Potential Threats of Information Disclosure in Social Media: a Systematic Literature Review
Keywords:social media, information disclosure, systematic literature review, social threat, identity threat
Along with the growth of social media, a variety of potential threats to users is also increasing. These kinds of threats often occur because the users accidentally or unknowingly disclose their information or identity on social media. Threats resulted from the disclosure of information are needed to be known so that the users can understand the risks that arise and take precautions. This research was aimed to summarize the potential threats arising from the information disclosure in social media. The research method used was a systematic literature review to explore and summarize the literatures that discuss the specific topic. The research results show that the potential threats are mostly social threats and identity theft.
Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. Privacy Enhancing Technologies, 4258, 36-58. doi: 10.1007/11957454_3
Aiello, L. M., & Ruffo, G. (2012). Lotus Net: Tunable privacy for distributed online social network services. Computer Communications, 35(1), 75-88. doi: 10.1016/j.comcom.2010.12.006
BBC. (2014). Rapes increase by 29% as overall crime falls in England and Wales. Retrieved in March, 2016 from http://www.bbc.com/news/uk-29642455
Bishop, E. (2013). 5 Threats To Your Security When Using Social Media. Retrieved in October, 2015 from http://www.adweek.com/socialtimes/5-social-media-threats/493325
Bonneau, J., & Preibusch, S. (2010). The privacy jungle: On the market for data protection in social networks. Economics of Information Security and Privacy, 121-167. doi: 10.1007/978-1-4419-6967-5_8
Boyd, D. (2008). Facebook's Privacy Trainwreck. Convergence: The International Journal of Research into New Media Technologies, 14(1), 13-20. doi: 10.1177/1354856507084416
Broaddus, M. R., DiFranceisco, W. J., Kelly, J. A., Lawrence, J. S. S., Amirkhanian, Y. A., & Dickson-Gomez, J. D. (2015). Social media use and high-risk sexual behavior among black men who have sex with men: a three-city study. AIDS and Behavior, 19(2), 90-97. doi: 10.1007/s10461-014-0980-z
Chena, R., & Sharma, S. K. (2013). Understanding Member Use of Social Networking Sites from a Risk Perspective. Procedia Technology, 9, 331-339. doi:10.1016/j.protcy.2013.12.037
Chiu, C. J., & Young, S. D. (2015). The relationship between online social network use, sexual risk behaviors, and HIV sero-status among a sample of predominately African American and Latino men who have sex with men (MSM) social media users. AIDS and Behavior, 19(2), 98-105. doi: 10.1007/s10461-014-0986-6
Christofides, E., Desmarais, S., & Muise, A. (2010). Privacy and Disclosure on Facebook: Youth and Adult's Information Disclosure and Perceptions of Privacy Risks. Retrieved in October, 2015 from https://www.ontariosciencecentre.ca/Uploads/researchlive/documents/OPC-FinalReport-FacebookPrivacy.pdf
De Souza, Z., & Dick, G. N. (2009). Disclosure of information by children in social networking—Not just a case of “you show me yours and I’ll show you mine”. International Journal of Information Management, 29(4), 255-261. doi: 10.1016/j.ijinfomgt.2009.03.006
De Choudhury, M. (2015). Social Media for Mental Illness Risk Assessment, Prevention and Support. Proceedings of the 1st ACM Workshop on Social Media World Sensors, 1-1. doi: 10.1145/2806655.2806659
Ebizmba. (2016). Top 15 Most Popular Social Networking Sites. Retrieved in March, 2016 from http://www.ebizmba.com/articles/social-networking-websites
Elmaghraby, A. S., & Losavio, M. M. (2014). Cyber security challenges in Smart Cities: Safety, security and privacy. Journal of advanced research, I(4), 491-497. doi: 10.1016/j.jare.2014.02.006
Factslides. (2015). Facebook Facts. Retrieved in October, 2015 from http://www.factslides.com/s-Facebook
Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in human behavior, 25(1), 153-160. doi: 10.1016/j.chb.2008.08.006
Frankowski, D., Cosley, D., Sen, S., Terveen, L., & Riedl, J. (2006). You are what you say: privacy risks of public mentions. Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval, 565-572. doi: 10.1145/1148170.1148267
Gangopadhyay, D. S., & Dhar, M. D. (2014). Social Networking Sites and Privacy Issues Concerning Youths. Article-2 Global Media Journal-Indian Edition, 5(1).
