Skip to main content

2024 | OriginalPaper | Buchkapitel

From Digital Tracks to Digital Twins: On the Path to Cross-Platform Profile Linking

verfasst von : Sergej Schultenkämper, Frederik S. Bäumer, Benjamin Bellgrau, Yeong Su Lee, Michaela Geierhos

Erschienen in: Enterprise Design, Operations, and Computing. EDOC 2023 Workshops

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In recent years, many studies have focused on correlating the profiles of real users across different social media. On the one hand, this provides a better overview of the user’s social behavior; on the other hand, it can be used to warn of possible abuse through identity theft or cyberbullying. We try to make the threat on the Web predictable for the individual user by creating digital twins. To do this, it is important to use different data sources and to merge overlapping data across platforms. In this paper, we show that YouTube is a suitable entry point into the online social network for making connections between platforms, tracking user activity across platforms, and finally merging the collected profile information into an overall picture, the digital twin.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
4.
Zurück zum Zitat Bäumer, F.S., Grote, N., Kersting, J., Geierhos, M.: Privacy matters: detecting nocuous patient data exposure in online physician reviews. In: Damasevicius, R., Mikasyte, V. (eds.) Information and Software Technologies. ICIST 2017. CCIS, vol. 756, pp. 77–89. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-67642-5_7 Bäumer, F.S., Grote, N., Kersting, J., Geierhos, M.: Privacy matters: detecting nocuous patient data exposure in online physician reviews. In: Damasevicius, R., Mikasyte, V. (eds.) Information and Software Technologies. ICIST 2017. CCIS, vol. 756, pp. 77–89. Springer, Cham (2017). https://​doi.​org/​10.​1007/​978-3-319-67642-5_​7
5.
Zurück zum Zitat Bäumer, F.S., Kersting, J., Orlikowski, M., Geierhos, M.: Towards a multi-stage approach to detect privacy breaches in physician reviews. In: SEMANTICS Posters & Demos (2018) Bäumer, F.S., Kersting, J., Orlikowski, M., Geierhos, M.: Towards a multi-stage approach to detect privacy breaches in physician reviews. In: SEMANTICS Posters & Demos (2018)
6.
7.
Zurück zum Zitat Bäumer, F.S., Denisov, S., Su Lee, Y., Geierhos, M.: Towards authority-dependent risk identification and analysis in online networks. In: Halimi, A., Ayday, E. (eds.) Proceedings of the IST-190 Research Symposium (RSY) on AI, ML and BD for Hybrid Military Operations (AI4HMO) (2021) Bäumer, F.S., Denisov, S., Su Lee, Y., Geierhos, M.: Towards authority-dependent risk identification and analysis in online networks. In: Halimi, A., Ayday, E. (eds.) Proceedings of the IST-190 Research Symposium (RSY) on AI, ML and BD for Hybrid Military Operations (AI4HMO) (2021)
10.
Zurück zum Zitat Denisov, S., Bäumer, F.S.: The only link you will ever need: how social media reference landing pages speed up profile matching. In: Lopata, A., Gudoniene, D., Butkiene, R. (eds.) Information and Software Technologies. ICIST 2022. CCIS, vol. 1665, pp. 136–147. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-16302-9-10 Denisov, S., Bäumer, F.S.: The only link you will ever need: how social media reference landing pages speed up profile matching. In: Lopata, A., Gudoniene, D., Butkiene, R. (eds.) Information and Software Technologies. ICIST 2022. CCIS, vol. 1665, pp. 136–147. Springer, Cham (2022). https://​doi.​org/​10.​1007/​978-3-031-16302-9-10
13.
Zurück zum Zitat Gan, D., Jenkins, L.R.: Social networking privacy-Who’s stalking you? Future Internet 7(1), 67–93 (2015)CrossRef Gan, D., Jenkins, L.R.: Social networking privacy-Who’s stalking you? Future Internet 7(1), 67–93 (2015)CrossRef
14.
Zurück zum Zitat Goga, O., Lei, H., Parthasarathi, S.H.K., Friedland, G., Sommer, R., Teixeira, R.: Exploiting innocuous activity for correlating users across sites. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 447–458. WWW ’13, Association for Computing Machinery, New York, NY, USA (2013). https://doi.org/10.1145/2488388.2488428 Goga, O., Lei, H., Parthasarathi, S.H.K., Friedland, G., Sommer, R., Teixeira, R.: Exploiting innocuous activity for correlating users across sites. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 447–458. WWW ’13, Association for Computing Machinery, New York, NY, USA (2013). https://​doi.​org/​10.​1145/​2488388.​2488428
15.
Zurück zum Zitat Halimi, A., Ayday, E.: Efficient quantification of profile matching risk in social networks using belief propagation. In: Chen, L., Li, N., Liang, K., Schneider, S. (eds.) Computer Security – ESORICS 2020. ESORICS 2020. LNCS, vol. 12308, pp. 110–130. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-58951-6_6 Halimi, A., Ayday, E.: Efficient quantification of profile matching risk in social networks using belief propagation. In: Chen, L., Li, N., Liang, K., Schneider, S. (eds.) Computer Security – ESORICS 2020. ESORICS 2020. LNCS, vol. 12308, pp. 110–130. Springer, Cham (2020). https://​doi.​org/​10.​1007/​978-3-030-58951-6_​6
