SlideShare a Scribd company logo
Privacy and Security in Online
Social Media
Course on NPTEL
NOC-CS07
Week 4.1
Ponnurangam Kumaraguru (“PK”)
Associate Professor
ACM Distinguished Speaker
fb/ponnurangam.kumaraguru, @ponguru
Topics that we will cover
⚫ Overview of OSM
⚫ Linux / Python / Twitter API / Mongo DB / MySQL
[Hands-on]
⚫ Trust & Credibility
⚫ Privacy
⚫ Social Network Analysis, NLTK [Hands-on]
⚫ e-crime
⚫ Plotly / Highcharts / Geo-location analysis
[Hands-on]
⚫ Policing
⚫ Identity resolution
⚫ What next – Deep learning, machine learning, NLP,
Image analysis
2
Westin’s 3 categories
⚫Fundamentalists, 25%
⚫Pragmatists, 60%
⚫Unconcerned, 15%
3
Internet & Social Media
What do you feel about privacy of your personal
information on your OSN?
4
Q42, N = 6,855
It is not a concern at all 19.30
Since I have specified my privacy settings, my
data is secure from a privacy breach 42.13
Even though, I have specified my privacy
settings, I am concerned about privacy of my
data 23.84
It is a concern, but I still share personal
information 8.02
It is a concern; hence I do not share personal
data on OSN 6.71
Internet & Social Media
If you receive a friendship request on your most
frequently used OSN, which of the following people
will you add as friends?
5
Q43, N = 6,929
Person of opposite gender 27.39
People from my hometown 19.51
Person with nice profile picture 10.12
Strangers (people you do not
know) 4.99
Somebody, whom you do not
know or recognize but have
mutual / common friends with 8.31
Anyone 2.99
6
http://precog.iiitd.edu.in/research/privacyindia/
Hard to define
“Privacy is a value so complex, so entangled
in competing and contradictory dimensions,
so engorged with various and distinct
meanings, that I sometimes despair whether
it can be usefully addressed at all.”
Robert C. Post, Three Concepts of Privacy,
89 Geo. L.J. 2087 (2001).
7
Control over information
“Privacy is the claim of individuals, groups or
institutions to determine for themselves when,
how, and to what extent information about them is
communicated to others.”
“…each individual is continually engaged in a
personal adjustment process in which he balances
the desire for privacy with the desire for disclosure
and communication….”
Alan Westin, Privacy and Freedom, 1967
8
Forms of Privacy
⚫Information
-Internet
⚫Communication
-Telephone
⚫Territorial
-Living space
⚫Bodily
-Self
9
Background
⚫In 2000, 100 billion photos were shot
worldwide
⚫In 2010, 2.5 billion photos per month were
uploaded by Facebook users only
⚫In 2015, 1.8 billion photos uploaded
everyday on Facebook, Instagram, Flickr,
Snapchat, and WhatsApp
⚫Facebook, Microsoft, Google, Apple have
acquired / licensed products that do Face
recognition
10
Many things are colluding
⚫Increasing public self-disclosures through
online social networks
-Photos
⚫Improving accuracy in Face recognition
⚫Cloud, ubiquitous computing
⚫Re-identification techniques are getting
better
11
Question
⚫Can one combine publicly available online
social network data with off-the-shelf face
recognition technology for
-Individual re-identification
-Finding potentially, sensitive information
12
Goal is to
⚫Use un-identified source {Match.com, photos
from Flickr, CCTVs, etc.} + identified sources
{Facebook, Linkedin, Govt. websites, etc.}
⚫To get some sensitive information of the
individual {gender orientation, SSN, Aadhaar
#, etc.}
13
Latanya Sweeney
14
Experiment 1
⚫Online – Online
⚫Mined publicly available images from FB to
re-identify profiles on one of the most
popular dating sites in the US
⚫Used http://www.pittpatt.com/ for face
recognizing
-Pittpatt acquired by Google
-Face detection
-Face recognition
⚫Use Tensorflow now
15
Experiment 1: Data
⚫Identified
⚫Downloaded FB profiles from one city in USA
⚫Profiles: 277,978
⚫Images: 274,540
⚫Faces detected: 110,984
16
Experiment 1: Data
⚫Un-Identified
⚫Downloaded profiles of one of the popular
dating websites
⚫Pseudonyms to protect their identities
⚫Photos can be used to identify
⚫Same city was used to search
⚫Profiles: 5,818
⚫Faces detected: 4,959
17
Experiment 1: Approach
⚫Unidentified {Dating site photos} + Identified
{FB photos} → Re-identified individual
⚫More than 500 million pairs compared
⚫Used only the best matching pair for each
dating site picture
⚫PittPatt produces score of -1.5 to 20
⚫Crowd sourced to Mturkers for validating
PittPatt
⚫Likert scale, 1 – 5
⚫At least 5 Turkers for each pair
18
Experiment 1: Results
⚫Highly likely matches: 6.3%
⚫Highly likely + Likely matches: 10.5%
⚫1 on 10 from the dating site can be identified
19
Reactions?
⚫What can you do better if you were the
attacker?
20
Experiment 2
⚫Offline to online
⚫Pictures from FB college network to identify
student strolling in campus
21
Experiment 2: Data
⚫Webcam to take 3 pics per participant
⚫Collected over 2 days
⚫Facebook data for the university
-Profiles: 25,051
-Images: 26,262
-Faces detected: 114,745
22
Experiment 2: Process
⚫Pictures taken of individuals walking in
campus
⚫Asked to fill online survey
⚫Pictures matched from cloud while they are
filling survey
⚫Last page of the survey with options of their
pictures
⚫Asked to select the pics which matched
closely, produced by the recognizer
23
Experiment 2: Process
24
Experiment 2: Process
25
Experiment 2: Results
26
⚫98 participants
-All students and had FB accounts
⚫38.18% of participants were matched with
correct FB profile
-Including a participant who mentioned that he
did not have a picture on FB
-Average computation less than 3 seconds
Experiment 3
⚫Predicted SSN from public data
⚫Faces / FB data + Public data → SSN
⚫27% of subjects’ first 5 SSN digits identified
with four attempts – starting from their faces
⚫Predicted sensitive information like SSN
27
What can you think of doing in India?
⚫Aadhaar number?
⚫Other details?
28
References
⚫https://www.blackhat.com/docs/webcast/ac
quisti-face-BH-Webinar-2012-out.pdf
⚫http://www.heinz.cmu.edu/~acquisti/papers
/privacy-facebook-gross-acquisti.pdf
29
Thank you
pk@iiitd.ac.in
precog.iiitd.edu.in
fb/ponnurangam.kumaraguru

