PL EN RU
METADATA – A SILENT PRIVACY KILLER
 
More details
Hide details
1
doktorant na Wydziale Nauk Politycznych i Studiów Międzynarodowych Uniwersytetu Warszawskiego
 
 
Publication date: 2020-01-15
 
 
Studia Politologiczne 2019;54
 
KEYWORDS
ABSTRACT
The article has a deeper reflection on the issue of metadata, that is, data which are defined or describe other data. The theoretical layer extracted three types of metadata: descriptive, structural, and administrative. Descriptive metadata is used to find and identify key information that allows the location of an object. Structured metadata describes the internal structure of the object, but administrative metadata refers to the technical information, where information is provided for example about the time and how the file was created. The purpose of the publication is to provide theoretical knowledge as well as practical. The second part of the article depicts the concepts of graphic and text files, and simple self-defense techniques are indicated, which allow you to remove metadata before sharing the file. The supplementing of article is: analysis the ability to extract meta information by Fingerprinting Organizations with Collected Archives (FOCA), which is used to mechanizedly extract metadata reflection on what the metadata includes the email header.
PEER REVIEW INFORMATION
Article has been screened for originality
REFERENCES (17)
1.
Andrews M., Structural Metadata. Key to Structured Content, 11.10.2017, https://storyneedle.com/struct... (dostęp: 14.12.2018).
 
2.
Bretherton F.P., Singley P.T., A User’s View [w:] Proceedings of the 7th International Working Conference on Scientific and Statistical Database Management, Charlottesville 1994.
 
3.
Campbell D., Dublin Core Metadata and the Australian Metaweb Project, 10th National Library Technicians’ Conference, Fremantle, 8–10.09.1999, https://www.nla.gov.au/bla/sta... dcampvell1.html (dostęp: 15.10.2018).
 
4.
Caplan P., Metadata Fundamentals for All Librarians, Chicago 2003.
 
5.
Colburn G., How to Explain Authenticated Received Chain (ARC) in Plain English, 6.11.2015, https://blog.returnpath.com/ho... (dostęp: 15.01.2019).
 
6.
Dempsey L., Registries: The Intelligence in Network, 20.08.2006, http://orweblog.oclc.org/Regis... (dostęp: 11.11.2018).
 
7.
Foulonneau M., Riley J., Metadata for Digital Resources. Implementation, Systems Design and Interoperability, Oxford 2008.
 
8.
Garlicki J., Mider D., Mincewicz W., Pozyskiwanie informacji w Internecie metodą Google Hacking – biały, szary czy czarny wywiad?, „Przegląd Bezpieczeństwa Wewnętrznego” 2019, nr 20.
 
9.
Griffel D., McIntosh S., ADMINS – A Progres Raport, MIT 1967, https://dspace.mit.edu/bitstre... (dostęp: 20.09.2018).
 
10.
Hang S., The Life of an Ex-Hacker Who Is Now Banned from Using the Internet, 25.04.2015, https://gizmodo.com/the-life-o...- 1700074684 (dostęp: 14.12.2018).
 
11.
Ignatowicz L., Cyfrowe ślady mówią. Poradnik ochrony prywatności, Warszawa 2015.
 
12.
Litwin L., Rossa M., Metadane geoinformacyjne w INSPIRE i SDI, Gliwice 2010.
 
13.
Marr. B, Every Day? The Mind-Blowing Stats Everyone Should Read, Forbes, 21.05.2018, https://www.forbes.com/sites/b... (dostęp: 15.01.2019).
 
14.
Nahotko M., Metadane – sposób na uporządkowanie Internetu, Kraków 2004.
 
15.
Niebrzydowska M., Kotowicz R., Wstęp do informatyki śledczej, „Przegląd Bezpieczeństwa Wewnętrznego” 2012, nr 6.
 
16.
Weissman C.G., The Insane Life of Former Fugitive and Eccentric Cybersecurity Legend John McAfee, 23.06.2015, https://www.businessinsider.co... (dostęp: 15.12.2018).
 
17.
Zeng, M.L. Metadata Basics, http://marciazeng.slis.kent.ed... (dostęp: 14.11.2018).
 
ISSN:1640-8888
Journals System - logo
Scroll to top