skip to main content
10.5555/1732323.1732336guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Sh@re: negotiated audit in social networks

Published: 11 October 2009 Publication History

Abstract

With the growth in the popularity of social networking sites like Facebook and MySpace, there is an increasing concern about privacy of content posted by users. Many users enter personal details about themselves but have poor understanding of theats such as identity theft and stalking. There is a need to educate and assist users in understanding how their personal data is exposed to other users. In this paper, we introduce the concept of negotiated audit which gives users of social networks valuable feedback about how their data is being used. Our design has three levels of auditing for both sharing and browsing data: no audit, complete audit and anonymous audit. Users can classify their data as requiring some level of auditing and can also set their browsing preference to one of the auditing levels. Users can only see some data if their browsing preference is compatible with the data's audit level thus giving rise to negotiation of how much users are willing to reveal about their activities and how much data they will be able to access. We provide a mathematical model and describe a simple social networking prototype called Share that implements negotiated audit.

References

[1]
Apache. Xampp, http://www.apachefriends.org/en/xampp.html, May 2002.
[2]
InformationWeek Cory Doctorow. How your creepy ex-co-workers will kill facebook, November 2007.
[3]
Catherine Dwyer, Starr R. Hiltz, and Katia Passerini. Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. In Proceedings of the Thirteenth Americas Conference on Information Systems, August 2007.
[4]
Tabreez Govani and Harriet Pashley. Student awareness of the privacy implications when using facebook. none, 2005.
[5]
Mark S. Granovetter. The strength of weak ties. The American Journal of Sociology, Jan 1973.
[6]
Ralph Gross, Alessandro Acquisti, and John H. Heinz. Information revelation and privacy in online social networks. In WPES '05: Proceedings of the 2005 ACM workshop on Privacy in the electronic society, pages 71-80, New York, NY, USA, 2005. ACM Press.
[7]
Saikat Guha, Kevin Tang, and Paul Francis. Noyb: Privacy in online social networks. In Proceedings of the First ACM SIGCOMM Workshop on Online Social Networks (WOSN), Seattle, WA, USA, August 2008.
[8]
Tom N. Jagatic, Nathaniel A. Johnson, Markus Jakobsson, and Filippo Menczer. Social phishing. Commun. ACM, 50(10):94-100, 2007.
[9]
Harvey Jones and José H. Soltren. Facebook: Threats to privacy, December 2005.
[10]
Matthew M. Lucas and Nikita Borisov. Flybynight: mitigating the privacy risks of social networking. In WPES '08: Proceedings of the 7th ACM workshop on Privacy in the electronic society, pages 1-8, New York, NY, USA, 2008. ACM.
[11]
Jaehong Park and Ravi Sandhu. Towards usage control models: beyond traditional access control. In SACMAT'02: Proceedings of the seventh ACM symposium on Access control models and technologies, pages 57- 64, New York, NY, USA, 2002. ACM.
[12]
http://www.quantcast.com/facebook.com Quantcast. Profile for facebook.com, December 2008.
[13]
http://www.quantcast.com/myspace.com Quantcast. Profile for myspace.com, December 2008.
[14]
D. Watts. Six Degrees: The Science of a Connected Age. W.W.Norton Company, 2003.
[15]
Eric Yuan and Jin Tong. Attributed based access control (abac) for web services. In ICWS '05: Proceedings of the IEEE International Conference on Web Services, pages 561-569, Washington, DC, USA, 2005. IEEE Computer Society.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
SMC'09: Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
October 2009
5232 pages
ISBN:9781424427932

Publisher

IEEE Press

Publication History

Published: 11 October 2009

Author Tags

  1. negotiated audit
  2. privacy
  3. social networks

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Jan 2025

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media