Abstract
Preserving users’ privacy is important for Web systems. In systems where transactions are managed by a single user, such as e-commerce systems, preserving privacy of the transactions is merely the capability of access control. However, in online social networks, where each transaction is managed by and has effect on others, preserving privacy is difficult. In many cases, the users’ privacy constraints are distributed, expressed in a high-level manner, and would depend on information that only becomes available over interactions with others. Hence, when a content is being shared by a user, others who might be affected by the content should discuss and agree on how the content will be shared online so that none of their privacy constraints are violated. To enable this, we model users of the social networks as agents that represent their users’ privacy constraints as semantic rules. Agents argue with each other on propositions that enable their privacy rules by generating facts and assumptions from their ontology. Moreover, agents can seek help from others by requesting new information to enrich their ontology. Using assumption-based argumentation, agents decide whether a content should be shared or not. We evaluate the applicability of our approach on real-life privacy scenarios in comparison with user surveys.
- Leila Amgoud, Yannis Dimopoulos, and Pavlos Moraitis. 2007. A unified and general framework for argumentation-based negotiation. In Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems. ACM, New York, NY, 158. Google Scholar
Digital Library
- Leila Amgoud and Henri Prade. 2009. Using arguments for making and explaining decisions. Artificial Intelligence 173, 3, 413--436. Google Scholar
Digital Library
- Trevor J. M. Bench-Capon. 2003. Persuasion in practical argument using value-based argumentation frameworks. Journal of Logic and Computation 13, 3, 429--448.Google Scholar
Cross Ref
- Jamal Bentahar, Rafiul Alam, Zakaria Maamar, and Nanjangud C. Narendra. 2010. Using argumentation to model and deploy agent-based B2B applications. Knowledge-Based Systems 23, 7, 677--692. Google Scholar
Digital Library
- Barbara Carminati and Elena Ferrari. 2011. Collaborative access control in on-line social networks. In Proceedings of the 2011 7th International Conference on Collaborative Computing: Networking, Applications, and Worksharing (CollaborateCom’11). 231--240.Google Scholar
Cross Ref
- Barbara Carminati, Elena Ferrari, Raymond Heatherly, Murat Kantarcioglu, and Bhavani Thuraisingham. 2011. Semantic Web-based social network access control. Computers and Security 30, 2, 108--115. Google Scholar
Digital Library
- Kristijonas Cyras and Francesca Toni. 2016. ABA+: Assumption-based argumentation with preferences. In Proceedings of the 15th International Conference on the Principles of Knowledge Representation and Reasoning. Google Scholar
Digital Library
- Phan Minh Dung. 1995. On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games. Artificial Intelligence 77, 2, 321--357. Google Scholar
Digital Library
- Phan Minh Dung, Robert A. Kowalski, and Francesca Toni. 2009. Assumption-based argumentation. In Argumentation in Artificial Intelligence. Springer, 199--218.Google Scholar
- Xiuyi Fan, Francesca Toni, Andrei Mocanu, and Matthew Williams. 2014. Dialogical two-agent decision making with assumption-based argumentation. In Proceedings of the 2014 International Conference on Autonomous Agents and Multi-Agent Systems. 533--540. Google Scholar
Digital Library
- Lujun Fang and Kristen LeFevre. 2010. Privacy wizards for social networking sites. In Proceedings of the 19th International Conference on World Wide Web. ACM, New York, NY, 351--360. Google Scholar
Digital Library
- Ricard L. Fogues, Pradeep Murukanniah, Jose M. Such, Agustin Espinosa, Ana Garcia-Fornes, and Munindar Singh. 2015. Argumentation for multi-party privacy management. In Proceedings of the 2nd International Workshop on Agents and CyberSecurity (ACySe’15). 3--6.Google Scholar
- Fabien L. Gandon and Norman M. Sadeh. 2004. Semantic Web technologies to reconcile privacy and context awareness. Web Semantics: Science, Services and Agents on the World Wide Web 1, 3, 241--260.Google Scholar
Cross Ref
- Matthew Horridge and Sean Bechhofer. 2011. The OWL API: A Java API for OWL Ontologies. Semantic Web 2, 1, 11--21. Google Scholar
Cross Ref
- Ian Horrocks, Peter F. Patel-Schneider, Harold Boley, Said Tabet, Benjamin Grosof, and Mike Dean. 2004. SWRL: A Semantic Web rule language combining OWL and RuleML. World Wide Web Consortium Member Submission 21, 79.Google Scholar
- Hongxin Hu, Gail-Joon Ahn, and Jan Jorgensen. 2013. Multiparty access control for online social networks: Model and mechanisms. IEEE Transactions on Knowledge and Data Engineering 25, 7, 1614--1627. Google Scholar
Digital Library
- Nadin Kökciyan and Pınar Yolum. 2016. PriGuard: A semantic approach to detect privacy violations in online social networks. IEEE Transactions on Knowledge and Data Engineering 28, 10, 2724--2737. Google Scholar
Digital Library
- Yavuz Mester, Nadin Kökciyan, and Pınar Yolum. 2015. Negotiating privacy constraints in online social networks. In Advances in Social Computing and Multiagent Systems, F. Koch, C. Guttmann, and D. Busquets (Eds.). Communications in Computer and Information Science, Vol. 541. Springer, 112--129. Google Scholar
Digital Library
