Individual values for protecting identity in social networks

Consequences of loss of identity are severe and abuse by criminal elements is a real threat. Any effort to institute identity protection controls requires a strategic focus where objectives of individuals need to be understood and established. In this paper we undertake an extensive study to develop individual identity protection objectives. Using concepts rooted in value theory and value-focused thinking, we define five fundamental and fourteen means objectives. Our fundamental objectives for identity protection include: Maximizing end user trust; Ensuring development of social networking ethics; Ensuring authenticity of user identity; Maximizing identity management to make social networks useful; Maximizing social networking infrastructure protection. Our means objectives range from protecting individual identity from commercial exploitation to private and public segregation of information and maximizing communication richness. All together the fundamental and means objectives ensure protection of individual identity in social networking environments.

[1]  Susan B. Barnes,et al.  A privacy paradox: Social networking in the United States , 2006, First Monday.

[2]  James Horley,et al.  Personal Construct Theory and Human Values , 2012 .

[3]  M. White,et al.  Assessing Our Knowledge of Identity Theft , 2008 .

[4]  James P. Peerenboom,et al.  Identifying, understanding, and analyzing critical infrastructure interdependencies , 2001 .

[5]  Gurpreet Dhillon,et al.  Defining value-based objectives for ERP systems planning , 2013, Decis. Support Syst..

[6]  Lilian Edwards,et al.  Data Control and Social Networking: Irreconcilable Ideas? , 2008 .

[7]  G. Newman,et al.  Identity Theft Literature Review , 2005 .

[8]  Gurpreet Dhillon,et al.  TORKZADEH AND DHILLON Measuring Factors that Influence the Success of Internet , 2015 .

[9]  D. McQuail Mass Communication Theory: An Introduction , 1983 .

[10]  Timothy L. McDaniels,et al.  Value-Focused Thinking in a Difficult Context: Planning Tourism for Guimaras, Philippines , 1999, Interfaces.

[11]  H. Blumer,et al.  Symbolic Interactionism: Perspective and Method , 1988 .

[12]  Cara J Wong,et al.  The meaning of American national identity: Patterns of ethnic conflict and consensus. , 2001 .

[13]  Anthony D. Miyazaki,et al.  Self-Regulatory Safeguards and the Online Privacy of Preteen Children , 2009 .

[14]  Anders Albrechtslund,et al.  Online Social Networking as Participatory Surveillance , 2008, First Monday.

[15]  Vitaly Shmatikov,et al.  De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[16]  Matthew S. Eastin,et al.  eCRM: Understanding Internet Confidence and the Implications for Customer Relationship Management , 2005 .

[17]  Jonathan P. Allen,et al.  Value conflicts for information security management , 2011, J. Strateg. Inf. Syst..

[18]  B. Fischhoff,et al.  Value elicitation: Is there anything in there? , 1991 .

[19]  Keith N. Hampton,et al.  Does the Internet Increase, Decrease, or Supplement Social Capital? , 2001 .

[20]  Grant Mccracken The long interview , 1988 .

[21]  R. Keeney,et al.  The Value of Internet Commerce to the Customer , 1999 .

[22]  P. Thoits,et al.  Me's and we's: Forms and functions of social identities. , 1997 .

[23]  Andrew J. Rohm,et al.  Consumers' Protection of Online Privacy and Identity , 2004 .

[24]  P. Burke,et al.  The Past, Present, and Future of an Identity Theory* , 2000 .

[25]  Jure Leskovec,et al.  The dynamics of viral marketing , 2005, EC '06.

[26]  R. Baumeister Identity: Cultural Change and the Struggle for Self , 1986 .

[27]  Fred D. Davis,et al.  User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .

[28]  Adrian Palmer,et al.  An experiential, social network‐based approach to direct marketing , 2009 .

[29]  S. Schwartz Universals in the Content and Structure of Values: Theoretical Advances and Empirical Tests in 20 Countries , 1992 .

[30]  Felix B. Tan,et al.  The Repertory Grid Technique: A Method for the Study of Cognition in Information Systems , 2002, MIS Q..

[31]  Bernardo A. Huberman,et al.  Predicting the Future with Social Media , 2010, Web Intelligence.

[32]  E. Schein Organizational Culture and Leadership , 1991 .

[33]  Sonia Livingstone,et al.  Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression , 2008, New Media Soc..

[34]  Qing Hu,et al.  Is spyware an Internet nuisance or public menace? , 2005, CACM.

[35]  R. Gregory,et al.  Creating policy alternatives using stakeholder values , 1994 .

[36]  P. Burke,et al.  Identity theory and social identity theory , 2000 .

[37]  J. Hewitt Self and Society: A Symbolic Interactionist Social Psychology , 1976 .

[38]  Gurpreet Dhillon,et al.  Value‐focused assessment of information system security in organizations , 2006, Inf. Syst. J..

[39]  Krishna P. Gummadi,et al.  Measurement and analysis of online social networks , 2007, IMC '07.

[40]  Ben Light,et al.  Ethics and social networking sites: a disclosive analysis of Facebook , 2010, Inf. Technol. People.

[41]  D. Paulhus,et al.  Effects of Self-Presentation Strategies on Personality Profiles and their Structure , 1995 .

[42]  Lee Sproull,et al.  What's Mine Is Ours, or Is It? A Study of Attitudes about Information Sharing , 1994, Inf. Syst. Res..

[43]  Steven Hitlin,et al.  Values as the core of personal identity: Drawing links between two theories of self. , 2003 .

[44]  Leyla Bilge,et al.  All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.

[45]  T. Abel,et al.  Mind, Self, and Society , 1934 .

[46]  Marcus K. Rogers The role of criminal profiling in the computer forensics process , 2003, Comput. Secur..

[47]  Wenjie Wang,et al.  A contextual framework for combating identity theft , 2006, IEEE Security & Privacy.

[48]  Dorothy E. Leidner,et al.  Review: A Review of Culture in Information Systems Research: Toward a Theory of Information Technology Culture Conflict , 2006, MIS Q..

[49]  Sally Atkinson,et al.  Trust in managerial relationships , 2003 .

[50]  Lionel Wee,et al.  Personal Branding and the Commodification of Reflexivity , 2010 .