), 219-229. doi: 10.1007/s12525-013-0138-2

Osatuyi, B. (2015). Is lurking an anxiety-masking strategy on social media sites? The effects of lurking and computer anxiety on explaining information privacy concern on social media platforms. Computers in Human Behavior, 49(C), 324-332. doi: 10.1016/j.chb.2015.02.062

Papadopoulos, S., Bontcheva, K., Jaho, E., Lupu, M., & Castillo, C. (2016). Overview of the Special Issue on Trust and Veracity of Information in Social Media. ACM Transactions on Information Systems (TOIS), 34(3), 14. doi: 10.1145/2870630

Ridley, D. (2012). The literature review: A step-by-step guide for students. Sage Publications Asia-Pacific.

Riley, N. S. (2016). Don’t downplay the dangers of social media to kids. Retrieved in March 2016 from http://nypost.com/2016/02/07/dont-downplay-the-dangers-of-social-media-to-kids/

Rivera, J. C., Di Gangi, P. M., Johnston, A., & Worrell, J. L. (2015). Undergraduate student perceptions of personal social media risk. Information Security Education Journal, 2(2), 49¬

Rouse, M. (2015). Social Media. Retrieved in Oct, 2015 from http://whatis.techtarget.com/definition/social-media

Saridakis, G., Benson, V., Ezingeard, J. N., & Tennakoon, H. (2016). Individual information security, user behaviour and cyber victimisation: An empirical study of social networking users. Technological Forecasting and Social Change, 102, 320-330. doi: 10.1016/j.techfore.2015.08.012

Shullich, R. (2012). Risk Assessment of social media. Retrieved in October, 2015 from https://www.sans.org/reading-room/whitepapers/privacy/risk-assessment-social-media-33940

Statista. (2016). Leading social networks worldwide as of January 2016, ranked by number of active users (in millions). Retrieved in March, 2016 from http://www.statista.com/statistics/272014/global-social-networks-ranked-by-number-of-users/

Stutzman, F., & Hartzog, W. (2012). Obscurity by design: An approach to building privacy into social media. Retrieved in October, 2015 from http://fredstutzman.com/papers/CSCW2012W_Stutzman.pdf.

Turel, O., & Serenko, A. (2012). The benefits and dangers of enjoyment with social networking websites. European Journal of Information Systems, 21(5), 512-528. doi: 10.1057/ejis.2012.1

US Dept. of Justice, Global Justice Information Sharing Initiative, & United States of America. (2013). Developing a Policy on the Use of Social Media in Intelligence and Investigative Activities: Guidance and Recommendations. Retrieved in March 2016 from https://it.ojp.gov/GIST/132/File/Developing%20a%20Policy%20on%20the%20Use%20of% 20Social%20Media%20in%20Intelligence%20and%20Investigative%20Activities_complian t.pdf

Walnycky, D., Baggili, I., Marrington, A., Moore, J., & Breitinger, F. (2015). Network and device forensic analysis of android social-messaging applications. Digital Investigation, 14(1), S77-S84. doi: 10.1016/j.diin.2015.05.009

Wise, E. K., & Shorter, J. D. (2014). Social networking and the exchange of information. Issues in Information Systems, 15(2), 103-109.

Downloads

Published

2016-09-30

Issue

Section

Articles
Abstract 848  .
PDF downloaded 470  .