More Related Content

Similar to Privacy and Security in Online Social : Privacy and Pictures on Online Social Media

Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
Symeon Papadopoulos
 
Keynote at 4th International Symposium on Secuirty in Computing at Communicat...
Keynote at 4th International Symposium on Secuirty in Computing at Communicat...Keynote at 4th International Symposium on Secuirty in Computing at Communicat...
Keynote at 4th International Symposium on Secuirty in Computing at Communicat...
IIIT Hyderabad
 
Week 6.1: eCrime
Week 6.1: eCrimeWeek 6.1: eCrime
Week 6.1: eCrime
IIIT Hyderabad
 
Conference Report Final 11.18
Conference Report Final 11.18Conference Report Final 11.18
Conference Report Final 11.18
Nancy J. Brandwein
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
IJERA Editor
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
IJERA Editor
 
CONTEXT: Understanding the Role of Contexts in Managing Privacy Online
CONTEXT: Understanding the Role of Contexts in Managing Privacy OnlineCONTEXT: Understanding the Role of Contexts in Managing Privacy Online
CONTEXT: Understanding the Role of Contexts in Managing Privacy Online
Gideonbms
 
Ass a koene_ca_sma
Ass a koene_ca_smaAss a koene_ca_sma
Ass a koene_ca_sma
Ansgar Koene
 
Designing Cybersecurity Policies with Field Experiments
Designing Cybersecurity Policies with Field ExperimentsDesigning Cybersecurity Policies with Field Experiments
Designing Cybersecurity Policies with Field Experiments
Gene Moo Lee
 
Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...
Mike Kujawski
 
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Jason Hong
 
When Play is More than Just "Playing": Delivering Intentional Instruction th...
When Play is More than Just "Playing":  Delivering Intentional Instruction th...When Play is More than Just "Playing":  Delivering Intentional Instruction th...
When Play is More than Just "Playing": Delivering Intentional Instruction th...
milfamln
 
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Toronto Metropolitan University
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
ijsptm
 
A Review of Big data for Social Policy Decision Making
A Review of Big data for Social Policy Decision Making A Review of Big data for Social Policy Decision Making
A Review of Big data for Social Policy Decision Making
Ridi Fe
 
