skip to main content
10.1145/2897053.2897063acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Privacy dynamics: learning privacy norms for social software

Published: 14 May 2016 Publication History

Abstract

Privacy violations in online social networks (OSNs) often arise as a result of users sharing information with unintended audiences. One reason for this is that, although OSN capabilities for creating and managing social groups can make it easier to be selective about recipients of a given post, they do not provide enough guidance to the users to make informed sharing decisions. In this paper we present Privacy Dynamics, an adaptive architecture that learns privacy norms for different audience groups based on users' sharing behaviours. Our architecture is underpinned by a formal model inspired by social identity theory, a social psychology framework for analysing group processes and intergroup relations. Our formal model comprises two main concepts, the group membership as a Social Identity (SI) map and privacy norms as a set of conflict rules. In our approach a privacy norm is specified in terms of the information objects that should be prevented from flowing between two conflicting social identity groups. We implement our formal model by using inductive logic programming (ILP), which automatically learns privacy norms. We evaluate the performance of our learning approach using synthesised data representing the sharing behaviour of social network users.

References

[1]
Facebook User Statistics. http://newsroom.fb.com/company-info/, 2014 (accessed December 1, 2015).
[2]
Leading Social Networks Worldwide as of November 2015, Ranked by Number of Active Users (in millions). http://www.statista.com/statistics/272014/global-social-networks-ranked-by-number-of-users/, 2014 (accessed December 1, 2015).
[3]
D. B. Alice E. Marwick. I tweet honestly, i tweet passionately: Twitter users, context collapse and the imagined audience. New Media and Society, 13(1):114--133, 2010.
[4]
D. Athakravi, D. Corapi, K. Broda, and A. Russo. Learning through hypothesis refinement using answer set programming. In Inductive Logic Programming, pages 31--46. Springer, 2014.
[5]
A. Barth, A. Datta, J. Mitchell, and H. Nissenbaum. Privacy and contextual integrity: framework and applications. In Security and Privacy, 2006 IEEE Symposium on, pages 15 pp.--198, May 2006.
[6]
I. Bilogrevic, K. Huguenin, B. Agir, M. Jadliwala, and J.-P. Hubaux. Adaptive information-sharing for privacy-aware mobile social networks. In Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '13, pages 657--666, New York, NY, USA, 2013. ACM.
[7]
D. Corapi, A. Russo, and E. Lupu. Inductive logic programming in answer set programming. In Inductive Logic Programming, pages 91--97. Springer, 2012.
[8]
J. Cranshaw, J. Mugan, and N. Sadeh. User-controllable learning of location privacy policies with gaussian mixture models. 2011.
[9]
N. Criado and J. Such. Implicit contextual integrity in online social networks. Information Sciences, 325:48--69, 12 2015.
[10]
M. Duggan, N. B. Ellison, C. Lampe, A. Lenhart, and M. Madden. Social Media Update 2014. http://www.pewinternet.org/2015/01/09/social-media-update-2014/, 2015 (accessed December 1, 2015).
[11]
R. I. M. Dunbar. Neocortex size as a constraint on group size in primates. Journal of Human Evolution, 22(6):469--493, June 1992.
[12]
R. Emerson. 13 Controversial Facebook Firings: Palace Guards, Doctors, Teachers and More. http://bit.ly/Controversial-FB-Firings, 2015 (accessed December 1, 2015).
[13]
L. Fang and K. LeFevre. Privacy wizards for social networking sites. In Proceedings of the 19th International Conference on World Wide Web, WWW '10, pages 351--360, New York, NY, USA, 2010. ACM.
[14]
G. A. Fowler. When the Most Personal Secrets Get Outed on Facebook. http://www.wsj.com/articles/SB10000872396390444165804578008740578200224, 2012 (accessed December 1, 2015).
[15]
M. Gebser, R. Kaminski, B. Kaufmann, M. Ostrowski, T. Schaub, and M. Schneider. Potassco: The Potsdam answer set solving collection. AI Communications, 24(2):107--124, 20131.
[16]
M. Gebser, R. Kaminsky, B. Kaufmann, and T. Schaub. answer Set Solving in Practice (Synthesis Lectures on Artificial Intelligence and Machine Learning. Morgan and Claypool Publishers, 2012.
[17]
M. Gelfond and V. Lifschitz. The stable model semantics for logic programming. In ICLP/SLP, volume 88, pages 1070--1080, 1988.
[18]
J. T. Henri Tajfel. Intergroup relations: Essential readings. Key readings in social psychology., chapter An Integrative Theory of Intergroup Conflict. Psychology Press, New York, NY, US, 2001.
[19]
A. Hernando, D. Viluendas, C. Vesperinas, M. Abad, and A. Plastron. Unravelling the size distribution of social groups with information theory in complex networks. The European Physical Journal B, 76(1):87--97, 2010.
[20]
O. Kafali, A. Gunay, and P. Yolum. Protoss: A run time tool for detecting privacy violations in online social networks. In Advances in Social Networks Analysis and Mining (ASONAM), 2012 IEEE/ACM International Conference on, pages 429--433, Aug 2012.
[21]
J. O. Kephart and D. M. Chess. The vision of autonomic computing. Computer, 36(1):41--50, Jan 2003.
[22]
A. Lampinen, S. Tamminen, and A. Oulasvirta. All my people right here, right now: Management of group co-presence on a social networking site. In Proceedings of the ACM 2009 International Conference on Supporting Group Work, GROUP '09, pages 281--290, New York, NY, USA, 2009. ACM.
[23]
M. Law, A. Russo, and K. Broda. Inductive learning of answer set programs. In Logics in Artificial Intelligence (JELIA 2014). Springer, 2014.
[24]
E. Litt. Knock, knock. who's there? the imagined audience. Journal of Broadcasting and Electronic Media, 56(3):330--345, 2012.
[25]
A. Luft. Quebec Woman Loses Benefits over Facebook Photo. http://www.thestar.com/news/canada/2009/11/23quebec_woman_loses_benefits_over_facebook_photo.html, 2015 (accessed December 1, 2015).
[26]
J. Mcauley and J. Leskovec. Discovering social circles in ego networks. ACM Trans. Knowl. Discov. Data, 8(1):4:1--4:28, Feb. 2014.
[27]
Y. Mester, N. Kokciyan, and P. Yolum. Negotiating privacy constraints in online social networks. In Advances in Social Computing and Multiagent System, Second International Workshop on Multiagent Foundations of Social Computing, pages 112--128, 2015.
[28]
D. Mosbergen. Single Mom Fired from Daycare Center for Facebook Post Saying She Hates being around a Lot of Kids. http://www.huffingtonpost.com/2015/05/05/daycare-worker-fired-facebook-kaitlyn-walls_n_7210122.html, 2015 (accessed December 1, 2015).
[29]
J. Mugan, T. Sharma, and N. Sadeh. Understandable learning of privacy preferences through default personas and suggestions. Carnegie Mellon University, School of Computer Science Technical Report CMU-ISR-11-112, http://reports-archive.adm.cs.cmu.edu/anon/isr2011/CMU-ISR-11-112.pdf, 2011.
[30]
S. Muggleton. Inductive logic programming. New generation computing, 8(4):295--318, 1991.
[31]
H. Nissenbaum. Privacy as contextual integrity. Washington Law Review, 22(6):101--139, 2004.
[32]
C. Sakama and K. Inoue. Brave induction: a logical framework for learning from incomplete information. Machine Learning, 76(1):3--35, 2009.
[33]
J. M. Such and N. Criado. Adaptive conflict resolution mechanism for multi-party privacy management in social media. In Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES '14, pages 69--72, New York, NY, USA, 2014. ACM.
[34]
P. Walker. Octavia Nasr fired by CNN over Tweet Praising Late Ayatollah. http://www.theguardian.com/media/2010/jul/08/octavia-nasr-cnn-tweet-fired, 2015 (accessed December 1, 2015).
[35]
Y. Wang, P. G. Leon, X. Chen, S. Komanduri, G. Norcie, A. Acquisti, L. F. Cranor, and N. Sadeh. From facebook regrets to facebook privacy nudges. Ohio State Law Journal, 74:1307--1335, 2013.

