SlideShare uma empresa Scribd logo
1 de 70
Baixar para ler offline
Call Me MayBe:
Understanding Nature and Risks of
Sharing Mobile Numbers on Online Social
Networks
Prachi Jain
M.Tech. Thesis Defense
14th November 2013
Committee:
Dr. Ponnurangam Kumaraguru, IIIT-Delhi (Chair)
Dr. Alessandra Sala, Alcatel Lucent (Bell Labs), Dublin
Dr. Amarjeet Singh, IIIT-Delhi
Problem Statement
 Characterize mobile number sharing behavior on
Online Social Networks.
 Examine risk of collation of mobile number’s
owner data from multiple online public data
sources.
 Propose a systematic approach for risk
communication.
2
Achievements
 Paper:
Call Me MayBe: Understanding Nature
and Risks of Sharing Mobile Numbers on
Online Social Networks, Conference
on Online Social Networks (COSN) 2013

 Poster:
Flash of Two Worlds, Security and
Privacy Symposium (SPS) 2013
3
Achievements

4
5
Research
motivation
Research Motivation
 46% of Internet users post original (self created)
content on internet.
 User Generated Content (UGC) has high similarity with
offline interactions of user.
 Concerns on (un)intentional mention of sensitive
information on OSN profile.
 Mobile phone number is an example of identifiable
information with which a real-world entity can be
associated uniquely, in most cases.
7
How many of you have posted
mobile numbers on Online Social
Networks?

How many of you have seen
mobile numbers being posted on
Online Social Networks?
8
Sample posts

9
Sample posts

10
Sample posts

11
Sample posts

12
Is it a good idea?
Characterize mobile number
sharing behavior on Online
Social Networks
 Focus on Indian Mobile Numbers

“India has the fastest growing telecom
market in the world.“

 Focus on two most popular social
networks – Facebook & Twitter
14
Background
Twitter 101
Name
Screen name

User description
Whom I
follow

Who
follow me

Tweet

Retweet = Tweet exposed
16
to new audience
Facebook 101
Name

People I am
friends with
User attributes

Public !
Post

17
Personally Identifiable Information
(PII)
An attribute that itself or in combination of other
attributes can connect an online user account
with a real world entity.
 Email address (Balduzzi et al, 2010)
 Phone numbers (Magno et al, 2012; Jain et al, 2013)

18
Indian Mobile Number format
 10 digit number, start with 7 / 8 / 9
 Country code: +91 ( Example: +91 9123456789 )
 Trunk Code: 0 ( Example: 0 9123456789 )

No standard

way of sharing mobile numbers on OSN!

+91- 9123456789

91.91.23.456.789

+91- 91-2345-6789 (91)23.456.789

0 9123456789
(91234)56789
19
Literature
Review
Literature review
 Identity information disclosure on OSNs.

 Consequences of identity information disclosure on
OSNs.
 Communicating the risk of identity information
disclosure.

21
1. Identity information disclosure
on OSNs
Zheleva et al, 2009

Group membership

Balduzzi et al, 2010

Email address

Burger et al, 2011

Gender

Dey et al, 2012

Age

Magno et al, 2012;
Chen et al, 2012;
Jain et al, 2013

Phone numbers

No quantitative study on mobile numbers sharing
behavior on OSN.
22
1. Identity information disclosure
on OSNs
Chen et al, 2012
Observed 2% Facebook users (in their dataset) share
their mobile number as a profile attribute.

Magno et al, 2012
Observed users share their mobile number as profile

attribute on Google+
Single Indian males share most mobile numbers
We dive deeper to understand characteristics of exposed
mobile numbers on Facebook and Twitter posts and user
descriptions.

23
2. Consequences of identity
information disclosure on OSNs
Jagatic et al, 2007
Social phishing

Chen et al, 2012 Mao et al, 2011
Linkage attack

Privacy attack

Krishnamurthy et al, 2012
Auxiliary information collected from online sources might help in
connecting an online profile with an offline entity.

We explore if Indian mobile numbers leaked from OSNs
can be used to gain a wider profile by linking it with
e-government data and truecaller.
24
2. Consequences of identity
information disclosure on OSNs
Schrittwieser et al, 2012
Mobile numbers can be used
to exploit smart phone
messaging services.
Address book resolution
Impersonation, SMS spam,
Phone number enumeration
attack, Status message forgery

attack

Cheng et al, 2013
Address book resolution
Randomly picked mobile

numbers used to integrate
accounts on WeChat and
MiTalk.

Aggregate information
about users in China.
25
2. Consequences of identity
information disclosure on OSNs

We link exposed Indian mobile numbers on
Facebook and Twitter profile with their
WhatsApp profiles.

We study comprehensiveness of additional
information obtained.
26
3. Communicating the risk of
identity information disclosure
Krishnamurthy et al, 2012
Privacy leaks could be prevented by alerting the users

about information sharing vulnerabilities.

