ABSTRACT
Traditionally, if someone did some act that required forgiveness, there were social norms in place for such forgiveness to happen. Over time, the act is also typically forgotten. And, should the person not be forgiven and the social pressure become too great, he had the option of moving to a new location for a fresh start. Yet with the Internet, these options are no longer available. Worse, activities which traditionally did not even require forgiveness are now impacting lives in unexpected ways, and are never forgotten. There are, however, technical approaches that could be applied to the problem, such as (1) controlling dissemination through new access control models or cryptographic approaches, (2) flooding the web with contrary information, (3) leading users to believe the information applies to someone else, (4) changing the semantics of what was written, and (5) finding a way to take advantage of the inconvenient information. In this paper we discuss the social act of forgiveness, and go into detail on the possible technical approaches to "forgetting" without deleting.
- Snapchat. http://www.snapchat.com, 2013.Google Scholar
- A. Almuhareb and M. Poesio. Attribute-based and value-based clustering: An evaluation. In Proceedings of EMNLP, pages 158--165, 2004.Google Scholar
- M. Ambrose, N. Friess, and J. Van Matre. Seeking Digitial Redemption: The Future of Forgiveness in the Internet Age. 2012. December 13.Google Scholar
- Nate Anderson. Spain Asks: If Google Search Results Make Your Business Look Bad, Can You Sue? Ars Technica News Report, February 2012.Google Scholar
- M. Baroni, B. Murphy, E. Barbu, and M. Poesio. Strudel: A corpus-based semantic model based on properties and types. Cognitive Science, 34:224--254, 2010.Google ScholarCross Ref
- Sarit Barzilai and Yoram Eshet-Alkalai. The role of epistemic thinking in comprehension of multiple online source perspectives. In Proceedings of the Chais conference on instructional technologies research 2013: Learning in the technological era, pages 11--17, 2013.Google Scholar
- Malek Ben Salem and Salvatore J. Stolfo. Decoy document deployment for effective masquerade attack detection. In Thorsten Holz and Herbert Bos, editors, Proceedings of the 8th International Conference on the Detection of Intrusions and Malware, and Vulnerability Assessment, volume 6739 of Lecture Notes in Computer Science, Berlin, Germany, August 2011. Springer-Verlag. Google ScholarDigital Library
- C.R. Berger and R.J. Calabrese. Some explorations in initial interaction and beyond: Toward a developmental theory of interpersonal communication. Human Communication Research, 1:99--112, 1975.Google ScholarCross Ref
- Nikita Borisov, Ian Goldberg, and Eric Brewer. Off-the-record communication, or, why not to use pgp. In Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, pages 77--84, 2004. Google ScholarDigital Library
- Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, and Salvatore J. Stolfo. Baiting inside attackers using decoy documents. In Yan Chen, Tassos D. Dimitriou, and Jianying Zhou, editors, Proceedings of the 5th International ICST Conference on Security and Privacy in Communication Networks, volume 19 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pages 51--70, Berlin, Germany, September 2009. Springer.Google Scholar
- R. Brackney and R. Anderson. Understanding the Insider Threat: Proceedings of a March 2004 Workshop. Technical report, RAND Corporation, Santa Monica, CA, March 2004.Google Scholar
- Ying Chen. Information Valuation for Information Lifecycle Management. In ICAC 2005: Proceedings of Second IEEE International Conference on Autonomic Computing, pages 135--146, 2005. Google ScholarDigital Library
- Bill Cheswick. An Evening with Berferd, in Which a Cracker Is Lured, Endured, and Studied. In Proceedings of the Winter 1992 USENIX Conference, pages 163--174, Berkeley, CA, USA, 1992. USENIX Association.Google Scholar
- P. Cimiano and J. Wenderoth. Automatically learning qualia structures from the web. In Proceedings of the ACL/SIGLEX Workshop on Deep Lexical Acquisition, pages 28--37, 2005. Google ScholarDigital Library
- Philip K. Dick. Paycheck and Other Classic Stories. Citadel, New York, NY, USA, 2003.Google Scholar
