dc.contributor.author |
Labuschagne, WA
|
|
dc.contributor.author |
Eloff, MM
|
|
dc.contributor.author |
Veerasamy, Namosha
|
|
dc.date.accessioned |
2012-10-22T09:35:46Z |
|
dc.date.available |
2012-10-22T09:35:46Z |
|
dc.date.issued |
2012-09 |
|
dc.identifier.citation |
Labuschagne, WA, Eloff, MM and Veerasamy, N. The dark side of Web 2.0. ICT Critical Infrastructure and Society, Amsterdam (Netherlands), 27 to 28 September 2012. Published in IFIP Advances in Information and Communication Technology, 2012, Volume 386/2012, 237-249, DOI: 10.1007/978-3-642-33332-3_22 |
en_US |
dc.identifier.isbn |
978-3-642-33331-6 |
|
dc.identifier.uri |
http://www.springerlink.com/content/2l16p44123137325/
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/6201
|
|
dc.description |
Copyright: 2011 Springer-Verlag. This is a post-print version of the work. The definitive version is published in IFIP Advances in Information and Communication Technology, 2012, Volume 386/2012, 237-249, DOI: 10.1007/978-3-642-33332-3_22 |
en_US |
dc.description.abstract |
Social networking sites have increased in popularity and are utilized for many purposes which include connecting with other people, sharing information and creating content. Many people on social networking sites use these platforms to express opinions relating to current affairs within society. People do not realize the value of their data divulged on these platforms and the tactics implemented by social engineers to harvest the seemingly worthless data. An attack vector is created when a user can be profiled using responses from one of these platforms and the data combined with leaked information from another platform. This paper discusses methods for how this data, with no significant value to the users, can become a commodity to social engineers. This paper addresses what information can be deducted from responses on social news sites, as well as investigating how this information can be useful to social engineers. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Springer |
en_US |
dc.relation.ispartofseries |
Workflow;9679 |
|
dc.subject |
Social networking |
en_US |
dc.subject |
Web 2.0 |
en_US |
dc.subject |
Social news sites |
en_US |
dc.subject |
Social engineers |
en_US |
dc.subject |
Information security |
en_US |
dc.subject |
Digital footprint |
en_US |
dc.subject |
Facebook |
en_US |
dc.subject |
Information gathering |
en_US |
dc.subject |
Internet |
en_US |
dc.subject |
LIWC |
en_US |
dc.subject |
Social engineering |
en_US |
dc.subject |
Profiling |
en_US |
dc.title |
The dark side of Web 2.0 |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Labuschagne, W., Eloff, M., & Veerasamy, N. (2012). The dark side of Web 2.0. Springer. http://hdl.handle.net/10204/6201 |
en_ZA |
dc.identifier.chicagocitation |
Labuschagne, WA, MM Eloff, and Namosha Veerasamy. "The dark side of Web 2.0." (2012): http://hdl.handle.net/10204/6201 |
en_ZA |
dc.identifier.vancouvercitation |
Labuschagne W, Eloff M, Veerasamy N, The dark side of Web 2.0; Springer; 2012. http://hdl.handle.net/10204/6201 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Labuschagne, WA
AU - Eloff, MM
AU - Veerasamy, Namosha
AB - Social networking sites have increased in popularity and are utilized for many purposes which include connecting with other people, sharing information and creating content. Many people on social networking sites use these platforms to express opinions relating to current affairs within society. People do not realize the value of their data divulged on these platforms and the tactics implemented by social engineers to harvest the seemingly worthless data. An attack vector is created when a user can be profiled using responses from one of these platforms and the data combined with leaked information from another platform. This paper discusses methods for how this data, with no significant value to the users, can become a commodity to social engineers. This paper addresses what information can be deducted from responses on social news sites, as well as investigating how this information can be useful to social engineers.
DA - 2012-09
DB - ResearchSpace
DP - CSIR
KW - Social networking
KW - Web 2.0
KW - Social news sites
KW - Social engineers
KW - Information security
KW - Digital footprint
KW - Facebook
KW - Information gathering
KW - Internet
KW - LIWC
KW - Social engineering
KW - Profiling
LK - https://researchspace.csir.co.za
PY - 2012
SM - 978-3-642-33331-6
T1 - The dark side of Web 2.0
TI - The dark side of Web 2.0
UR - http://hdl.handle.net/10204/6201
ER -
|
en_ZA |