We communicate the risk to a set of users by calling them
with the help of an IVR system.
We also study their reactions.
27
Methodology
Approach
Keyword Selection
Data Extraction / Collection
Data Validation
29
System architecture
Facebook
Graph
API

Public users /
posts
with mobile
numbers

Category
+91

Regex
patterns

Category 0
Category
void

call ring

Mobile
number
validation

Keyword
Selection

contact

Indian
Mobile
Number
Database

Category
void

Twitter
Stream
API

Keyword selection

Public Bio/Tweets
with mobile
numbers

Regex
patterns

Category 0
Category
+91

Data collection

Data validation

30
System architecture
Facebook
Graph
API

Public users /
posts
with mobile
numbers

Category
+91

Regex
patterns

Category 0
Category
void

call ring

Mobile
number
validation

Keyword
Selection

contact

Indian
Mobile
Number
Database

Category
void

Twitter
Stream
API

Keyword selection

Public Bio/Tweets
with mobile
numbers

Regex
patterns

Category 0
Category
+91

Data collection

Data validation

31
Data statistics
Twitter:

12th October 2012 – 20th October 2013

Facebook:

16th November 2012 – 20th April 2013

Numbers

Category +91

Category 0

Category void

Twitter Facebook Twitter Facebook Twitter
Mobile
885
Numbers

2,191

User
profiles

2,663

1,074

100%

14,909 8,873
85%

17,913 9,028

Total

Facebook Twitter Facebook

25,566 25,294

41,360 36,358

85%

31,149 25,406

49,817 36,588

32
Analysis
Ownership
Analysis
Ownership analysis: Methodology
Owner posted
the number

Post

Has 1st
person
pronoun

Frequent
action
words

Bio /
Name

Y

Y
Has 2nd / 3rd
person
pronoun

N

Phrasal
search

Y
Non-owner posted
the number

35
Ownership Analysis: Results
Social Network Mechanism

Mobile
Numbers

Total

Twitter:
Owner

Bio

155

291/885 (33%)

Tweet

136

Non-owner

Tweet

18

18/885 (0.02%)

Facebook:
Owner

Post

468

485/2191 (22%)

Name

17

Non-owner

Message

25

25/2191
(0.01%)

Users share their own mobile numbers on OSNs!
36
Source Analysis
Source analysis: Results
Which applications are used
Which applications are used
to share mobile numbers on
to share mobile numbers on
Twitter?
Facebook?
32% numbers on Twitter
were pushed from
Facebook

5%

Facebook
mobile
Facebook for
iPhones
Photos

1%

Facebook
11%

32%

Twitterfeed

12%
8%

Google
26%

LinkedIn
26%

TweetDeck

14%

50%
15%

Facebook for
Android
HootSuite
Twitterfeed

Users posted same mobile numbers on multiple OSNs !

38
Topographical
Analysis
Topographical analysis:
Methodology
Indian Mobile number

XXXX - NNNNNN
Network operator

Subscriber number

Telecom Zone/Circle
Metro

(High density)

A Circle

(Largest
population coverage)

B Circle

C Circle

(Smallest
population coverage)

(Source: http://www.trai.gov.in)
40
Topographical analysis: Results
Telecom Circle

Category

# of Mobile Numbers

Delhi

Metropolitan 582

Mumbai

Metropolitan 312

Karnataka

“A” Circle

233

Punjab

“B” Circle

226

Rajasthan

“B” Circle

171

Andhra Pradesh

“A” Circle

164

Kerala

“B” Circle

158

Maharashtra

“A” Circle

140

Gujarat

“A” Circle

135

Tamil Nadu

“A” Circle

102

Users of metropolitan cities in India actively posted mobile
numbers on OSNs !

41
Gender Analysis
Gender analysis: Results
Cross Syndication

Facebook Twitter
Total users
Gender available (G)

2,663
1,438

1,074
29

Females (F)
Males (M)
F/G

220
1,218
15%

6
23
20%

Females are conservative while
sharing mobile numbers on OSNs !

43
Context Analysis
Context Analysis: Results
Twitter Tag Cloud

Facebook Tag Cloud

Emergency,
marketing, escort
and entertainment
business are major
context on OSNs !
45
Risk
Assessment
Risk of Collation: Experiment 1
Methodology
Mobile
Number

Penetration rate:

Store in Phone
Address Book
Install and
open
WhatsApp

Status

userexposed
prate =
usertotal
= 1,071 / 3,076
= 34.8 %

Last Seen
time
47
Risk of Collation: Experiment 1
Sample Status

48
Risk of Collation: Experiment 2
OCEAN:
Open
Government
Data
Repository

Details

User 1

User 2

Mobile
Number

+9198xxxx5485

+9199xxxx2708

Full Name

xxxxxx Jeswani

x Gambhir

Age

53

23

Gender

Male

Father’s
Name

x x Jeswani

Address

***, Mig Flats, *-block,
xxxxx Vihar Phase-I

8 Delhi
Male
Users
xx Gambhir
Identified
Uniquely
***, xxxx Bagh,
Delhi

ID

Driving License:
DL/04/xxx/222668

Voter ID:
NLNxxx5696

Shared by
Owner?

Yes

No
49
Risk
Communication
Experiment: IVR System Setup

(2,492)
51
Result:
Callee
Decision
Tree

0.35 (867)

Call the
Number
0.65 (1625)

Call not
picked

Call picked

0.61 (988)

Listen
message

Disconnect
the Call
0.48 (479)

0.52 (509)

Listen Options
0.21 (107)
FORM 1

0.39 (637)

Didn’t know
0.23 (47)

Leave
Feedback

Disconnect
the Call

0.20
(102)

0.59 (300)

Posted
purposefully

Disconnect
the Call

0.77 (60)

Disconnect
the Call

1.0 (47)

Disconnect
the Call

52
Feedback
“Thank you for information, I have deleted, I will not
post my number online.”
“I want to know how to remove my number and I don't
know, I haven't put my number purposely but if it is
there, where exactly it is there I would also like to know
that. Please get in touch with me asap. Thank you!”

