Abstract
Online privacy is not just about what you disclose about yourself, it is also about what others disclose about you.
- Acquisti, A. and Gross, R. Imagined communities: Awareness, information sharing, and privacy on the Facebook. Privacy enhancing technologies PET (Jan. 2006), 36--58. Google ScholarDigital Library
- Besmer, A. and Richter Lipford, H. Moving beyond untagging: Photo privacy in a tagged world. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (2010), 1563--1572. Google ScholarDigital Library
- Boyd, D. and Marwick, A. Social steganography: Privacy in networked publics. International Communication Association, 2011, Boston, MA.Google Scholar
- Calikli, G. et al. Privacy Dynamics: Learning privacy norms for social software. In Proceedings of the 2016 IEEE/ACM 11<sup>th</sup> Intern'l Symposium on Software Engineering for Adaptive and Self-Managing Systems. ACM, 47--56. Google ScholarDigital Library
- Carminati, B. and Ferrari, E. Collaborative access control in online social networks. IEEE CollaborateCom, (2011), 231--240.Google ScholarCross Ref
- Criado, N. and Such, J.M. (2015). Implicit contextual integrity in online social networks. Information Sciences 325 (2015), 48--69. Google ScholarDigital Library
- Fang, L. and LeFevre, K. Privacy wizards for social networking sites. In Proceedings of the 19<sup>th</sup> Intern'l Conference on World Wide Web. ACM, 2010. Google ScholarDigital Library
- Fogues, R.L., Murukannaiah, P.K., Such, J.M. and Singh, M.P. Sharing policies in multiuser privacy scenarios: Incorporating context, preferences, and arguments in decision-making. ACM Trans. Computer-Human Interaction 24, 1 (2017), 5. Google ScholarDigital Library
- Fong, P.W. Relationship-based access control: protection model and policy language. In Proceedings of the 1<sup>st</sup> ACM Conference on Data and Application Security and Privacy (2011), 191--202. Google ScholarDigital Library
- Gross, R. and Acquisti, A. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 71--80. Google ScholarDigital Library
- Gürses, S., and del Alamo, J. M. (2016). Privacy engineering: Shaping an emerging field of research and practice. IEEE Security & Privacy 14(2), 40--46. Google ScholarDigital Library
- Hu, H., Ahn, G.J., and Jorgensen, J. Multiparty access control for online social networks: Model and mechanisms. IEEE Transactions on Knowledge and Data Engineering 25, 7 (2013), 1614--1627. Google ScholarDigital Library
- Hu, H., Ahn, G.J., Zhao, Z. and Yang, D. (2014). Game theoretic analysis of multiparty access control in online social networks. In Proceedings of the 19<sup>th</sup> ACM Symposium on Access Control Models and Technologies (2014), 93--102. Google ScholarDigital Library
- Ilia, P., Polakis, I., Athanasopoulos, E., Maggi, F., and Ioannidis, S. Face/Off: Preventing privacy leakage from photos in social networks. In Proceedings of the 22<sup>nd</sup> ACM Conference on Computer and Communications Security, (2015) Google ScholarDigital Library
- Internet.org. A focus on efficiency, 2014; http://internet.org/efficiencypaper/Google Scholar
- Kairam, S., Brzozowski, M., Huffaker, D. and Chi, E. (2012). Talking in circles: selective sharing in google+. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (2012), 1065--1074. ACM. Google ScholarDigital Library
- Keküllüoğlu, D., Kökciyan, N. and Yolum, P. Strategies for privacy negotiation in online social networks. In Proceedings of the ACM International Workshop on AI for Privacy and Security (2016), 2. Google ScholarDigital Library
- Lampinen, A., Lehtinen, V., Lehmuskallio, A. and Tamminen, S. We're in it together: Interpersonal management of disclosure in social network services. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (2011), 3217--3226. ACM. Google ScholarDigital Library
- Liang, K., Liu, J. K., Lu, R., and Wong, D.S. Privacy concerns for photo sharing in online social networks. IEEE Internet Computing 19, 2 (2015), 58--63.Google ScholarCross Ref
- Lipford, H. R., Besmer, A. and Watson, J. Understanding privacy settings in Facebook with an audience view. UPSEC, (2008), 1--8. USENIX. Google ScholarDigital Library
- Nissenbaum, H. Privacy as contextual integrity. Wash. L. Rev. 79 (2004), 119.Google Scholar
- Petronio, S. Boundaries of Privacy: Dialectics of Disclosure. Suny Press, 2012.Google Scholar
- Polakis, I. et al. Faces in the distorting mirror: Revisiting photo-based social authentication. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (Nov. 2014), 501--512. Google ScholarDigital Library
- Ramokapane, K.M., Rashid, A., and Such, J.M. 'I feel stupid I can't delete...:' A study of users' cloud deletion practices and coping strategies. USENIX Symposium on Usable Privacy and Security, (2017), 241--256. Google ScholarDigital Library
