Skip to main content

Privacy in Online Social Networks: An Ontological Model for Self-Presentation

  • Conference paper
  • First Online:
Knowledge Engineering and Semantic Web (KESW 2016)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 649))

Included in the following conference series:

Abstract

Online Social Networks (OSNs) have become an important part of daily digital interactions for more than half billion users around the world. Unconstrained by physical spaces, the OSNs offer to web users new interesting means to communicate, interact, and socialize. The OSNs exhibit many of the characteristics of human societies in terms of forming relationships and how those relationships are used for personal information disclosure. However, current OSNs lack an effective mechanism to represent social relationships of the users that leads to undesirable consequences of leakage of users’ personal information to unintended audiences. We propose an ontological model to represent diverse social relationships and manage self-presentation of social web users. This model is inspired from most influential social theories about self-presentation and tie strength. This model regulates personal information disclosure on the basis of social role and relationship quality between the users. We also present results of our user study, which demonstrates that relationship quality plays vital role to control personal information disclosure in social web, and quality of relationship between users can be easily inferred from user interaction patterns in online social networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    PewResearchCenter http://www.pewglobal.org/2010/12/15/global-publics-embrace- social-networking/.

  2. 2.

    Alexa http://www.alexa.com/topsites.

  3. 3.

    Nielsen http://blog.nielsen.com/nielsenwire/wp-content/uploads/2009/03/nielsen- globalfaces-mar09.pdf.

  4. 4.

    Facebook Facelifts Its Privacy Policy http://gadgets.ndtv.com/social-networking/news/facebook-facelifts-its-privacy-policy-226824.

  5. 5.

    Do Social Networks Bring the End of Privacy? http://www.scientificamerican.com/article/do-social-networks-bring/.

  6. 6.

    RELATIONSHIP, http://vocab.org/relationship/.

  7. 7.

    Do Social Networks Bring the End of Privacy? http://www.scientificamerican.com/article/do-social-networks-bring/.

  8. 8.

    http://xmlns.com/foaf/spec/.

  9. 9.

    http://www.sparontologies.net/ontologies/pro.

  10. 10.

    http://www.ontologydesignpatterns.org/cp/owl/timeinterval.owl.

  11. 11.

    http://www.essepuntato.it/2012/04/tvc.

References

  1. Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove, A.: Analyzing facebook privacy settings: user expectations vs. reality. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, pp. 61–70. ACM (2011)

    Google Scholar 

  2. Madejski, M., Johnson, M.L., Bellovin, S.M.: The failure of online social network privacy settings (2011)

    Google Scholar 

  3. Johnson, M., Egelman, S., Bellovin, S.M., Facebook, privacy: it’s complicated. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, p. 9. ACM (2012)

    Google Scholar 

  4. Netter, M., Riesner, M., Weber, M., Pernul, G.: Privacy settings in online social networks-preferences, perception, and reality. In: 2013 46th Hawaii International Conference on System Sciences (HICSS), pp. 3219–3228. IEEE (2013)

    Google Scholar 

  5. Akcora, C.G., Ferrari, E.: Graphical user interfaces for privacy settings. In: Alhajj, R., Rokne, J. (eds.) Encyclopedia of Social Network Analysis and Mining, pp. 648–660. Springer, New York (2014)

    Google Scholar 

  6. Liu, Y., Viswanath, B., Mondal, M., Gummadi, K.P., Mislove, A.: Simplifying friendlist management. In: Proceedings of the 21st International Conference Companion on World Wide Web, pp. 385–388. ACM (2012)

    Google Scholar 

  7. Bartel, J.W., Dewan, P.: Evolving friend lists in social networks. In: Proceedings of the 7th ACM Conference on Recommender Systems, pp. 435–438. ACM (2013)

    Google Scholar 

  8. Brickley, D., Miller, L.: Foaf vocabulary specification 0.98. Namespace document 9 (2012)

    Google Scholar 

  9. Kruk, S.R.: Foaf-realm-control your friends access to the resource. In: FOAF Workshop Proceedings, vol. 186 (2004)

    Google Scholar 

  10. Kruk, S.R., Grzonkowski, S., Gzella, A., Woroniecki, T., Choi, H.-C.: D-FOAF: distributed identity management with access rights delegation. In: Mizoguchi, R., Shi, Z.-Z., Giunchiglia, F. (eds.) ASWC 2006. LNCS, vol. 4185, pp. 140–154. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  11. Buffa, M., Faron-Zucker, C.: Ontology-based access rights management. In: Guillet, F., Ritschard, G., Zighed, D.A. (eds.) Advances in Knowledge Discovery and Management. SCI, vol. 398, pp. 49–62. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  12. Elahi, N., Chowdhury, M.M.R., Noll, J.: Semantic access control in web based communities. In: The Third International Multi-conference on Computing in the Global Information Technology, 2008. ICCGI 2008, pp. 131–136. IEEE (2008)

    Google Scholar 

  13. Carminati, B., Ferrari, E., Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: A semantic web based framework for social network access control. In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, pp. 177–186. ACM (2009)

    Google Scholar 

  14. Carminati, B., Ferrari, E., Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: Semantic web-based social network access control. Comput. Secur. 30(2), 108–115 (2011)

    Article  Google Scholar 

  15. Masoumzadeh, A., Joshi, J.: OSNAC: an ontology-based access control model for social networking systems. In: 2010 IEEE Second International Conference on Social Computing (SocialCom), pp. 751–759. IEEE (2010)

    Google Scholar 

  16. Masoumzadeh, A., Joshi, J.: Ontology-based access control for social network systems. Int. J. Inf. Priv. Secur. Integrity 1(1), 59–78 (2011)