“It is a very nice process that you are doing and making
people aware about online frauds and telephone
number frauds but your system is basically calling
business houses”
53
Understanding user’s
response: Ownership analysis
Ownership analysis on posts from users who said that
they did not know that their number can be leaked (IVR
option 1)
38.3% (41/107) of mobile numbers were posted
publicly by their owners.
Inability of users to manage their privacy settings.
OR
Inadvertent disclosure of personal information (mobile
number)
54
Evaluation: Interview
Mobile numbers
from profiles on
OSNs

Collating with
e-government
data repository
(OCEAN)

8 users
identified
uniquely
55
Interview questions
Interviewed 8 people whom we uniquely
identified.
To validate the information we had about them.
Inquire if they posted mobile number on OSN.
If yes than why?
If no then we informed them about the profile revealing
their number. And asked if they knew the person.

Will they remove the number and Why?
Feedback?
56
Interview results
# of callee
True positive (Valid information) 5/8
False positive
1/8
Denied to get interviewed
1/8
Did not pick
1/8

57
Interview Response
 Suspected if we got the information via
offline sources.
 Called their service provider to confirm
what bad we can do with this information
about them.

58
Interview Response
Posted mobile number to be in touch with friends
and relatives.
 Expressed concerns of getting calls from
unwanted people.
Posted mobile number to promote a small scale
business.
 Inquired and suggested some countermeasures.

59
Take
Aways
Take Aways
Users share their own mobile numbers on OSNs.
Users post same mobile numbers on multiple OSNs.
Females are conservative while sharing mobile numbers on
OSNs.

A publically shared mobile number can expose sensitive details
(age, ID, family details and full address) of its owner, from
multiple sources.
We should communicate the risks of sharing mobile numbers
online, to their owners.
Few users were unaware of the online presence of their number.
61
Future work
Build a generic technological,
people and process oriented
solutions to forewarn users and
raise awareness towards risks of
exposing mobile numbers on
OSNs.
62
Acknowledgments
Paridhi Jain, PhD student, IIIT Delhi

Siddhartha Asthana, PhD student, IIIT Delhi
Anupama Aggarwal, PhD student, IIIT Delhi
Precog family
63
Publications and poster
Prachi Jain, Paridhi Jain, Ponnurangam
Kumaraguru. Call Me MayBe: Understanding
Nature and Risks of Sharing Mobile Numbers on
Online Social Networks. ACM Conference on Online
Social Networks (COSN) 2013

Prachi Jain, Ponnurangam Kumaraguru. Flash of
Two Worlds. Security and Privacy Symposium (SPS)
2013
64
References
1.

Paul 2010, Broken promises of privacy: Responding to the surprising
failure of anonymization. UCLA Law Review, 57:1701, 2010.

2.

Prachi Jain, Paridhi Jain, and Ponnurangam Kumaraguru. Call me maybe:
understanding the nature and risks of sharing mobile numbers on online
social networks. In Proceedings of the first ACM conference on Online
social networks, pages 101-106. ACM, 2013.

3.

Gabriel Magno, Giovanni Comarela, Diego Saez-Trumper, Meeyoung Cha,
and Virgilio Almeida. New kid on the block: Exploring the google+ social
graph. In Proceedings of the 2012 ACM conference on Internet
measurement conference, pages 159-170. ACM, 2012.

4.

Latanya Sweeney. k-anonymity: A model for protecting privacy.
International Journal of Uncertainty, Fuzziness and Knowledge-Based
Systems, 10(05):557-570, 2002.

5.

Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide
Balzarotti, and Christopher Kruegel. Abusing social networks for
automated user proling. In Recent Advances in Intrusion Detection, pages
422-441. Springer, 2010.
65
References
6.

Ratan Dey, Cong Tang, Keith Ross, and Nitesh Saxena. Estimating age privacy
leakage in online social networks. In INFOCOM, 2012 Proceedings IEEE, pages
2836-2840. IEEE, 2012.

7.

John D Burger, John Henderson, George Kim, and Guido Zarrella.
Discriminating gender on twitter. In Proceedings of the Conference on
Empirical Methods in Natural Language Processing, pages 1301-1309.
Association for Computational Linguistics, 2011.

8.

Tom N Jagatic, Nathaniel A Johnson, Markus Jakobsson, and Filippo Menczer.
Social phishing. Communications of the ACM, 50(10):94-100, 2007.

9.

Terence Chen, Mohamed Ali Kaafar, Arik Friedman, and Roksana Boreli. Is
more always merrier?: a deep dive into online social footprints. In
Proceedings of the 2012 ACM workshop on Workshop on online social
networks, pages 67-72. ACM, 2012.

