skip to main content
10.1145/2535813.2535814acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
research-article

Forgive and forget: return to obscurity

Published:09 September 2013Publication History

ABSTRACT

Traditionally, if someone did some act that required forgiveness, there were social norms in place for such forgiveness to happen. Over time, the act is also typically forgotten. And, should the person not be forgiven and the social pressure become too great, he had the option of moving to a new location for a fresh start. Yet with the Internet, these options are no longer available. Worse, activities which traditionally did not even require forgiveness are now impacting lives in unexpected ways, and are never forgotten. There are, however, technical approaches that could be applied to the problem, such as (1) controlling dissemination through new access control models or cryptographic approaches, (2) flooding the web with contrary information, (3) leading users to believe the information applies to someone else, (4) changing the semantics of what was written, and (5) finding a way to take advantage of the inconvenient information. In this paper we discuss the social act of forgiveness, and go into detail on the possible technical approaches to "forgetting" without deleting.

References

  1. Snapchat. http://www.snapchat.com, 2013.Google ScholarGoogle Scholar
  2. A. Almuhareb and M. Poesio. Attribute-based and value-based clustering: An evaluation. In Proceedings of EMNLP, pages 158--165, 2004.Google ScholarGoogle Scholar
  3. M. Ambrose, N. Friess, and J. Van Matre. Seeking Digitial Redemption: The Future of Forgiveness in the Internet Age. 2012. December 13.Google ScholarGoogle Scholar
  4. Nate Anderson. Spain Asks: If Google Search Results Make Your Business Look Bad, Can You Sue? Ars Technica News Report, February 2012.Google ScholarGoogle Scholar
  5. M. Baroni, B. Murphy, E. Barbu, and M. Poesio. Strudel: A corpus-based semantic model based on properties and types. Cognitive Science, 34:224--254, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  6. Sarit Barzilai and Yoram Eshet-Alkalai. The role of epistemic thinking in comprehension of multiple online source perspectives. In Proceedings of the Chais conference on instructional technologies research 2013: Learning in the technological era, pages 11--17, 2013.Google ScholarGoogle Scholar
  7. Malek Ben Salem and Salvatore J. Stolfo. Decoy document deployment for effective masquerade attack detection. In Thorsten Holz and Herbert Bos, editors, Proceedings of the 8th International Conference on the Detection of Intrusions and Malware, and Vulnerability Assessment, volume 6739 of Lecture Notes in Computer Science, Berlin, Germany, August 2011. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. C.R. Berger and R.J. Calabrese. Some explorations in initial interaction and beyond: Toward a developmental theory of interpersonal communication. Human Communication Research, 1:99--112, 1975.Google ScholarGoogle ScholarCross RefCross Ref
  9. Nikita Borisov, Ian Goldberg, and Eric Brewer. Off-the-record communication, or, why not to use pgp. In Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, pages 77--84, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, and Salvatore J. Stolfo. Baiting inside attackers using decoy documents. In Yan Chen, Tassos D. Dimitriou, and Jianying Zhou, editors, Proceedings of the 5th International ICST Conference on Security and Privacy in Communication Networks, volume 19 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pages 51--70, Berlin, Germany, September 2009. Springer.Google ScholarGoogle Scholar
  11. R. Brackney and R. Anderson. Understanding the Insider Threat: Proceedings of a March 2004 Workshop. Technical report, RAND Corporation, Santa Monica, CA, March 2004.Google ScholarGoogle Scholar
  12. Ying Chen. Information Valuation for Information Lifecycle Management. In ICAC 2005: Proceedings of Second IEEE International Conference on Autonomic Computing, pages 135--146, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Bill Cheswick. An Evening with Berferd, in Which a Cracker Is Lured, Endured, and Studied. In Proceedings of the Winter 1992 USENIX Conference, pages 163--174, Berkeley, CA, USA, 1992. USENIX Association.Google ScholarGoogle Scholar
  14. P. Cimiano and J. Wenderoth. Automatically learning qualia structures from the web. In Proceedings of the ACL/SIGLEX Workshop on Deep Lexical Acquisition, pages 28--37, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Philip K. Dick. Paycheck and Other Classic Stories. Citadel, New York, NY, USA, 2003.Google ScholarGoogle Scholar
  16. Zach Epstein. Your Snapchats Aren't Safe: How to Secretly Save Videos from Snapchat or Facebook's 'Poke'. http://bgr.com/2013/01/01/how-to-save-snapchat-video-secretly-278227/, January 2013.Google ScholarGoogle Scholar
