skip to main content
research-article

Privacy Policy Negotiation in Social Media

Published:09 February 2016Publication History
Skip Abstract Section

Abstract

Social media involve many shared items, such as photos, which may concern more than one user. The challenge is that users’ individual privacy preferences for the same item may conflict, so an approach that simply merges in some way the users’ privacy preferences may provide unsatisfactory results. Previous proposals to deal with the problem were either time-consuming or did not consider compromises to solve these conflicts (e.g., by considering unilaterally imposed approaches only). We propose a negotiation mechanism for users to agree on a compromise for these conflicts. The second challenge we address in this article relates to the exponential complexity of such a negotiation mechanism. To address this, we propose heuristics that reduce the complexity of the negotiation mechanism and show how substantial benefits can be derived from the use of these heuristics through extensive experimental evaluation that compares the performance of the negotiation mechanism with and without these heuristics. Moreover, we show that one such heuristic makes the negotiation mechanism produce results fast enough to be used in actual social media infrastructures with near-optimal results.

References

  1. Amr Ali-Eldin and Jan van den Berg. 2014. A self-disclosure framework for social mobile applications. In Proceedings of the 6th International Conference on New Technologies, Mobility and Security (NTMS’14). IEEE, 1--5.Google ScholarGoogle Scholar
  2. Joseph Bonneau and Sören Preibusch. 2010. The privacy jungle: On the market for data protection in social networks. In Economics of Information Security and Privacy. Springer, 121--167.Google ScholarGoogle Scholar
  3. Barbara Carminati and Elena Ferrari. 2011. Collaborative access control in on-line social networks. In Proceedings of 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom’11). IEEE, 231--240.Google ScholarGoogle ScholarCross RefCross Ref
  4. Barbara Carminati, Elena Ferrari, and Andrea Perego. 2009. Enforcing access control in web-based social networks. ACM Transactions on Information and System Security (TISSEC) 13, 1 (2009), 6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Andrei Ciortea, Yann Krupa, and Laurent Vercouter. 2012. Designing privacy-aware social networks: A multi-agent approach. In Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics. ACM, 1--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Lorrie Cranor and Simson Garfinkel. 2005. Security and Usability: Designing Secure Systems That People Can Use. O’Reilly Media, Incorporated. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. George Danezis. 2009. Inferring privacy policies for social networking services. In Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence. ACM, 5--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Steve Duck. 2007. Human Relationships. SAGE Publications Limited.Google ScholarGoogle Scholar
  9. Ulle Endriss. 2006. Monotonic concession protocols for multilateral negotiation. In AAMAS. ACM, 392--399. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Lujun Fang and Kristen LeFevre. 2010. Privacy wizards for social networking sites. In Proceedings of the 19th International Conference on World Wide Web (WWW). ACM, 351--360. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Ricard Fogues, Jose M. Such, Agustin Espinosa, and Ana Garcia-Fornes. 2015. Open challenges in relationship-based privacy mechanisms for social network services. International Journal of Human-Computer Interaction 31, 5 (2015), 350--370.Google ScholarGoogle ScholarCross RefCross Ref
  12. Ricard L. Fogués, Jose M. Such, Agustin Espinosa, and Ana Garcia-Fornes. 2014. BFF: A tool for eliciting tie strength and user communities in social networking services. Information Systems Frontiers 16, 2 (2014), 225--237. DOI:http://dx.doi.org/10.1007/s10796-013-9453-6 Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Philip W. L. Fong. 2011. Relationship-based access control: Protection model and policy language. In Proceedings of the 1st ACM Conference on Data and Application Security and Privacy (CODASPY). ACM, 191--202. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Carrie Gates. 2007. Access control requirements for web 2.0 security and privacy. IEEE Web 2, 0 (2007).Google ScholarGoogle Scholar
