Conflict Detection Techniques for Preserving Privacy in Social Media

Author(s):  
Fulpagare Priya K. ◽  
Nitin N. Patil

Social Network is an emerging e-service for Content Sharing Sites (CSS). It is an emerging service which provides reliable communication. Some users over CSS affect user’s privacy on their personal contents, where some users keep on sending annoying comments and messages by taking advantage of the user’s inherent trust in their relationship network. Integration of multiple user’s privacy preferences is very difficult task, because privacy preferences may create conflict. The techniques to resolve conflicts are essentially required. Moreover, these methods need to consider how users would actually reach an agreement about a solution to the conflict in order to offer solutions acceptable by all of the concerned users. The first mechanism to resolve conflicts for multi-party privacy management in social media that is able to adapt to different situations by displaying the enterprises that users make to reach a result to the conflicts. Billions of items that are uploaded to social media are co-owned by multiple users. Only the user that uploads the item is allowed to set its privacy settings (i.e. who can access the item). This is a critical problem as users’ privacy preferences for co-owned items can conflict. Multi-party privacy management is therefore of crucial importance for users to appropriately reserve their privacy in social media.

2020 ◽  
Vol 35 (1) ◽  
Author(s):  
A. Can Kurtan ◽  
Pınar Yolum

AbstractImage sharing is a service offered by many online social networks. In order to preserve privacy of images, users need to think through and specify a privacy setting for each image that they upload. This is difficult for two main reasons: first, research shows that many times users do not know their own privacy preferences, but only become aware of them over time. Second, even when users know their privacy preferences, editing these privacy settings is cumbersome and requires too much effort, interfering with the quick sharing behavior expected on an online social network. Accordingly, this paper proposes a privacy recommendation model for images using tags and an agent that implements this, namely pelte. Each user agent makes use of the privacy settings that its user have set for previous images to predict automatically the privacy setting for an image that is uploaded to be shared. When in doubt, the agent analyzes the sharing behavior of other users in the user’s network to be able to recommend to its user about what should be considered as private. Contrary to existing approaches that assume all the images are available to a centralized model, pelte is compatible to distributed environments since each agent accesses only the privacy settings of the images that the agent owner has shared or those that have been shared with the user. Our simulations on a real-life dataset shows that pelte can accurately predict privacy settings even when a user has shared a few images with others, the images have only a few tags or the user’s friends have varying privacy preferences.


Author(s):  
Khalid Alemerien

A variety of online social networking (OSNs) services facilitates users to share a huge amount of their personal information such as photos. On the other hand, users may unintentionally reveal their photos to other audiences. Therefore, users of OSNs strive to protect their photos with existing privacy management mechanisms. Moreover, users need adequate feedback to understand their privacy preferences in photo sharing services. In this paper, the authors present a new visualization mechanism called Visual Privacy Management Policy (VPMP) in order to simplify the configuring privacy settings when users of OSNs share their photos with others. Also, this solution aims to address the shortcomings of privacy settings policies of photo sharing in OSNs. Furthermore, the solution employs a social graph and circles for visualizing when, where, how and with whom users will share their photos. So, this solution provides users a comprehensible and effective way to determine their privacy settings. The authors evaluate the visual privacy management policy (VPMP) for photo sharing with a user study that compared our solution with the user interface of photo-sharing on Facebook. The obtained findings provide quantitative evidence regarding the applicability of VPMP in terms of usability and privacy protection.


MedienJournal ◽  
2020 ◽  
Vol 44 (1) ◽  
pp. 41-54
Author(s):  
Isabell Koinig

The youth constitutes the largest user base of social media networks. While this generation has grown up in a digitally immersed environment, they are still not immune to the dangers the online space bears. Hence, maintaining their privacy is paramount. The present article presents a theoretical contribution, that is based on a review of relevant articles. It sets out to investigate the importance adolescents attribute to online privacy, which is likely to influence their willingness to disclose data. In line with a “new privacy paradox”, information disclosure is seen as unavoidable, given the centrality of social networks to adolescents’ lives. This goes hand in hand with individual privacy management. As individuals often lack knowledge as to how to protect their privacy, it is essential to educate the youth about their possibilities, equipping them with agency and self-responsibilization. This corresponds with a teen-centric approach to privacy as proposed by the TOSS framework.


