skip to main content
research-article

An Argumentation Approach for Resolving Privacy Disputes in Online Social Networks

Published:27 June 2017Publication History
Skip Abstract Section

Abstract

Preserving users’ privacy is important for Web systems. In systems where transactions are managed by a single user, such as e-commerce systems, preserving privacy of the transactions is merely the capability of access control. However, in online social networks, where each transaction is managed by and has effect on others, preserving privacy is difficult. In many cases, the users’ privacy constraints are distributed, expressed in a high-level manner, and would depend on information that only becomes available over interactions with others. Hence, when a content is being shared by a user, others who might be affected by the content should discuss and agree on how the content will be shared online so that none of their privacy constraints are violated. To enable this, we model users of the social networks as agents that represent their users’ privacy constraints as semantic rules. Agents argue with each other on propositions that enable their privacy rules by generating facts and assumptions from their ontology. Moreover, agents can seek help from others by requesting new information to enrich their ontology. Using assumption-based argumentation, agents decide whether a content should be shared or not. We evaluate the applicability of our approach on real-life privacy scenarios in comparison with user surveys.

References

  1. Leila Amgoud, Yannis Dimopoulos, and Pavlos Moraitis. 2007. A unified and general framework for argumentation-based negotiation. In Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems. ACM, New York, NY, 158. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Leila Amgoud and Henri Prade. 2009. Using arguments for making and explaining decisions. Artificial Intelligence 173, 3, 413--436. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Trevor J. M. Bench-Capon. 2003. Persuasion in practical argument using value-based argumentation frameworks. Journal of Logic and Computation 13, 3, 429--448.Google ScholarGoogle ScholarCross RefCross Ref
  4. Jamal Bentahar, Rafiul Alam, Zakaria Maamar, and Nanjangud C. Narendra. 2010. Using argumentation to model and deploy agent-based B2B applications. Knowledge-Based Systems 23, 7, 677--692. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Barbara Carminati and Elena Ferrari. 2011. Collaborative access control in on-line social networks. In Proceedings of the 2011 7th International Conference on Collaborative Computing: Networking, Applications, and Worksharing (CollaborateCom’11). 231--240.Google ScholarGoogle ScholarCross RefCross Ref
  6. Barbara Carminati, Elena Ferrari, Raymond Heatherly, Murat Kantarcioglu, and Bhavani Thuraisingham. 2011. Semantic Web-based social network access control. Computers and Security 30, 2, 108--115. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Kristijonas Cyras and Francesca Toni. 2016. ABA+: Assumption-based argumentation with preferences. In Proceedings of the 15th International Conference on the Principles of Knowledge Representation and Reasoning. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Phan Minh Dung. 1995. On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games. Artificial Intelligence 77, 2, 321--357. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Phan Minh Dung, Robert A. Kowalski, and Francesca Toni. 2009. Assumption-based argumentation. In Argumentation in Artificial Intelligence. Springer, 199--218.Google ScholarGoogle Scholar
  10. Xiuyi Fan, Francesca Toni, Andrei Mocanu, and Matthew Williams. 2014. Dialogical two-agent decision making with assumption-based argumentation. In Proceedings of the 2014 International Conference on Autonomous Agents and Multi-Agent Systems. 533--540. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Lujun Fang and Kristen LeFevre. 2010. Privacy wizards for social networking sites. In Proceedings of the 19th International Conference on World Wide Web. ACM, New York, NY, 351--360. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Ricard L. Fogues, Pradeep Murukanniah, Jose M. Such, Agustin Espinosa, Ana Garcia-Fornes, and Munindar Singh. 2015. Argumentation for multi-party privacy management. In Proceedings of the 2nd International Workshop on Agents and CyberSecurity (ACySe’15). 3--6.Google ScholarGoogle Scholar
  13. Fabien L. Gandon and Norman M. Sadeh. 2004. Semantic Web technologies to reconcile privacy and context awareness. Web Semantics: Science, Services and Agents on the World Wide Web 1, 3, 241--260.Google ScholarGoogle ScholarCross RefCross Ref
  14. Matthew Horridge and Sean Bechhofer. 2011. The OWL API: A Java API for OWL Ontologies. Semantic Web 2, 1, 11--21. Google ScholarGoogle ScholarCross RefCross Ref
  15. Ian Horrocks, Peter F. Patel-Schneider, Harold Boley, Said Tabet, Benjamin Grosof, and Mike Dean. 2004. SWRL: A Semantic Web rule language combining OWL and RuleML. World Wide Web Consortium Member Submission 21, 79.Google ScholarGoogle Scholar
  16. Hongxin Hu, Gail-Joon Ahn, and Jan Jorgensen. 2013. Multiparty access control for online social networks: Model and mechanisms. IEEE Transactions on Knowledge and Data Engineering 25, 7, 1614--1627. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Nadin Kökciyan and Pınar Yolum. 2016. PriGuard: A semantic approach to detect privacy violations in online social networks. IEEE Transactions on Knowledge and Data Engineering 28, 10, 2724--2737. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Yavuz Mester, Nadin Kökciyan, and Pınar Yolum. 2015. Negotiating privacy constraints in online social networks. In Advances in Social Computing and Multiagent Systems, F. Koch, C. Guttmann, and D. Busquets (Eds.). Communications in Computer and Information Science, Vol. 541. Springer, 112--129. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Sanjay Modgil and Henry Prakken. 2013. A general account of argumentation with preferences. Artificial Intelligence 195, 361--397. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Jonathan Mugan, Tarun Sharma, and Norman Sadeh. 2011. Understandable Learning of Privacy Preferences Through Default Personas and Suggestions. Institute for Software Research Technical Report CMU-ISR-11-112. Carnegie Mellon University, Pittsburgh, PA.Google ScholarGoogle Scholar