10. Huina Mao, Xin Shuai, and Apu Kapadia. Loose tweets: an analysis of privacy
leaks on twitter. In Proceedings of the 10th annual ACM workshop on Privacy
in the electronic society, pages 1-12. ACM, 2011.
66
References
11. Sebastian Schrittwieser, Peter Fruhwirt, Peter Kieseberg, Manuel Leithner,
Martin Mulazzani, Markus Huber, and Edgar Weippl. Guess whos texting you?
evaluating the security of smartphone messaging applications. In
Proceedings of the 19th Annual Symposium on Network and Distributed
System Security, 2012.
12. Yao Cheng, Lingyun Ying, Sibei Jiao, Purui Su, and Dengguo Feng. Bind your
phone number with caution: automated user proling through address book
matching on smartphone. In Proceedings of the 8th ACM SIGSAC symposium
on Information, computer and communications security, pages 335-340.
ACM, 2013.
13. Balachander Krishnamurthy. Privacy and online social networks: Can colorless
green ideas sleep furiously? IEEE Security & Privacy, 11(3):14-20, 2013.
14. Zeynep Tufekci. Can you see me now? audience and disclosure regulation in
online social network sites. Bulletin of Science, Technology & Society,
28(1):20-36, 2008.

67
Thank You!
Questions?
prachi1107@iiitd.ac.in
pk@iiitd.ac.in
For further information, please write to

pk@iiitd.ac.in
precog.iiitd.edu.in

Mais conteúdo relacionado

Mais procurados

Current trend in internet access and utilization using mobile devices among p...
Current trend in internet access and utilization using mobile devices among p...Current trend in internet access and utilization using mobile devices among p...
Current trend in internet access and utilization using mobile devices among p...Alexander Decker
 
IRJET- Detecting Fake News
IRJET- Detecting Fake NewsIRJET- Detecting Fake News
IRJET- Detecting Fake NewsIRJET Journal
 
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEYPHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEYIJNSA Journal
 
Development of Security Detection Model for the Security of Social Blogs and ...
Development of Security Detection Model for the Security of Social Blogs and ...Development of Security Detection Model for the Security of Social Blogs and ...
Development of Security Detection Model for the Security of Social Blogs and ...AIRCC Publishing Corporation
 

Mais procurados (6)

Current trend in internet access and utilization using mobile devices among p...
Current trend in internet access and utilization using mobile devices among p...Current trend in internet access and utilization using mobile devices among p...
Current trend in internet access and utilization using mobile devices among p...
 
IRJET- Detecting Fake News
IRJET- Detecting Fake NewsIRJET- Detecting Fake News
IRJET- Detecting Fake News
 
Seminar Report Mine
Seminar Report MineSeminar Report Mine
Seminar Report Mine
 
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEYPHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
PHISHING MITIGATION TECHNIQUES: A LITERATURE SURVEY
 
Spammer taxonomy using scientific approach
Spammer taxonomy using scientific approachSpammer taxonomy using scientific approach
Spammer taxonomy using scientific approach
 
Development of Security Detection Model for the Security of Social Blogs and ...
Development of Security Detection Model for the Security of Social Blogs and ...Development of Security Detection Model for the Security of Social Blogs and ...
Development of Security Detection Model for the Security of Social Blogs and ...
 

Destaque

Truecaller - Take The Right Call
Truecaller - Take The Right CallTruecaller - Take The Right Call
Truecaller - Take The Right CallIdris Bhavnagarwala
 
Product Analytics at Truecaller
Product Analytics at TruecallerProduct Analytics at Truecaller
Product Analytics at TruecallerTruecaller
 
How Qatar uses WhatsApp, Snapchat and other social media
How Qatar uses WhatsApp, Snapchat and other social mediaHow Qatar uses WhatsApp, Snapchat and other social media
How Qatar uses WhatsApp, Snapchat and other social mediaMOTC Qatar
 
Big Data Platform at Pinterest
Big Data Platform at PinterestBig Data Platform at Pinterest
Big Data Platform at PinterestQubole
 
Project report on 'customer satisfaction towards whatsapp'
Project report on 'customer satisfaction towards whatsapp'Project report on 'customer satisfaction towards whatsapp'
Project report on 'customer satisfaction towards whatsapp'Chirag Patel
 

Destaque (8)

Truecaller - Take The Right Call
Truecaller - Take The Right CallTruecaller - Take The Right Call
Truecaller - Take The Right Call
 
Product Analytics at Truecaller
Product Analytics at TruecallerProduct Analytics at Truecaller
Product Analytics at Truecaller
 
How Qatar uses WhatsApp, Snapchat and other social media
How Qatar uses WhatsApp, Snapchat and other social mediaHow Qatar uses WhatsApp, Snapchat and other social media
How Qatar uses WhatsApp, Snapchat and other social media
 
Big Data Platform at Pinterest
Big Data Platform at PinterestBig Data Platform at Pinterest
Big Data Platform at Pinterest
 
Whatsapp
WhatsappWhatsapp
Whatsapp
 
Whatsapp project work
Whatsapp project workWhatsapp project work
Whatsapp project work
 
Project report on 'customer satisfaction towards whatsapp'
Project report on 'customer satisfaction towards whatsapp'Project report on 'customer satisfaction towards whatsapp'
Project report on 'customer satisfaction towards whatsapp'
 
Strategy on whatsapp
Strategy on whatsappStrategy on whatsapp
Strategy on whatsapp
 

Semelhante a Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on Online Social Networks

IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET Journal
 
Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on On...
Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on On...Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on On...
Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on On...IIIT Hyderabad
 
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Eswar Publications
 
Measuring human behaviour by sensing everyday mobile interactions
Measuring human behaviour by sensing everyday mobile interactionsMeasuring human behaviour by sensing everyday mobile interactions
Measuring human behaviour by sensing everyday mobile interactionsOresti Banos
 
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATIONA BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATIONNana Kwame(Emeritus) Gyamfi
 
Smartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process ModelSmartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process ModelCSCJournals
 
Smartphone Forensic Challenges
Smartphone Forensic ChallengesSmartphone Forensic Challenges
Smartphone Forensic ChallengesCSCJournals
 
Personality Prediction with social media using Machine Learning
Personality Prediction with social media using Machine LearningPersonality Prediction with social media using Machine Learning
Personality Prediction with social media using Machine LearningIRJET Journal
 
Personality Prediction with social media using Machine Learning
Personality Prediction with social media using Machine LearningPersonality Prediction with social media using Machine Learning
Personality Prediction with social media using Machine LearningIRJET Journal
 
State of Social Media in India | August 2013
State of Social Media in India | August 2013State of Social Media in India | August 2013
State of Social Media in India | August 2013Nabeel Adeni
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...IRJET Journal
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...IRJET Journal
 
Utilizing Social Networks for User Model Priming: User Attitudes
Utilizing Social Networks for User Model Priming: User AttitudesUtilizing Social Networks for User Model Priming: User Attitudes
Utilizing Social Networks for User Model Priming: User AttitudesAdam Moore
 
A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)eSAT Journals
 
A Mobile Based Women Safety Application (I Safe Apps)
A Mobile Based Women Safety Application (I Safe Apps)A Mobile Based Women Safety Application (I Safe Apps)
A Mobile Based Women Safety Application (I Safe Apps)IOSR Journals
 
IE admission - Express yourself - Social interaction within 10 years
IE admission - Express yourself - Social interaction within 10 yearsIE admission - Express yourself - Social interaction within 10 years
IE admission - Express yourself - Social interaction within 10 yearsAndrea Salvati
 

Semelhante a Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on Online Social Networks (20)

IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
 
Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on On...
Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on On...Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on On...
Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on On...
 
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
 
Measuring human behaviour by sensing everyday mobile interactions
Measuring human behaviour by sensing everyday mobile interactionsMeasuring human behaviour by sensing everyday mobile interactions
Measuring human behaviour by sensing everyday mobile interactions
 
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATIONA BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
 
Smartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process ModelSmartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process Model
 
The Challenges of Integrating Mapping and Texting for Community Development i...
The Challenges of Integrating Mapping and Texting for Community Development i...The Challenges of Integrating Mapping and Texting for Community Development i...
The Challenges of Integrating Mapping and Texting for Community Development i...
 
sun2021.pdf
sun2021.pdfsun2021.pdf
sun2021.pdf
 
204
204204
204
 
Smartphone Forensic Challenges
Smartphone Forensic ChallengesSmartphone Forensic Challenges
Smartphone Forensic Challenges
 
Personality Prediction with social media using Machine Learning
Personality Prediction with social media using Machine LearningPersonality Prediction with social media using Machine Learning
Personality Prediction with social media using Machine Learning
 
Personality Prediction with social media using Machine Learning
Personality Prediction with social media using Machine LearningPersonality Prediction with social media using Machine Learning
Personality Prediction with social media using Machine Learning
 
State of Social Media in India | August 2013
State of Social Media in India | August 2013State of Social Media in India | August 2013
State of Social Media in India | August 2013
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
 
Utilizing Social Networks for User Model Priming: User Attitudes
Utilizing Social Networks for User Model Priming: User AttitudesUtilizing Social Networks for User Model Priming: User Attitudes
Utilizing Social Networks for User Model Priming: User Attitudes
 
A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)
 
A Mobile Based Women Safety Application (I Safe Apps)
A Mobile Based Women Safety Application (I Safe Apps)A Mobile Based Women Safety Application (I Safe Apps)
A Mobile Based Women Safety Application (I Safe Apps)
 
F017112934
F017112934F017112934
F017112934
 
IE admission - Express yourself - Social interaction within 10 years
IE admission - Express yourself - Social interaction within 10 yearsIE admission - Express yourself - Social interaction within 10 years
IE admission - Express yourself - Social interaction within 10 years
 

Mais de IIIT Hyderabad

Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayResponsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayIIIT Hyderabad
 
International Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesInternational Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesIIIT Hyderabad
 
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasResponsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasIIIT Hyderabad
 
Identify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIIIT Hyderabad
 
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyData Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyIIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...IIIT Hyderabad
 
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityIIIT Hyderabad
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...
Data Science for Social Good: #LegalNLP #AlgorithmicBias...IIIT Hyderabad
 
How to Write a (Good) Research Paper
How to Write a (Good) Research Paper How to Write a (Good) Research Paper
How to Write a (Good) Research Paper IIIT Hyderabad
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasData Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasIIIT Hyderabad
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in IndiaIIIT Hyderabad
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in IndiaIIIT Hyderabad
 
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...IIIT Hyderabad
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayIIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...IIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...IIIT Hyderabad
 
Leveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceLeveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceIIIT Hyderabad
 
Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...IIIT Hyderabad
 
A Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesA Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesIIIT Hyderabad
 

Mais de IIIT Hyderabad (20)

Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayResponsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
 
International Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesInternational Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success stories
 
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasResponsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
 
Identify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake News
 
#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI
 
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyData Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
 
How to Write a (Good) Research Paper
How to Write a (Good) Research Paper How to Write a (Good) Research Paper
How to Write a (Good) Research Paper
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasData Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBias
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
 
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
Leveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceLeveraging Social Media for Financial Advice
Leveraging Social Media for Financial Advice
 
Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...
 
A Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesA Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian Languages
 

Último

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Último (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on Online Social Networks

  • 1. Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on Online Social Networks Prachi Jain M.Tech. Thesis Defense 14th November 2013 Committee: Dr. Ponnurangam Kumaraguru, IIIT-Delhi (Chair) Dr. Alessandra Sala, Alcatel Lucent (Bell Labs), Dublin Dr. Amarjeet Singh, IIIT-Delhi
  • 2. Problem Statement  Characterize mobile number sharing behavior on Online Social Networks.  Examine risk of collation of mobile number’s owner data from multiple online public data sources.  Propose a systematic approach for risk communication. 2
  • 3. Achievements  Paper: Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on Online Social Networks, Conference on Online Social Networks (COSN) 2013  Poster: Flash of Two Worlds, Security and Privacy Symposium (SPS) 2013 3
  • 5. 5
  • 7. Research Motivation  46% of Internet users post original (self created) content on internet.  User Generated Content (UGC) has high similarity with offline interactions of user.  Concerns on (un)intentional mention of sensitive information on OSN profile.  Mobile phone number is an example of identifiable information with which a real-world entity can be associated uniquely, in most cases. 7
  • 8. How many of you have posted mobile numbers on Online Social Networks? How many of you have seen mobile numbers being posted on Online Social Networks? 8
  • 13. Is it a good idea?
  • 14. Characterize mobile number sharing behavior on Online Social Networks  Focus on Indian Mobile Numbers “India has the fastest growing telecom market in the world.“  Focus on two most popular social networks – Facebook & Twitter 14
  • 16. Twitter 101 Name Screen name User description Whom I follow Who follow me Tweet Retweet = Tweet exposed 16 to new audience
  • 17. Facebook 101 Name People I am friends with User attributes Public ! Post 17
  • 18. Personally Identifiable Information (PII) An attribute that itself or in combination of other attributes can connect an online user account with a real world entity.  Email address (Balduzzi et al, 2010)  Phone numbers (Magno et al, 2012; Jain et al, 2013) 18
  • 19. Indian Mobile Number format  10 digit number, start with 7 / 8 / 9  Country code: +91 ( Example: +91 9123456789 )  Trunk Code: 0 ( Example: 0 9123456789 ) No standard way of sharing mobile numbers on OSN! +91- 9123456789 91.91.23.456.789 +91- 91-2345-6789 (91)23.456.789 0 9123456789 (91234)56789 19
  • 21. Literature review  Identity information disclosure on OSNs.  Consequences of identity information disclosure on OSNs.  Communicating the risk of identity information disclosure. 21
  • 22. 1. Identity information disclosure on OSNs Zheleva et al, 2009 Group membership Balduzzi et al, 2010 Email address Burger et al, 2011 Gender Dey et al, 2012 Age Magno et al, 2012; Chen et al, 2012; Jain et al, 2013 Phone numbers No quantitative study on mobile numbers sharing behavior on OSN. 22
  • 23. 1. Identity information disclosure on OSNs Chen et al, 2012 Observed 2% Facebook users (in their dataset) share their mobile number as a profile attribute. Magno et al, 2012 Observed users share their mobile number as profile attribute on Google+ Single Indian males share most mobile numbers We dive deeper to understand characteristics of exposed mobile numbers on Facebook and Twitter posts and user descriptions. 23
  • 24. 2. Consequences of identity information disclosure on OSNs Jagatic et al, 2007 Social phishing Chen et al, 2012 Mao et al, 2011 Linkage attack Privacy attack Krishnamurthy et al, 2012 Auxiliary information collected from online sources might help in connecting an online profile with an offline entity. We explore if Indian mobile numbers leaked from OSNs can be used to gain a wider profile by linking it with e-government data and truecaller. 24
  • 25. 2. Consequences of identity information disclosure on OSNs Schrittwieser et al, 2012 Mobile numbers can be used to exploit smart phone messaging services. Address book resolution Impersonation, SMS spam, Phone number enumeration attack, Status message forgery attack Cheng et al, 2013 Address book resolution Randomly picked mobile numbers used to integrate accounts on WeChat and MiTalk. Aggregate information about users in China. 25
  • 26. 2. Consequences of identity information disclosure on OSNs We link exposed Indian mobile numbers on Facebook and Twitter profile with their WhatsApp profiles. We study comprehensiveness of additional information obtained. 26
  • 27. 3. Communicating the risk of identity information disclosure Krishnamurthy et al, 2012 Privacy leaks could be prevented by alerting the users about information sharing vulnerabilities. We communicate the risk to a set of users by calling them with the help of an IVR system. We also study their reactions. 27
  • 29. Approach Keyword Selection Data Extraction / Collection Data Validation 29