2019 June 27 - Big data and data science
2019 June 27 - Big data and data science2019 June 27 - Big data and data science
2019 June 27 - Big data and data science
Fabio Stella
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
Frances Coronel
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
gloriakt
 
Digital Tattoo: for MOSAIC
Digital Tattoo: for MOSAICDigital Tattoo: for MOSAIC
Digital Tattoo: for MOSAIC
University of British Columbia
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
Pranav Godse
 

Similar to Privacy and Security in Online Social : Privacy and Pictures on Online Social Media (20)

Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
 
Keynote at 4th International Symposium on Secuirty in Computing at Communicat...
Keynote at 4th International Symposium on Secuirty in Computing at Communicat...Keynote at 4th International Symposium on Secuirty in Computing at Communicat...
Keynote at 4th International Symposium on Secuirty in Computing at Communicat...
 
Week 6.1: eCrime
Week 6.1: eCrimeWeek 6.1: eCrime
Week 6.1: eCrime
 
Conference Report Final 11.18
Conference Report Final 11.18Conference Report Final 11.18
Conference Report Final 11.18
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
CONTEXT: Understanding the Role of Contexts in Managing Privacy Online
CONTEXT: Understanding the Role of Contexts in Managing Privacy OnlineCONTEXT: Understanding the Role of Contexts in Managing Privacy Online
CONTEXT: Understanding the Role of Contexts in Managing Privacy Online
 
Ass a koene_ca_sma
Ass a koene_ca_smaAss a koene_ca_sma
Ass a koene_ca_sma
 
Designing Cybersecurity Policies with Field Experiments
Designing Cybersecurity Policies with Field ExperimentsDesigning Cybersecurity Policies with Field Experiments
Designing Cybersecurity Policies with Field Experiments
 
Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...Practical Applications for Social Network Analysis in Public Sector Marketing...
Practical Applications for Social Network Analysis in Public Sector Marketing...
 
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
 
When Play is More than Just "Playing": Delivering Intentional Instruction th...
When Play is More than Just "Playing":  Delivering Intentional Instruction th...When Play is More than Just "Playing":  Delivering Intentional Instruction th...
When Play is More than Just "Playing": Delivering Intentional Instruction th...
 
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
Roundtable: Social Media Users' Privacy Expectations & the Ethics of Using Th...
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
 
A Review of Big data for Social Policy Decision Making
A Review of Big data for Social Policy Decision Making A Review of Big data for Social Policy Decision Making
A Review of Big data for Social Policy Decision Making
 
2019 June 27 - Big data and data science
2019 June 27 - Big data and data science2019 June 27 - Big data and data science
2019 June 27 - Big data and data science
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
Digital Tattoo: for MOSAIC
Digital Tattoo: for MOSAICDigital Tattoo: for MOSAIC
Digital Tattoo: for MOSAIC
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
 

More from IIIT Hyderabad

Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayResponsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
IIIT Hyderabad
 
International Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesInternational Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success stories
IIIT Hyderabad
 
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasResponsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
IIIT Hyderabad
 
Identify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake News
IIIT Hyderabad
 
#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI
IIIT Hyderabad
 
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyData Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
IIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
IIIT Hyderabad
 
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
IIIT Hyderabad
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
IIIT Hyderabad
 
How to Write a (Good) Research Paper
How to Write a (Good) Research Paper How to Write a (Good) Research Paper
How to Write a (Good) Research Paper
IIIT Hyderabad
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasData Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBias
IIIT Hyderabad
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
IIIT Hyderabad
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
IIIT Hyderabad
 
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...
IIIT Hyderabad
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
IIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
IIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
IIIT Hyderabad
 
Leveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceLeveraging Social Media for Financial Advice
Leveraging Social Media for Financial Advice
IIIT Hyderabad
 
Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...
IIIT Hyderabad
 
A Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesA Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian Languages
IIIT Hyderabad
 

More from IIIT Hyderabad (20)

Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayResponsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
 
International Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesInternational Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success stories
 
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasResponsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
 
Identify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake News
 
#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI
 
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyData Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
 
How to Write a (Good) Research Paper
How to Write a (Good) Research Paper How to Write a (Good) Research Paper
How to Write a (Good) Research Paper
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasData Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBias
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
 
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
Leveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceLeveraging Social Media for Financial Advice
Leveraging Social Media for Financial Advice
 
Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...
 
A Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesA Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian Languages
 

Recently uploaded

A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
AlessioFois2
 
一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理
一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理
一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理
ytypuem
 
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
z6osjkqvd
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
nuttdpt
 
Jio cinema Retention & Engagement Strategy.pdf
Jio cinema Retention & Engagement Strategy.pdfJio cinema Retention & Engagement Strategy.pdf
Jio cinema Retention & Engagement Strategy.pdf
inaya7568
 
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
oaxefes
 
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
aguty
 
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Kaxil Naik
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
Timothy Spann
 
原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理
原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理 原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理
原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理
tzu5xla
 
一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理
一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理
一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理
1tyxnjpia
 
一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理
一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理
一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理
nyvan3
 
Experts live - Improving user adoption with AI
Experts live - Improving user adoption with AIExperts live - Improving user adoption with AI
Experts live - Improving user adoption with AI
jitskeb
 
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
eoxhsaa
 
End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024
Lars Albertsson
 
The Ipsos - AI - Monitor 2024 Report.pdf
The  Ipsos - AI - Monitor 2024 Report.pdfThe  Ipsos - AI - Monitor 2024 Report.pdf
The Ipsos - AI - Monitor 2024 Report.pdf
Social Samosa
 
How To Control IO Usage using Resource Manager
How To Control IO Usage using Resource ManagerHow To Control IO Usage using Resource Manager
How To Control IO Usage using Resource Manager
Alireza Kamrani
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
bmucuha
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Kiwi Creative
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
aqzctr7x
 

Recently uploaded (20)

A presentation that explain the Power BI Licensing
A presentation that explain the Power BI LicensingA presentation that explain the Power BI Licensing
A presentation that explain the Power BI Licensing
 
一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理
一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理
一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理
 
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
 
Jio cinema Retention & Engagement Strategy.pdf
Jio cinema Retention & Engagement Strategy.pdfJio cinema Retention & Engagement Strategy.pdf
Jio cinema Retention & Engagement Strategy.pdf
 
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
 
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
 
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
 
原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理
原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理 原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理
原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理
 
一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理
一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理
一比一原版(Sheffield毕业证书)谢菲尔德大学毕业证如何办理
 
一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理
一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理
一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理
 
Experts live - Improving user adoption with AI
Experts live - Improving user adoption with AIExperts live - Improving user adoption with AI
Experts live - Improving user adoption with AI
 
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
 
End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024
 
The Ipsos - AI - Monitor 2024 Report.pdf
The  Ipsos - AI - Monitor 2024 Report.pdfThe  Ipsos - AI - Monitor 2024 Report.pdf
The Ipsos - AI - Monitor 2024 Report.pdf
 
How To Control IO Usage using Resource Manager
How To Control IO Usage using Resource ManagerHow To Control IO Usage using Resource Manager
How To Control IO Usage using Resource Manager
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
 

Privacy and Security in Online Social : Privacy and Pictures on Online Social Media