  21. Johannes Muller and Andrew Hunter. 2012. An argumentation-based approach for decision making. In Proceedings of the IEEE 24th International Conference on Tools with Artificial Intelligence (ICTAI’12), Vol. 1. 564--571. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Primal Pappachan, Roberto Yus, Prajit Kumar Das, Tim Finin, Eduardo Mena, and Anupam Joshi. 2014. A semantic context-aware privacy model for FaceBlock. In Proceedings of the 2nd International Conference on Society, Privacy, and the Semantic Web—Policy and Technology (PrivOn’14). 64--72. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Pablo Pilotti, Ana Casali, and Carlos Iván Chesñevar. 2015. A belief revision approach for argumentation-based negotiation agents. Applied Mathematics and Computer Science 25, 3, 455--470. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Norman Sadeh, Jason Hong, Lorrie Cranor, Ian Fette, Patrick Kelley, Madhu Prabaker, and Jinghai Rao. 2009. Understanding and capturing people’s privacy policies in a mobile social networking application. Personal and Ubiquitous Computing 13, 6, 401--412. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Albrecht Schmidt, Michael Beigl, and Hans W. Gellersen. 1999. There is more to context than location. Computers and Graphics 23, 6, 893--901.Google ScholarGoogle Scholar
  26. Evren Sirin, Bijan Parsia, Bernardo Cuenca Grau, Aditya Kalyanpur, and Yarden Katz. 2007. Pellet: A practical OWL-DL reasoner. Web Semantics: Science, Services and Agents on the World Wide Web 5, 2, 51--53. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Elizabeth Sklar and Simon Parsons. 2004. Towards the application of argumentation-based dialogues for education. In Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems, Vol. 3. IEEE, Los Alamitos, CA, 1420--1421. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Anna C. Squicciarini, Federica Paci, and Smitha Sundareswaran. 2013. PriMa: A comprehensive approach to privacy protection in social network sites. Annals of Telecommunications/Annales des Télécommunications 69, 1--2, 1--16.Google ScholarGoogle Scholar
  29. Anna C. Squicciarini, Heng Xu, and Xiaolong (Luke) Zhang. 2011. CoPE: Enabling collaborative privacy management in online social networks. Journal of the American Society for Information Science and Technology 62, 3, 521--534. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Margaret Gould Stewart. 2014. How Giant Websites Design for You (and a Billion Others, Too). Retrieved March 17, 2017, from https://goo.gl/vCO8IM.Google ScholarGoogle Scholar
  31. Jose M. Such and Michael Rovatsos. 2016. Privacy policy negotiation in social media. ACM Transactions on Autonomous and Adaptive Systems 11, 1, 1--29. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Francesca Toni. 2014. A tutorial on assumption-based argumentation. Argument and Computation 5, 1, 89--117.Google ScholarGoogle ScholarCross RefCross Ref
  33. Douglas Walton and Erik C. W. Krabbe. 1995. Commitment in Dialogue: Basic Concept of Interpersonal Reasoning. State University of New York Press, Albany, NY.Google ScholarGoogle Scholar
  34. Matt Williams and Anthony Hunter. 2007. Harnessing ontologies for argument-based decision-making in breast cancer. In Proceedings of the IEEE International Conference on Tools with Artificial Intelligence, Vol. 2. 254--261. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Ryan Wishart, Domenico Corapi, Srdjan Marinovic, and Morris Sloman. 2010. Collaborative privacy policy authoring in a social networking context. In Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY’10). 1--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Nefise Yaglikci and Paolo Torroni. 2014. Microdebates app for Android: A tool for participating in argumentative online debates using a handheld device. In Proceedings of the 26th International Conference on Tools with Artificial Intelligence (ICTAI’14). 792--799. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An Argumentation Approach for Resolving Privacy Disputes in Online Social Networks

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image ACM Transactions on Internet Technology
                ACM Transactions on Internet Technology  Volume 17, Issue 3
                Special Issue on Argumentation in Social Media and Regular Papers
                August 2017
                201 pages
                ISSN:1533-5399
                EISSN:1557-6051
                DOI:10.1145/3106680
                • Editor:
                • Munindar P. Singh
                Issue’s Table of Contents

                Copyright © 2017 ACM

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 27 June 2017
                • Accepted: 1 September 2016
                • Revised: 1 July 2016
                • Received: 1 January 2016
                Published in toit Volume 17, Issue 3

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article
                • Research
                • Refereed

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader
              About Cookies On This Site

              We use cookies to ensure that we give you the best experience on our website.

              Learn more

              Got it!