  15. Eric Gilbert. 2012. Predicting tie strength in a new medium. In Proceedings of the ACM Conference on Computer Supported Cooperative Work (CSCW’12). ACM, New York, NY, 1047--1056. DOI:http://dx.doi.org/10.1145/2145204.2145360 Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Eric Gilbert and Karrie Karahalios. 2009. Predicting tie strength with social media. In Proceedings of the 27th International Conference on Human Factors in Computing Systems (CHI). ACM, 211--220. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Mark Granovetter. 1973. The strength of weak ties. American Journal of Sociology 78, 6 (1973), 1360--1380.Google ScholarGoogle ScholarCross RefCross Ref
  18. Kathryn Green, Valerian J. Derlega, and Alicia Mathews. 2006. Self-disclosure in personal relationships. In The Cambridge Handbook of Personal Relationships. Cambridge University Press, 409--427.Google ScholarGoogle Scholar
  19. Ralph Gross and Alessandro Acquisti. 2005. Information revelation and privacy in online social networks. In Proceedings of the ACM Workshop on Privacy in the Electronic Society (WPES’05). ACM, 71--80. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Tad Hogg, Dennis M. Wilkinson, Gabor Szabo, and Michael J. Brzozowski. 2008. Multiple relationship types in online communities and social networks. In AAAI Spring Symposium: Social Information Processing. 30--35.Google ScholarGoogle Scholar
  21. David J. Houghton and Adam N. Joinson. 2010. Privacy, social network sites, and social relations. Journal of Technology in Human Services 28, 1--2 (2010), 74--94.Google ScholarGoogle ScholarCross RefCross Ref
  22. Hongxin Hu, G. Ahn, and Jan Jorgensen. 2012. Multiparty access control for online social networks: Model and mechanisms. IEEE Transactions on Knowledge and Data Engineering (2012). Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Hongxin Hu, Gail-Joon Ahn, and Jan Jorgensen. 2011. Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC). ACM, New York, NY, 103--112. DOI:http://dx.doi.org/10.1145/2076732.2076747 Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Nadin Kökciyan and Pınar Yolum. 2014. Commitment-based privacy management in online social networks. In Proceedings of the 1st International Workshop on the Multiagent Foundations of Social Computing ([email protected]’14). 1--12.Google ScholarGoogle Scholar
  25. Yann Krupa and Laurent Vercouter. 2012. Handling privacy as contextual integrity in decentralized virtual communities: The PrivaCIAS framework. Web Intelligence and Agent Systems 10, 1 (2012), 105--116. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Fernando Lopes, Michael Wooldridge, and Augusto Q. Novais. 2008. Negotiation among autonomous computational agentsl: Principles, analysis and challenges. Artificial Intelligence Review 29, 1 (2008), 1--44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Michelle Madejski, Maritza Johnson, and Steven Bellovin. 2011. The Failure of Online Social Network Privacy Settings. Technical Report CUCS-010-11. Columbia University. 1--20 pages.Google ScholarGoogle Scholar
  28. Martin J. Osborne and Ariel Rubinstein. 1990. Bargaining and Markets. Vol. 34. Academic Press, San Diego.Google ScholarGoogle Scholar
  29. Daniele Quercia, Renaud Lambiotte, Michal Kosinski, David Stillwell, and Jon Crowcroft. 2012. The personality of popular facebook users. In Proceedings of the ACM Conference on Computer Supported Cooperative Work (CSCW’12). 955--964. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Elie Raad, Richard Chbeir, and Albert Dipanda. 2013. Discovering relationship types between users using profiles and shared photos in a social network. Multimedia Tools and Applications 64, 1 (2013), 141--170. DOI:http://dx.doi.org/10.1007/s11042-011-0853-7 Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Jeffrey S. Rosenschein and Gilad Zlotkin. 1994. Rules of Encounter: Designing Conventions for Automated Negotiation Among Computers. MIT Press. http://books.google.com/books?id=4ZhPMk3ftpoC. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Michael Rovatsos. 2014. Multiagent systems for social computation. In Proceedings of the International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS’14). IFAAMAS, 1165--1168. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Carles Sierra and John Debenham. 2007. The LOGIC negotiation model. In Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS’07). ACM, 1--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Munindar P. Singh. 2013. Norms as a basis for governing sociotechnical systems. ACM Transactions on Intelligent Systems and Technology (TIST) 5, 1 (2013), 21. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Anna Cinzia Squicciarini, Mohamed Shehab, and Federica Paci. 2009. Collective privacy management in social networks. In Proceedings of the 18th International Conference on World Wide Web (WWW). ACM, 521--530. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Anna Cinzia Squicciarini, Smitha Sundareswaran, Dan Lin, and Josh Wede. 2011. A3P: Adaptive policy prediction for shared images over popular content sharing sites. In Proceedings of the 22nd ACM Conference on Hypertext and Hypermedia (Hypertext). 261--270. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Jessica Staddon, David Huffaker, Larkin Brown, and Aaron Sedley. 2012. Are privacy concerns a turn-off: Engagement and privacy in social networks. In Proceedings of the 8th Symposium on Usable Privacy and Security (SOUPS). ACM, 1--13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Lior J. Strahilevitz. 2005. A social networks theory of privacy. In American Law & Economics Association Annual Meetings. bepress, 42.Google ScholarGoogle Scholar
  39. Fred Stutzman, Ralph Gross, and Alessandro Acquisti. 2013. Silent listeners: The evolution of privacy and disclosure on facebook. Journal of Privacy and Confidentiality 4, 2 (2013), 2.Google ScholarGoogle ScholarCross RefCross Ref
  40. Jose M. Such and Natalia Criado. 2014. Adaptive conflict resolution mechanism for multi-party privacy management in social media. In Proceedings of the 13th Workshop on Privacy in the Electronic Society. ACM, 69--72. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Jose M. Such, Agustín Espinosa, and Ana García-Fornes. 2014. A survey of privacy in multi-agent systems. Knowledge Engineering Review 29 (2014), 313--344. Issue 03.Google ScholarGoogle ScholarCross RefCross Ref
  42. Jose M. Such, Agustin Espinosa, Ana García-Fornes, and C. Sierra. 2012. Self-disclosure decision making based on intimacy and privacy. Information Sciences 211 (2012), 93--111. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Kurt Thomas, Chris Grier, and David M. Nicol. 2010. Unfriendly: Multi-party privacy risks in social networks. In Privacy Enhancing Technologies, Mikhail J. Atallah and Nicholas J. Hopper (Eds.). Springer, 236--252. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Jose M. Vidal. 2010. Fundamentals of Multiagent Systems with NetLogo Examples. http://multiagent.com/p/fundamentals-of-multiagent-systems.html.Google ScholarGoogle Scholar
  45. Sami Vihavainen, Airi Lampinen, Antti Oulasvirta, Suvi Silfverberg, and Asko Lehmuskallio. 2014. The clash between privacy and automation in social media. IEEE Pervasive Computing 13, 1 (2014), 56--63. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Yonggang Wang, Ennan Zhai, Eng Keong Lua, Jianbin Hu, and Zhong Chen. 2012. iSac: Intimacy based access control for social network sites. In Proceedings of the 9th International Conference on Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC’& Trusted Computing (UIC/ATC’’12). IEEE, 517--524. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Douglas R. White and Michael Houseman. 2002. The navigability of strong ties: Small worlds, tie strength, and network topology. Complexity 8, 1 (2002), 72--81. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Jason Wiese, Patrick Gage Kelley, Lorrie Faith Cranor, Laura Dabbish, Jason I. Hong, and John Zimmerman. 2011. Are you close with me? Are you nearby? Investigating social groups, closeness, and willingness to share. In Proceedings of the 13th International Conference on Ubiquitous Computing (UbiComp). ACM, 197--206. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Ryan Wishart, Domenico Corapi, Srdjan Marinovic, and Morris Sloman. 2010. Collaborative privacy policy authoring in a social networking context. In Proceedings of the 2010 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY). IEEE, 1--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Pamela Wisniewski, Heather Lipford, and David Wilson. 2012. Fighting for my space: Coping mechanisms for SNS boundary regulation. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 609--618. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Elena Zheleva and Lise Getoor. 2009. To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles. In Proceedings of the 18th International Conference on World Wide Web (WWW). ACM, New York, NY, 531--540. DOI:http://dx.doi.org/10.1145/1526709.1526781 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Privacy Policy Negotiation in Social Media

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!