144,495 Hits in 3.8 sec

Collective privacy management in social networks

Anna Cinzia Squicciarini, Mohamed Shehab, Federica Paci
2009 Proceedings of the 18th international conference on World wide web - WWW '09  
In spite of the fact that content sharing represents one of the prominent features of existing Social Network sites, Social Networks yet do not support any mechanism for collaborative management of privacy  ...  In the paper, we also show a proof-of-concept application, which we implemented in the context of Facebook, one of today's most popular social networks.  ...  CONCLUSION In this paper we discussed a novel model for privacy management across social networks, where data may belong to many users.  ... 
doi:10.1145/1526709.1526780 dblp:conf/www/SquicciariniSP09 fatcat:tiq5s6nfbzbepkq7iohu2a6pya

Measuring individuals' concerns over collective privacy on social networking sites

Haiyan Jia, Heng Xu
2016 Cyberpsychology: Journal of Psychosocial Research on Cyberpspace  
In order to address this gap in existing literature, we propose a conceptual framework of individuals' collective privacy concerns in the context of SNSs.  ...  Drawing on the Communication Privacy Management (CPM) theory (Petronio, 2002) , we suggest three dimensions of collective privacy concerns, namely, collective information access, control and diffusion.  ...  Any opinion, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.  ... 
doi:10.5817/cp2016-1-4 fatcat:raf5blftpzgp3heag5luxhl6f4

A Survey on Multi-Party Privacy Conflict Detection and Resolution in Social Media

Rajul Chhallani, Jyoti Rao
2016 IJARCCE  
management in Social Media in order to determine what number of times every approach matched users' behaviour.  ...  From few recent years online social network have amazing advance and become a factual gateway for many billions of Internet users. the shortage of multi-party privacy handling gives in existing mechanism  ...  Her guidance always helps me to succeed in this work. I am also very grateful for her guidance and comments while designing part of my research paper and learnt many things under his leadership.  ... 
doi:10.17148/ijarcce.2016.51262 fatcat:skmicwqkpfafvl7g7grlzstmhq

Privacy management system using social networking

Ronggong Song, Larry Korba, George Yee
2007 2007 IEEE International Conference on Systems, Man and Cybernetics  
In this paper, we expose the limitations of existing privacy management systems, and present a privacy management system that exploits social network analysis, which can automatically discover the privacy-related  ...  However, the advancement of computer and networking technologies has made privacy management very challenging.  ...  PRIVACY MANAGEMENT SYSTEM USING SOCIAL NETWORKING In our system, we combine several technologies that allow organizations to manage their private data and understand how it is being used throughout the  ... 
doi:10.1109/icsmc.2007.4414220 dblp:conf/smc/SongKY07 fatcat:pps6nzqvu5eftjszhc22paacva

Research On Privacy Protection Strategies Of Mobile Social Network Users

Pshwang Wang, Zecheng Wang
2020 International journal of advanced networking and applications  
in mobile social networks, and proposes the privacy protection strategies for users in mobile social networks from the aspects of formulating national laws and regulations, building and managing mobile  ...  In order to protect mobile social network users' privacy information, and promote the healthy development of the mobile social industry, This paper studies the types and ways of user privacy disclosure  ...  This work was supported by the National Social Science Foundation Project of China under Grant 16BTQ085.  ... 
doi:10.35444/ijana.2020.12103 fatcat:4bhf2mgnc5hanaiiectqek44my

Beyond Information: The Role of Territory in Privacy Management Behavior on Social Networking Sites

Shuaifu Lin, Deborah J. Armstrong
2019 Journal of the AIS  
This study draws on communication privacy management theory to explore aspects of social networking sites (SNSs) that may influence individual privacy management behaviors and conceptualizes two behaviors  ...  These distinct privacy risk beliefs, in turn, influence two privacy management behaviors.  ...  Study 1: Survey Instructions and Questions The purpose of this survey is to learn about managing privacy in online social networks.  ... 
doi:10.17705/1jais.00540 fatcat:u4seoxyarvbjhphoff7ls7s6mq

Audience Segregation in Social Network Sites

Bibi van den Berg, Ronald Leenes
2010 2010 IEEE Second International Conference on Social Computing  
Audience segregation in social network sites van den Berg, B.; Leenes, Ronald Abstract-In recent years research has shown that most social network sites pose serious privacy and security risks for individual  ...  From the existing analyses of privacy and security risks in social network sites we deduce that one of the biggest categories of privacy risks revolves around the notion of 'audience segregation', i.e.  ...  PRIVACY ISSUES IN SOCIAL NETWORK SITES One of the fastest growing online fora for self-presentation and social interaction are 'social network sites' (SNSs).  ... 
doi:10.1109/socialcom.2010.165 dblp:conf/socialcom/BergL10 fatcat:7ytxlazj45eyppbdjwijww7n64

Keeping Up Appearances: Audience Segregation in Social Network Sites [chapter]