Gross, R., & Acquisti, A. (2005). Information revelation and privacy in online social networks. Proceedings of the 2005 ACM workshop on Privacy in the electronic society, 71-80.
Guo, R. M. (2008). Stranger danger and the online social network. Berkeley Technology Law Journal, 23(1), 617-644.
Haynes, D., Bawden, D., & Robinson, L. (2016). A regulatory model for personal data on social networking services in the UK. International Journal of Information Management, 36(6), 872-882.
He, J., Chu, W. W., & Liu, Z. V. (2006). Inferring privacy information from social networks. International Conference on Intelligence and Security Informatics, 154-165.
Jia, H., Wisniewski, P. J., Xu, H., Rosson, M. B., & Carroll, J. M. (2015). Risk-taking as a Learning Process for Shaping Teen’s Online Information Privacy Behaviors. Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 583-599. doi: 10.1145/2675133.2675287
Jones, H., & Soltren, J. H. (2005). Facebook: Threats to privacy. Project MAC: MIT Project on Mathematics and Computing, 1, 1-76.
Kandias, M., Stavrou, V., Bozovic, N., & Gritzalis, D. (2013). Proactive insider threat detection through social media: The YouTube case. Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society, 261-266. doi: 10.1145/2517840.2517865
Khan, I. (2015). Top 10 most Facebook User Country in the World. Retrieved in March, 2016 from http://worldknowing.com/top-10-most-facebook-user-country-in-the-world/
Koehorst, R. H. G. (2013). Personal information disclosure on online social networks: an empirical study on the predictors of adolescences’ disclosure of personal information on Facebook. Retrieved in March 2016 from http://essay.utwente.nl/63797/1/MSc_Ruud_H.G._Koehorst.pdf
Krasnova, H., Günther, O., Spiekermann, S., & Koroleva, K. (2009). Privacy concerns and identity in online social networks. Identity in the Information Society, 2(1), 39-63. doi: 10.1007/s12394-009-0019-1
Krishnamurthy, B., & Wills, C. E. (2009). On the leakage of personally identifiable information via online social networks. Proceedings of the 2nd ACM workshop on Online social networks, 7-12. doi: 10.1145/1592665.1592668
Kumar, S., Saravanakumar, K., & Deepa, K. (2016). On Privacy and Security in Social Media–A Comprehensive Study. Procedia Computer Science, 78, 114-119. doi: 10.1016/j.procs.2016.02.019
Lawstuff. (2015). Cyber Bullying. Retrieved in October, from http://www.lawstuff.org.au/sa_law/topics/bullying/cyber-bullying
Li, K., Lin, Z., & Wang, X. (2015). An empirical analysis of users’ privacy disclosure behaviors on social network sites. Information & Management, 52(7), 882-891.