MedienJournal ◽  
2020 ◽  
Vol 44 (1) ◽  
pp. 41-54
Author(s):  
Isabell Koinig

The youth constitutes the largest user base of social media networks. While this generation has grown up in a digitally immersed environment, they are still not immune to the dangers the online space bears. Hence, maintaining their privacy is paramount. The present article presents a theoretical contribution, that is based on a review of relevant articles. It sets out to investigate the importance adolescents attribute to online privacy, which is likely to influence their willingness to disclose data. In line with a “new privacy paradox”, information disclosure is seen as unavoidable, given the centrality of social networks to adolescents’ lives. This goes hand in hand with individual privacy management. As individuals often lack knowledge as to how to protect their privacy, it is essential to educate the youth about their possibilities, equipping them with agency and self-responsibilization. This corresponds with a teen-centric approach to privacy as proposed by the TOSS framework.


Sexualities ◽  
2020 ◽  
pp. 136346072096130
Author(s):  
Rhiannon Bury ◽  
Lee Easton

Social media and content-sharing platforms provide new opportunities for the circulation of not only professional and amateur porn productions but also “pornographic self-representation”. This study examines the interactions that occur when male pornographic self-representation is shared in an inclusive space that welcomes both straight and gay men to post dick pics and gaze/comment on them. Focusing on the Reddit forum, Massive Cock, we conducted a discourse analysis of a selection of posts, comments and account profiles collected over a seven-month period. Based on our findings, we contend that Massive is a homosocial space where homoerotic dick gazing reaffirms and disrupts the heterosexual–homosexual binary. Our findings point to an uneven dynamic in which the majority of the posters perform a straight identity, whereas the majority of commenters perform a gay identity. Their comments serve to disrupt hegemonic masculinity and, in turn, create a space that welcomes mostly straight and bi-curious performances of masculinity. Such performances are possible due to recent cultural shift away from homo-hysteria and towards a more inclusive heteromasculinity. Collectively these performances produce an inclusive “fraternity of the cock”, but it is one which maintains a heterocentric focus and function.


Author(s):  
Amanda Cox ◽  
Yeslam Al-Saggaf ◽  
Kate McLean

Social networking users are presented with a plethora of profile and privacy settings; most of which are left defaulted. As a result, there is little understanding of the fields that make up the user profile, the privacy settings available to safeguard the user, and the ramifications of not changing the same. Concerns relating to the unprecedented quantities of Personally Identifiable Information being stored need to be addressed. By employing a risk matrix to a social media profile, a user could be alerted to the potential dangers of the information being contained within the profile. By adapting this tool, the risks to the individual user of a social media profile will be minimised.


Author(s):  
Shalin Hai-Jew

Malicious political socialbots used to sway public opinion regarding the U.S. government and its functions have been identified as part of a larger information warfare effort by the Russian government. This work asks what is knowable from a web-based sleuthing approach regarding the following four factors: 1) the ability to identify malicious political socialbot accounts based on their ego neighborhoods at 1, 1.5, and 2 degrees; 2) the ability to identify malicious political socialbot accounts based on the claimed and linked geographical locations of their accounts, their ego neighborhoods, and their #hashtag networks; 3) the ability to identify malicious political socialbot accounts based on their strategic messaging (content, sentiment, and language structures) on respective social media platforms; and 4) the ability to identify and describe “maliciousness” in malicious political socialbot accounts based on observable behaviors on that account on three social media platform types: (a) microblogging, (b) social networking, and (c) crowd-sourced encyclopedia content sharing.


Sign in / Sign up

Export Citation Format

Share Document