skip to main content
research-article

Privacy Policy Negotiation in Social Media

Published: 09 February 2016 Publication History

Abstract

Social media involve many shared items, such as photos, which may concern more than one user. The challenge is that users’ individual privacy preferences for the same item may conflict, so an approach that simply merges in some way the users’ privacy preferences may provide unsatisfactory results. Previous proposals to deal with the problem were either time-consuming or did not consider compromises to solve these conflicts (e.g., by considering unilaterally imposed approaches only). We propose a negotiation mechanism for users to agree on a compromise for these conflicts. The second challenge we address in this article relates to the exponential complexity of such a negotiation mechanism. To address this, we propose heuristics that reduce the complexity of the negotiation mechanism and show how substantial benefits can be derived from the use of these heuristics through extensive experimental evaluation that compares the performance of the negotiation mechanism with and without these heuristics. Moreover, we show that one such heuristic makes the negotiation mechanism produce results fast enough to be used in actual social media infrastructures with near-optimal results.

References

[1]
Amr Ali-Eldin and Jan van den Berg. 2014. A self-disclosure framework for social mobile applications. In Proceedings of the 6th International Conference on New Technologies, Mobility and Security (NTMS’14). IEEE, 1--5.
[2]
Joseph Bonneau and Sören Preibusch. 2010. The privacy jungle: On the market for data protection in social networks. In Economics of Information Security and Privacy. Springer, 121--167.
[3]
Barbara Carminati and Elena Ferrari. 2011. Collaborative access control in on-line social networks. In Proceedings of 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom’11). IEEE, 231--240.
[4]
Barbara Carminati, Elena Ferrari, and Andrea Perego. 2009. Enforcing access control in web-based social networks. ACM Transactions on Information and System Security (TISSEC) 13, 1 (2009), 6.
[5]
Andrei Ciortea, Yann Krupa, and Laurent Vercouter. 2012. Designing privacy-aware social networks: A multi-agent approach. In Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics. ACM, 1--8.
[6]
Lorrie Cranor and Simson Garfinkel. 2005. Security and Usability: Designing Secure Systems That People Can Use. O’Reilly Media, Incorporated.
[7]
George Danezis. 2009. Inferring privacy policies for social networking services. In Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence. ACM, 5--10.
[8]
Steve Duck. 2007. Human Relationships. SAGE Publications Limited.
[9]
Ulle Endriss. 2006. Monotonic concession protocols for multilateral negotiation. In AAMAS. ACM, 392--399.
[10]
Lujun Fang and Kristen LeFevre. 2010. Privacy wizards for social networking sites. In Proceedings of the 19th International Conference on World Wide Web (WWW). ACM, 351--360.
[11]
Ricard Fogues, Jose M. Such, Agustin Espinosa, and Ana Garcia-Fornes. 2015. Open challenges in relationship-based privacy mechanisms for social network services. International Journal of Human-Computer Interaction 31, 5 (2015), 350--370.
[12]
Ricard L. Fogués, Jose M. Such, Agustin Espinosa, and Ana Garcia-Fornes. 2014. BFF: A tool for eliciting tie strength and user communities in social networking services. Information Systems Frontiers 16, 2 (2014), 225--237.
[13]
Philip W. L. Fong. 2011. Relationship-based access control: Protection model and policy language. In Proceedings of the 1st ACM Conference on Data and Application Security and Privacy (CODASPY). ACM, 191--202.
[14]
Carrie Gates. 2007. Access control requirements for web 2.0 security and privacy. IEEE Web 2, 0 (2007).
[15]
Eric Gilbert. 2012. Predicting tie strength in a new medium. In Proceedings of the ACM Conference on Computer Supported Cooperative Work (CSCW’12). ACM, New York, NY, 1047--1056.
[16]
Eric Gilbert and Karrie Karahalios. 2009. Predicting tie strength with social media. In Proceedings of the 27th International Conference on Human Factors in Computing Systems (CHI). ACM, 211--220.
[17]
Mark Granovetter. 1973. The strength of weak ties. American Journal of Sociology 78, 6 (1973), 1360--1380.
[18]
Kathryn Green, Valerian J. Derlega, and Alicia Mathews. 2006. Self-disclosure in personal relationships. In The Cambridge Handbook of Personal Relationships. Cambridge University Press, 409--427.
[19]
Ralph Gross and Alessandro Acquisti. 2005. Information revelation and privacy in online social networks. In Proceedings of the ACM Workshop on Privacy in the Electronic Society (WPES’05). ACM, 71--80.
[20]
Tad Hogg, Dennis M. Wilkinson, Gabor Szabo, and Michael J. Brzozowski. 2008. Multiple relationship types in online communities and social networks. In AAAI Spring Symposium: Social Information Processing. 30--35.
[21]
David J. Houghton and Adam N. Joinson. 2010. Privacy, social network sites, and social relations. Journal of Technology in Human Services 28, 1--2 (2010), 74--94.
[22]
Hongxin Hu, G. Ahn, and Jan Jorgensen. 2012. Multiparty access control for online social networks: Model and mechanisms. IEEE Transactions on Knowledge and Data Engineering (2012).
[23]
Hongxin Hu, Gail-Joon Ahn, and Jan Jorgensen. 2011. Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC). ACM, New York, NY, 103--112.
[24]
Nadin Kökciyan and Pınar Yolum. 2014. Commitment-based privacy management in online social networks. In Proceedings of the 1st International Workshop on the Multiagent Foundations of Social Computing (MFSC@AAMAS’14). 1--12.