  17. A. Etzioni. The Limits of Privacy. New York: Basic, 1999.Google ScholarGoogle Scholar
  18. A. Etzioni and R. Bhat. Second chances, social forgiveness, and the internet, 2009. http://theamericanscholar.org/second-chances-social-forgiveness-and-the-internet/#.UWOSWxnB1xM.Google ScholarGoogle Scholar
  19. P. Fleischer. http://peterfleischer.blogspot.com/2011/03/foggy-thinking-about-right-to-oblivion.html, 2011. http://peterfleischer.blogspot.com/2011/03/foggy-thinking-about-right-to-oblivion.html.Google ScholarGoogle Scholar
  20. Carrie Gates and Matt Bishop. One of these records is not like the others. In Proceedings of the 3rd USENIX Workshop on the Theory and Practice of Provenance, Berkeley, CA, USA, June 2011. USENIX Association.Google ScholarGoogle Scholar
  21. Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, and Henry M. Levy. Vanish: Increasing data privacy with self-destructing data. In Proceedings of the 18th USENIX Security Symposium, pages 299--315, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. R. Graubert. On the need for a third form of access control. In Proceedings of the 12th National Computer Security Conference, pages 296--304, Oct. 1989.Google ScholarGoogle Scholar
  23. Wayne D Gray, Michael J Schoelles, and Chris Sims. Cognitive metrics profiling. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, volume 49, pages 1144--1148. SAGE Publications, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  24. J.T. Hancock and P.J. Dunham. Impression formation in computer-mediated communication revisited: An analysis of the breadth and intensity of impressions. Communication Research, 28(3):325--347, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  25. Leslie Harris. Escaping your online mistakes: Should there be a law? ABC News Report, July 2011.Google ScholarGoogle Scholar
  26. Susan G Hill, Helene P Iavecchia, James C Byers, Alvah C Bittner, Allen L Zaklade, and Richard E Christ. Comparison of four subjective workload rating scales. Human Factors: The Journal of the Human Factors and Ergonomics Society, 34(4):429--439, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. D. Jacobson. Impression formation in cyberspace: Online expectations and offline experiences in text-based virtual communities. Journal of Computer-Mediated Communication, 5(1), 1999. http://www.ascusc.jcmc/vol5/issue1/jacobson.html.Google ScholarGoogle ScholarCross RefCross Ref
  28. David Kravets. Convicted murderer sues Wikipedia, demands removal of his name. http://www.wired.com/threatlevel/2009/11/wikipedia_murder/, 2009. November 11.Google ScholarGoogle Scholar
  29. T.K. Landauer and S.T. Dumais. A solution to Plato's problem: The latent semantic analysis theory of acquisition, induction and representation of knowledge. Psychological Review, 104(2):211--240, 1997.Google ScholarGoogle ScholarCross RefCross Ref
  30. K. Lund and C. Burgess. Producing high-dimensional semantic spaces from lexical co-occurrence. Behaviour Research Methods, 28:203--208, 1996.Google ScholarGoogle ScholarCross RefCross Ref
  31. Ben Macintyre. Operation Mincemeat. Harmony Books, New York, NY, USA, 2010.Google ScholarGoogle Scholar
  32. G. Mantovani. Internet haze: Why new artifacts can enhance situation ambiguity. Culture & Psychology, 8(3):307--326, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  33. T. Mayes. We have no right to be forgotten online: The European union is planning to enshrine in law the right to be forgotten on the internet, but we can't live outside society, 2011. http://www.guardian.co.uk/commentisfree/libertycentral/2011/mar/18/forgotten-online-european-union-law-internet.Google ScholarGoogle Scholar
  34. Ewen Montagu. The Man Who Never Was. J. B. Lippincott Company, New York, NY, USA, 1953.Google ScholarGoogle Scholar
  35. No Author Provided. Commission proposes a comprehensive reform of data protection rules to increase users' control of their data and to cut costs for businesses, 2012. http://europa.eu/rapid/press-release_IP-12--46_en.htm?locale=en#PR_metaPressRelease_bottom.Google ScholarGoogle Scholar
  36. Thomas P. O'Neill. Man of the House. Random House, New York, NY, USA, 1987.Google ScholarGoogle Scholar
  37. P. O'Sullivan, S. Hunt, and L. Lippert. Mediated immediacy: A language of affiliation in a technological age. Journal of Language and Social Psychology, 23(4):464--490, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  38. M.R. Parks and K. Floyd. Making friends in cyberspace. Journal of Communication, 46:80--97, 1996.Google ScholarGoogle ScholarCross RefCross Ref
  39. Radia Perlman. The ephemerizer: Making data disappear. Journal of Information System Security, 1(1):51--68, 2005.Google ScholarGoogle Scholar