16.
Zurück zum Zitat Huber, M., Kowalski, S., Nohlberg, M., Tjoa, S.: Towards automating social engineering using social networking sites. In: 2009 International Conference on Computational Science and Engineering, vol. 3, pp. 117–124. IEEE (2009) Huber, M., Kowalski, S., Nohlberg, M., Tjoa, S.: Towards automating social engineering using social networking sites. In: 2009 International Conference on Computational Science and Engineering, vol. 3, pp. 117–124. IEEE (2009)
18.
Zurück zum Zitat Labuschagne, A., Eloff, M., Veerasamy, N.: The dark side of web 2.0. In: Hercheui, M.D., Whitehouse, D., McIver, W., Phahlamohlaka, J. (eds.) ICT Critical Infrastructures and Society. HCC 2012. IFIPAICT, LNCS, vol. 386, pp. 237–249. Springer, Berlin, Heidelberg (2012). https://doi.org/10.1007/978-3-642-33332-3_22 Labuschagne, A., Eloff, M., Veerasamy, N.: The dark side of web 2.0. In: Hercheui, M.D., Whitehouse, D., McIver, W., Phahlamohlaka, J. (eds.) ICT Critical Infrastructures and Society. HCC 2012. IFIPAICT, LNCS, vol. 386, pp. 237–249. Springer, Berlin, Heidelberg (2012). https://​doi.​org/​10.​1007/​978-3-642-33332-3_​22
19.
Zurück zum Zitat Li, Y., Ji, W., Gao, X., Deng, Y., Dong, W., Li, D.: Matching user accounts with spatio-temporal awareness across social networks. Inf. Sci. 570 (2021) Li, Y., Ji, W., Gao, X., Deng, Y., Dong, W., Li, D.: Matching user accounts with spatio-temporal awareness across social networks. Inf. Sci. 570 (2021)
21.
Zurück zum Zitat Mbarek, A., Jamoussi, S., BenHamadou, A.: Tuser3: a profile matching based algorithm across three heterogeneous social networks. In: Yang, X., Wang, C.D., Islam, M.S., Zhang, Z. (eds.) Advanced Data Mining and Applications. ADMA 2020. LNCS, vol.12447, pp. 191–206. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-65390-3_16 Mbarek, A., Jamoussi, S., BenHamadou, A.: Tuser3: a profile matching based algorithm across three heterogeneous social networks. In: Yang, X., Wang, C.D., Islam, M.S., Zhang, Z. (eds.) Advanced Data Mining and Applications. ADMA 2020. LNCS, vol.12447, pp. 191–206. Springer, Cham (2020). https://​doi.​org/​10.​1007/​978-3-030-65390-3_​16
22.
Zurück zum Zitat Müngen, A.A., Gündoğan, E., Kaya, M.: Identifying multiple social network accounts belonging to the same users. Soc. Netw. Anal. Min. 11(1), 29 (2021)CrossRef Müngen, A.A., Gündoğan, E., Kaya, M.: Identifying multiple social network accounts belonging to the same users. Soc. Netw. Anal. Min. 11(1), 29 (2021)CrossRef
23.
Zurück zum Zitat Ryan, T., Mauch, G.: Getting in bed with Robin Sage. In: Black Hat Conference, pp. 1–8 (2010) Ryan, T., Mauch, G.: Getting in bed with Robin Sage. In: Black Hat Conference, pp. 1–8 (2010)
24.
Zurück zum Zitat Seymour, J., Tully, P.: Weaponizing data science for social engineering: automated E2E spear phishing on Twitter. Black Hat USA 37, 1–39 (2016) Seymour, J., Tully, P.: Weaponizing data science for social engineering: automated E2E spear phishing on Twitter. Black Hat USA 37, 1–39 (2016)
26.
Zurück zum Zitat Soltani, R., Abhari, A.: Identity matching in social media platforms. In: SPECTS, pp. 64–70. IEEE (2013) Soltani, R., Abhari, A.: Identity matching in social media platforms. In: SPECTS, pp. 64–70. IEEE (2013)
27.
Zurück zum Zitat Wang, L., Hu, K., Zhang, Y., Cao, S.: Factor graph model based user profile matching across social networks. IEEE Access 7, 152429–152442 (2019)CrossRef Wang, L., Hu, K., Zhang, Y., Cao, S.: Factor graph model based user profile matching across social networks. IEEE Access 7, 152429–152442 (2019)CrossRef
28.
Zurück zum Zitat Xing, L., Deng, K., Wu, H., Xie, P., Gao, J.: Behavioral habits-based user identification across social networks. Symmetry 11, 1134 (2019) Xing, L., Deng, K., Wu, H., Xie, P., Gao, J.: Behavioral habits-based user identification across social networks. Symmetry 11, 1134 (2019)
29.
Zurück zum Zitat Xing, L., Deng, K., Wu, H., Xie, P., Zhang, M., Wu, Q.: Exploiting two-level information entropy across social networks for user identification. Wirel. Commun. Mob. Comput. 2021, 1–15 (2021) Xing, L., Deng, K., Wu, H., Xie, P., Zhang, M., Wu, Q.: Exploiting two-level information entropy across social networks for user identification. Wirel. Commun. Mob. Comput. 2021, 1–15 (2021)
Metadaten
Titel
From Digital Tracks to Digital Twins: On the Path to Cross-Platform Profile Linking
verfasst von
Sergej Schultenkämper
Frederik S. Bäumer
Benjamin Bellgrau
Yeong Su Lee
Michaela Geierhos
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-54712-6_10

Premium Partner