  • 30. System architecture Facebook Graph API Public users / posts with mobile numbers Category +91 Regex patterns Category 0 Category void call ring Mobile number validation Keyword Selection contact Indian Mobile Number Database Category void Twitter Stream API Keyword selection Public Bio/Tweets with mobile numbers Regex patterns Category 0 Category +91 Data collection Data validation 30
  • 31. System architecture Facebook Graph API Public users / posts with mobile numbers Category +91 Regex patterns Category 0 Category void call ring Mobile number validation Keyword Selection contact Indian Mobile Number Database Category void Twitter Stream API Keyword selection Public Bio/Tweets with mobile numbers Regex patterns Category 0 Category +91 Data collection Data validation 31
  • 32. Data statistics Twitter: 12th October 2012 – 20th October 2013 Facebook: 16th November 2012 – 20th April 2013 Numbers Category +91 Category 0 Category void Twitter Facebook Twitter Facebook Twitter Mobile 885 Numbers 2,191 User profiles 2,663 1,074 100% 14,909 8,873 85% 17,913 9,028 Total Facebook Twitter Facebook 25,566 25,294 41,360 36,358 85% 31,149 25,406 49,817 36,588 32
  • 35. Ownership analysis: Methodology Owner posted the number Post Has 1st person pronoun Frequent action words Bio / Name Y Y Has 2nd / 3rd person pronoun N Phrasal search Y Non-owner posted the number 35
  • 36. Ownership Analysis: Results Social Network Mechanism Mobile Numbers Total Twitter: Owner Bio 155 291/885 (33%) Tweet 136 Non-owner Tweet 18 18/885 (0.02%) Facebook: Owner Post 468 485/2191 (22%) Name 17 Non-owner Message 25 25/2191 (0.01%) Users share their own mobile numbers on OSNs! 36
  • 38. Source analysis: Results Which applications are used Which applications are used to share mobile numbers on to share mobile numbers on Twitter? Facebook? 32% numbers on Twitter were pushed from Facebook 5% Facebook mobile Facebook for iPhones Photos 1% Facebook 11% 32% Twitterfeed 12% 8% Google 26% LinkedIn 26% TweetDeck 14% 50% 15% Facebook for Android HootSuite Twitterfeed Users posted same mobile numbers on multiple OSNs ! 38
  • 40. Topographical analysis: Methodology Indian Mobile number XXXX - NNNNNN Network operator Subscriber number Telecom Zone/Circle Metro (High density) A Circle (Largest population coverage) B Circle C Circle (Smallest population coverage) (Source: http://www.trai.gov.in) 40
  • 41. Topographical analysis: Results Telecom Circle Category # of Mobile Numbers Delhi Metropolitan 582 Mumbai Metropolitan 312 Karnataka “A” Circle 233 Punjab “B” Circle 226 Rajasthan “B” Circle 171 Andhra Pradesh “A” Circle 164 Kerala “B” Circle 158 Maharashtra “A” Circle 140 Gujarat “A” Circle 135 Tamil Nadu “A” Circle 102 Users of metropolitan cities in India actively posted mobile numbers on OSNs ! 41
  • 43. Gender analysis: Results Cross Syndication Facebook Twitter Total users Gender available (G) 2,663 1,438 1,074 29 Females (F) Males (M) F/G 220 1,218 15% 6 23 20% Females are conservative while sharing mobile numbers on OSNs ! 43
  • 45. Context Analysis: Results Twitter Tag Cloud Facebook Tag Cloud Emergency, marketing, escort and entertainment business are major context on OSNs ! 45
  • 47. Risk of Collation: Experiment 1 Methodology Mobile Number Penetration rate: Store in Phone Address Book Install and open WhatsApp Status userexposed prate = usertotal = 1,071 / 3,076 = 34.8 % Last Seen time 47
  • 48. Risk of Collation: Experiment 1 Sample Status 48
  • 49. Risk of Collation: Experiment 2 OCEAN: Open Government Data Repository Details User 1 User 2 Mobile Number +9198xxxx5485 +9199xxxx2708 Full Name xxxxxx Jeswani x Gambhir Age 53 23 Gender Male Father’s Name x x Jeswani Address ***, Mig Flats, *-block, xxxxx Vihar Phase-I 8 Delhi Male Users xx Gambhir Identified Uniquely ***, xxxx Bagh, Delhi ID Driving License: DL/04/xxx/222668 Voter ID: NLNxxx5696 Shared by Owner? Yes No 49
  • 51. Experiment: IVR System Setup (2,492) 51
  • 52. Result: Callee Decision Tree 0.35 (867) Call the Number 0.65 (1625) Call not picked Call picked 0.61 (988) Listen message Disconnect the Call 0.48 (479) 0.52 (509) Listen Options 0.21 (107) FORM 1 0.39 (637) Didn’t know 0.23 (47) Leave Feedback Disconnect the Call 0.20 (102) 0.59 (300) Posted purposefully Disconnect the Call 0.77 (60) Disconnect the Call 1.0 (47) Disconnect the Call 52
  • 53. Feedback “Thank you for information, I have deleted, I will not post my number online.” “I want to know how to remove my number and I don't know, I haven't put my number purposely but if it is there, where exactly it is there I would also like to know that. Please get in touch with me asap. Thank you!” “It is a very nice process that you are doing and making people aware about online frauds and telephone number frauds but your system is basically calling business houses” 53
  • 54. Understanding user’s response: Ownership analysis Ownership analysis on posts from users who said that they did not know that their number can be leaked (IVR option 1) 38.3% (41/107) of mobile numbers were posted publicly by their owners. Inability of users to manage their privacy settings. OR Inadvertent disclosure of personal information (mobile number) 54