  40. M. Poesio and A. Almuhareb. Identifying concept attributes using a classifier. In Proceedings of the ACL Workshop on Deep Lexical Semantics, pages 18--27, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. M. Poesio and A. Almuhareb. Extracting concept descriptions from the web: The importance of attributes and values. In P. Buitelaar and P. Cimiano, editors, Bridging the gap between text and knowledge, pages 29--44. IOS Press, Amsterdam, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. T. Postmes, R. Spears, and M. Lea. Breaching or building social boundaries? Side-effects of computer-mediated communication. Communication Research, 25(6):689--715, 1998.Google ScholarGoogle ScholarCross RefCross Ref
  43. Raffaele. Crew razes Amish schoolhouse, 2006. October 13.Google ScholarGoogle Scholar
  44. Reputation.com. http://www.reputation.com\myreputation, 2013.Google ScholarGoogle Scholar
  45. J. Rosen. The web means the end of forgetting, 2010. July 21.Google ScholarGoogle Scholar
  46. J. Rosen. The right to be forgotten. Stanford Law Review, 64:88--92, 2012.Google ScholarGoogle Scholar
  47. Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278--1308, September 1975.Google ScholarGoogle ScholarCross RefCross Ref
  48. R. Spears and M. Lea. Social influence and the influence of 'social' in computer-mediated communication. In M. Lea, editor, Contexts of computer-mediated communication, pages 30--65. Harvester Wheatsheaf, London, 1992.Google ScholarGoogle Scholar
  49. Gabrielle M. Spiegel, editor. Practicing History: New Directions in Historical Writing after the Linguistic Turn. Routledge, 2005.Google ScholarGoogle Scholar
  50. Cliff Stoll. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage. Pocket Books, New York, NY, USA, Sep. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Clifford Stoll. Stalking the wily hacker. Communications of the ACM, 31(5):484--497, May 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. L.C. Tidwell and J.B. Walther. Computer-mediated communication effects on disclosure, impressions, and interpersonal evaluations: Getting to know one another a bit at a time. Human Communication Research, 28(3):317--348, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  53. Kathy Tomlinson. Escaping your online mistakes: Should there be a law? CBC News Report: British Columbia, May 2013. http://www.cbc.ca/news/canada/british-columbia/teacher-powerless-to-stop-ex-girlfriend-s- cyberstalking-1.1314610.Google ScholarGoogle Scholar
  54. S. Turkle. Life on the Screen. Simon & Shuster, 1997.Google ScholarGoogle Scholar
  55. UsingEnglish.com. http://www.usingenglish.com/glossary/polysemy.html, 2013.Google ScholarGoogle Scholar
  56. S. Utz. Social information processing in muds: The development of friendships in virtual worlds. Journal of Online Behavior, 1(1), 2000.Google ScholarGoogle Scholar
  57. Jonathan Voris, Nathaniel Boggs, and Salvatore J. Stolfo. Lost in translation: Improving decoy documents via automated translation. In Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, pages 129--133, May 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. J.B. Walther. Interpersonal effects in computer-mediated interaction: a relational perspective. Communication Research, 19(1):52--90, 1992.Google ScholarGoogle ScholarCross RefCross Ref
  59. J.B. Walther. Impression development in computer-mediated interaction. Western Journal of Communication, 57(4):381--398, 1993.Google ScholarGoogle ScholarCross RefCross Ref
  60. J.B. Walther. Anticipated ongoing versus channel effects on relational communication in computer-mediated interaction. Human Communication Research, 20(4):473--501, 1994.Google ScholarGoogle ScholarCross RefCross Ref
  61. J.B. Walther. Computer-mediated communication: Impersonal, interpersonal, and hyperpersonal interaction. Communication Research, 23:1--43, 1996.Google ScholarGoogle ScholarCross RefCross Ref
  62. Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach, Brent Waters, and Emmett Witchel. Defeating Vanish with low-cost sybil attacks against large dhts. In Proceedings of the 17th Annual Network and Distributed System Security Symposium, 2010.Google ScholarGoogle Scholar
  63. Joseph Zajda and Rea Zajda. The politics of rewriting history: New history textbooks and curriculum materials in Russia. International Review of Education, 49(3--4):363--384, July 2003.Google ScholarGoogle Scholar

Index Terms

  1. Forgive and forget: return to obscurity

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          NSPW '13: Proceedings of the 2013 New Security Paradigms Workshop
          December 2013
          132 pages
          ISBN:9781450325820
          DOI:10.1145/2535813

          Copyright © 2013 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 9 September 2013

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          NSPW '13 Paper Acceptance Rate11of32submissions,34%Overall Acceptance Rate62of170submissions,36%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader