Skip to main content

2015 | OriginalPaper | Buchkapitel

De-anonymising Social Network Posts by Linking with Résumé

verfasst von : Yohei Ogawa, Eina Hashimoto, Masatsugu Ichino, Isao Echizen, Hiroshi Yoshiura

Erschienen in: Business Information Systems Workshops

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We have developed a system for identifying the person who posted posts of interest. It calculates the similarity between the posts of interest and the résumé of each candidate person and then identifies the résumé with the highest similarity as that of the posting person. Identification accuracy was improved by using the posts of persons other than the target person. Evaluation using 30 student volunteers who permitted the use of their résumés and sets of tweets showed that using information from tweets of other persons dramatically improved identification accuracy. Identification accuracy was 0.36 and 0.53 when the number of other persons was 4 and 9, respectively. Those that the target person can be limited in 10 % of the candidates were 0.72 both with 4 and 9 such employees.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
UEC is near Chofu station on the Keio line in Tokyo.
 
2
The employer may know which of several employees owns which accounts. However, we can formulate an n–n matching problem by eliminating the known pairs.
 
Literatur
1.
Zurück zum Zitat Okuno, T., Ichino, M., Echizen, I., Utsumi, A., Yoshiura, H.: Ineluctable background checking on social networks: linking job seeker’s résumé and posts. In: 5th IEEE International Workshop on Security and Social Networking (SESOC 2013) (2013) Okuno, T., Ichino, M., Echizen, I., Utsumi, A., Yoshiura, H.: Ineluctable background checking on social networks: linking job seeker’s résumé and posts. In: 5th IEEE International Workshop on Security and Social Networking (SESOC 2013) (2013)
2.
Zurück zum Zitat Accorsi, R., Sato, Y., Kai, S.: Compliance monitor for early warning risk determination. Wirtschaftsinformatik 50(5), 375–382 (2008). Vieweg VerlagCrossRef Accorsi, R., Sato, Y., Kai, S.: Compliance monitor for early warning risk determination. Wirtschaftsinformatik 50(5), 375–382 (2008). Vieweg VerlagCrossRef
3.
Zurück zum Zitat Wohlgemuth, S.: Resilience as a new enforcement model for IT security based on usage control. In: 5th Security & Privacy Workshop on Data Usage Management, 35th IEEE Symposium on Security and Privacy (S&P) 2014, pp. 31–38 (2014) Wohlgemuth, S.: Resilience as a new enforcement model for IT security based on usage control. In: 5th Security & Privacy Workshop on Data Usage Management, 35th IEEE Symposium on Security and Privacy (S&P) 2014, pp. 31–38 (2014)
4.
Zurück zum Zitat Fung, B., Wang, K., Fu, A., Yu, P.: Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques. Chapman and Hall/CRC, Boca Raton (2010)CrossRef Fung, B., Wang, K., Fu, A., Yu, P.: Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques. Chapman and Hall/CRC, Boca Raton (2010)CrossRef
5.
Zurück zum Zitat Sweeney, L.: k-anonymity: a Model for Protecting Privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)CrossRef Sweeney, L.: k-anonymity: a Model for Protecting Privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)CrossRef
6.
Zurück zum Zitat Machanavajjhala, A., Gehrke, J., Kifer, D.: ℓ-diversity: privacy beyond k-anonymity. In: 22nd IEEE International Conference on Data Engineering, pp. 24–75 (2006) Machanavajjhala, A., Gehrke, J., Kifer, D.: ℓ-diversity: privacy beyond k-anonymity. In: 22nd IEEE International Conference on Data Engineering, pp. 24–75 (2006)
7.
Zurück zum Zitat Soria-Comas, J., et al.: Probabilistic k-anonymity through microaggregation and data swapping. In: IEEE International Conference on Fuzzy Systems, pp. 1–8 (2012) Soria-Comas, J., et al.: Probabilistic k-anonymity through microaggregation and data swapping. In: IEEE International Conference on Fuzzy Systems, pp. 1–8 (2012)
8.
Zurück zum Zitat Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006)CrossRef Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006)CrossRef
9.
Zurück zum Zitat Shokri, R., et al.: Unraveling an old cloak: k-anonymity for location privacy. In: 9th Annual ACM Workshop on Privacy in the Electronic Society, pp. 115–118 (2010) Shokri, R., et al.: Unraveling an old cloak: k-anonymity for location privacy. In: 9th Annual ACM Workshop on Privacy in the Electronic Society, pp. 115–118 (2010)
10.
Zurück zum Zitat Nguyen-Son, H.-Q., Tran, M.-T., Tien, D.T., Yoshiura, H., Sonehara, N., Echizen, I.: Automatic anonymous fingerprinting of text posted on social networking services. In: Shi, Y.Q., Kim, H.-J., Pérez-González, F. (eds.) IWDW 2012. LNCS, vol. 7809, pp. 410–424. Springer, Heidelberg (2013)CrossRef Nguyen-Son, H.-Q., Tran, M.-T., Tien, D.T., Yoshiura, H., Sonehara, N., Echizen, I.: Automatic anonymous fingerprinting of text posted on social networking services. In: Shi, Y.Q., Kim, H.-J., Pérez-González, F. (eds.) IWDW 2012. LNCS, vol. 7809, pp. 410–424. Springer, Heidelberg (2013)CrossRef
11.
Zurück zum Zitat Winkler, W.E.: Masking and re-identification methods for public-use microdata: overview and research problems. In: Domingo-Ferrer, J., Torra, V. (eds.) PSD 2004. LNCS, vol. 3050, pp. 231–246. Springer, Heidelberg (2004)CrossRef Winkler, W.E.: Masking and re-identification methods for public-use microdata: overview and research problems. In: Domingo-Ferrer, J., Torra, V. (eds.) PSD 2004. LNCS, vol. 3050, pp. 231–246. Springer, Heidelberg (2004)CrossRef
12.
Zurück zum Zitat Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: 29th IEEE Security & Privacy, pp. 111–125 (2008) Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: 29th IEEE Security & Privacy, pp. 111–125 (2008)
13.
Zurück zum Zitat Watanabe, N., Yoshiura, H.: Detecting revelation of private information on online social networks. In: 6th IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 502–505 (2010) Watanabe, N., Yoshiura, H.: Detecting revelation of private information on online social networks. In: 6th IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 502–505 (2010)
14.
Zurück zum Zitat Polakis, I., et al.: Using social networks to harvest email addresses. In: 9th Annual ACM Workshop on Privacy in the Electronic Society, pp. 11–20 (2010) Polakis, I., et al.: Using social networks to harvest email addresses. In: 9th Annual ACM Workshop on Privacy in the Electronic Society, pp. 11–20 (2010)
15.
Zurück zum Zitat Salton, G., Wong, A., Yang, C.: A vector space model for automatic indexing. Commun. ACM 18(11), 613–620 (1975)CrossRef Salton, G., Wong, A., Yang, C.: A vector space model for automatic indexing. Commun. ACM 18(11), 613–620 (1975)CrossRef
16.
Zurück zum Zitat Jones, K.: A statistical interpretation of term specificity and its application in retrieval. J. Documentation 28(1), 11–21 (1972)CrossRef Jones, K.: A statistical interpretation of term specificity and its application in retrieval. J. Documentation 28(1), 11–21 (1972)CrossRef
Metadaten
Titel
De-anonymising Social Network Posts by Linking with Résumé
verfasst von
Yohei Ogawa
Eina Hashimoto
Masatsugu Ichino
Isao Echizen
Hiroshi Yoshiura
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-26762-3_22