  • 55. Evaluation: Interview Mobile numbers from profiles on OSNs Collating with e-government data repository (OCEAN) 8 users identified uniquely 55
  • 56. Interview questions Interviewed 8 people whom we uniquely identified. To validate the information we had about them. Inquire if they posted mobile number on OSN. If yes than why? If no then we informed them about the profile revealing their number. And asked if they knew the person. Will they remove the number and Why? Feedback? 56
  • 57. Interview results # of callee True positive (Valid information) 5/8 False positive 1/8 Denied to get interviewed 1/8 Did not pick 1/8 57
  • 58. Interview Response  Suspected if we got the information via offline sources.  Called their service provider to confirm what bad we can do with this information about them. 58
  • 59. Interview Response Posted mobile number to be in touch with friends and relatives.  Expressed concerns of getting calls from unwanted people. Posted mobile number to promote a small scale business.  Inquired and suggested some countermeasures. 59
  • 61. Take Aways Users share their own mobile numbers on OSNs. Users post same mobile numbers on multiple OSNs. Females are conservative while sharing mobile numbers on OSNs. A publically shared mobile number can expose sensitive details (age, ID, family details and full address) of its owner, from multiple sources. We should communicate the risks of sharing mobile numbers online, to their owners. Few users were unaware of the online presence of their number. 61
  • 62. Future work Build a generic technological, people and process oriented solutions to forewarn users and raise awareness towards risks of exposing mobile numbers on OSNs. 62
  • 63. Acknowledgments Paridhi Jain, PhD student, IIIT Delhi Siddhartha Asthana, PhD student, IIIT Delhi Anupama Aggarwal, PhD student, IIIT Delhi Precog family 63
  • 64. Publications and poster Prachi Jain, Paridhi Jain, Ponnurangam Kumaraguru. Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on Online Social Networks. ACM Conference on Online Social Networks (COSN) 2013 Prachi Jain, Ponnurangam Kumaraguru. Flash of Two Worlds. Security and Privacy Symposium (SPS) 2013 64
  • 65. References 1. Paul 2010, Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review, 57:1701, 2010. 2. Prachi Jain, Paridhi Jain, and Ponnurangam Kumaraguru. Call me maybe: understanding the nature and risks of sharing mobile numbers on online social networks. In Proceedings of the first ACM conference on Online social networks, pages 101-106. ACM, 2013. 3. Gabriel Magno, Giovanni Comarela, Diego Saez-Trumper, Meeyoung Cha, and Virgilio Almeida. New kid on the block: Exploring the google+ social graph. In Proceedings of the 2012 ACM conference on Internet measurement conference, pages 159-170. ACM, 2012. 4. Latanya Sweeney. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05):557-570, 2002. 5. Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide Balzarotti, and Christopher Kruegel. Abusing social networks for automated user proling. In Recent Advances in Intrusion Detection, pages 422-441. Springer, 2010. 65
  • 66. References 6. Ratan Dey, Cong Tang, Keith Ross, and Nitesh Saxena. Estimating age privacy leakage in online social networks. In INFOCOM, 2012 Proceedings IEEE, pages 2836-2840. IEEE, 2012. 7. John D Burger, John Henderson, George Kim, and Guido Zarrella. Discriminating gender on twitter. In Proceedings of the Conference on Empirical Methods in Natural Language Processing, pages 1301-1309. Association for Computational Linguistics, 2011. 8. Tom N Jagatic, Nathaniel A Johnson, Markus Jakobsson, and Filippo Menczer. Social phishing. Communications of the ACM, 50(10):94-100, 2007. 9. Terence Chen, Mohamed Ali Kaafar, Arik Friedman, and Roksana Boreli. Is more always merrier?: a deep dive into online social footprints. In Proceedings of the 2012 ACM workshop on Workshop on online social networks, pages 67-72. ACM, 2012. 10. Huina Mao, Xin Shuai, and Apu Kapadia. Loose tweets: an analysis of privacy leaks on twitter. In Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, pages 1-12. ACM, 2011. 66
  • 67. References 11. Sebastian Schrittwieser, Peter Fruhwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, and Edgar Weippl. Guess whos texting you? evaluating the security of smartphone messaging applications. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security, 2012. 12. Yao Cheng, Lingyun Ying, Sibei Jiao, Purui Su, and Dengguo Feng. Bind your phone number with caution: automated user proling through address book matching on smartphone. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, pages 335-340. ACM, 2013. 13. Balachander Krishnamurthy. Privacy and online social networks: Can colorless green ideas sleep furiously? IEEE Security & Privacy, 11(3):14-20, 2013. 14. Zeynep Tufekci. Can you see me now? audience and disclosure regulation in online social network sites. Bulletin of Science, Technology & Society, 28(1):20-36, 2008. 67
  • 70. For further information, please write to pk@iiitd.ac.in precog.iiitd.edu.in