Cited By

View all
  • (2024)The IDEA of Us: An Identity-Aware Architecture for Autonomous SystemsACM Transactions on Software Engineering and Methodology10.1145/365443933:6(1-38)Online publication date: 28-Jun-2024
  • (2022)A Model for Governing Information Sharing in Smart AssistantsProceedings of the 2022 AAAI/ACM Conference on AI, Ethics, and Society10.1145/3514094.3534129(845-855)Online publication date: 26-Jul-2022
  • (2022)A Review of Privacy Decision-making Mechanisms in Online Social NetworksACM Computing Surveys10.1145/349406755:2(1-32)Online publication date: 18-Jan-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SEAMS '16: Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems
May 2016
179 pages
ISBN:9781450341875
DOI:10.1145/2897053
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 May 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. adaptive privacy
  2. inductive logic programming
  3. online social networks
  4. social identity theory

Qualifiers

  • Research-article

Funding Sources

Conference

ICSE '16
Sponsor:

Acceptance Rates

Overall Acceptance Rate 17 of 31 submissions, 55%

Upcoming Conference

ICSE 2025

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)19
  • Downloads (Last 6 weeks)2
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)The IDEA of Us: An Identity-Aware Architecture for Autonomous SystemsACM Transactions on Software Engineering and Methodology10.1145/365443933:6(1-38)Online publication date: 28-Jun-2024
  • (2022)A Model for Governing Information Sharing in Smart AssistantsProceedings of the 2022 AAAI/ACM Conference on AI, Ethics, and Society10.1145/3514094.3534129(845-855)Online publication date: 26-Jul-2022
  • (2022)A Review of Privacy Decision-making Mechanisms in Online Social NetworksACM Computing Surveys10.1145/349406755:2(1-32)Online publication date: 18-Jan-2022
  • (2021)PANOLA: A Personal Assistant for Supporting Users in Preserving PrivacyACM Transactions on Internet Technology10.1145/347118722:1(1-32)Online publication date: 14-Sep-2021
  • (2020)Norm-based Access ControlProceedings of the 25th ACM Symposium on Access Control Models and Technologies10.1145/3381991.3395601(35-46)Online publication date: 10-Jun-2020
  • (2020)The Application of Machine Learning in Self-Adaptive Systems: A Systematic Literature ReviewIEEE Access10.1109/ACCESS.2020.30360378(205948-205967)Online publication date: 2020
  • (2020)Self Adaptive Privacy in Cloud Computing Environments: Identifying the Major Socio-Technical ConceptsComputer Security10.1007/978-3-030-64330-0_8(117-132)Online publication date: 17-Dec-2020
  • (2020)Measuring Users’ Socio-contextual Attributes for Self-adaptive Privacy Within Cloud-Computing EnvironmentsTrust, Privacy and Security in Digital Business10.1007/978-3-030-58986-8_10(140-155)Online publication date: 14-Sep-2020
  • (2019)More than smart speakersProceedings of the Fifteenth USENIX Conference on Usable Privacy and Security10.5555/3361476.3361510(451-466)Online publication date: 12-Aug-2019
  • (2019)A Privacy Awareness System for Software DesignInternational Journal of Software Engineering and Knowledge Engineering10.1142/S021819401950049929:10(1557-1604)Online publication date: 1-Nov-2019
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media