Maintaining a Consistent Representation of Self across Multiple Social Networking Sites -- A Data-centric Perspective

The rising pervasiveness and use of sensitive data on Social Networking Sites (SNS) requires careful consideration of one's privacy while using such sites. Also, users faced with a multitude of online contacts from various areas of life feel the need to create multiple representations of self and keeping them consistent. The difficulty of this task is compounded by the use of multiple SNS. We argue that for maintaining a consistent representation of self across multiple SNS, it needs to be carefully analyzed how personal attributes, which make up the online identity, are implemented and stored on each site. In this paper, we analyze criteria to classify how attributes and their values are implemented at SNS. Then, we present a structured approach to transform attribute values for use on multiple SNS. We evaluate the approach by applying it to selected attributes of major SNS.

[1]  Michael Netter,et al.  An Analysis of Implemented and Desirable Settings for Identity Management on Social Networking Sites , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.

[2]  Dogan Kesdogan,et al.  Privacy enhancing identity management: protection against re-identification and profiling , 2005, DIM '05.

[3]  Esma Aïmeur,et al.  Towards a Privacy-Enhanced Social Networking Site , 2010, 2010 International Conference on Availability, Reliability and Security.

[4]  Jonathan Grudin,et al.  When social networks cross boundaries: a case study of workplace use of facebook and linkedin , 2009, GROUP.

[5]  Bruce Schneier,et al.  A Taxonomy of Social Networking Data , 2010, IEEE Security & Privacy.

[6]  Philip W. L. Fong,et al.  A Privacy Preservation Model for Facebook-Style Social Network Systems , 2009, ESORICS.

[7]  Elizabeth F. Churchill,et al.  Faceted identity, faceted lives: social and technical issues with being yourself online , 2011, CSCW.

[8]  Gail-Joon Ahn,et al.  Detecting and resolving privacy conflicts for collaborative data sharing in online social networks , 2011, ACSAC '11.

[9]  Nikita Borisov,et al.  FlyByNight: mitigating the privacy risks of social networking , 2008, WPES '08.

[10]  Calton Pu,et al.  Large Online Social Footprints--An Emerging Threat , 2009, 2009 International Conference on Computational Science and Engineering.

[11]  Ronald E. Leenes Context Is Everything Sociality and Privacy in Online Social Network Sites , 2009, PrimeLife.

[12]  Danah Boyd,et al.  Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..

[13]  Joseph Bonneau,et al.  The Privacy Jungle: On the Market for Data Protection in Social Networks , 2009, WEIS.

[14]  Celine Latulipe,et al.  Visible Flows: Contextual Integrity and the Design of Privacy Mechanisms on Social Network Sites , 2009, 2009 International Conference on Computational Science and Engineering.

[15]  Andreas Pfitzmann,et al.  Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[16]  Günther Pernul,et al.  Provider-Independent Online Social Identity Management--Enhancing Privacy Consistently Across Multiple Social Networking Sites , 2012, 2012 45th Hawaii International Conference on System Sciences.

[17]  Themis Palpanas,et al.  Decentralised social network management , 2011, Int. J. Web Based Communities.

[18]  Bhavani M. Thuraisingham,et al.  Semantic web-based social network access control , 2011, Comput. Secur..

[19]  Jennifer Golbeck,et al.  Linking Social Networks on the Web with FOAF: A Semantic Web Case Study , 2008, AAAI.

[20]  Zeynep Tufekci Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites , 2008 .