- Zach Epstein. Your Snapchats Aren't Safe: How to Secretly Save Videos from Snapchat or Facebook's 'Poke'. http://bgr.com/2013/01/01/how-to-save-snapchat-video-secretly-278227/, January 2013.Google Scholar
- A. Etzioni. The Limits of Privacy. New York: Basic, 1999.Google Scholar
- A. Etzioni and R. Bhat. Second chances, social forgiveness, and the internet, 2009. http://theamericanscholar.org/second-chances-social-forgiveness-and-the-internet/#.UWOSWxnB1xM.Google Scholar
- P. Fleischer. http://peterfleischer.blogspot.com/2011/03/foggy-thinking-about-right-to-oblivion.html, 2011. http://peterfleischer.blogspot.com/2011/03/foggy-thinking-about-right-to-oblivion.html.Google Scholar
- Carrie Gates and Matt Bishop. One of these records is not like the others. In Proceedings of the 3rd USENIX Workshop on the Theory and Practice of Provenance, Berkeley, CA, USA, June 2011. USENIX Association.Google Scholar
- Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, and Henry M. Levy. Vanish: Increasing data privacy with self-destructing data. In Proceedings of the 18th USENIX Security Symposium, pages 299--315, 2009. Google ScholarDigital Library
- R. Graubert. On the need for a third form of access control. In Proceedings of the 12th National Computer Security Conference, pages 296--304, Oct. 1989.Google Scholar
- Wayne D Gray, Michael J Schoelles, and Chris Sims. Cognitive metrics profiling. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, volume 49, pages 1144--1148. SAGE Publications, 2005.Google ScholarCross Ref
- J.T. Hancock and P.J. Dunham. Impression formation in computer-mediated communication revisited: An analysis of the breadth and intensity of impressions. Communication Research, 28(3):325--347, 2001.Google ScholarCross Ref
- Leslie Harris. Escaping your online mistakes: Should there be a law? ABC News Report, July 2011.Google Scholar
- Susan G Hill, Helene P Iavecchia, James C Byers, Alvah C Bittner, Allen L Zaklade, and Richard E Christ. Comparison of four subjective workload rating scales. Human Factors: The Journal of the Human Factors and Ergonomics Society, 34(4):429--439, 1992. Google ScholarDigital Library
- D. Jacobson. Impression formation in cyberspace: Online expectations and offline experiences in text-based virtual communities. Journal of Computer-Mediated Communication, 5(1), 1999. http://www.ascusc.jcmc/vol5/issue1/jacobson.html.Google ScholarCross Ref
- David Kravets. Convicted murderer sues Wikipedia, demands removal of his name. http://www.wired.com/threatlevel/2009/11/wikipedia_murder/, 2009. November 11.Google Scholar
- T.K. Landauer and S.T. Dumais. A solution to Plato's problem: The latent semantic analysis theory of acquisition, induction and representation of knowledge. Psychological Review, 104(2):211--240, 1997.Google ScholarCross Ref
- K. Lund and C. Burgess. Producing high-dimensional semantic spaces from lexical co-occurrence. Behaviour Research Methods, 28:203--208, 1996.Google ScholarCross Ref
- Ben Macintyre. Operation Mincemeat. Harmony Books, New York, NY, USA, 2010.Google Scholar
- G. Mantovani. Internet haze: Why new artifacts can enhance situation ambiguity. Culture & Psychology, 8(3):307--326, 2002.Google ScholarCross Ref
- T. Mayes. We have no right to be forgotten online: The European union is planning to enshrine in law the right to be forgotten on the internet, but we can't live outside society, 2011. http://www.guardian.co.uk/commentisfree/libertycentral/2011/mar/18/forgotten-online-european-union-law-internet.Google Scholar
- Ewen Montagu. The Man Who Never Was. J. B. Lippincott Company, New York, NY, USA, 1953.Google Scholar
- No Author Provided. Commission proposes a comprehensive reform of data protection rules to increase users' control of their data and to cut costs for businesses, 2012. http://europa.eu/rapid/press-release_IP-12--46_en.htm?locale=en#PR_metaPressRelease_bottom.Google Scholar
- Thomas P. O'Neill. Man of the House. Random House, New York, NY, USA, 1987.Google Scholar
- P. O'Sullivan, S. Hunt, and L. Lippert. Mediated immediacy: A language of affiliation in a technological age. Journal of Language and Social Psychology, 23(4):464--490, 2004.Google ScholarCross Ref
