Prevention of inference attacks for private information in social networking sites

Author(s):  
A. Praveena ◽  
S. Smys
2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Shu-Chuan Chu ◽  
Lili Chen ◽  
Sachin Kumar ◽  
Saru Kumari ◽  
Joel J. P. C. Rodrigues ◽  
...  

Social networks are becoming popular, with people sharing information with their friends on social networking sites. On many of these sites, shared information can be read by all of the friends; however, not all information is suitable for mass distribution and access. Although people can form communities on some sites, this feature is not yet available on all sites. Additionally, it is inconvenient to set receivers for a message when the target community is large. One characteristic of social networks is that people who know each other tend to form densely connected clusters, and connections between clusters are relatively rare. Based on this feature, community-finding algorithms have been proposed to detect communities on social networks. However, it is difficult to apply community-finding algorithms to distributed social networks. In this paper, we propose a distributed privacy control protocol for distributed social networks. By selecting only a small portion of people from a community, our protocol can transmit information to the target community.


Author(s):  
Haiyan Jia ◽  
Heng Xu

With the rise of social networking sites (SNSs), individuals not only disclose personal information but also share private information concerning others online. While shared information is co-constructed by self and others, personal and collective privacy boundaries become blurred. Thus there is an increasing concern over information privacy beyond the individual perspective. However, limited research has empirically examined if individuals are concerned about privacy loss not only of their own but their social ties’; nor is there an established instrument for measuring the collective aspect of individuals’ privacy concerns. In order to address this gap in existing literature, we propose a conceptual framework of individuals’ collective privacy concerns in the context of SNSs. Drawing on the Communication Privacy Management (CPM) theory (Petronio, 2002), we suggest three dimensions of collective privacy concerns, namely, collective information access, control and diffusion. This is followed by the development and empirical validation of a preliminary scale of SNS collective privacy concerns (SNSCPC). Structural model analyses confirm the three-dimensional conceptualization of SNSCPC and reveal antecedents of SNS users’ concerns over violations of the collective privacy boundaries. This paper serves as a starting point for theorizing privacy as a collective notion and for understanding online information disclosure as a result of social interaction and group influence.


2007 ◽  
Vol 12 (5) ◽  
pp. 67-79 ◽  
Author(s):  
David Beer ◽  
Roger Burrows

This paper introduces the idea of Web 2.0 to a sociological audience as a key example of a process of cultural digitization that is moving faster than our ability to analyse it. It offers a definition, a schematic overview and a typology of the notion as part of a commitment to a renewal of description in sociology. It provides examples of wikis, folksonomies, mashups and social networking sites and, where possible and by way of illustration, examines instances where sociology and sociologists are featured. The paper then identifies three possible agendas for the development of a viable sociology of Web 2.0: the changing relations between the production and consumption of internet content; the mainstreaming of private information posted to the public domain; and, the emergence of a new rhetoric of ‘democratisation’. The paper concludes by discussing some of the ways in which we can engage with these new web applications and go about developing sociological understandings of the new online cultures as they become increasingly significant in the mundane routines of everyday life.


Author(s):  
Elena Kitova ◽  
Anastasia Melgunova

The authors study the concepts of data protection and freedom of information, which are considered to be the basic concepts of modern information societies. The research is based on the materials of British and American mass media. Language is viewed as integral part of the society, as one of its self-regulation mechanisms; the authors use the integrationist approach to language and the bio-cultural theory of meaning to describe each of the concepts from the standpoint of its value for the society. They also prove that the meaning of these concepts is based on their characteristic as a “valuable resource”, which leads to the co-existence of two opposing trends — the need to protect private life and private information on the one hand, and the necessity of sharing different, including private, information to reach the socially approved goals on the other hand. The first trend is manifested through the concept of privacy, while the second describes the availability of data and information. The authors pay special attention to the analysis of social changes that lead to a new balance of data protection / freedom of information, to the necessity of finding a new equilibrium point. They study the rapid growth of various social networking sites and messengers that facilitate the emergence and dissemination of fake news, while this news — data and information — lose their characteristic of a “valuable resource” since they are totally or partially false. Social networking sites could also make personal information widely available or collect user information that is then transferred to a third party. The unacceptability of such practices in the eyes of the society is examined using the example of a recent scandal involving Facebook and Data Analytica. The authors come to the conclusion that the concepts of data protection and freedom of information reflect the essence of a regulatory social mechanism that coordinates interactions between the person and society in the new information age.


