Abstract
Online Social Networks (OSNs) have become an important part of daily digital interactions for more than half billion users around the world. Unconstrained by physical spaces, the OSNs offer to web users new interesting means to communicate, interact, and socialize. The OSNs exhibit many of the characteristics of human societies in terms of forming relationships and how those relationships are used for personal information disclosure. However, current OSNs lack an effective mechanism to represent social relationships of the users that leads to undesirable consequences of leakage of users’ personal information to unintended audiences. We propose an ontological model to represent diverse social relationships and manage self-presentation of social web users. This model is inspired from most influential social theories about self-presentation and tie strength. This model regulates personal information disclosure on the basis of social role and relationship quality between the users. We also present results of our user study, which demonstrates that relationship quality plays vital role to control personal information disclosure in social web, and quality of relationship between users can be easily inferred from user interaction patterns in online social networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
PewResearchCenter http://www.pewglobal.org/2010/12/15/global-publics-embrace- social-networking/.
- 2.
- 3.
- 4.
Facebook Facelifts Its Privacy Policy http://gadgets.ndtv.com/social-networking/news/facebook-facelifts-its-privacy-policy-226824.
- 5.
Do Social Networks Bring the End of Privacy? http://www.scientificamerican.com/article/do-social-networks-bring/.
- 6.
RELATIONSHIP, http://vocab.org/relationship/.
- 7.
Do Social Networks Bring the End of Privacy? http://www.scientificamerican.com/article/do-social-networks-bring/.
- 8.
- 9.
- 10.
- 11.
References
Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove, A.: Analyzing facebook privacy settings: user expectations vs. reality. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, pp. 61–70. ACM (2011)
Madejski, M., Johnson, M.L., Bellovin, S.M.: The failure of online social network privacy settings (2011)
Johnson, M., Egelman, S., Bellovin, S.M., Facebook, privacy: it’s complicated. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, p. 9. ACM (2012)
Netter, M., Riesner, M., Weber, M., Pernul, G.: Privacy settings in online social networks-preferences, perception, and reality. In: 2013 46th Hawaii International Conference on System Sciences (HICSS), pp. 3219–3228. IEEE (2013)
Akcora, C.G., Ferrari, E.: Graphical user interfaces for privacy settings. In: Alhajj, R., Rokne, J. (eds.) Encyclopedia of Social Network Analysis and Mining, pp. 648–660. Springer, New York (2014)
Liu, Y., Viswanath, B., Mondal, M., Gummadi, K.P., Mislove, A.: Simplifying friendlist management. In: Proceedings of the 21st International Conference Companion on World Wide Web, pp. 385–388. ACM (2012)
Bartel, J.W., Dewan, P.: Evolving friend lists in social networks. In: Proceedings of the 7th ACM Conference on Recommender Systems, pp. 435–438. ACM (2013)
Brickley, D., Miller, L.: Foaf vocabulary specification 0.98. Namespace document 9 (2012)
Kruk, S.R.: Foaf-realm-control your friends access to the resource. In: FOAF Workshop Proceedings, vol. 186 (2004)
Kruk, S.R., Grzonkowski, S., Gzella, A., Woroniecki, T., Choi, H.-C.: D-FOAF: distributed identity management with access rights delegation. In: Mizoguchi, R., Shi, Z.-Z., Giunchiglia, F. (eds.) ASWC 2006. LNCS, vol. 4185, pp. 140–154. Springer, Heidelberg (2006)
Buffa, M., Faron-Zucker, C.: Ontology-based access rights management. In: Guillet, F., Ritschard, G., Zighed, D.A. (eds.) Advances in Knowledge Discovery and Management. SCI, vol. 398, pp. 49–62. Springer, Heidelberg (2012)
Elahi, N., Chowdhury, M.M.R., Noll, J.: Semantic access control in web based communities. In: The Third International Multi-conference on Computing in the Global Information Technology, 2008. ICCGI 2008, pp. 131–136. IEEE (2008)
Carminati, B., Ferrari, E., Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: A semantic web based framework for social network access control. In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, pp. 177–186. ACM (2009)
Carminati, B., Ferrari, E., Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: Semantic web-based social network access control. Comput. Secur. 30(2), 108–115 (2011)
Masoumzadeh, A., Joshi, J.: OSNAC: an ontology-based access control model for social networking systems. In: 2010 IEEE Second International Conference on Social Computing (SocialCom), pp. 751–759. IEEE (2010)
Masoumzadeh, A., Joshi, J.: Ontology-based access control for social network systems. Int. J. Inf. Priv. Secur. Integrity 1(1), 59–78 (2011)
Barkhuus, L.: The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 367–376. ACM (2012)
Shi, P., Xu, H., Chen, Y.: Using contextual integrity to examine interpersonal information boundary on social network sites. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 35–38. ACM (2013)
Lipford, H.R., Hull, G., Latulipe, C., Besmer, A., Watson, J.: Visible flows: contextual integrity and the design of privacy mechanisms on social network sites. In: 2009 International Conference on Computational Science and Engineering, CSE 2009, vol. 4, pp. 985–989. IEEE (2009)
Kayes, I., Iamnitchi, A.: Out of the wild: on generating default policies in social ecosystems. In: ICC Workshops, pp. 204–208 (2013)
Kayes, I., Iamnitchi, A.: Aegis: a semantic implementation of privacy as contextual integrity in social ecosystems. In: 2013 Eleventh Annual International Conference on Privacy, Security and Trust (PST), pp. 88–97. IEEE (2013)
Banks, L., Shyhtsun Felix, W.: All friends are not created equal: an interaction intensity based approach to privacy in online social networks. In: International Conference on Computational Science and Engineering, 2009, CSE 2009, vol. 4, pp. 970–974. IEEE (2009)
Ahmad, W., Riaz, A., Johnson, H., Lavesson, N.: Predicting friendship intensity in online social networks. In: 21st International Tyrrhenian Workshop on Digital Communications (2010)
Wilson, C., Boe, B., Sala, A., Puttaswamy, K.P.N., Zhao, B.Y.: User interactions in social networks and their implications. In: Proceedings of the 4th ACM European Conference on Computer Systems, pp. 205–218. ACM (2009)
Kang, J.: Information privacy in cyberspace transactions. Stanford Law Rev. 50, 1193–1294 (1998)
Gurses, S., Diaz, C.: Two tales of privacy in online social networks. IEEE Secur. Priv. 11(3), 29–37 (2013)
Palen, L., Dourish, P.: Unpacking privacy for a networked world. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 129–136. ACM (2003)
Ahmed, J., Governatori, G., van der Torre, L.W.N., Villata, S.: Social interaction based audience segregation for online social networks. In: ECSI, pp. 186–197 (2014)
Ahmed, J.: A privacy protection model for online social networks. In: SW4LAW+ DC@ JURIX (2014)
Ahmed, J.: A semantic model for friend segregation in online social networks. In: Bozzon, A., Cudré-Mauroux, P., Pautasso, C. (eds.) ICWE 2016. LNCS, vol. 9671, pp. 495–500. Springer, Heidelberg (2016). doi:10.1007/978-3-319-38791-8_36
Borceapfitzmann, K., Pfitzmann, A., Berg, M.: Privacy 3.0: = data minimization user control contextual integrity. Information Technology Methoden und innovative Anwendungen der Informatik und Informationstechnik 53(1), 34–40 (2011)
Goffman, E.: The presentation of self in everyday life [1959]. Contemporary Sociological Theory, pp. 46–61 (2012)
Nissenbaum, H.: Privacy as contextual integrity. Wash. Law Rev. 79(1), 119–157 (2004)
Granovetter, M.S.: The strength of weak ties. Am. J. Soc. 78, 1360–1380 (1973)
Petróczi, A., Nepusz, T., Bazsó, F.: Measuring tie-strength in virtual social networks. Connections 27(2), 39–52 (2007)
Altman, I.: The environment, social behavior: privacy, personal space, territory, and crowding (1975)
Hu, H., Ahn, G.-J., Jorgensen, J.: Enabling collaborative data sharing in google+. In: 2012 IEEE Global Communications Conference (GLOBECOM), pp. 720–725. IEEE (2012)
Banks, L.D., Wu, S.F.: Toward a behavioral approach to privacy for online social networks. In: Bolc, L., Makowski, M., Wierzbicki, A. (eds.) SocInfo 2010. LNCS, vol. 6430, pp. 19–34. Springer, Heidelberg (2010)
Gruber, T.R.: A translation approach to portable ontology specifications. Knowl. Acquisition 5(2), 199–220 (1993)
Fernández-López, M., Gómez-Pérez, A., Juristo, N.: Methontology: from ontological art towards ontological engineering (1997)
Acknowledgments
This research project is funded by erasmus mundus joint international doctorate in law, science and technology, and administered by CIRSFID, University of Bologna, Italy. This paper is extension of our research work published in PhD symposium of ICWE 2016. The author also acknowledges valuable comments of Leendert van der Torre, Guido Governatori, Serena Villata and Silvio Peroni.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Ahmed, J. (2016). Privacy in Online Social Networks: An Ontological Model for Self-Presentation. In: Ngonga Ngomo, AC., Křemen, P. (eds) Knowledge Engineering and Semantic Web. KESW 2016. Communications in Computer and Information Science, vol 649. Springer, Cham. https://doi.org/10.1007/978-3-319-45880-9_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-45880-9_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-45879-3
Online ISBN: 978-3-319-45880-9
eBook Packages: Computer ScienceComputer Science (R0)