Privacy Protection of Personal Data in Social Networks

2010 ◽  
pp. 461-486
Author(s):  
Barbara Carminati ◽  
Elena Ferrari ◽  
Murat Kantarcioglu ◽  
Bhavani Thuraisingham

2018 ◽  
Vol 14 (1) ◽  
pp. 33-48 ◽  
Author(s):  
Sanna-Maria Nurmi ◽  
Mari Kangasniemi ◽  
Arja Halkoaho ◽  
Anna-Maija Pietilä

With changes in clinical research practice, the importance of a study-subject’s privacy and the confidentiality of their personal data is growing. However, the body of research is fragmented, and a synthesis of work in this area is lacking. Accordingly, an integrative review was performed, guided by Whittemore and Knafl’s work. Data from PubMed, Scopus, and CINAHL searches from January 2012 to February 2017 were analyzed via the constant comparison method. From 16 empirical and theoretical studies, six topical aspects were identified: the evolving nature of health data in clinical research, sharing of health data, the challenges of anonymizing data, collaboration among stakeholders, the complexity of regulation, and ethics-related tension between social benefits and privacy. Study subjects’ privacy is an increasingly important ethics principle for clinical research, and privacy protection is rendered even more challenging by changing research practice.


Author(s):  
Jon Crowcroft ◽  
Hamed Haddadi ◽  
Tristan Henderson

Researchers have found online social networks a goldmine for research into various aspects of social behavior and interpersonal communication. For example, observing social interaction between individuals and their engagement in conversations, or performing sentiment analysis on these communications, is often carried out for research in a number of disciplines such as health, sociology, or politics. Such studies introduce many challenges for conducting research in a responsible manner. Data may be repurposed or cross-correlated in ways that participants may not have anticipated or desired, private information may be collected, or legal requirements may not be met. This chapter explores some of the challenges and dilemmas faced by industry, academia, regulators, privacy advocates, and ultimately the individuals using these services. It discusses the pros and cons of the collection, analysis, and archiving of personal data for digital research. The chapter concludes by discussing theoretical and practical approaches that target these dilemmas.


2014 ◽  
pp. 451-484
Author(s):  
Rula Sayaf ◽  
Dave Clarke

Access control is one of the crucial aspects in information systems security. Authorizing access to resources is a fundamental process to limit potential privacy violations and protect users. The nature of personal data in online social networks (OSNs) requires a high-level of security and privacy protection. Recently, OSN-specific access control models (ACMs) have been proposed to address the particular structure, functionality and the underlying privacy issues of OSNs. In this survey chapter, the essential aspects of access control and review the fundamental classical ACMs are introduced. The specific OSNs features and review the main categories of OSN-specific ACMs are highlighted. Within each category, the most prominent ACMs and their underlying mechanisms that contribute enhancing privacy of OSNs are surveyed. Toward the end, more advanced issues of access control in OSNs are discussed. Throughout the discussion, different models and highlight open problems are contrasted. Based on these problems, the chapter is concluded by proposing requirements for future ACMs.


Author(s):  
Valentina Amenta ◽  
Adriana Lazzaroni ◽  
Laura Abba

In this chapter, the analysis will focus on the concept of digital identity which is evolving and changing, based on the experiences that every individual lives. The chapter further highlights how the digital identity includes the fundamental human rights such as the right to a name, the right of reply, the right to protection of personal data and the right to an image. In translating the right to personal identity to our digitalized era, with its massive use of social networks, we have added to the related decalogue of rights the right to oblivion, equally called right to be forgotten. Given the complexity of the subject, the chapter develops an analysis of the actual international regulatory trends.


Sign in / Sign up

Export Citation Format

Share Document