Abstract
Effective, safe, and fast identity recognition is crucial in today’s rapidly growing society. As a convenient and reliable alternative to traditional identification methods, biometric technologies are increasingly adopted for security applications, such as the verification of ID cards or passports and the authentication of computer and mobile devices. However, if spoofed, such technologies can create serious privacy and security risks, and the proliferation of high quality multimedia content on social media platforms facilitates such spoofing attacks. Unfortunately, many users are unaware of the risks of posting their biometric information online and social media companies are not taking appropriate action to protect them. In this paper, we make the case for biometric anti-spoofing policies by examining the social media enabled marketplace of Etsy. We demonstrate that biometric information can be collected from social media users and that the level of privacy concerns is not a predictor of a user’s biometric information sharing behavior.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)
Wen, D., Han, H., Jain, A.K.: Face spoof detection with image distortion analysis. IEEE Trans. Inf. Forensics Secur. 10(4), 746–761 (2015)
Mott, N.: Hacking fingerprints is actually pretty easy-and cheap, November 2021
Alnabhi, H., Al-naamani, Y., Al-madhehagi, M., Alhamzi, M.: Enhanced security methods of door locking based fingerprint. Int. J. Innov. Technol. Explor. Eng. 9(03), 1173–1178 (2020)
Girelli, C.M.A., et al.: Application of a standard procedure to avoid errors when comparing fingerprints with their reversals in fake documents. J. Forensic Sci. Med. 2(1), 60 (2016)
Boididou, C., et al.: Verifying information with multimedia content on twitter. Multimed. Tools Appl. 77(12), 15545–15571 (2018)
Dean, B.: Social network usage & growth statistics: how many people use social media in 2021, vol. 2, p. 2021 (2021). Accessed July 2021
Gouert, C., Tsoutsos, N.G.: Dirty metadata: understanding a threat to online privacy. IEEE Secur. Priv. 01, 2–9 (2022)
Krämer, N.C., Schäwel, J.: Mastering the challenge of balancing self-disclosure and privacy in social media. Curr. Opin. Psychol. 31, 67–71 (2020)
Kim, J., Tussyadiah, I.P.: Social networking and social support in tourism experience: the moderating role of online self-presentation strategies. J. Travel Tour. Mark. 30(1–2), 78–92 (2013)
Sheth, S., Kim, J.: Social media marketing: the effect of information sharing, entertainment, emotional connection and peer pressure on the attitude and purchase intentions. GSTF J. Bus. Rev. (GBR) 5(1) (2017)
Berger, C.R., Calabrese, R.J.: Some explorations in initial interaction and beyond: toward a developmental theory of interpersonal communication. Hum. Commun. Res. 1(2), 99–112 (1974)
Ellison, N.B., Steinfield, C., Lampe, C.: The benefits of Facebook “friends:” social capital and college students’ use of online social network sites. J. Comput.-Mediat. Commun. 12(4), 1143–1168 (2007)
Ellison, N.B., Steinfield, C., Lampe, C.: Connection strategies: social capital implications of Facebook-enabled communication practices. New Media Soc. 13(6), 873–892 (2011)
Kokolakis, S.: Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122–134 (2017)
Hallam, C., Zanella, G.: Online self-disclosure: the privacy paradox explained as a temporally discounted balance between concerns and rewards. Comput. Hum. Behav. 68, 217–227 (2017)
Westin, A.F.: Privacy and freedom. Wash. Lee Law Rev. 25(1), 166 (1968)
Mekovec, R., Hutinski, Ž.: The role of perceived privacy and perceived security in online market. In: 2012 Proceedings of the 35th International Convention MIPRO, pp. 1549–1554. IEEE (2012)
Flavián, C., Guinalíu, M.: Consumer trust, perceived security and privacy policy: three basic elements of loyalty to a web site. Ind. Manag. Data Syst. (2006)
De Veirman, M., Cauberghe, V., Hudders, L.: Marketing through instagram influencers: the impact of number of followers and product divergence on brand attitude. Int. J. Advert. 36(5), 798–828 (2017)
Jozani, M., Ayaburi, E., Ko, M., Choo, K.-K.R.: Privacy concerns and benefits of engagement with social media-enabled apps: a privacy calculus perspective. Comput. Hum. Behav. 107, 106260 (2020)
Madden, M.: Public perceptions of privacy and security in the post-snowden era, (2014)
Schuckers, S.A.: Spoofing and anti-spoofing measures. Inf. Secur. Tech. Rep. 7(4), 56–62 (2002)
Cavusoglu, H., Phan, T.Q., Cavusoglu, H., Airoldi, E.M.: Assessing the impact of granular privacy controls on content sharing and disclosure on Facebook. Inf. Syst. Res. 27(4), 848–879 (2016)
Devlin, J., Chang, M.-W., Lee, K., Toutanova, K.,: Bert: pre-training of deep bidirectional transformers for language understanding, arXiv preprint arXiv:1810.04805 (2018)
Bradski, G., Kaehler, A.: Opencv. Dr. Dobb’s J. Softw. Tools 3, 2 (2000)
Liu, K., Terzi, E.: A framework for computing the privacy scores of users in online social networks. ACM Trans. Knowl. Discov. Data (TKDD) 5(1), 1–30 (2010)
Alam, M.M., Islam, M.T., Rahman, S.M.: Unified learning approach for egocentric hand gesture recognition and fingertip detection. Pattern Recogn. 121, 108200 (2022)
Lugaresi, C., et al. : Mediapipe: a framework for perceiving and processing reality. In: Third Workshop on Computer Vision for AR/VR at IEEE Computer Vision and Pattern Recognition (CVPR) 2019 (2019)
Patsakis, C., Zigomitros, A., Papageorgiou, A., Galván-López, E.: Distributing privacy policies over multimedia content across multiple online social networks. Comput. Netw. 75, 531–543 (2014)
Ploeg, I.V.D., Lyon, D.: Biometrics and the body as information: normative issues of the socio-technical coding of the body. Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination. Londres e Nova Iorque, Routledge, pp. 57–73 (2002)
Agamben, G., Murray, S.J.: No to biopolitical tattooing. Commun. Crit. Cult. Stud. 5(2), 201–202 (2008)
Rebera, A.P., Mordini, E.: Biometrics and ageing: social and ethical considerations. Age Factors Biom. Process. 37–58 (2013)
Goddard, M.: The EU general data protection regulation (GDPR): European regulation that has a global impact. Int. J. Mark. Res. 59(6), 703–705 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Jozani, M., Zanella, G., Khanov, M., Dorai, G., Akbas, E. (2023). The Need for Biometric Anti-spoofing Policies: The Case of Etsy. In: Goel, S., Gladyshev, P., Nikolay, A., Markowsky, G., Johnson, D. (eds) Digital Forensics and Cyber Crime. ICDF2C 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 508. Springer, Cham. https://doi.org/10.1007/978-3-031-36574-4_17
Download citation
DOI: https://doi.org/10.1007/978-3-031-36574-4_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-36573-7
Online ISBN: 978-3-031-36574-4
eBook Packages: Computer ScienceComputer Science (R0)