skip to main content
10.1145/2808797.2809279acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Privacy Tips: Would it be ever possible to empower online social-network users to control the confidentiality of their data?

Published: 25 August 2015 Publication History

Abstract

Using the web for communication, purchases, searching information and/or socializing generates data, about ourselves, our connections and our activities, which is collected easily. In online social networks, users volunteer perhaps what is considered more personal information to their selected circles. But each person has personal preferences about what it considers public and what it considers private. The problem is that the information that is public may be used to disclose information that the users expect to remain confidential.
This paper offers a path to provide tips and warnings to each user of an online social network so they can exercise control on the information they consider private not only by not disclosing such information, but by acting on their public information-items that could be informative for those information-items that are private. This is a significant challenge, because most web-applications use personalization to build a context and provide better services. We aim to raise awareness on privacy and to empower users, giving them the possibility to regulate the benefits of personalization with the privacy risks. In this paper we also show that information-items (like relationships) can be chosen as confidential, and that we can provide meaningful warnings on metrics of association and public attributes that are strong predictors of confidential information-items.

References

[1]
R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The second-generation onion router," 13th Conf. on USENIX Security Symposium - V. 13, ser. SSYM'04. Berkeley, CA, USENIX Assoc., pp. 21--21.
[2]
G. Gürses and B. Berendt, "The social web and privacy: Practices, reciprocity and conflict detection in social networks," in Privacy-Aware Knowledge Discovery, Novel Applications and New Techniques. CRC Press, 2010, pp. 395--429.
[3]
R. Wishart, R. Corapi, A. Madhavapeddy, and M. Sloman, "Privacy butler: A personal privacy rights manager for online presence," in 8th Annual IEEE Int. Conf. on Pervasive Computing and Communications, PerCom. Mannheim: IEEE, 2010, pp. 672--677.
[4]
R. Compton, D. Jurgens, and D. Allen, "Geotagging one hundred million twitter accounts with total variation minimization," in 2014 IEEE Int. Conf. on Big Data 2014, Washington, DC, USA: IEEE, 2014, pp. 393--401.
[5]
J. M. Such, A. García-Fornes, A. Espinosa, and J. Bellver, "Magentix2: A privacy-enhancing agent platform," Eng. Appl. of AI, vol. 26, no. 1, pp. 96--109, 2013.
[6]
N. Ramakrishnan, B. Keller, B. J. Mirza, A. Grama, and G. Karypis, "Privacy risks in recommender systems," IEEE Internet Computing, vol. 5, no. 6, pp. 54--62, 2001.
[7]
R. Baraglia, C. Lucchese, R. Orlando, S. Perego, and F. Silvestri, "Preserving privacy in web recommender systems," in Privacy-Aware Knowledge Discovery, Novel Applications and New Techniques. CRC Press, 2010, pp. 369--391.
[8]
V. Estivill-Castro, P. Hough, and M. Islam, "Empowering users of social networks to assess their privacy risks," in 2014 IEEE Int. Conf. on Big Data, Washington, DC, USA: IEEE, 2014, pp. 644--649.
[9]
J. Vaidya, Y. Zhu, and C. W. Clifton, Privacy Preserving Data Mining, ser. Advances in Information Security. Springer, 2006, vol. 19.
[10]
C. C. Aggarwal and P. S. Yu, Eds., Privacy-Preserving Data Mining - Models and Algorithms, ser. Advances in Database Systems. Springer, 2008, vol. 34.
[11]
F. Giannotti and D. Pedreschi, Eds., Mobility, Data Mining and Privacy - Geographic Knowledge Discovery. Springer, 2008.
[12]
F. Bonchi and E. Ferrari, Eds., Privacy-Aware Knowledge Discovery --- Novel Applications and techniques, ser. Chapman & Hall/CRC Data Mining and Knowledge Discovery Series. CRC Press, 2010.
[13]
E. Zheleva, E. Terzi, and L. Getoor, Privacy in Social Networks, ser. Synthesis Lectures on Data Mining and Knowledge Discovery. Morgan & Claypool, 2012.
[14]
B. Könings, D. Piendl, F. Schaub, and M. Weber, "PrivacyJudge: Effective privacy controls for online published information," in Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third Int. Conf. on Social Computing (SocialCom), Boston, MA, USA, 2011, pp. 935--941.
[15]
B. Carminati, E. Ferrari, M. Kantarcioglu, and B. Thuraisinghaim, "Privacy protection of personal data in social networks," in Privacy-Aware Knowledge Discovery, Novel Applications and New Techniques. CRC Press, 2010, pp. 433--458.
[16]
M. Hay, G. Miklau, and D. Jensen, "Analyzing private network data," in Privacy-Aware Knowledge Discovery, Novel Applications and New Techniques. CRC Press, 2010, pp. 459--498.