Bibi van den Berg, Ronald Leenes
2011 Computers, Privacy and Data Protection: an Element of Choice  
Contact-Management: Collections Our starting point for realising audience segregation in social network sites is the introduction of nuance in connections 34 .  ...  social network sites more privacy-friendly.  ... 
doi:10.1007/978-94-007-0641-5_10 fatcat:3czjz3yuc5e43df35nyrfgsgda

Cross-Cultural Privacy Differences [chapter]

Yao Li
2022 Modern Socio-Technical Perspectives on Privacy  
Specifically, it briefly reviews the concept of culture, discusses the cross-cultural differences in privacy management, and recommends design implications on privacy design in the international context  ...  Such investigation is important to understand how users in different cultures manage their information privacy differently and to inform the privacy design for technologies that are used globally.  ...  The privacy systems in collectivistic countries should emphasize collaborative privacy management to coordinate privacy management experience between users and their online social networks.  ... 
doi:10.1007/978-3-030-82786-1_12 fatcat:qcxcsn5fkbbbdhobjlcduz5mau

New strategies for employment? internet skills and online privacy practices during people's job search

Eszter Hargittai, Eden Litt
2013 IEEE Security and Privacy  
How does online know-how relate to people's tendencies to manage their privacy?  ...  A survey of young adults' online skills and privacy practices reveals how demographic factors influence reputation-management strategies online when it comes to monitoring self-presentation.  ...  content from their profiles. 4, 17 People have long engaged in privacy management strategies to preserve their reputations, but social network sites add new challenges.  ... 
doi:10.1109/msp.2013.64 fatcat:e2vni45h2ngwbkazdbeehknepq

Can We Assess and Monitor Privacy and Security Risk for Social Networks?

Mehmet Sahinoglu, Aysen Dener Akkaya, David Ang
2012 Procedia - Social and Behavioral Sciences  
Ramifications of this quantitative risk assessment of privacy and security breaches in social networks will be summarized.  ...  We will address these issues by employing a quantitative approach to assess security and privacy risks for social networks already under pressure by users and policymakers for breaches in both quality  ...  be social or health or any privacy/security related network.  ... 
doi:10.1016/j.sbspro.2012.09.1170 fatcat:chopqp357nbx5moicars5nuyoi

Proposition of a dynamic steganography system based on the chaos properties and image registration for distributing an encryption key

Rachid Rimani, Naima Hadj Said, Adda Ali Pacha
2019 International Journal of Information Privacy Security and Integrity  
Thus, IJIPSI covers up-to-date information technology in social networking, mobile computing, intelligent techniques and big/open data, with applications across multiple areas.  ...  IJIPSI presents innovative research in the theory, application, implementation, analysis, design, evaluation of information privacy and security.  ...  security • Social network information privacy/security/integrity • Secure computing and systems • Database privacy and security Risk analysis, modelling and management •  ... 
doi:10.1504/ijipsi.2019.10028196 fatcat:mxg3zi45zvgengqr4a7cz2pelu

Identifying Privacy Related Requirements for the Design of Self-Adaptive Privacy Protections Schemes in Social Networks

Angeliki Kitsiou, Eleni Tzortzaki, Christos Kalloniatis, Stefanos Gritzalis
2021 Future Internet  
Social Networks (SNs) bring new types of privacy risks threats for users; which developers should be aware of when designing respective services.  ...  This study, aimed at elaborating this examination in depth, in order as to identify the users' social characteristics and privacy perceptions that can affect self-adaptive privacy design, as well as to  ...  Privacy Management Privacy, as a social phenomenon, is interpreted in several ways both individually and collectively [52] Since privacy definitions are shaped in SNs accordingly with users' societal  ... 
doi:10.3390/fi13020023 fatcat:tff6ifbptnbivlpjan4adktscq

Designing Privacy into Online Communities

Catherine Ann Dwyer, Starr Roxanne Hiltz
2008 Social Science Research Network  
This provides evidence of poor design of privacy management on social networking sites.  ...  We offer an analysis of current privacy management practices and offer suggestions for improving the design of privacy management in social software.  ...  ACKNOWLEDGMENTS The authors wish to thank the members of the NJIT community who enthusiastically shared their experiences with social networking sites.  ... 
doi:10.2139/ssrn.1305278 fatcat:ycsp7qn7vbf3rmvzlpwyq5l2oe

Privacy by Design: Does It Matter for Social Networks? [chapter]

Mohammad Badiul Islam, Renato Iannella
2012 IFIP Advances in Information and Communication Technology  
Users want to protect their privacy -particularly in "privacy invasive" areas such as social networks.  ...  However, Social Network users seldom know how to protect their own privacy through online mechanisms.  ...  In different research areas (e.g., database, data mining, network, security, social science), the term "privacy" in social networks has quite different meanings.  ... 
doi:10.1007/978-3-642-31668-5_16 fatcat:xzy6xw4k4fcr3johbebm33f3oe
« Previous Showing results 1 — 15 out of 144,495 results