    Google Scholar 

  17. Barkhuus, L.: The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 367–376. ACM (2012)

    Google Scholar 

  18. Shi, P., Xu, H., Chen, Y.: Using contextual integrity to examine interpersonal information boundary on social network sites. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 35–38. ACM (2013)

    Google Scholar 

  19. Lipford, H.R., Hull, G., Latulipe, C., Besmer, A., Watson, J.: Visible flows: contextual integrity and the design of privacy mechanisms on social network sites. In: 2009 International Conference on Computational Science and Engineering, CSE 2009, vol. 4, pp. 985–989. IEEE (2009)

    Google Scholar 

  20. Kayes, I., Iamnitchi, A.: Out of the wild: on generating default policies in social ecosystems. In: ICC Workshops, pp. 204–208 (2013)

    Google Scholar 

  21. Kayes, I., Iamnitchi, A.: Aegis: a semantic implementation of privacy as contextual integrity in social ecosystems. In: 2013 Eleventh Annual International Conference on Privacy, Security and Trust (PST), pp. 88–97. IEEE (2013)

    Google Scholar 

  22. Banks, L., Shyhtsun Felix, W.: All friends are not created equal: an interaction intensity based approach to privacy in online social networks. In: International Conference on Computational Science and Engineering, 2009, CSE 2009, vol. 4, pp. 970–974. IEEE (2009)

    Google Scholar 

  23. Ahmad, W., Riaz, A., Johnson, H., Lavesson, N.: Predicting friendship intensity in online social networks. In: 21st International Tyrrhenian Workshop on Digital Communications (2010)

    Google Scholar 

  24. Wilson, C., Boe, B., Sala, A., Puttaswamy, K.P.N., Zhao, B.Y.: User interactions in social networks and their implications. In: Proceedings of the 4th ACM European Conference on Computer Systems, pp. 205–218. ACM (2009)

    Google Scholar 

  25. Kang, J.: Information privacy in cyberspace transactions. Stanford Law Rev. 50, 1193–1294 (1998)

    Article  Google Scholar 

  26. Gurses, S., Diaz, C.: Two tales of privacy in online social networks. IEEE Secur. Priv. 11(3), 29–37 (2013)

    Article  Google Scholar 

  27. Palen, L., Dourish, P.: Unpacking privacy for a networked world. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 129–136. ACM (2003)

    Google Scholar 

  28. Ahmed, J., Governatori, G., van der Torre, L.W.N., Villata, S.: Social interaction based audience segregation for online social networks. In: ECSI, pp. 186–197 (2014)

    Google Scholar 

  29. Ahmed, J.: A privacy protection model for online social networks. In: SW4LAW+ DC@ JURIX (2014)

    Google Scholar 

  30. Ahmed, J.: A semantic model for friend segregation in online social networks. In: Bozzon, A., Cudré-Mauroux, P., Pautasso, C. (eds.) ICWE 2016. LNCS, vol. 9671, pp. 495–500. Springer, Heidelberg (2016). doi:10.1007/978-3-319-38791-8_36

    Chapter  Google Scholar 

  31. Borceapfitzmann, K., Pfitzmann, A., Berg, M.: Privacy 3.0: = data minimization user control contextual integrity. Information Technology Methoden und innovative Anwendungen der Informatik und Informationstechnik 53(1), 34–40 (2011)

    Google Scholar 

  32. Goffman, E.: The presentation of self in everyday life [1959]. Contemporary Sociological Theory, pp. 46–61 (2012)

    Google Scholar 

  33. Nissenbaum, H.: Privacy as contextual integrity. Wash. Law Rev. 79(1), 119–157 (2004)

    Google Scholar 

  34. Granovetter, M.S.: The strength of weak ties. Am. J. Soc. 78, 1360–1380 (1973)

    Article  Google Scholar 

  35. Petróczi, A., Nepusz, T., Bazsó, F.: Measuring tie-strength in virtual social networks. Connections 27(2), 39–52 (2007)

    Google Scholar 

  36. Altman, I.: The environment, social behavior: privacy, personal space, territory, and crowding (1975)

    Google Scholar 

  37. Hu, H., Ahn, G.-J., Jorgensen, J.: Enabling collaborative data sharing in google+. In: 2012 IEEE Global Communications Conference (GLOBECOM), pp. 720–725. IEEE (2012)

    Google Scholar 

  38. Banks, L.D., Wu, S.F.: Toward a behavioral approach to privacy for online social networks. In: Bolc, L., Makowski, M., Wierzbicki, A. (eds.) SocInfo 2010. LNCS, vol. 6430, pp. 19–34. Springer, Heidelberg (2010)

    Google Scholar 

  39. Gruber, T.R.: A translation approach to portable ontology specifications. Knowl. Acquisition 5(2), 199–220 (1993)

    Article  Google Scholar 

  40. Fernández-López, M., Gómez-Pérez, A., Juristo, N.: Methontology: from ontological art towards ontological engineering (1997)

    Google Scholar 

Download references

Acknowledgments

This research project is funded by erasmus mundus joint international doctorate in law, science and technology, and administered by CIRSFID, University of Bologna, Italy. This paper is extension of our research work published in PhD symposium of ICWE 2016. The author also acknowledges valuable comments of Leendert van der Torre, Guido Governatori, Serena Villata and Silvio Peroni.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Javed Ahmed .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Ahmed, J. (2016). Privacy in Online Social Networks: An Ontological Model for Self-Presentation. In: Ngonga Ngomo, AC., Křemen, P. (eds) Knowledge Engineering and Semantic Web. KESW 2016. Communications in Computer and Information Science, vol 649. Springer, Cham. https://doi.org/10.1007/978-3-319-45880-9_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-45880-9_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-45879-3

  • Online ISBN: 978-3-319-45880-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics