Resolving Multi-Party Privacy Conflicts in Social Media

被引:74
作者
Such, Jose M. [1 ]
Criado, Natalia [2 ]
机构
[1] Univ Lancaster, Sch Comp & Commun, Secur Lancaster, Lancaster LA1 4WA, England
[2] Kings Coll London, Dept Informat, London WC2R 2LS, England
关键词
Social media; privacy; conflicts; multi-party privacy; social networking services; online social networks; ACCESS-CONTROL;
D O I
10.1109/TKDE.2016.2539165
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Items shared through Social Media may affect more than one user's privacy-e.g., photos that depict multiple users, comments that mention multiple users, events in which multiple users are invited, etc. The lack of multi-party privacy management support in current mainstream Social Media infrastructures makes users unable to appropriately control to whom these items are actually shared or not. Computational mechanisms that are able to merge the privacy preferences of multiple users into a single policy for an item can help solve this problem. However, merging multiple users' privacy preferences is not an easy task, because privacy preferences may conflict, so methods to resolve conflicts are needed. Moreover, these methods need to consider how users' would actually reach an agreement about a solution to the conflict in order to propose solutions that can be acceptable by all of the users affected by the item to be shared. Current approaches are either too demanding or only consider fixed ways of aggregating privacy preferences. In this paper, we propose the first computational mechanism to resolve conflicts for multi-party privacy management in Social Media that is able to adapt to different situations by modelling the concessions that users make to reach a solution to the conflicts. We also present results of a user study in which our proposed mechanism outperformed other existing approaches in terms of how many times each approach matched users' behaviour.
引用
收藏
页码:1851 / 1863
页数:13
相关论文
共 45 条
  • [1] Acquisti A, 2006, LECT NOTES COMPUT SC, V4258, P36
  • [2] [Anonymous], 2012, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 12, DOI DOI 10.1145/2207676.2208552
  • [3] [Anonymous], 1992, P THEOR PRAX FUZZ LO
  • [4] [Anonymous], 2011, Proceedings of the Seventh Symposium on Usable Privacy and Security, DOI [10.1145/2078827.2078841, DOI 10.1145/2078827.2078841]
  • [5] [Anonymous], 2010, CHI 10 EXTENDED ABST
  • [6] [Anonymous], 2012, P 8 S US PRIV SEC JU
  • [7] [Anonymous], 2008, UPSEC
  • [8] [Anonymous], 2011, P HT 2011
  • [9] Besmer A, 2010, CHI2010: PROCEEDINGS OF THE 28TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, VOLS 1-4, P1563
  • [10] Collaborative Access Control in On-line Social Networks (Invited Paper)
    Canninati, Barbara
    Ferrari, Elena
    [J]. PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM), 2011, : 231 - 240