Skip to main content
Top

2015 | OriginalPaper | Chapter

De-anonymising Social Network Posts by Linking with Résumé

Authors : Yohei Ogawa, Eina Hashimoto, Masatsugu Ichino, Isao Echizen, Hiroshi Yoshiura

Published in: Business Information Systems Workshops

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We have developed a system for identifying the person who posted posts of interest. It calculates the similarity between the posts of interest and the résumé of each candidate person and then identifies the résumé with the highest similarity as that of the posting person. Identification accuracy was improved by using the posts of persons other than the target person. Evaluation using 30 student volunteers who permitted the use of their résumés and sets of tweets showed that using information from tweets of other persons dramatically improved identification accuracy. Identification accuracy was 0.36 and 0.53 when the number of other persons was 4 and 9, respectively. Those that the target person can be limited in 10 % of the candidates were 0.72 both with 4 and 9 such employees.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
UEC is near Chofu station on the Keio line in Tokyo.
 
2
The employer may know which of several employees owns which accounts. However, we can formulate an n–n matching problem by eliminating the known pairs.
 
Literature
1.
go back to reference Okuno, T., Ichino, M., Echizen, I., Utsumi, A., Yoshiura, H.: Ineluctable background checking on social networks: linking job seeker’s résumé and posts. In: 5th IEEE International Workshop on Security and Social Networking (SESOC 2013) (2013) Okuno, T., Ichino, M., Echizen, I., Utsumi, A., Yoshiura, H.: Ineluctable background checking on social networks: linking job seeker’s résumé and posts. In: 5th IEEE International Workshop on Security and Social Networking (SESOC 2013) (2013)
2.
go back to reference Accorsi, R., Sato, Y., Kai, S.: Compliance monitor for early warning risk determination. Wirtschaftsinformatik 50(5), 375–382 (2008). Vieweg VerlagCrossRef Accorsi, R., Sato, Y., Kai, S.: Compliance monitor for early warning risk determination. Wirtschaftsinformatik 50(5), 375–382 (2008). Vieweg VerlagCrossRef
3.
go back to reference Wohlgemuth, S.: Resilience as a new enforcement model for IT security based on usage control. In: 5th Security & Privacy Workshop on Data Usage Management, 35th IEEE Symposium on Security and Privacy (S&P) 2014, pp. 31–38 (2014) Wohlgemuth, S.: Resilience as a new enforcement model for IT security based on usage control. In: 5th Security & Privacy Workshop on Data Usage Management, 35th IEEE Symposium on Security and Privacy (S&P) 2014, pp. 31–38 (2014)
4.
go back to reference Fung, B., Wang, K., Fu, A., Yu, P.: Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques. Chapman and Hall/CRC, Boca Raton (2010)CrossRef Fung, B., Wang, K., Fu, A., Yu, P.: Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques. Chapman and Hall/CRC, Boca Raton (2010)CrossRef
5.
go back to reference Sweeney, L.: k-anonymity: a Model for Protecting Privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)CrossRef Sweeney, L.: k-anonymity: a Model for Protecting Privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(5), 557–570 (2002)CrossRef
6.
go back to reference Machanavajjhala, A., Gehrke, J., Kifer, D.: ℓ-diversity: privacy beyond k-anonymity. In: 22nd IEEE International Conference on Data Engineering, pp. 24–75 (2006) Machanavajjhala, A., Gehrke, J., Kifer, D.: ℓ-diversity: privacy beyond k-anonymity. In: 22nd IEEE International Conference on Data Engineering, pp. 24–75 (2006)
7.
go back to reference Soria-Comas, J., et al.: Probabilistic k-anonymity through microaggregation and data swapping. In: IEEE International Conference on Fuzzy Systems, pp. 1–8 (2012) Soria-Comas, J., et al.: Probabilistic k-anonymity through microaggregation and data swapping. In: IEEE International Conference on Fuzzy Systems, pp. 1–8 (2012)
8.
go back to reference Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006)CrossRef Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006)CrossRef
9.
go back to reference Shokri, R., et al.: Unraveling an old cloak: k-anonymity for location privacy. In: 9th Annual ACM Workshop on Privacy in the Electronic Society, pp. 115–118 (2010) Shokri, R., et al.: Unraveling an old cloak: k-anonymity for location privacy. In: 9th Annual ACM Workshop on Privacy in the Electronic Society, pp. 115–118 (2010)
10.
go back to reference Nguyen-Son, H.-Q., Tran, M.-T., Tien, D.T., Yoshiura, H., Sonehara, N., Echizen, I.: Automatic anonymous fingerprinting of text posted on social networking services. In: Shi, Y.Q., Kim, H.-J., Pérez-González, F. (eds.) IWDW 2012. LNCS, vol. 7809, pp. 410–424. Springer, Heidelberg (2013)CrossRef Nguyen-Son, H.-Q., Tran, M.-T., Tien, D.T., Yoshiura, H., Sonehara, N., Echizen, I.: Automatic anonymous fingerprinting of text posted on social networking services. In: Shi, Y.Q., Kim, H.-J., Pérez-González, F. (eds.) IWDW 2012. LNCS, vol. 7809, pp. 410–424. Springer, Heidelberg (2013)CrossRef
11.
go back to reference Winkler, W.E.: Masking and re-identification methods for public-use microdata: overview and research problems. In: Domingo-Ferrer, J., Torra, V. (eds.) PSD 2004. LNCS, vol. 3050, pp. 231–246. Springer, Heidelberg (2004)CrossRef Winkler, W.E.: Masking and re-identification methods for public-use microdata: overview and research problems. In: Domingo-Ferrer, J., Torra, V. (eds.) PSD 2004. LNCS, vol. 3050, pp. 231–246. Springer, Heidelberg (2004)CrossRef
12.
go back to reference Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: 29th IEEE Security & Privacy, pp. 111–125 (2008) Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: 29th IEEE Security & Privacy, pp. 111–125 (2008)
13.
go back to reference Watanabe, N., Yoshiura, H.: Detecting revelation of private information on online social networks. In: 6th IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 502–505 (2010) Watanabe, N., Yoshiura, H.: Detecting revelation of private information on online social networks. In: 6th IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 502–505 (2010)
14.
go back to reference Polakis, I., et al.: Using social networks to harvest email addresses. In: 9th Annual ACM Workshop on Privacy in the Electronic Society, pp. 11–20 (2010) Polakis, I., et al.: Using social networks to harvest email addresses. In: 9th Annual ACM Workshop on Privacy in the Electronic Society, pp. 11–20 (2010)
15.
go back to reference Salton, G., Wong, A., Yang, C.: A vector space model for automatic indexing. Commun. ACM 18(11), 613–620 (1975)CrossRef Salton, G., Wong, A., Yang, C.: A vector space model for automatic indexing. Commun. ACM 18(11), 613–620 (1975)CrossRef
16.
go back to reference Jones, K.: A statistical interpretation of term specificity and its application in retrieval. J. Documentation 28(1), 11–21 (1972)CrossRef Jones, K.: A statistical interpretation of term specificity and its application in retrieval. J. Documentation 28(1), 11–21 (1972)CrossRef
Metadata
Title
De-anonymising Social Network Posts by Linking with Résumé
Authors
Yohei Ogawa
Eina Hashimoto
Masatsugu Ichino
Isao Echizen
Hiroshi Yoshiura
Copyright Year
2015
DOI
https://doi.org/10.1007/978-3-319-26762-3_22

Premium Partner