- M.R. Parks and K. Floyd. Making friends in cyberspace. Journal of Communication, 46:80--97, 1996.Google ScholarCross Ref
- Radia Perlman. The ephemerizer: Making data disappear. Journal of Information System Security, 1(1):51--68, 2005.Google Scholar
- M. Poesio and A. Almuhareb. Identifying concept attributes using a classifier. In Proceedings of the ACL Workshop on Deep Lexical Semantics, pages 18--27, 2005. Google ScholarDigital Library
- M. Poesio and A. Almuhareb. Extracting concept descriptions from the web: The importance of attributes and values. In P. Buitelaar and P. Cimiano, editors, Bridging the gap between text and knowledge, pages 29--44. IOS Press, Amsterdam, 2008. Google ScholarDigital Library
- T. Postmes, R. Spears, and M. Lea. Breaching or building social boundaries? Side-effects of computer-mediated communication. Communication Research, 25(6):689--715, 1998.Google ScholarCross Ref
- Raffaele. Crew razes Amish schoolhouse, 2006. October 13.Google Scholar
- Reputation.com. http://www.reputation.com\myreputation, 2013.Google Scholar
- J. Rosen. The web means the end of forgetting, 2010. July 21.Google Scholar
- J. Rosen. The right to be forgotten. Stanford Law Review, 64:88--92, 2012.Google Scholar
- Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278--1308, September 1975.Google ScholarCross Ref
- R. Spears and M. Lea. Social influence and the influence of 'social' in computer-mediated communication. In M. Lea, editor, Contexts of computer-mediated communication, pages 30--65. Harvester Wheatsheaf, London, 1992.Google Scholar
- Gabrielle M. Spiegel, editor. Practicing History: New Directions in Historical Writing after the Linguistic Turn. Routledge, 2005.Google Scholar
- Cliff Stoll. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage. Pocket Books, New York, NY, USA, Sep. 2005. Google ScholarDigital Library
- Clifford Stoll. Stalking the wily hacker. Communications of the ACM, 31(5):484--497, May 1988. Google ScholarDigital Library
- L.C. Tidwell and J.B. Walther. Computer-mediated communication effects on disclosure, impressions, and interpersonal evaluations: Getting to know one another a bit at a time. Human Communication Research, 28(3):317--348, 2002.Google ScholarCross Ref
- Kathy Tomlinson. Escaping your online mistakes: Should there be a law? CBC News Report: British Columbia, May 2013. http://www.cbc.ca/news/canada/british-columbia/teacher-powerless-to-stop-ex-girlfriend-s- cyberstalking-1.1314610.Google Scholar
- S. Turkle. Life on the Screen. Simon & Shuster, 1997.Google Scholar
- UsingEnglish.com. http://www.usingenglish.com/glossary/polysemy.html, 2013.Google Scholar
- S. Utz. Social information processing in muds: The development of friendships in virtual worlds. Journal of Online Behavior, 1(1), 2000.Google Scholar
- Jonathan Voris, Nathaniel Boggs, and Salvatore J. Stolfo. Lost in translation: Improving decoy documents via automated translation. In Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, pages 129--133, May 2012. Google ScholarDigital Library
- J.B. Walther. Interpersonal effects in computer-mediated interaction: a relational perspective. Communication Research, 19(1):52--90, 1992.Google ScholarCross Ref
- J.B. Walther. Impression development in computer-mediated interaction. Western Journal of Communication, 57(4):381--398, 1993.Google ScholarCross Ref
- J.B. Walther. Anticipated ongoing versus channel effects on relational communication in computer-mediated interaction. Human Communication Research, 20(4):473--501, 1994.Google ScholarCross Ref
- J.B. Walther. Computer-mediated communication: Impersonal, interpersonal, and hyperpersonal interaction. Communication Research, 23:1--43, 1996.Google ScholarCross Ref
- Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach, Brent Waters, and Emmett Witchel. Defeating Vanish with low-cost sybil attacks against large dhts. In Proceedings of the 17th Annual Network and Distributed System Security Symposium, 2010.Google Scholar
- Joseph Zajda and Rea Zajda. The politics of rewriting history: New history textbooks and curriculum materials in Russia. International Review of Education, 49(3--4):363--384, July 2003.Google Scholar
Index Terms
- Forgive and forget: return to obscurity
Comments