{"title":"网络身份:出卖一切?","authors":"S.M. Furnell","doi":"10.1016/j.istr.2010.09.002","DOIUrl":null,"url":null,"abstract":"<div><p>With a wealth of personal data now residing across various locations online, individuals can find themselves at increasing risk of too much information being exposed. This in turn may increase the potential for threats such as cyber-snooping, social engineering, and identity theft based upon the gathered details. In many cases the exposure occurs as a result of what individuals directly post about themselves on social networks and blog sites, whereas in some cases it happens thanks to other people posting things beyond their control. This paper examines the potential risks and some of the routes by which information might be harvested. It then proceeds to consider some of the potential consequences, presenting examples of how people can be duped using freely available information and how willingly they appear to expose it to others. Recognising the ease of online search, and the difficulty of reigning back information once it is exposed, the requirement is clearly to improve user awareness and control over their data in the first instance.</p></div>","PeriodicalId":100669,"journal":{"name":"Information Security Technical Report","volume":"15 2","pages":"Pages 42-46"},"PeriodicalIF":0.0000,"publicationDate":"2010-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.istr.2010.09.002","citationCount":"9","resultStr":"{\"title\":\"Online identity: Giving it all away?\",\"authors\":\"S.M. Furnell\",\"doi\":\"10.1016/j.istr.2010.09.002\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>With a wealth of personal data now residing across various locations online, individuals can find themselves at increasing risk of too much information being exposed. This in turn may increase the potential for threats such as cyber-snooping, social engineering, and identity theft based upon the gathered details. In many cases the exposure occurs as a result of what individuals directly post about themselves on social networks and blog sites, whereas in some cases it happens thanks to other people posting things beyond their control. This paper examines the potential risks and some of the routes by which information might be harvested. It then proceeds to consider some of the potential consequences, presenting examples of how people can be duped using freely available information and how willingly they appear to expose it to others. Recognising the ease of online search, and the difficulty of reigning back information once it is exposed, the requirement is clearly to improve user awareness and control over their data in the first instance.</p></div>\",\"PeriodicalId\":100669,\"journal\":{\"name\":\"Information Security Technical Report\",\"volume\":\"15 2\",\"pages\":\"Pages 42-46\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1016/j.istr.2010.09.002\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Information Security Technical Report\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1363412710000245\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Security Technical Report","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1363412710000245","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
With a wealth of personal data now residing across various locations online, individuals can find themselves at increasing risk of too much information being exposed. This in turn may increase the potential for threats such as cyber-snooping, social engineering, and identity theft based upon the gathered details. In many cases the exposure occurs as a result of what individuals directly post about themselves on social networks and blog sites, whereas in some cases it happens thanks to other people posting things beyond their control. This paper examines the potential risks and some of the routes by which information might be harvested. It then proceeds to consider some of the potential consequences, presenting examples of how people can be duped using freely available information and how willingly they appear to expose it to others. Recognising the ease of online search, and the difficulty of reigning back information once it is exposed, the requirement is clearly to improve user awareness and control over their data in the first instance.