[25]
Yann Krupa and Laurent Vercouter. 2012. Handling privacy as contextual integrity in decentralized virtual communities: The PrivaCIAS framework. Web Intelligence and Agent Systems 10, 1 (2012), 105--116.
[26]
Fernando Lopes, Michael Wooldridge, and Augusto Q. Novais. 2008. Negotiation among autonomous computational agentsl: Principles, analysis and challenges. Artificial Intelligence Review 29, 1 (2008), 1--44.
[27]
Michelle Madejski, Maritza Johnson, and Steven Bellovin. 2011. The Failure of Online Social Network Privacy Settings. Technical Report CUCS-010-11. Columbia University. 1--20 pages.
[28]
Martin J. Osborne and Ariel Rubinstein. 1990. Bargaining and Markets. Vol. 34. Academic Press, San Diego.
[29]
Daniele Quercia, Renaud Lambiotte, Michal Kosinski, David Stillwell, and Jon Crowcroft. 2012. The personality of popular facebook users. In Proceedings of the ACM Conference on Computer Supported Cooperative Work (CSCW’12). 955--964.
[30]
Elie Raad, Richard Chbeir, and Albert Dipanda. 2013. Discovering relationship types between users using profiles and shared photos in a social network. Multimedia Tools and Applications 64, 1 (2013), 141--170.
[31]
Jeffrey S. Rosenschein and Gilad Zlotkin. 1994. Rules of Encounter: Designing Conventions for Automated Negotiation Among Computers. MIT Press. http://books.google.com/books?id=4ZhPMk3ftpoC.
[32]
Michael Rovatsos. 2014. Multiagent systems for social computation. In Proceedings of the International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS’14). IFAAMAS, 1165--1168.
[33]
Carles Sierra and John Debenham. 2007. The LOGIC negotiation model. In Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS’07). ACM, 1--8.
[34]
Munindar P. Singh. 2013. Norms as a basis for governing sociotechnical systems. ACM Transactions on Intelligent Systems and Technology (TIST) 5, 1 (2013), 21.
[35]
Anna Cinzia Squicciarini, Mohamed Shehab, and Federica Paci. 2009. Collective privacy management in social networks. In Proceedings of the 18th International Conference on World Wide Web (WWW). ACM, 521--530.
[36]
Anna Cinzia Squicciarini, Smitha Sundareswaran, Dan Lin, and Josh Wede. 2011. A3P: Adaptive policy prediction for shared images over popular content sharing sites. In Proceedings of the 22nd ACM Conference on Hypertext and Hypermedia (Hypertext). 261--270.
[37]
Jessica Staddon, David Huffaker, Larkin Brown, and Aaron Sedley. 2012. Are privacy concerns a turn-off: Engagement and privacy in social networks. In Proceedings of the 8th Symposium on Usable Privacy and Security (SOUPS). ACM, 1--13.
[38]
Lior J. Strahilevitz. 2005. A social networks theory of privacy. In American Law & Economics Association Annual Meetings. bepress, 42.
[39]
Fred Stutzman, Ralph Gross, and Alessandro Acquisti. 2013. Silent listeners: The evolution of privacy and disclosure on facebook. Journal of Privacy and Confidentiality 4, 2 (2013), 2.
[40]
Jose M. Such and Natalia Criado. 2014. Adaptive conflict resolution mechanism for multi-party privacy management in social media. In Proceedings of the 13th Workshop on Privacy in the Electronic Society. ACM, 69--72.
[41]
Jose M. Such, Agustín Espinosa, and Ana García-Fornes. 2014. A survey of privacy in multi-agent systems. Knowledge Engineering Review 29 (2014), 313--344. Issue 03.
[42]
Jose M. Such, Agustin Espinosa, Ana García-Fornes, and C. Sierra. 2012. Self-disclosure decision making based on intimacy and privacy. Information Sciences 211 (2012), 93--111.
[43]
Kurt Thomas, Chris Grier, and David M. Nicol. 2010. Unfriendly: Multi-party privacy risks in social networks. In Privacy Enhancing Technologies, Mikhail J. Atallah and Nicholas J. Hopper (Eds.). Springer, 236--252.
[44]
Jose M. Vidal. 2010. Fundamentals of Multiagent Systems with NetLogo Examples. http://multiagent.com/p/fundamentals-of-multiagent-systems.html.
[45]
Sami Vihavainen, Airi Lampinen, Antti Oulasvirta, Suvi Silfverberg, and Asko Lehmuskallio. 2014. The clash between privacy and automation in social media. IEEE Pervasive Computing 13, 1 (2014), 56--63.
[46]
Yonggang Wang, Ennan Zhai, Eng Keong Lua, Jianbin Hu, and Zhong Chen. 2012. iSac: Intimacy based access control for social network sites. In Proceedings of the 9th International Conference on Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC’& Trusted Computing (UIC/ATC’’12). IEEE, 517--524.
[47]
Douglas R. White and Michael Houseman. 2002. The navigability of strong ties: Small worlds, tie strength, and network topology. Complexity 8, 1 (2002), 72--81.
[48]
Jason Wiese, Patrick Gage Kelley, Lorrie Faith Cranor, Laura Dabbish, Jason I. Hong, and John Zimmerman. 2011. Are you close with me? Are you nearby? Investigating social groups, closeness, and willingness to share. In Proceedings of the 13th International Conference on Ubiquitous Computing (UbiComp). ACM, 197--206.
[49]
Ryan Wishart, Domenico Corapi, Srdjan Marinovic, and Morris Sloman. 2010. Collaborative privacy policy authoring in a social networking context. In Proceedings of the 2010 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY). IEEE, 1--8.
[50]
Pamela Wisniewski, Heather Lipford, and David Wilson. 2012. Fighting for my space: Coping mechanisms for SNS boundary regulation. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 609--618.
[51]
Elena Zheleva and Lise Getoor. 2009. To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles. In Proceedings of the 18th International Conference on World Wide Web (WWW). ACM, New York, NY, 531--540.

