skip to main content
review-article
Free Access

Multiparty privacy in social media

Published:23 July 2018Publication History
Skip Abstract Section

Abstract

Online privacy is not just about what you disclose about yourself, it is also about what others disclose about you.

References

  1. Acquisti, A. and Gross, R. Imagined communities: Awareness, information sharing, and privacy on the Facebook. Privacy enhancing technologies PET (Jan. 2006), 36--58. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Besmer, A. and Richter Lipford, H. Moving beyond untagging: Photo privacy in a tagged world. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (2010), 1563--1572. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Boyd, D. and Marwick, A. Social steganography: Privacy in networked publics. International Communication Association, 2011, Boston, MA.Google ScholarGoogle Scholar
  4. Calikli, G. et al. Privacy Dynamics: Learning privacy norms for social software. In Proceedings of the 2016 IEEE/ACM 11<sup>th</sup> Intern'l Symposium on Software Engineering for Adaptive and Self-Managing Systems. ACM, 47--56. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Carminati, B. and Ferrari, E. Collaborative access control in online social networks. IEEE CollaborateCom, (2011), 231--240.Google ScholarGoogle ScholarCross RefCross Ref
  6. Criado, N. and Such, J.M. (2015). Implicit contextual integrity in online social networks. Information Sciences 325 (2015), 48--69. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Fang, L. and LeFevre, K. Privacy wizards for social networking sites. In Proceedings of the 19<sup>th</sup> Intern'l Conference on World Wide Web. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Fogues, R.L., Murukannaiah, P.K., Such, J.M. and Singh, M.P. Sharing policies in multiuser privacy scenarios: Incorporating context, preferences, and arguments in decision-making. ACM Trans. Computer-Human Interaction 24, 1 (2017), 5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Fong, P.W. Relationship-based access control: protection model and policy language. In Proceedings of the 1<sup>st</sup> ACM Conference on Data and Application Security and Privacy (2011), 191--202. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Gross, R. and Acquisti, A. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 71--80. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Gürses, S., and del Alamo, J. M. (2016). Privacy engineering: Shaping an emerging field of research and practice. IEEE Security & Privacy 14(2), 40--46. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Hu, H., Ahn, G.J., and Jorgensen, J. Multiparty access control for online social networks: Model and mechanisms. IEEE Transactions on Knowledge and Data Engineering 25, 7 (2013), 1614--1627. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Hu, H., Ahn, G.J., Zhao, Z. and Yang, D. (2014). Game theoretic analysis of multiparty access control in online social networks. In Proceedings of the 19<sup>th</sup> ACM Symposium on Access Control Models and Technologies (2014), 93--102. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Ilia, P., Polakis, I., Athanasopoulos, E., Maggi, F., and Ioannidis, S. Face/Off: Preventing privacy leakage from photos in social networks. In Proceedings of the 22<sup>nd</sup> ACM Conference on Computer and Communications Security, (2015) Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Internet.org. A focus on efficiency, 2014; http://internet.org/efficiencypaper/Google ScholarGoogle Scholar
  16. Kairam, S., Brzozowski, M., Huffaker, D. and Chi, E. (2012). Talking in circles: selective sharing in google+. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (2012), 1065--1074. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Keküllüoğlu, D., Kökciyan, N. and Yolum, P. Strategies for privacy negotiation in online social networks. In Proceedings of the ACM International Workshop on AI for Privacy and Security (2016), 2. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Lampinen, A., Lehtinen, V., Lehmuskallio, A. and Tamminen, S. We're in it together: Interpersonal management of disclosure in social network services. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (2011), 3217--3226. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Liang, K., Liu, J. K., Lu, R., and Wong, D.S. Privacy concerns for photo sharing in online social networks. IEEE Internet Computing 19, 2 (2015), 58--63.Google ScholarGoogle ScholarCross RefCross Ref
  20. Lipford, H. R., Besmer, A. and Watson, J. Understanding privacy settings in Facebook with an audience view. UPSEC, (2008), 1--8. USENIX. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Nissenbaum, H. Privacy as contextual integrity. Wash. L. Rev. 79 (2004), 119.Google ScholarGoogle Scholar
  22. Petronio, S. Boundaries of Privacy: Dialectics of Disclosure. Suny Press, 2012.Google ScholarGoogle Scholar
