Title :
An analysis of Facebook´s graph search
Author :
Khan, Zubeida Casmod ; Mashiane, Thulani
Author_Institution :
Dept. of Comput. Sci., Univ. of Cape Town, Cape Town, South Africa
Abstract :
With over a billion active users monthly Facebook is one of the biggest social media sites in the world. Facebook encourages friends and people with similar interests to share information such as messages, pictures, videos, Web site links, and other digital media. With the large number of users active on Facebook, an upgrade to Facebook´s searching capability was made through the launch of graph search. Graph search is a powerful search feature which allows users to search Facebook using queries phrased in simple English. When a query is executed, the results from the search can reveal personal information of friends as well as strangers. This availability of personal information to strangers is a cyber security threat to citizens. Cyber criminals can use the graph search feature for malicious and illegal intent. This paper presents an analysis of graph search on Facebook. The purpose of the study is to highlight the amount and type of personal information that is accessible through Facebook´s graph search. This is done through the design and execution of graph queries on two separate Facebook profiles. An analysis of the results is presented, together with possible negative consequences, and guidance as to best practices to follow in order to minimise the cyber security threats imposed by Facebook´s graph search.
Keywords :
authorisation; query processing; social networking (online); English language; Facebook graph search analysis; Facebook profiles; Facebook searching capability upgrade; active users; cyber criminals; cyber security threat minimisation; graph query design; graph query execution; information sharing; personal information; search feature; social media sites; Africa; Demography; Instruments; Robots; Semantics; Facebook; authentication; cyber security; cyber warfare; cyber-criminal; graph search; identity theft; spam; stalking;
Conference_Titel :
Information Security for South Africa (ISSA), 2014
Conference_Location :
Johannesburg
Print_ISBN :
978-1-4799-3383-9
DOI :
10.1109/ISSA.2014.6950517