Ubiquitous Social Networks: Opportunities and Challenges for Privacy-Aware User Modelling

Privacy has been recognized as an important topic in the Internet for a long time, and technological developments in the area of privacy tools are ongoing. However, their focus was mainly on the individual. With the proliferation of social network sites, it has become more evident that the problem of privacy is not bounded by the perimeters of individuals but also by the privacy needs of their social networks. The objective of this paper is to contribute to the discussion about privacy in social network sites, a topic which we consider to be severely under-researched. We propose a framework for analyzing privacy requirements and for analyzing privacy-related data. We outline a combination of requirements analysis, conflict-resolution techniques, and a P3P extension that can contribute to privacy within such sites.

[1]  Sharon L. Milgram,et al.  The Small World Problem , 1967 .

[2]  Stanley Milgram,et al.  An Experimental Study of the Small World Problem , 1969 .

[3]  T. F. O'Higgins Judgment of the Court , 1981 .

[4]  Ian Sommerville,et al.  Viewpoints: principles, problems and a practical approach to requirements engineering , 1997, Ann. Softw. Eng..

[5]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[6]  M. KleinbergJon Authoritative sources in a hyperlinked environment , 1999 .

[7]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[8]  Lorrie Faith Cranor,et al.  The platform for privacy preferences , 1999, CACM.

[9]  Latanya Sweeney,et al.  Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[10]  Matthew Richardson,et al.  Mining knowledge-sharing sites for viral marketing , 2002, KDD.

[11]  William N. Robinson,et al.  Requirements interaction management , 2003, CSUR.

[12]  Bettina Berendt,et al.  SIMT - a privacy preserving Web metrics tool , 2004, Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004..

[13]  Alfred Kobsa,et al.  Impacts of User Privacy Preferences on Personalized Systems , 2004, Designing Personalized User Experiences in eCommerce.

[14]  Ramakrishnan Srikant,et al.  XPref: a preference language for P3P , 2005, Comput. Networks.

[15]  Massimo Barbaro,et al.  A Face Is Exposed for AOL Searcher No , 2006 .

[16]  Jens H. Weber,et al.  Modeling and reasoning for confidentiality requirements in software development , 2006, 13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06).

[17]  Sören Preibusch Privacy Negotiations with P3P , 2006 .

[18]  Seda F. Gürses,et al.  Multilateral security requirements analysis for preserving privacy in ubiquitous environments , 2006 .

[19]  Julita Vassileva,et al.  A Usability Study of an Access Control System for Group Blogs , 2007, ICWSM.

[20]  Danah Boyd,et al.  Identity Production in a Networked Culture : Why Youth Heart MySpace , 2007 .

[21]  Tsvi Kuflik,et al.  Examining users' attitude towards privacy preserving collaborative filtering , 2007 .

[22]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.

[23]  Georg Groh,et al.  Groups and Group-Instantiations in Mobile Communities - Detection, Modeling and Applications , 2007, ICWSM.