Exploring Privacy Risks in Information Networks
Total Page:16
File Type:pdf, Size:1020Kb
Blekinge Institute of Technology Licentiate Series No 2004:11 ISSN 1650-2140 ISBN 91-7295-051-X Exploring Privacy Risks in Information Networks Andreas Jacobsson Department of Interaction and System Design School of Engineering Blekinge Institute of Technology Sweden Blekinge Institute of Technology Licentiate Series No. 2004:11 ISSN 1650-2140 ISBN 91-7295-051-X Published by Blekinge Institute of Technology © 2004 Andreas Jacobsson Cover picture “Son of Man” (1964) by René Magritte © With permission from “BUS - Bildkonst Upphovsrätt i Sverige” Printed in Sweden Kaserntryckeriet, Karlskrona 2004 To Jess This thesis is submitted to the Faculty of Technology at Blekinge Institute of Technology, in partial fulfillment of the requirements for the degree of Licentiate of Technology in Computer Science. Contact Information Andreas Jacobsson Department of Interaction and System Design School of Engineering Blekinge Institute of Technology PO Box 520 SE-372 25 Ronneby SWEDEN E-mail: [email protected] Abstract Exploring privacy risks in information networks is analysing the dangers and hazards that are related to personal information about users of a network. It is about investigating the dynamics and complexities of a setting where humans are served by technology in order to exploit the network for their own good. In the information network, malicious activities are motivated by commercial factors in that the attacks to privacy are happening, not in the name of national security, but in the name of the free market together with technological advancements. Based on the assumption of Machiavellian Intelligence, we have modelled our analyses by way of concepts such as Arms Race, Tragedy of the Commons, and the Red Queen effect. In a number of experiments on spam, adware, and spyware, we have found that they match the characteristics of privacy-invasive software, i.e., software that ignores users’ right to decide what, how and when information about themselves is disseminated by others. Spam messages and adware programs suggest a hazard in that they exploit the lives of millions and millions of users with unsolicited commercial and/or political content. Although, in reality spam and adware are rather benign forms of a privacy risks, since they, e.g., do not collect and/or transmit user data to third parties. Spyware programs are more serious forms of privacy risks. These programs are usually bundled with, e.g., file-sharing tools that allow a spyware to secretly infiltrate computers in order to collect and dis- tribute, e.g., personal information and data about the computer to profit-driven third parties on the Internet. In return, adware and spam displaying customised advertisements and offers may be distributed to vast amounts of users. Spyware programs also have the capability of retrieving malicious code, which can make the spyware act like a virus when the file-sharing tools are distributed in-between the users of a network. In conclusion, spam, spyware and virulent programs invade user privacy. However, our experiments also indicate that privacy-invasive software inflicts the security, stability and capacity of computerised systems and networks. Furthermore, we propose a description of the risk environment in information networks, where network contaminants (such as spam, spyware and virulent programs) are put in a context (information ecosystem) and dynamically modelled by their characteristics both individually and as a group. We show that network contamination may be a serious threat to the future prosperity of an information ecosystem. It is therefore strongly recommended to network owners and designers to respect the privacy rights of individuals. Privacy risks have the potential to overthrow the positive aspects of belonging to an information network. In a sound information network the flow of personal information is balanced with the advantages of belonging to the network. With an understanding of the privacy risk environment, there is a good starting-point for recognising and preventing intrusions into matters of a personal nature. In reflect, mitigating privacy risks contributes to a secure and efficient use of infor- mation networks. i ii Acknowledgements First and foremost, I would like to extend my sincere gratitude to my supervisor and collaborator, Dr. Bengt Carlsson, for creative support and guidance throughout this work. I would also like to thank my examiner Professor Rune Gustavsson, and my secondary supervisors Dr. Anders Hederstierna and Dr. Stefan Johansson for all the work that they have put down in helping me to form this thesis. The persons giving me the opportunity to commence doctoral studies also deserve many thanks, in particular Dr. Stefan Östholm who was the one that gave me the offer to become a Ph.D. student, Professor Rune Gustavsson and Dr. Anders Hederstierna for eager support during the first phase of my work, and Dr. Michael Mattsson who sorted out all the administrative things and presented me to the value of creative thinking. Thanks to Professor Paul Davidsson who gradually has introduced me to the nature of critical review, and who always is an invaluable source of knowledge, and to Dr. Mikael Svahnberg for helping me understand all the tiny details about life as a Ph.D. student. I would also like to thank my colleague and friend Martin Boldt, co- author to some of the work included in this thesis, for his in-depth technical knowledge and overall positive attitude. I would like to express my gratitude to my colleagues and friends who all have contributed to this journey with loads of laughters, creative feedback and sugges- tions for recreational activities. It is probably impossible to mention you all with- out accidentally leaving someone out, so I rest my case by saying thanks. You know who your are. As always, I am grateful to my parents, Lena and Clas, for everlasting support and love, and for teaching me the value of humour and hard work. Special thanks also go to my sister Lotta, her husband Niklas and their amazing children Oscar, Jacob and Anna for cool comments and for being true sources of inspiration. Finally, I am especially indebted to my Jessica for tremendous support, loving understanding and endless encouragement. Without you this thesis would not have existed at all. Thanks for being so great! Ronneby, fall of 2004. Andreas Jacobsson iii iv Contents Part I Setting the Scene 1 CHAPTER 1 Introduction..................................................................3 Thesis Structure ............................................................................ 5 Included Publications..................................................................... 5 CHAPTER 2 Research Approach .......................................................7 Research Questions ....................................................................... 7 Research Method........................................................................... 9 Definitions ...................................................................................10 Results and Contribution ...............................................................14 Future Work.................................................................................17 Concluding Remarks .....................................................................17 CHAPTER 3 Concepts and Related Work .........................................19 Privacy ........................................................................................19 Information Networks ...................................................................26 Concluding Remarks .....................................................................32 References...................................................................................33 Part II Publications 37 PAPER 1 Privacy and Unsolicited Commercial E-Mail ....................39 Introduction.................................................................................39 E-Mail Marketing ..........................................................................40 Privacy and Spam.........................................................................45 Discussion Concerning Privacy and Spam .......................................49 Conclusions..................................................................................50 References...................................................................................51 PAPER 2 Privacy and Spam: Empirical Studies of Unsolicited Commercial E-Mail.......................................................53 Introduction.................................................................................53 Spam Experiments........................................................................55 Discussion....................................................................................60 Conclusions..................................................................................62 References...................................................................................63 v PAPER 3 Privacy-Invasive Software in File-Sharing Tools .............65 Introduction.................................................................................65 Privacy-Invasive Programs and their Implications............................67 Experiment Design .......................................................................69 Experiment Results and Analysis....................................................72 Discussion....................................................................................75