  • 1. Privacy and Security in Online Social Media Course on NPTEL NOC-CS07 Week 4.1 Ponnurangam Kumaraguru (“PK”) Associate Professor ACM Distinguished Speaker fb/ponnurangam.kumaraguru, @ponguru
  • 2. Topics that we will cover ⚫ Overview of OSM ⚫ Linux / Python / Twitter API / Mongo DB / MySQL [Hands-on] ⚫ Trust & Credibility ⚫ Privacy ⚫ Social Network Analysis, NLTK [Hands-on] ⚫ e-crime ⚫ Plotly / Highcharts / Geo-location analysis [Hands-on] ⚫ Policing ⚫ Identity resolution ⚫ What next – Deep learning, machine learning, NLP, Image analysis 2
  • 3. Westin’s 3 categories ⚫Fundamentalists, 25% ⚫Pragmatists, 60% ⚫Unconcerned, 15% 3
  • 4. Internet & Social Media What do you feel about privacy of your personal information on your OSN? 4 Q42, N = 6,855 It is not a concern at all 19.30 Since I have specified my privacy settings, my data is secure from a privacy breach 42.13 Even though, I have specified my privacy settings, I am concerned about privacy of my data 23.84 It is a concern, but I still share personal information 8.02 It is a concern; hence I do not share personal data on OSN 6.71
  • 5. Internet & Social Media If you receive a friendship request on your most frequently used OSN, which of the following people will you add as friends? 5 Q43, N = 6,929 Person of opposite gender 27.39 People from my hometown 19.51 Person with nice profile picture 10.12 Strangers (people you do not know) 4.99 Somebody, whom you do not know or recognize but have mutual / common friends with 8.31 Anyone 2.99
  • 7. Hard to define “Privacy is a value so complex, so entangled in competing and contradictory dimensions, so engorged with various and distinct meanings, that I sometimes despair whether it can be usefully addressed at all.” Robert C. Post, Three Concepts of Privacy, 89 Geo. L.J. 2087 (2001). 7
  • 8. Control over information “Privacy is the claim of individuals, groups or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.” “…each individual is continually engaged in a personal adjustment process in which he balances the desire for privacy with the desire for disclosure and communication….” Alan Westin, Privacy and Freedom, 1967 8
  • 10. Background ⚫In 2000, 100 billion photos were shot worldwide ⚫In 2010, 2.5 billion photos per month were uploaded by Facebook users only ⚫In 2015, 1.8 billion photos uploaded everyday on Facebook, Instagram, Flickr, Snapchat, and WhatsApp ⚫Facebook, Microsoft, Google, Apple have acquired / licensed products that do Face recognition 10
  • 11. Many things are colluding ⚫Increasing public self-disclosures through online social networks -Photos ⚫Improving accuracy in Face recognition ⚫Cloud, ubiquitous computing ⚫Re-identification techniques are getting better 11
  • 12. Question ⚫Can one combine publicly available online social network data with off-the-shelf face recognition technology for -Individual re-identification -Finding potentially, sensitive information 12
  • 13. Goal is to ⚫Use un-identified source {Match.com, photos from Flickr, CCTVs, etc.} + identified sources {Facebook, Linkedin, Govt. websites, etc.} ⚫To get some sensitive information of the individual {gender orientation, SSN, Aadhaar #, etc.} 13
  • 15. Experiment 1 ⚫Online – Online ⚫Mined publicly available images from FB to re-identify profiles on one of the most popular dating sites in the US ⚫Used http://www.pittpatt.com/ for face recognizing -Pittpatt acquired by Google -Face detection -Face recognition ⚫Use Tensorflow now 15
  • 16. Experiment 1: Data ⚫Identified ⚫Downloaded FB profiles from one city in USA ⚫Profiles: 277,978 ⚫Images: 274,540 ⚫Faces detected: 110,984 16
  • 17. Experiment 1: Data ⚫Un-Identified ⚫Downloaded profiles of one of the popular dating websites ⚫Pseudonyms to protect their identities ⚫Photos can be used to identify ⚫Same city was used to search ⚫Profiles: 5,818 ⚫Faces detected: 4,959 17
  • 18. Experiment 1: Approach ⚫Unidentified {Dating site photos} + Identified {FB photos} → Re-identified individual ⚫More than 500 million pairs compared ⚫Used only the best matching pair for each dating site picture ⚫PittPatt produces score of -1.5 to 20 ⚫Crowd sourced to Mturkers for validating PittPatt ⚫Likert scale, 1 – 5 ⚫At least 5 Turkers for each pair 18
  • 19. Experiment 1: Results ⚫Highly likely matches: 6.3% ⚫Highly likely + Likely matches: 10.5% ⚫1 on 10 from the dating site can be identified 19
  • 20. Reactions? ⚫What can you do better if you were the attacker? 20
  • 21. Experiment 2 ⚫Offline to online ⚫Pictures from FB college network to identify student strolling in campus 21
  • 22. Experiment 2: Data ⚫Webcam to take 3 pics per participant ⚫Collected over 2 days ⚫Facebook data for the university -Profiles: 25,051 -Images: 26,262 -Faces detected: 114,745 22
  • 23. Experiment 2: Process ⚫Pictures taken of individuals walking in campus ⚫Asked to fill online survey ⚫Pictures matched from cloud while they are filling survey ⚫Last page of the survey with options of their pictures ⚫Asked to select the pics which matched closely, produced by the recognizer 23
  • 26. Experiment 2: Results 26 ⚫98 participants -All students and had FB accounts ⚫38.18% of participants were matched with correct FB profile -Including a participant who mentioned that he did not have a picture on FB -Average computation less than 3 seconds
  • 27. Experiment 3 ⚫Predicted SSN from public data ⚫Faces / FB data + Public data → SSN ⚫27% of subjects’ first 5 SSN digits identified with four attempts – starting from their faces ⚫Predicted sensitive information like SSN 27
  • 28. What can you think of doing in India? ⚫Aadhaar number? ⚫Other details? 28