skip to main content
10.1145/3110025.3110073acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
short-paper

REACT: REcommending Access Control decisions To social media users

Published: 31 July 2017 Publication History

Abstract

The problems that social media users have in appropriately controlling access to their content has been well documented in previous research. A promising method of providing assistance to users is by learning from the access control decisions made by them and making future recommendations. In this paper, we present REACT, a learning mechanism which utilizes information available in the social network in conjunction with information about the content to be shared to provide users with access control recommendations. We demonstrate the highly accurate performance of REACT through a detailed empirical evaluation and also discuss ways of personalizing it for different users in order to improve performance even further.

References

[1]
H. Nissenbaum, "Privacy as contextual integrity," Washington Law Review, vol. 79, p. 119, 2004.
[2]
G. Hull, H. R. Lipford, and C. Latulipe, "Contextual gaps: Privacy issues on facebook," Ethics and information technology, 2011.
[3]
M. Johnson, S. Egelman, and S. M. Bellovin, "Facebook and privacy: it's complicated," in Proc. of SOUPS. ACM, 2012, p. 9.
[4]
S. Kairam, M. Brzozowski, D. Huffaker, and E. Chi, "Talking in circles: selective sharing in google+," in Proc. of the SIGCHI. ACM, 2012, pp. 1065--1074.
[5]
P. Wisniewski, B. P. Knijnenburg, and H. Richter Lipford, "Profiling facebook users privacy behaviors," in SOUPS2014 Workshop on Privacy Personas and Segmentation, 2014.
[6]
A. Mazzia, K. LeFevre, and E. Adar, "The pviz comprehension tool for social network privacy settings," in Proceedings of the Eighth Symposium on Usable Privacy and Security. ACM, 2012, p. 13.
[7]
G. Misra and J. M. Such, "How socially aware are social media privacy controls?" IEEE Computer, vol. 49, no. 3, pp. 96--99, 2016.
[8]
L. Fang and K. LeFevre, "Privacy wizards for social networking sites," in Proc. of the 19th international conference on World wide web. ACM, 2010, pp. 351--360.
[9]
G. P. Cheek and M. Shehab, "Human effects of enhanced privacy management models," Dependable and Secure Computing, IEEE Transactions on, vol. 11, no. 2, pp. 142--154, 2014.
[10]
S. Amershi, J. Fogarty, and D. Weld, "Regroup: Interactive machine learning for on-demand group creation in social networks," in Proc. of the SIGCHI. ACM, 2012, pp. 21--30.
[11]
J. J. McAuley and J. Leskovec, "Learning to discover social circles in ego networks." in NIPS, vol. 272, 2012, pp. 548--556.
[12]
A. C. Squicciarini, S. Sundareswaran, D. Lin, and J. Wede, "A3p: adaptive policy prediction for shared images over popular content sharing sites," in Proceedings of the 22nd ACM conference on Hypertext and hypermedia. ACM, 2011, pp. 261--270.
[13]
A. Acquisti, L. Brandimarte, and G. Loewenstein, "Privacy and human behavior in the age of information," Science, vol. 347, no. 6221, pp. 509--514, 2015.
[14]
G. Misra, J. M. Such, and H. Balogun, "Non-sharing communities? an empirical study of community detection for access control decisions," in IEEE/ACM ASONAM, 2016. IEEE, 2016, pp. 49--56.
[15]
E. Gilbert and K. Karahalios, "Predicting tie strength with social media," in Proceedings of the SIGCHI conference on human factors in computing systems. ACM, 2009, pp. 211--220.
[16]
R. L. Fogués, J. M. Such, A. Espinosa, and A. Garcia-Fornes, "Bff: A tool for eliciting tie strength and user communities in social networking services," Information Systems Frontiers, pp. 1--13, 2013.
[17]
G. Misra, J. M. Such, and H. Balogun, "Improve: Identifying minimal profile vectors for similarity based access control," in IEEE TrustCom. IEEE, 2016, pp. 868--875.
[18]
C.-m. A. Yeung, L. Kagal, N. Gibbins, and N. Shadbolt, "Providing access control to online photo albums based on tags and linked data." in AAAI Spring Symposium: Social Semantic Web: Where Web 2.0 Meets Web 3.0, 2009, pp. 9--14.
[19]
I. Derényi, G. Palla, and T. Vicsek, "Clique percolation in random networks," Physical review letters, vol. 94, no. 16, p. 160202, 2005.
[20]
G. Calikli, M. Law, A. K. Bandara, A. Russo, L. Dickens, B. A. Price, A. Stuart, M. Levine, and B. Nuseibeh, "Privacy dynamics: Learning privacy norms for social software," in Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems. ACM, 2016, pp. 47--56.
[21]
N. Japkowicz and S. Stephen, "The class imbalance problem: A systematic study," Intelligent data analysis, 2002.
[22]
S. Jones and E. O'Neill, "Feasibility of structural network clustering for group-based privacy control in social networks," in Proceedings of the SOUPS. ACM, 2010, p. 9.
[23]
G. Danezis, "Inferring privacy policies for social networking services," in Proc of the 2nd ACM workshop on Security and artificial intelligence, 2009.
[24]
A. Squicciarini, S. Karumanchi, D. Lin, and N. DeSisto, "Identifying hidden social circles for advanced privacy configuration," Computers & Security, vol. 41, pp. 40--51, 2014.
[25]
A. E. Marwick et al., "I tweet honestly, i tweet passionately: Twitter users, context collapse, and the imagined audience," New Media & Society, vol. 13, no. 1, pp. 114--133, 2011.
[26]
H. Yildiz and C. Kruegel, "Detecting social cliques for automated privacy control in online social networks," in Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012 IEEE International Conference on. IEEE, 2012, pp. 353--359.
[27]
J. M. Such and N. Criado, "Resolving multi-party privacy conflicts in social media," IEEE Transactions on Knowledge and Data Engineering, vol. 28, no. 7, pp. 1851--1863, 2016.

Cited By

View all
  1. REACT: REcommending Access Control decisions To social media users

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ASONAM '17: Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017
    July 2017
    698 pages
    ISBN:9781450349932
    DOI:10.1145/3110025
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 31 July 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Short-paper
    • Research
    • Refereed limited

    Conference

    ASONAM '17
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 116 of 549 submissions, 21%

    Upcoming Conference

    KDD '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 31 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media