Joe Harrison, Joshua Lyons, Lauren Anderson, Lauren Maunder, Paul O'Donnell, Kiernan B. George, Alan J. Michaels
{"title":"个人信息的量化使用和滥用","authors":"Joe Harrison, Joshua Lyons, Lauren Anderson, Lauren Maunder, Paul O'Donnell, Kiernan B. George, Alan J. Michaels","doi":"10.1109/ISI53945.2021.9624816","DOIUrl":null,"url":null,"abstract":"Once shared, our personal information on the Internet is no longer private. We routinely receive emails from companies that we have not had any known interaction with, and are receiving an increasingly large volume of spam phone calls. In this paper, we describe interim results from an experiment designed to quantify who is using and distributing our personally identifying information (PII). To do this, we set up 300 fake identities, each with an email address and around half with a live phone number, and performed one-time online interactions with 188 distinct companies. Over a 9-month span, we received around 20,000 artifacts and found that reputable companies, surprisingly, do not sell our information in ways that we could detect, that there was no observation of undue foreign interest during the election, and that the classic “extended vehicle warranty” scam is still in active use today.","PeriodicalId":347770,"journal":{"name":"2021 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Quantifying Use and Abuse of Personal Information\",\"authors\":\"Joe Harrison, Joshua Lyons, Lauren Anderson, Lauren Maunder, Paul O'Donnell, Kiernan B. George, Alan J. Michaels\",\"doi\":\"10.1109/ISI53945.2021.9624816\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Once shared, our personal information on the Internet is no longer private. We routinely receive emails from companies that we have not had any known interaction with, and are receiving an increasingly large volume of spam phone calls. In this paper, we describe interim results from an experiment designed to quantify who is using and distributing our personally identifying information (PII). To do this, we set up 300 fake identities, each with an email address and around half with a live phone number, and performed one-time online interactions with 188 distinct companies. Over a 9-month span, we received around 20,000 artifacts and found that reputable companies, surprisingly, do not sell our information in ways that we could detect, that there was no observation of undue foreign interest during the election, and that the classic “extended vehicle warranty” scam is still in active use today.\",\"PeriodicalId\":347770,\"journal\":{\"name\":\"2021 IEEE International Conference on Intelligence and Security Informatics (ISI)\",\"volume\":\"52 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE International Conference on Intelligence and Security Informatics (ISI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISI53945.2021.9624816\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Intelligence and Security Informatics (ISI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISI53945.2021.9624816","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Once shared, our personal information on the Internet is no longer private. We routinely receive emails from companies that we have not had any known interaction with, and are receiving an increasingly large volume of spam phone calls. In this paper, we describe interim results from an experiment designed to quantify who is using and distributing our personally identifying information (PII). To do this, we set up 300 fake identities, each with an email address and around half with a live phone number, and performed one-time online interactions with 188 distinct companies. Over a 9-month span, we received around 20,000 artifacts and found that reputable companies, surprisingly, do not sell our information in ways that we could detect, that there was no observation of undue foreign interest during the election, and that the classic “extended vehicle warranty” scam is still in active use today.