Cited By

View all
  • (2025)Accurate Policy Enforcement for Secure Data Dissemination in VANETsSecure Data Sensing, Computing, and Dissemination in Vehicular Ad Hoc Networks10.1007/978-981-96-0336-7_6(197-241)Online publication date: 20-Feb-2025
  • (2023)Uncertainty-aware Personal Assistant and Explanation Method for Privacy DecisionsProceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems10.5555/3545946.3599148(2991-2992)Online publication date: 30-May-2023
  • (2023)Contextual Integrity for Argumentation-based Privacy ReasoningProceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems10.5555/3545946.3598903(2253-2261)Online publication date: 30-May-2023
  • Show More Cited By

Index Terms

  1. Privacy Policy Negotiation in Social Media

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Autonomous and Adaptive Systems
    ACM Transactions on Autonomous and Adaptive Systems  Volume 11, Issue 1
    April 2016
    107 pages
    ISSN:1556-4665
    EISSN:1556-4703
    DOI:10.1145/2891451
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 09 February 2016
    Accepted: 01 September 2015
    Revised: 01 July 2015
    Received: 01 March 2015
    Published in TAAS Volume 11, Issue 1

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Social media
    2. conflicts
    3. intimacy
    4. online social networks
    5. privacy
    6. social networking services

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)98
    • Downloads (Last 6 weeks)6
    Reflects downloads up to 19 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Accurate Policy Enforcement for Secure Data Dissemination in VANETsSecure Data Sensing, Computing, and Dissemination in Vehicular Ad Hoc Networks10.1007/978-981-96-0336-7_6(197-241)Online publication date: 20-Feb-2025
    • (2023)Uncertainty-aware Personal Assistant and Explanation Method for Privacy DecisionsProceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems10.5555/3545946.3599148(2991-2992)Online publication date: 30-May-2023
    • (2023)Contextual Integrity for Argumentation-based Privacy ReasoningProceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems10.5555/3545946.3598903(2253-2261)Online publication date: 30-May-2023
    • (2023)An Approach to Multi-Party Privacy Conflict Resolution for Co-owned Images on Content Sharing PlatformsProceedings of the 2023 8th International Conference on Machine Learning Technologies10.1145/3589883.3589923(264-268)Online publication date: 10-Mar-2023
    • (2023)On the Potential of Mediation Chatbots for Mitigating Multiparty Privacy Conflicts - A Wizard-of-Oz StudyProceedings of the ACM on Human-Computer Interaction10.1145/35796187:CSCW1(1-33)Online publication date: 16-Apr-2023
    • (2023)Uncertainty-Aware Personal Assistant for Making Personalized Privacy DecisionsACM Transactions on Internet Technology10.1145/356182023:1(1-24)Online publication date: 23-Mar-2023
    • (2023)Multiuser Privacy and Security Conflicts in the CloudProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581307(1-16)Online publication date: 19-Apr-2023
    • (2023)Content privacy enforcement models in decentralized online social networks: State of play, solutions, limitations, and future directionsComputer Communications10.1016/j.comcom.2023.02.023203(199-225)Online publication date: Apr-2023
    • (2022)An Extended Ultimatum Game for Multi-Party Access Control in Social NetworksACM Transactions on the Web10.1145/355535116:3(1-23)Online publication date: 28-Sep-2022
    • (2022)A Review of Privacy Decision-making Mechanisms in Online Social NetworksACM Computing Surveys10.1145/349406755:2(1-32)Online publication date: 18-Jan-2022
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media