scholarly journals PRIVACY-AVARE: An approach to manage and distribute privacy settings

Author(s):  
Sascha Alpers ◽  
Andreas Oberweis ◽  
Maria Pieper ◽  
Stefanie Betz ◽  
Andreas Fritsch ◽  
...  
Keyword(s):  
Author(s):  
Fulpagare Priya K. ◽  
Nitin N. Patil

Social Network is an emerging e-service for Content Sharing Sites (CSS). It is an emerging service which provides reliable communication. Some users over CSS affect user’s privacy on their personal contents, where some users keep on sending annoying comments and messages by taking advantage of the user’s inherent trust in their relationship network. Integration of multiple user’s privacy preferences is very difficult task, because privacy preferences may create conflict. The techniques to resolve conflicts are essentially required. Moreover, these methods need to consider how users would actually reach an agreement about a solution to the conflict in order to offer solutions acceptable by all of the concerned users. The first mechanism to resolve conflicts for multi-party privacy management in social media that is able to adapt to different situations by displaying the enterprises that users make to reach a result to the conflicts. Billions of items that are uploaded to social media are co-owned by multiple users. Only the user that uploads the item is allowed to set its privacy settings (i.e. who can access the item). This is a critical problem as users’ privacy preferences for co-owned items can conflict. Multi-party privacy management is therefore of crucial importance for users to appropriately reserve their privacy in social media.


2020 ◽  
Vol 35 (1) ◽  
Author(s):  
A. Can Kurtan ◽  
Pınar Yolum

AbstractImage sharing is a service offered by many online social networks. In order to preserve privacy of images, users need to think through and specify a privacy setting for each image that they upload. This is difficult for two main reasons: first, research shows that many times users do not know their own privacy preferences, but only become aware of them over time. Second, even when users know their privacy preferences, editing these privacy settings is cumbersome and requires too much effort, interfering with the quick sharing behavior expected on an online social network. Accordingly, this paper proposes a privacy recommendation model for images using tags and an agent that implements this, namely pelte. Each user agent makes use of the privacy settings that its user have set for previous images to predict automatically the privacy setting for an image that is uploaded to be shared. When in doubt, the agent analyzes the sharing behavior of other users in the user’s network to be able to recommend to its user about what should be considered as private. Contrary to existing approaches that assume all the images are available to a centralized model, pelte is compatible to distributed environments since each agent accesses only the privacy settings of the images that the agent owner has shared or those that have been shared with the user. Our simulations on a real-life dataset shows that pelte can accurately predict privacy settings even when a user has shared a few images with others, the images have only a few tags or the user’s friends have varying privacy preferences.


IFLA Journal ◽  
2018 ◽  
Vol 44 (3) ◽  
pp. 203-222
Author(s):  
Deirdre McGuinness ◽  
Anoush Simon

This paper explores the use of social networking sites amongst the student population of a Welsh university, with particular respect to information-sharing and privacy behaviours, and the potential impact of social networking site checks by employers on future use of these sites. A mixed-methods research design incorporating both quantitative and qualitative approaches was employed to investigate the research question. Results demonstrated that participants were concerned with maintaining privacy online, and were careful with regards to posting and protecting information on social networking sites; however, protective measures were imperfect due to human and system errors. Most respondents were aware of social networking site surveillance, with many noting that this would have an impact on their future use; however, users are active in protecting their privacy through a combination of use of privacy settings and varied levels of information disclosure dependent on context.


Author(s):  
Amanda Cox ◽  
Yeslam Al-Saggaf ◽  
Kate McLean

Social networking users are presented with a plethora of profile and privacy settings; most of which are left defaulted. As a result, there is little understanding of the fields that make up the user profile, the privacy settings available to safeguard the user, and the ramifications of not changing the same. Concerns relating to the unprecedented quantities of Personally Identifiable Information being stored need to be addressed. By employing a risk matrix to a social media profile, a user could be alerted to the potential dangers of the information being contained within the profile. By adapting this tool, the risks to the individual user of a social media profile will be minimised.


2015 ◽  
Vol 3 ◽  
pp. 815-822 ◽  
Author(s):  
Sylvia Kowalewski ◽  
Martina Ziefle ◽  
Henrik Ziegeldorf ◽  
Klaus Wehrle

2009 ◽  
Vol 6 (3) ◽  
pp. 275-293 ◽  
Author(s):  
Andrés Sanchez

This article presents a case study into the massive online demonstrations that occurred on Facebook (an online networking platform much like MySpace or Bebo) during Autumn/Winter of 2006 as a vibrant and contemporary example of resistance in action in the online domain. The demonstrations were carried out in response to the introduction of Facebook’s ‘News Feed’ and ‘Mini-Feed’ pages which greeted users upon signing in and presented a wealth of information about their friends and their online activities, seemingly without any form of privacy control. The pages even listed details of personal relationships and sexual orientations; both highly contentious issues. The response to this perceived intrusion on users’ privacy was staggering. Groups were set up overnight to pillory the Facebook News Feed, massive petitions that numbered hundreds of thousands were set up across international boundaries, online blogs and message boards became filled with incandescent comments.Eventually, Mark Zuckerberg (Facebook’s founder and himself a former Harvard student) was forced to issue a public apology and then amend the News Feed to allow users the opportunity to edit their privacy settings. No longer would such information be so publicly accessible. No longer would privacy be taken so lightly. The student body used the very means by which they were being surveilled (that is, the cyber-synoptic infrastructure of the Facebook network) to organize an internationally resistant movement to support their right to privacy. This confrontation provides an engrossing example of the World Wide Web being used as a powerful tool to mobilize many bodies against a perceived force of oppression and subjugation. This was a clear demonstration that the politics of surveillance (Haggerty 2006) and the politics of the self matter greatly in present climes; where issues of privacy and the sanctity of the virtual realm are never far from the headlines. As such, it provides an excellent empirical backdrop to a conceptual analysis of resistance-through-distance and resistance-through-persistence (Collinson 1994) in the virtual realm.


Sign in / Sign up

Export Citation Format

Share Document