- Rajtmajer, S., Squicciarini, A., Such, J.M., Semonsen, J. and Belmonte, A. An ultimatum game model for the evolution of privacy in jointly managed content. In Proceedings of the 2017 International Conference on Decision and Game Theory for Security, 112--130.Google Scholar
- Sadeghi, A.R., Schneider, T., and Wehrenberg, I. Efficient privacy-preserving face recognition. In Proceedings of Information, Security and Cryptology. Springer Berlin Heidelberg, 2010, 229--244. Google ScholarDigital Library
- Sarigol, E., Garcia, D., and Schweitzer, F. Online privacy as a collective phenomenon. In Proceedings of the 2<sup>nd</sup> ACM Conference on Online Social Networks (Oct. 2014), 95--106. Google ScholarDigital Library
- Shotton, J. et al. Real-time human pose recognition in parts from single depth images. Commun. ACM 56, 1 (Jan. 2013), 116--124. Google ScholarDigital Library
- Spiekermann, S., Krasnova, H., Koroleva, K. and Hildebrand, T. Online social networks: Why we disclose. J. Information Technology 25, 2 2010), 109--125.Google Scholar
- Squicciarini, A.C., Shehab, M., and Paci, F. Collective privacy management in social networks. In Proceedings of ACM's 18th International Conference on World Wide Web (Apr. 2009), 521--530. Google ScholarDigital Library
- Such, J.M. and Rovatsos, M. Privacy policy negotiation in social media. ACM Tran. Autonomous and Adaptive Systems 11, 1 (2016), 1--29. Google ScholarDigital Library
- Such, J.M. and Criado, N. Resolving multiparty privacy conflicts in social media. IEEE Trans. Knowledge and Data Engineering 28, 7 (2016), 1851--1863.Google ScholarCross Ref
- Such, J.M., Porter, J., Preibusch, S. and Joinson, A. Photo privacy conflicts in social media: A large-scale empirical study. In Proceedings of the 2017 ACM CHI Conference on Human Factors in Computing Systems, 3821--3832. Google ScholarDigital Library
- Taigman, Y., Yang, M., Ranzato, M.A., and Wolf, L. Deepface: Closing the gap to human-level performance in face verification. In Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (2014), 1701--1708). Google ScholarDigital Library
- Thomas, K., Grier, C., and Nicol, D.M. Unfriendly: Multiparty privacy risks in social networks. Privacy Enhancing Technologies. Springer Berlin Heidelberg, 2010, 246--252. Google ScholarDigital Library
- Vishwamitra, N., Li, Y., Wang, K., Hu, H., Caine, K., and Ahn, G.J. Towards Pi-based multiparty access control for photo sharing in online social networks. In Proceedings of the 22<sup>nd</sup> ACM on Symposium on Access Control Models and Technologies (2017), 155--166. Google ScholarDigital Library
- Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P.G. and Cranor, L.F. I regretted the minute I pressed share: A qualitative study of regrets on Facebook. In Proceedings of the 7<sup>th</sup> Symposium on Usable Privacy and Security (2011), 10. Google ScholarDigital Library
- Watson, J., Lipford, H.R. and Besmer, A. Mapping user preference to privacy default settings. ACM Trans. Computer-Human Interaction, 22, 6 (2015), 32. Google ScholarDigital Library
- Wishart, R., Corapi, D., Marinovic, S., and Sloman, M. (2010). Collaborative privacy policy authoring in a social networking context. In IEEE international symposium on Policies for distributed systems and networks (POLICY) (pp. 1--8). Google ScholarDigital Library
- Wisniewski, P., Lipford, H., and Wilson, D. (2012). Fighting for my space: Coping mechanisms for SNS boundary regulation. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (pp. 609--618). Google ScholarDigital Library
Index Terms
- Multiparty privacy in social media
Recommendations
A Survey on Privacy in Social Media: Identification, Mitigation, and Applications
The increasing popularity of social media has attracted a huge number of people to participate in numerous activities on a daily basis. This results in tremendous amounts of rich user-generated data. These data provide opportunities for researchers and ...
{Privacy, privacidad, Приватност} policies in social media: providing translated privacy notice
PSOSM '12: Proceedings of the 1st Workshop on Privacy and Security in Online Social MediaAs online social media have become a global phenomenon, popular sites have been translated into many languages. However, since many social media sites rely on crowdsourced translation, privacy-critical pages are not always translated into all languages ...
Reconciling privacy with social media
CSCW '12: Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work CompanionSocial media is one way that individuals share information, present themselves, and manage their social interactions in both personal and professional contexts. While social media benefits have been examined in the literature, relatively little ...
Comments