ResearchSpace

The dark side of Web 2.0

Show simple item record

dc.contributor.author Labuschagne, WA
dc.contributor.author Eloff, MM
dc.contributor.author Veerasamy, Namosha
dc.date.accessioned 2012-10-22T09:35:46Z
dc.date.available 2012-10-22T09:35:46Z
dc.date.issued 2012-09
dc.identifier.citation Labuschagne, WA, Eloff, MM and Veerasamy, N. The dark side of Web 2.0. ICT Critical Infrastructure and Society, Amsterdam (Netherlands), 27 to 28 September 2012. Published in IFIP Advances in Information and Communication Technology, 2012, Volume 386/2012, 237-249, DOI: 10.1007/978-3-642-33332-3_22 en_US
dc.identifier.isbn 978-3-642-33331-6
dc.identifier.uri http://www.springerlink.com/content/2l16p44123137325/
dc.identifier.uri http://hdl.handle.net/10204/6201
dc.description Copyright: 2011 Springer-Verlag. This is a post-print version of the work. The definitive version is published in IFIP Advances in Information and Communication Technology, 2012, Volume 386/2012, 237-249, DOI: 10.1007/978-3-642-33332-3_22 en_US
dc.description.abstract Social networking sites have increased in popularity and are utilized for many purposes which include connecting with other people, sharing information and creating content. Many people on social networking sites use these platforms to express opinions relating to current affairs within society. People do not realize the value of their data divulged on these platforms and the tactics implemented by social engineers to harvest the seemingly worthless data. An attack vector is created when a user can be profiled using responses from one of these platforms and the data combined with leaked information from another platform. This paper discusses methods for how this data, with no significant value to the users, can become a commodity to social engineers. This paper addresses what information can be deducted from responses on social news sites, as well as investigating how this information can be useful to social engineers. en_US
dc.language.iso en en_US
dc.publisher Springer en_US
dc.relation.ispartofseries Workflow;9679
dc.subject Social networking en_US
dc.subject Web 2.0 en_US
dc.subject Social news sites en_US
dc.subject Social engineers en_US
dc.subject Information security en_US
dc.subject Digital footprint en_US
dc.subject Facebook en_US
dc.subject Information gathering en_US
dc.subject Internet en_US
dc.subject LIWC en_US
dc.subject Social engineering en_US
dc.subject Profiling en_US
dc.title The dark side of Web 2.0 en_US
dc.type Conference Presentation en_US
dc.identifier.apacitation Labuschagne, W., Eloff, M., & Veerasamy, N. (2012). The dark side of Web 2.0. Springer. http://hdl.handle.net/10204/6201 en_ZA
dc.identifier.chicagocitation Labuschagne, WA, MM Eloff, and Namosha Veerasamy. "The dark side of Web 2.0." (2012): http://hdl.handle.net/10204/6201 en_ZA
dc.identifier.vancouvercitation Labuschagne W, Eloff M, Veerasamy N, The dark side of Web 2.0; Springer; 2012. http://hdl.handle.net/10204/6201 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Labuschagne, WA AU - Eloff, MM AU - Veerasamy, Namosha AB - Social networking sites have increased in popularity and are utilized for many purposes which include connecting with other people, sharing information and creating content. Many people on social networking sites use these platforms to express opinions relating to current affairs within society. People do not realize the value of their data divulged on these platforms and the tactics implemented by social engineers to harvest the seemingly worthless data. An attack vector is created when a user can be profiled using responses from one of these platforms and the data combined with leaked information from another platform. This paper discusses methods for how this data, with no significant value to the users, can become a commodity to social engineers. This paper addresses what information can be deducted from responses on social news sites, as well as investigating how this information can be useful to social engineers. DA - 2012-09 DB - ResearchSpace DP - CSIR KW - Social networking KW - Web 2.0 KW - Social news sites KW - Social engineers KW - Information security KW - Digital footprint KW - Facebook KW - Information gathering KW - Internet KW - LIWC KW - Social engineering KW - Profiling LK - https://researchspace.csir.co.za PY - 2012 SM - 978-3-642-33331-6 T1 - The dark side of Web 2.0 TI - The dark side of Web 2.0 UR - http://hdl.handle.net/10204/6201 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record