Author(s):  
Danielle Fishman

As a result of the changing times, the constant overuse of recently discovered information communication technologies (ICT’s) has become a detrimental trend in contemporary society. There are a number of issues that arise from the regular use of these technologies which ultimately lead to the misuse of certain capabilities of these technologies. Web 2.0 (DiNucci, 1999), became the subject of discussion in the early 2000s. Web 2.0 identifies the newly popularized social networking sites on the World Wide Web which allow an interaction between the host and the user where the user has the ability to respond, comment or offer feedback to the host. It has been used to describe the idea of information sharing, feedback and ultimately, ubiquitous connectivity. As a result of the current Web 2.0 we engage in, there is a trend toward the constant use of social networking sites ultimately leading to participatory surveillance (Albrechtslund, 2008). Furthermore, the constant posting and updating required to manage your profile on social networking sites leads to new surveillance (Marx 2002) and sequentially, what has been termed lateral surveillance (Andrejevic, 2005). In addition, the development of location based technologies, for purposes of monitoring, have been integrated into popular social networking websites. The term Web 2.0 is associated with web applications that facilitate participatory information sharing, interoperability, user-centered design and collaboration on the World Wide Web. A Web 2.0 site allows users to interact and collaborate with one another in a social media dialogue as creators of user-generated content in a virtual community. This differs from the previous Web 1.0 websites where users (consumers) were limited to the passive viewing of content that was created for them. In turn, these activities are extensively popular and through the network effects of that popularity, economically significant (O’Reilly, 2005; Tweney, 2007; Madden and Fox, 2006). Finally, in accordance with the prosumer society, monetary gains are the primary focus of companies and furthermore, there has been a trend toward selling private information by internet website hosts in order to profit. The harnessing of collective intelligence within Web 2.0 demands platforms where this intelligence can be expressed and collected.  Furthermore, in an age of growing technology, new legislations must be created in conjunction with the growing use of personal information. In a time of extreme internet use, our privacy is limited. With a growing trend toward the integration of Web 2.0 in daily life, it is clear that the relationship between privacy and surveillance is dramatically changing. We, as users, are naive in understanding the concepts of privacy and surveillance in the Web 2.0 society. Social networking systems and information sharing has blurred our ideas of privacy and limited our understanding of the use of surveillance. In a growing age of a prosumer society and the culture of social networking, users are inadvertently exposed to living an entirely public life.


2021 ◽  
pp. 1-16
Author(s):  
Mirna Gilman Ranogajec ◽  
Boris Badurina

In today’s Information society it is an everyday scenario to be a part of an online community such as social media. Participation has become almost mandatory to the point of acting as a virtual extremity to one’s physical environment. This virtual extremity is the individual’s window to the outside world and vice versa. The process of being a part of social media has become very easy and user friendly where one is only a few private information entries away from communicating and connecting with the rest of the world. From the user’s perspective it may be a small price considering what it is gained from joining an online community, but with the rise of social networking platforms, arise privacy concerns regarding social networking services. It is questionable how many social media users consider the information they upload or post about online whether it’s their location, hobbies, employment places, age or any other private information. How many users actually read security and privacy terms when first registering for a social media account? What private information are individuals comfortable with entering and sharing on social networking sites? More and more loopholes are being found in social media frameworks that may compromise user’s privacy or that can be misused in a way that was not intended by the user. In 2010, the Google CEO Eric Schmidt was even quoted “… If we look at enough of your messaging and your location, and use artificial intelligence, we can predict where you are going to go.” (Snickars, Pelle, Vonderau, 2012). That line alone raised a lot of concerns and questions about how exactly is the information users put online being used.


Sign in / Sign up

Export Citation Format

Share Document