METADATA – A SILENT PRIVACY KILLER
More details
Hide details
1
doktorant na Wydziale Nauk Politycznych i Studiów
Międzynarodowych Uniwersytetu Warszawskiego
Publication date: 2020-01-15
Studia Politologiczne 2019;54
KEYWORDS
ABSTRACT
The article has a deeper reflection on the issue of metadata, that is, data which
are defined or describe other data. The theoretical layer extracted three types of metadata: descriptive, structural, and administrative. Descriptive metadata is used
to find and identify key information that allows the location of an object. Structured
metadata describes the internal structure of the object, but administrative metadata
refers to the technical information, where information is provided for example
about the time and how the file was created. The purpose of the publication is to
provide theoretical knowledge as well as practical. The second part of the article
depicts the concepts of graphic and text files, and simple self-defense techniques
are indicated, which allow you to remove metadata before sharing the file. The
supplementing of article is: analysis the ability to extract meta information by
Fingerprinting Organizations with Collected Archives (FOCA), which is used
to mechanizedly extract metadata reflection on what the metadata includes the
email header.
PEER REVIEW INFORMATION
Article has been screened for originality
REFERENCES (17)
2.
Bretherton F.P., Singley P.T., A User’s View [w:] Proceedings of the 7th International Working Conference on Scientific and Statistical Database Management, Charlottesville 1994.
3.
Campbell D., Dublin Core Metadata and the Australian Metaweb Project, 10th National Library Technicians’ Conference, Fremantle, 8–10.09.1999,
https://www.nla.gov.au/bla/sta... dcampvell1.html (dostęp: 15.10.2018).
4.
Caplan P., Metadata Fundamentals for All Librarians, Chicago 2003.
7.
Foulonneau M., Riley J., Metadata for Digital Resources. Implementation, Systems Design and Interoperability, Oxford 2008.
8.
Garlicki J., Mider D., Mincewicz W., Pozyskiwanie informacji w Internecie metodą Google Hacking – biały, szary czy czarny wywiad?, „Przegląd Bezpieczeństwa Wewnętrznego” 2019, nr 20.
11.
Ignatowicz L., Cyfrowe ślady mówią. Poradnik ochrony prywatności, Warszawa 2015.
12.
Litwin L., Rossa M., Metadane geoinformacyjne w INSPIRE i SDI, Gliwice 2010.
14.
Nahotko M., Metadane – sposób na uporządkowanie Internetu, Kraków 2004.
15.
Niebrzydowska M., Kotowicz R., Wstęp do informatyki śledczej, „Przegląd Bezpieczeństwa Wewnętrznego” 2012, nr 6.
16.
Weissman C.G., The Insane Life of Former Fugitive and Eccentric Cybersecurity Legend John McAfee, 23.06.2015,
https://www.businessinsider.co... (dostęp: 15.12.2018).