  23. Polakis, I. et al. Faces in the distorting mirror: Revisiting photo-based social authentication. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (Nov. 2014), 501--512. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Ramokapane, K.M., Rashid, A., and Such, J.M. 'I feel stupid I can't delete...:' A study of users' cloud deletion practices and coping strategies. USENIX Symposium on Usable Privacy and Security, (2017), 241--256. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Rajtmajer, S., Squicciarini, A., Such, J.M., Semonsen, J. and Belmonte, A. An ultimatum game model for the evolution of privacy in jointly managed content. In Proceedings of the 2017 International Conference on Decision and Game Theory for Security, 112--130.Google ScholarGoogle Scholar
  26. Sadeghi, A.R., Schneider, T., and Wehrenberg, I. Efficient privacy-preserving face recognition. In Proceedings of Information, Security and Cryptology. Springer Berlin Heidelberg, 2010, 229--244. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Sarigol, E., Garcia, D., and Schweitzer, F. Online privacy as a collective phenomenon. In Proceedings of the 2<sup>nd</sup> ACM Conference on Online Social Networks (Oct. 2014), 95--106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Shotton, J. et al. Real-time human pose recognition in parts from single depth images. Commun. ACM 56, 1 (Jan. 2013), 116--124. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Spiekermann, S., Krasnova, H., Koroleva, K. and Hildebrand, T. Online social networks: Why we disclose. J. Information Technology 25, 2 2010), 109--125.Google ScholarGoogle Scholar
  30. Squicciarini, A.C., Shehab, M., and Paci, F. Collective privacy management in social networks. In Proceedings of ACM's 18th International Conference on World Wide Web (Apr. 2009), 521--530. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Such, J.M. and Rovatsos, M. Privacy policy negotiation in social media. ACM Tran. Autonomous and Adaptive Systems 11, 1 (2016), 1--29. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Such, J.M. and Criado, N. Resolving multiparty privacy conflicts in social media. IEEE Trans. Knowledge and Data Engineering 28, 7 (2016), 1851--1863.Google ScholarGoogle ScholarCross RefCross Ref
  33. Such, J.M., Porter, J., Preibusch, S. and Joinson, A. Photo privacy conflicts in social media: A large-scale empirical study. In Proceedings of the 2017 ACM CHI Conference on Human Factors in Computing Systems, 3821--3832. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Taigman, Y., Yang, M., Ranzato, M.A., and Wolf, L. Deepface: Closing the gap to human-level performance in face verification. In Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (2014), 1701--1708). Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Thomas, K., Grier, C., and Nicol, D.M. Unfriendly: Multiparty privacy risks in social networks. Privacy Enhancing Technologies. Springer Berlin Heidelberg, 2010, 246--252. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Vishwamitra, N., Li, Y., Wang, K., Hu, H., Caine, K., and Ahn, G.J. Towards Pi-based multiparty access control for photo sharing in online social networks. In Proceedings of the 22<sup>nd</sup> ACM on Symposium on Access Control Models and Technologies (2017), 155--166. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P.G. and Cranor, L.F. I regretted the minute I pressed share: A qualitative study of regrets on Facebook. In Proceedings of the 7<sup>th</sup> Symposium on Usable Privacy and Security (2011), 10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Watson, J., Lipford, H.R. and Besmer, A. Mapping user preference to privacy default settings. ACM Trans. Computer-Human Interaction, 22, 6 (2015), 32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Wishart, R., Corapi, D., Marinovic, S., and Sloman, M. (2010). Collaborative privacy policy authoring in a social networking context. In IEEE international symposium on Policies for distributed systems and networks (POLICY) (pp. 1--8). Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Wisniewski, P., Lipford, H., and Wilson, D. (2012). Fighting for my space: Coping mechanisms for SNS boundary regulation. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (pp. 609--618). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Multiparty privacy in social media

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Communications of the ACM
          Communications of the ACM  Volume 61, Issue 8
          August 2018
          83 pages
          ISSN:0001-0782
          EISSN:1557-7317
          DOI:10.1145/3241891
          Issue’s Table of Contents

          Copyright © 2018 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 23 July 2018

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • review-article
          • Popular
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format