[17]
S. Lederer, H. J. I, A. K. Dey, and J. A. Landay, "Personal privacy through understanding and action: five pitfalls for designers," Personal and Ubiquitous Computing, vol. 8, no. 6, pp. 440--454, 2004.
[18]
J. Domingo-Ferrer, A. Viejo, F. Sebé, and U. González-Nicolás, "Privacy homomorphisms for social networks with private relationships," Computer Networks, vol. 52, no. 15, pp. 3007--3016, 2008.
[19]
J. Domingo-Ferrer, "A public-key protocol for social networks with private relationships," in Modeling Decisions for Artificial Intelligence, 4th Int. Conf., MDAI, ser. LNCS, vol. 4617. Kitakyushu, Japan: Springer, 2007, pp. 373--379.
[20]
K. Liu and E. Terzi, "A framework for computing the privacy scores of users in online social networks," ACM Trans. Knowl. Discov. Data, vol. 5, no. 1, pp. 6:1--6:30, 2010.
[21]
Y. Jafer, S. Matwin, and M. Sokolova, "Privacy-aware filter-based feature selection," in 2014 IEEE Int. Conf. on Big Data, Big Data 2014, J. Lin, et, al. Eds. Washington, DC, USA: IEEE, 2014, pp. 1--5.
[22]
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten, "The WEKA data mining software: an update," SIGKDD Explorations, vol. 11, no. 1, pp. 10--18, 2009.
[23]
N. Z. Gong, A. Talwalkar, L. W. Mackey, L. Huang, E. C. R. Shin, E. Stefanov, E. Shi, and D. Song, "Joint link prediction and attribute inference using a social-attribute network," ACM Trans. Intell. Syst. Technol., vol. 5, no. 2, p. 27, 2014.
[24]
T. La Fond and J. Neville, "Randomization tests for distinguishing social influence and homophily effects," in 19th Int. Conf. on World Wide Web, ser. WWW '10. New York, NY, USA: ACM, 2010, pp. 601--610.
[25]
G. Kossinets and D. Watts, "Empirical analysis of an evolving social network," Science, vol. 311, no. 5757, pp. 88--90, 2006.
[26]
R. Kumar, J. Novak, P. Raghavan, and A. Tomkins, "Structure and evolution of blogspace," Commun. ACM, vol. 47, pp. 35--39, 2004.
[27]
M. Kim and J. Leskovec, "Modeling social networks with node attributes using the multiplicative attribute graph model," in In UAI, 2011.
[28]
D. Liben-Nowell and J. Kleinberg, "The link prediction problem for social networks," in Twelfth Int. Conf. on Information and Knowledge Management, ser. CIKM '03. ACM, 2003, pp. 556--559.
[29]
L. Adamic and E. Adar, "Friends and neighbors on the web," Social Networks, vol. 25, pp. 211--230, 2001.
[30]
U. M. Fayyad and K. B. Irani, "Multi-interval discretization of continuous-valued attributes for classification learning," in 13th Int. Joint Conf. on Artificial Intelligence, R. Bajcsy, Ed. Chambéry, France: Morgan Kaufmann, 3 1993, pp. 1022--1029.
[31]
A. Davis, B. B. Gardner, and M. R. Gardner, Deep South; a social anthropological study of caste and class. Chicago, IL, USA: University of Chicago Press, 1941.
[32]
L. Freeman, "Finding social groups: A meta-analysis of the southern women data," in Dynamic Social Network Modeling and Analysis. The National Academies, R. Breiger, K. Carley, and P. Pattison, Eds. Washington, DC.: National Academies Press, 2003, pp. 39--97.
[33]
M. J. J. and J. Leskovec, "Learning to discover social circles in ego networks," in Advances in Neural Information Processing Systems 25: 26th Annual Conf. on Neural Information Processing Systems 2012, P. Bartlett, et. al. Eds., ake Tahoe, Nevada, USA, 2012, pp. 548--556.
[34]
A. Kokkos and T. Tzouramanis, "A robust gender inference model for online social networks and its application to linkedin and twitter," First Monday, vol. 19, no. 9, 2014.
[35]
D. Chakrabarti, Y. Zhan, and C. Faloutsos, "R-MAT: A recursive model for graph mining," in Fourth SIAM Int. Conf. on Data Mining, M. W. Berry, et. al. Eds. Lake Buena Vista, Florida, USA: SIAM, 2004, pp. 442--446.

Cited By

View all
  1. Privacy Tips: Would it be ever possible to empower online social-network users to control the confidentiality of their data?

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ASONAM '15: Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015
      August 2015
      835 pages
      ISBN:9781450338547
      DOI:10.1145/2808797
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 25 August 2015

      Permissions

      Request permissions for this article.

      Check for updates

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Funding Sources

      • Ministerio de Economía y Competitividad, Spain

      Conference

      ASONAM '15
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 116 of 549 submissions, 21%

      Upcoming Conference

      KDD '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)4
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 31 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media