- Sanjay Modgil and Henry Prakken. 2013. A general account of argumentation with preferences. Artificial Intelligence 195, 361--397. Google Scholar
Digital Library
- Jonathan Mugan, Tarun Sharma, and Norman Sadeh. 2011. Understandable Learning of Privacy Preferences Through Default Personas and Suggestions. Institute for Software Research Technical Report CMU-ISR-11-112. Carnegie Mellon University, Pittsburgh, PA.Google Scholar
- Johannes Muller and Andrew Hunter. 2012. An argumentation-based approach for decision making. In Proceedings of the IEEE 24th International Conference on Tools with Artificial Intelligence (ICTAI’12), Vol. 1. 564--571. Google Scholar
Digital Library
- Primal Pappachan, Roberto Yus, Prajit Kumar Das, Tim Finin, Eduardo Mena, and Anupam Joshi. 2014. A semantic context-aware privacy model for FaceBlock. In Proceedings of the 2nd International Conference on Society, Privacy, and the Semantic Web—Policy and Technology (PrivOn’14). 64--72. Google Scholar
Digital Library
- Pablo Pilotti, Ana Casali, and Carlos Iván Chesñevar. 2015. A belief revision approach for argumentation-based negotiation agents. Applied Mathematics and Computer Science 25, 3, 455--470. Google Scholar
Digital Library
- Norman Sadeh, Jason Hong, Lorrie Cranor, Ian Fette, Patrick Kelley, Madhu Prabaker, and Jinghai Rao. 2009. Understanding and capturing people’s privacy policies in a mobile social networking application. Personal and Ubiquitous Computing 13, 6, 401--412. Google Scholar
Digital Library
- Albrecht Schmidt, Michael Beigl, and Hans W. Gellersen. 1999. There is more to context than location. Computers and Graphics 23, 6, 893--901.Google Scholar
- Evren Sirin, Bijan Parsia, Bernardo Cuenca Grau, Aditya Kalyanpur, and Yarden Katz. 2007. Pellet: A practical OWL-DL reasoner. Web Semantics: Science, Services and Agents on the World Wide Web 5, 2, 51--53. Google Scholar
Digital Library
- Elizabeth Sklar and Simon Parsons. 2004. Towards the application of argumentation-based dialogues for education. In Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems, Vol. 3. IEEE, Los Alamitos, CA, 1420--1421. Google Scholar
Digital Library
- Anna C. Squicciarini, Federica Paci, and Smitha Sundareswaran. 2013. PriMa: A comprehensive approach to privacy protection in social network sites. Annals of Telecommunications/Annales des Télécommunications 69, 1--2, 1--16.Google Scholar
- Anna C. Squicciarini, Heng Xu, and Xiaolong (Luke) Zhang. 2011. CoPE: Enabling collaborative privacy management in online social networks. Journal of the American Society for Information Science and Technology 62, 3, 521--534. Google Scholar
Digital Library
- Margaret Gould Stewart. 2014. How Giant Websites Design for You (and a Billion Others, Too). Retrieved March 17, 2017, from https://goo.gl/vCO8IM.Google Scholar
- Jose M. Such and Michael Rovatsos. 2016. Privacy policy negotiation in social media. ACM Transactions on Autonomous and Adaptive Systems 11, 1, 1--29. Google Scholar
Digital Library
- Francesca Toni. 2014. A tutorial on assumption-based argumentation. Argument and Computation 5, 1, 89--117.Google Scholar
Cross Ref
- Douglas Walton and Erik C. W. Krabbe. 1995. Commitment in Dialogue: Basic Concept of Interpersonal Reasoning. State University of New York Press, Albany, NY.Google Scholar
- Matt Williams and Anthony Hunter. 2007. Harnessing ontologies for argument-based decision-making in breast cancer. In Proceedings of the IEEE International Conference on Tools with Artificial Intelligence, Vol. 2. 254--261. Google Scholar
Digital Library
- Ryan Wishart, Domenico Corapi, Srdjan Marinovic, and Morris Sloman. 2010. Collaborative privacy policy authoring in a social networking context. In Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY’10). 1--8. Google Scholar
Digital Library
- Nefise Yaglikci and Paolo Torroni. 2014. Microdebates app for Android: A tool for participating in argumentative online debates using a handheld device. In Proceedings of the 26th International Conference on Tools with Artificial Intelligence (ICTAI’14). 792--799. Google Scholar
Digital Library
Index Terms
An Argumentation Approach for Resolving Privacy Disputes in Online Social Networks
Recommendations
Preserving Privacy as Social Responsibility in Online Social Networks
Special Issue on Computational Ethics and Accountability, Special Issue on Economics of Security and Privacy and Regular PapersOnline social networks provide an environment for their users to share content with others, where the user who shares a content item is put in charge, generally ignoring others that might be affected by it. However, a content that is shared by one user ...
Strategies for Privacy Negotiation in Online Social Networks
PrAISe '16: Proceedings of the 1st International Workshop on AI for Privacy and SecurityPreserving privacy of posts in online social networks is difficult. One reason for this is that a post can be related to the poster as well as various others that are related to the post. Hence, it is possible to share information that pertains others ...
Privacy leakage analysis in online social networks
Online Social Networks (OSNs) have become one of the major platforms for social interactions, such as building up relationship, sharing personal experiences, and providing other services. The wide adoption of OSNs raises privacy concerns due to personal ...






Comments