Abstract
Social media involve many shared items, such as photos, which may concern more than one user. The challenge is that users’ individual privacy preferences for the same item may conflict, so an approach that simply merges in some way the users’ privacy preferences may provide unsatisfactory results. Previous proposals to deal with the problem were either time-consuming or did not consider compromises to solve these conflicts (e.g., by considering unilaterally imposed approaches only). We propose a negotiation mechanism for users to agree on a compromise for these conflicts. The second challenge we address in this article relates to the exponential complexity of such a negotiation mechanism. To address this, we propose heuristics that reduce the complexity of the negotiation mechanism and show how substantial benefits can be derived from the use of these heuristics through extensive experimental evaluation that compares the performance of the negotiation mechanism with and without these heuristics. Moreover, we show that one such heuristic makes the negotiation mechanism produce results fast enough to be used in actual social media infrastructures with near-optimal results.
- Amr Ali-Eldin and Jan van den Berg. 2014. A self-disclosure framework for social mobile applications. In Proceedings of the 6th International Conference on New Technologies, Mobility and Security (NTMS’14). IEEE, 1--5.Google Scholar
- Joseph Bonneau and Sören Preibusch. 2010. The privacy jungle: On the market for data protection in social networks. In Economics of Information Security and Privacy. Springer, 121--167.Google Scholar
- Barbara Carminati and Elena Ferrari. 2011. Collaborative access control in on-line social networks. In Proceedings of 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom’11). IEEE, 231--240.Google Scholar
Cross Ref
- Barbara Carminati, Elena Ferrari, and Andrea Perego. 2009. Enforcing access control in web-based social networks. ACM Transactions on Information and System Security (TISSEC) 13, 1 (2009), 6. Google Scholar
Digital Library
- Andrei Ciortea, Yann Krupa, and Laurent Vercouter. 2012. Designing privacy-aware social networks: A multi-agent approach. In Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics. ACM, 1--8. Google Scholar
Digital Library
- Lorrie Cranor and Simson Garfinkel. 2005. Security and Usability: Designing Secure Systems That People Can Use. O’Reilly Media, Incorporated. Google Scholar
Digital Library
- George Danezis. 2009. Inferring privacy policies for social networking services. In Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence. ACM, 5--10. Google Scholar
Digital Library
- Steve Duck. 2007. Human Relationships. SAGE Publications Limited.Google Scholar
- Ulle Endriss. 2006. Monotonic concession protocols for multilateral negotiation. In AAMAS. ACM, 392--399. Google Scholar
Digital Library
- Lujun Fang and Kristen LeFevre. 2010. Privacy wizards for social networking sites. In Proceedings of the 19th International Conference on World Wide Web (WWW). ACM, 351--360. Google Scholar
Digital Library
- Ricard Fogues, Jose M. Such, Agustin Espinosa, and Ana Garcia-Fornes. 2015. Open challenges in relationship-based privacy mechanisms for social network services. International Journal of Human-Computer Interaction 31, 5 (2015), 350--370.Google Scholar
Cross Ref
- Ricard L. Fogués, Jose M. Such, Agustin Espinosa, and Ana Garcia-Fornes. 2014. BFF: A tool for eliciting tie strength and user communities in social networking services. Information Systems Frontiers 16, 2 (2014), 225--237. DOI:http://dx.doi.org/10.1007/s10796-013-9453-6 Google Scholar
Digital Library
- Philip W. L. Fong. 2011. Relationship-based access control: Protection model and policy language. In Proceedings of the 1st ACM Conference on Data and Application Security and Privacy (CODASPY). ACM, 191--202. Google Scholar
Digital Library
- Carrie Gates. 2007. Access control requirements for web 2.0 security and privacy. IEEE Web 2, 0 (2007).Google Scholar
- Eric Gilbert. 2012. Predicting tie strength in a new medium. In Proceedings of the ACM Conference on Computer Supported Cooperative Work (CSCW’12). ACM, New York, NY, 1047--1056. DOI:http://dx.doi.org/10.1145/2145204.2145360 Google Scholar
Digital Library
- Eric Gilbert and Karrie Karahalios. 2009. Predicting tie strength with social media. In Proceedings of the 27th International Conference on Human Factors in Computing Systems (CHI). ACM, 211--220. Google Scholar
Digital Library