Lucas, M. M., & Borisov, N. (2008). Flybynight: mitigating the privacy risks of social networking. Proceedings of the 7th ACM workshop on Privacy in the electronic society, 1-8. doi: 10.1145/1456403.1456405
Marques, J., & Serrão, C. (2013). Improving content privacy on social networks using open digital rights management solutions. Procedia Technology, 9, 405-410. doi: 10.1007/s12243-013-0388-1
Mathews, A. J., Lu, Y., Patton, M. T., Dede-Bamfo, N., & Chen, J. (2013). College students’ consumption, contribution, and risk awareness related to online mapping services and social media outlets: does geography and GIS knowledge matter?. Geo Journal, 78(4), 627-639. doi: 10.1007/s10708-012-9456-8
McMillan, R. (2015). Man arrested for using social media to lure, kidnap teen. Retrieved in March 2016 from http://abc7.com/news/man-arrested-for-using-social-media-to-lure-kidnap-teen/546961/
Milam, W. (2016). The 15 Craziest Deaths Caused by Social Media. Retrieved in March 2016 from http://www.ranker.com/list/the-13-craziest-deaths-caused-by-social-media/whitney-milam
Moore, A. (2016). I couldn’t save my child from being killed by an online predator. Retrieved in March, 2016 from http://www.theguardian.com/lifeandstyle/2016/jan/23/breck-bednar-murder-online-grooming-gaming-lorin-lafave
Munnukka, J., & Järvi, P. (2014). Perceived risks and risk management of social media in an organizational context. Electronic Markets, 24(3), 219-229. doi: 10.1007/s12525-013-0138-2
Osatuyi, B. (2015). Is lurking an anxiety-masking strategy on social media sites? The effects of lurking and computer anxiety on explaining information privacy concern on social media platforms. Computers in Human Behavior, 49(C), 324-332. doi: 10.1016/j.chb.2015.02.062
Papadopoulos, S., Bontcheva, K., Jaho, E., Lupu, M., & Castillo, C. (2016). Overview of the Special Issue on Trust and Veracity of Information in Social Media. ACM Transactions on Information Systems (TOIS), 34(3), 14. doi: 10.1145/2870630
Ridley, D. (2012). The literature review: A step-by-step guide for students. Sage Publications Asia-Pacific.
Riley, N. S. (2016). Don’t downplay the dangers of social media to kids. Retrieved in March 2016 from http://nypost.com/2016/02/07/dont-downplay-the-dangers-of-social-media-to-kids/
Rivera, J. C., Di Gangi, P. M., Johnston, A., & Worrell, J. L. (2015). Undergraduate student perceptions of personal social media risk. Information Security Education Journal, 2(2), 49¬
Rouse, M. (2015). Social Media. Retrieved in Oct, 2015 from http://whatis.techtarget.com/definition/social-media
Saridakis, G., Benson, V., Ezingeard, J. N., & Tennakoon, H. (2016). Individual information security, user behaviour and cyber victimisation: An empirical study of social networking users. Technological Forecasting and Social Change, 102, 320-330. doi: 10.1016/j.techfore.2015.08.012
Shullich, R. (2012). Risk Assessment of social media. Retrieved in October, 2015 from https://www.sans.org/reading-room/whitepapers/privacy/risk-assessment-social-media-33940
Statista. (2016). Leading social networks worldwide as of January 2016, ranked by number of active users (in millions). Retrieved in March, 2016 from http://www.statista.com/statistics/272014/global-social-networks-ranked-by-number-of-users/
Stutzman, F., & Hartzog, W. (2012). Obscurity by design: An approach to building privacy into social media. Retrieved in October, 2015 from http://fredstutzman.com/papers/CSCW2012W_Stutzman.pdf.
Turel, O., & Serenko, A. (2012). The benefits and dangers of enjoyment with social networking websites. European Journal of Information Systems, 21(5), 512-528. doi: 10.1057/ejis.2012.1
US Dept. of Justice, Global Justice Information Sharing Initiative, & United States of America. (2013). Developing a Policy on the Use of Social Media in Intelligence and Investigative Activities: Guidance and Recommendations. Retrieved in March 2016 from https://it.ojp.gov/GIST/132/File/Developing%20a%20Policy%20on%20the%20Use%20of% 20Social%20Media%20in%20Intelligence%20and%20Investigative%20Activities_complian t.pdf
Walnycky, D., Baggili, I., Marrington, A., Moore, J., & Breitinger, F. (2015). Network and device forensic analysis of android social-messaging applications. Digital Investigation, 14(1), S77-S84. doi: 10.1016/j.diin.2015.05.009
Wise, E. K., & Shorter, J. D. (2014). Social networking and the exchange of information. Issues in Information Systems, 15(2), 103-109.
Authors who publish with this journal agree to the following terms:
a. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License - Share Alike that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
b. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
c. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
All articles published Open Access will be immediately and permanently free for everyone to read and download. We are continuously working with our author communities to select the best choice of license options, currently being defined for this journal as follows: