{"title":"购物平台社交媒体帖子对隐私影响的初步分析","authors":"Bethany Sumner, Gokila Dorai, John J. Heslen","doi":"10.1145/3538969.3544457","DOIUrl":null,"url":null,"abstract":"The widespread activity of hash-tagging, especially among the Gen-Z population, and the impact of social commerce on average consumers raise questions about privacy implications and dangers of anonymous cyberstalking. In this work, we examined the privacy implications observed in hash-tag-based social-media posts (of average users and influencers) by following the trails of online shopping platform(s) product listings, consumer reviews, social-commerce policies, and influencer posts. We have conducted a preliminary analysis considering cyberstalking as one of the avenues that an anonymous stalker may use to impact the social-media user negatively. Further, we have conceptualized the trails behind hash-tagging activities in terms of a privacy threat model, the need for practical data analysis tools, and the lack of mitigation strategies at various layers. Mainly, this paper throws light on the need for more robust user privacy policies and the impact on socio-economic-privacy aspects. This paper also demonstrates the need for expanding the scope of digital investigations and DFIR tools beyond just the devices of individuals (including victims, suspects, perpetrators, and cyber-criminals) and to thoroughly prepare the forensic professionals to consider the online presence of individuals in its entirety including anonymous cyberstalking avenues and to raise awareness about the abuse of social networks.","PeriodicalId":306813,"journal":{"name":"Proceedings of the 17th International Conference on Availability, Reliability and Security","volume":"55 2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Preliminary Analysis of Privacy Implications Observed in Social-Media Posts Across Shopping Platforms\",\"authors\":\"Bethany Sumner, Gokila Dorai, John J. Heslen\",\"doi\":\"10.1145/3538969.3544457\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The widespread activity of hash-tagging, especially among the Gen-Z population, and the impact of social commerce on average consumers raise questions about privacy implications and dangers of anonymous cyberstalking. In this work, we examined the privacy implications observed in hash-tag-based social-media posts (of average users and influencers) by following the trails of online shopping platform(s) product listings, consumer reviews, social-commerce policies, and influencer posts. We have conducted a preliminary analysis considering cyberstalking as one of the avenues that an anonymous stalker may use to impact the social-media user negatively. Further, we have conceptualized the trails behind hash-tagging activities in terms of a privacy threat model, the need for practical data analysis tools, and the lack of mitigation strategies at various layers. Mainly, this paper throws light on the need for more robust user privacy policies and the impact on socio-economic-privacy aspects. This paper also demonstrates the need for expanding the scope of digital investigations and DFIR tools beyond just the devices of individuals (including victims, suspects, perpetrators, and cyber-criminals) and to thoroughly prepare the forensic professionals to consider the online presence of individuals in its entirety including anonymous cyberstalking avenues and to raise awareness about the abuse of social networks.\",\"PeriodicalId\":306813,\"journal\":{\"name\":\"Proceedings of the 17th International Conference on Availability, Reliability and Security\",\"volume\":\"55 2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-08-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 17th International Conference on Availability, Reliability and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3538969.3544457\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 17th International Conference on Availability, Reliability and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3538969.3544457","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Preliminary Analysis of Privacy Implications Observed in Social-Media Posts Across Shopping Platforms
The widespread activity of hash-tagging, especially among the Gen-Z population, and the impact of social commerce on average consumers raise questions about privacy implications and dangers of anonymous cyberstalking. In this work, we examined the privacy implications observed in hash-tag-based social-media posts (of average users and influencers) by following the trails of online shopping platform(s) product listings, consumer reviews, social-commerce policies, and influencer posts. We have conducted a preliminary analysis considering cyberstalking as one of the avenues that an anonymous stalker may use to impact the social-media user negatively. Further, we have conceptualized the trails behind hash-tagging activities in terms of a privacy threat model, the need for practical data analysis tools, and the lack of mitigation strategies at various layers. Mainly, this paper throws light on the need for more robust user privacy policies and the impact on socio-economic-privacy aspects. This paper also demonstrates the need for expanding the scope of digital investigations and DFIR tools beyond just the devices of individuals (including victims, suspects, perpetrators, and cyber-criminals) and to thoroughly prepare the forensic professionals to consider the online presence of individuals in its entirety including anonymous cyberstalking avenues and to raise awareness about the abuse of social networks.