- Mark Granovetter. 1973. The strength of weak ties. American Journal of Sociology 78, 6 (1973), 1360--1380.Google Scholar
Cross Ref
- Kathryn Green, Valerian J. Derlega, and Alicia Mathews. 2006. Self-disclosure in personal relationships. In The Cambridge Handbook of Personal Relationships. Cambridge University Press, 409--427.Google Scholar
- Ralph Gross and Alessandro Acquisti. 2005. Information revelation and privacy in online social networks. In Proceedings of the ACM Workshop on Privacy in the Electronic Society (WPES’05). ACM, 71--80. Google Scholar
Digital Library
- Tad Hogg, Dennis M. Wilkinson, Gabor Szabo, and Michael J. Brzozowski. 2008. Multiple relationship types in online communities and social networks. In AAAI Spring Symposium: Social Information Processing. 30--35.Google Scholar
- David J. Houghton and Adam N. Joinson. 2010. Privacy, social network sites, and social relations. Journal of Technology in Human Services 28, 1--2 (2010), 74--94.Google Scholar
Cross Ref
- Hongxin Hu, G. Ahn, and Jan Jorgensen. 2012. Multiparty access control for online social networks: Model and mechanisms. IEEE Transactions on Knowledge and Data Engineering (2012). Google Scholar
Digital Library
- Hongxin Hu, Gail-Joon Ahn, and Jan Jorgensen. 2011. Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC). ACM, New York, NY, 103--112. DOI:http://dx.doi.org/10.1145/2076732.2076747 Google Scholar
Digital Library
- Nadin Kökciyan and Pınar Yolum. 2014. Commitment-based privacy management in online social networks. In Proceedings of the 1st International Workshop on the Multiagent Foundations of Social Computing ([email protected]’14). 1--12.Google Scholar
- Yann Krupa and Laurent Vercouter. 2012. Handling privacy as contextual integrity in decentralized virtual communities: The PrivaCIAS framework. Web Intelligence and Agent Systems 10, 1 (2012), 105--116. Google Scholar
Digital Library
- Fernando Lopes, Michael Wooldridge, and Augusto Q. Novais. 2008. Negotiation among autonomous computational agentsl: Principles, analysis and challenges. Artificial Intelligence Review 29, 1 (2008), 1--44. Google Scholar
Digital Library
- Michelle Madejski, Maritza Johnson, and Steven Bellovin. 2011. The Failure of Online Social Network Privacy Settings. Technical Report CUCS-010-11. Columbia University. 1--20 pages.Google Scholar
- Martin J. Osborne and Ariel Rubinstein. 1990. Bargaining and Markets. Vol. 34. Academic Press, San Diego.Google Scholar
- Daniele Quercia, Renaud Lambiotte, Michal Kosinski, David Stillwell, and Jon Crowcroft. 2012. The personality of popular facebook users. In Proceedings of the ACM Conference on Computer Supported Cooperative Work (CSCW’12). 955--964. Google Scholar
Digital Library
- Elie Raad, Richard Chbeir, and Albert Dipanda. 2013. Discovering relationship types between users using profiles and shared photos in a social network. Multimedia Tools and Applications 64, 1 (2013), 141--170. DOI:http://dx.doi.org/10.1007/s11042-011-0853-7 Google Scholar
Digital Library
- Jeffrey S. Rosenschein and Gilad Zlotkin. 1994. Rules of Encounter: Designing Conventions for Automated Negotiation Among Computers. MIT Press. http://books.google.com/books?id=4ZhPMk3ftpoC. Google Scholar
Digital Library
- Michael Rovatsos. 2014. Multiagent systems for social computation. In Proceedings of the International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS’14). IFAAMAS, 1165--1168. Google Scholar
Digital Library
- Carles Sierra and John Debenham. 2007. The LOGIC negotiation model. In Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS’07). ACM, 1--8. Google Scholar
Digital Library
- Munindar P. Singh. 2013. Norms as a basis for governing sociotechnical systems. ACM Transactions on Intelligent Systems and Technology (TIST) 5, 1 (2013), 21. Google Scholar
Digital Library
- Anna Cinzia Squicciarini, Mohamed Shehab, and Federica Paci. 2009. Collective privacy management in social networks. In Proceedings of the 18th International Conference on World Wide Web (WWW). ACM, 521--530. Google Scholar
Digital Library
- Anna Cinzia Squicciarini, Smitha Sundareswaran, Dan Lin, and Josh Wede. 2011. A3P: Adaptive policy prediction for shared images over popular content sharing sites. In Proceedings of the 22nd ACM Conference on Hypertext and Hypermedia (Hypertext). 261--270. Google Scholar
Digital Library
- Jessica Staddon, David Huffaker, Larkin Brown, and Aaron Sedley. 2012. Are privacy concerns a turn-off: Engagement and privacy in social networks. In Proceedings of the 8th Symposium on Usable Privacy and Security (SOUPS). ACM, 1--13. Google Scholar
Digital Library
- Lior J. Strahilevitz. 2005. A social networks theory of privacy. In American Law & Economics Association Annual Meetings. bepress, 42.Google Scholar
- Fred Stutzman, Ralph Gross, and Alessandro Acquisti. 2013. Silent listeners: The evolution of privacy and disclosure on facebook. Journal of Privacy and Confidentiality 4, 2 (2013), 2.Google Scholar
Cross Ref
- Jose M. Such and Natalia Criado. 2014. Adaptive conflict resolution mechanism for multi-party privacy management in social media. In Proceedings of the 13th Workshop on Privacy in the Electronic Society. ACM, 69--72. Google Scholar
Digital Library
- Jose M. Such, Agustín Espinosa, and Ana García-Fornes. 2014. A survey of privacy in multi-agent systems. Knowledge Engineering Review 29 (2014), 313--344. Issue 03.Google Scholar
Cross Ref
- Jose M. Such, Agustin Espinosa, Ana García-Fornes, and C. Sierra. 2012. Self-disclosure decision making based on intimacy and privacy. Information Sciences 211 (2012), 93--111. Google Scholar
Digital Library
- Kurt Thomas, Chris Grier, and David M. Nicol. 2010. Unfriendly: Multi-party privacy risks in social networks. In Privacy Enhancing Technologies, Mikhail J. Atallah and Nicholas J. Hopper (Eds.). Springer, 236--252. Google Scholar
Digital Library
- Jose M. Vidal. 2010. Fundamentals of Multiagent Systems with NetLogo Examples. http://multiagent.com/p/fundamentals-of-multiagent-systems.html.Google Scholar
- Sami Vihavainen, Airi Lampinen, Antti Oulasvirta, Suvi Silfverberg, and Asko Lehmuskallio. 2014. The clash between privacy and automation in social media. IEEE Pervasive Computing 13, 1 (2014), 56--63. Google Scholar
Digital Library
- Yonggang Wang, Ennan Zhai, Eng Keong Lua, Jianbin Hu, and Zhong Chen. 2012. iSac: Intimacy based access control for social network sites. In Proceedings of the 9th International Conference on Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC’& Trusted Computing (UIC/ATC’’12). IEEE, 517--524. Google Scholar
Digital Library
- Douglas R. White and Michael Houseman. 2002. The navigability of strong ties: Small worlds, tie strength, and network topology. Complexity 8, 1 (2002), 72--81. Google Scholar
Digital Library
- Jason Wiese, Patrick Gage Kelley, Lorrie Faith Cranor, Laura Dabbish, Jason I. Hong, and John Zimmerman. 2011. Are you close with me? Are you nearby? Investigating social groups, closeness, and willingness to share. In Proceedings of the 13th International Conference on Ubiquitous Computing (UbiComp). ACM, 197--206. Google Scholar
Digital Library
- Ryan Wishart, Domenico Corapi, Srdjan Marinovic, and Morris Sloman. 2010. Collaborative privacy policy authoring in a social networking context. In Proceedings of the 2010 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY). IEEE, 1--8. Google Scholar
Digital Library
- Pamela Wisniewski, Heather Lipford, and David Wilson. 2012. Fighting for my space: Coping mechanisms for SNS boundary regulation. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 609--618. Google Scholar
Digital Library
- Elena Zheleva and Lise Getoor. 2009. To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles. In Proceedings of the 18th International Conference on World Wide Web (WWW). ACM, New York, NY, 531--540. DOI:http://dx.doi.org/10.1145/1526709.1526781 Google Scholar
Digital Library
Index Terms
Privacy Policy Negotiation in Social Media
Recommendations
Self-disclosure in social media
CHI EA '11: CHI '11 Extended Abstracts on Human Factors in Computing SystemsComputer mediated communication tools have multiplied the possibilities to stay in touch and interact with the people in our social network. The dynamics of use for these tools suggest changes in the context of self-disclosure. Although research has ...
Anonymity, Intimacy and Self-Disclosure in Social Media
CHI '16: Proceedings of the 2016 CHI Conference on Human Factors in Computing SystemsSelf-disclosure is rewarding and provides significant benefits for individuals, but it also involves risks, especially in social media settings. We conducted an online experiment to study the relationship between content intimacy and willingness to self-...
Photo Privacy Conflicts in Social Media: A Large-scale Empirical Study
CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing SystemsItems in social media such as photos may be co-owned by multiple users, i.e., the sharing decisions of the ones who upload them have the potential to harm the privacy of the others. Previous works uncovered coping strategies by co-owners to manage their ...






Comments