ABSTRACT
Social computing applications are transforming the way we make new social ties, work, learn and play, thus becoming an essential part our social fabric. As a result, people and systems routinely make inferences about people's personal information based on their disclosed personal information. Despite the significance of this phenomenon the opportunity to make social inferences about users and how this process can be managed is poorly understood. In this paper we 1) outline why social inferences are important to study in the context of social computing applications, 2) how we can model, understand and predict social inference opportunities 3) highlight the need for social inference management systems, and 4) discuss the design space and associated research challenges. Collectively, this paper provides the first systematic overview for social inference research in the area of social computing.
- Asbury Park Press DataUniverse Portal to Public Government Data. Retrieved Nov 10, 2011. http://www.app.com/section/DATAGoogle Scholar
- Biskup, J. and Bonatti, P. 2004. Controlled query evaluation for enforcing confidentiality in complete information systems. International Journal of Information Security, 3 (1), 14--27.Google ScholarDigital Library
- Black, G., 2011. Publicity Rights and Image. Oxford: Hart Publishing, page 61--62.Google Scholar
- Blaschke, C. and Valencia, A. 2002. Automatic ontology construction from the literature. Genome Informatics Series. 13201--213.Google Scholar
- Brodsky, A., Farkas, C. and Jajodia, S. 2000. Secure databases: constraints, inference channels, and monitoring disclosures. IEEE Transactions on Knowledge and Data Engineering, 2 (6), 900--919. Google ScholarDigital Library
- Cadiz, J. J., Venolia G. D., Jancke G., Gupta A., 2002. Designing and deploying an information awareness interface. CSCW 2002: 314--323. Google ScholarDigital Library
- Crampton, J. and Khambhammettu, H. 2008. Delegation in role-based access control International Journal of Information Security, 7 (2), 123--136. Google ScholarDigital Library
- Cuppens, F. and Trouessin, G. 1994. Information Flow Controls vs Inference Controls: An Integrated Approach Third European Symposium on Research in Computer Security Springer Berlin / Heidelberg, 447--468. Google ScholarDigital Library
- Dey, A., Lederer, S., Beckmann, C., Mankoff, J. 2003. Managing Personal Information Disclosure in Ubiquitous Computing Environments. Technical Report CSD-03-1257. UC Berkeley, Berkeley, CA, USA.Google Scholar
- Eagle, N., Pentland, A. 2006. Reality mining: sensing complex social systems, Personal and Ubiquitous Computing, v. 10 n. 4, p. 255--268. Google ScholarDigital Library
- Fletcher, D. February 18, 2010. Please Rob Me: The Risks of Online Oversharing. Retrieved March 5, 2012. http://www.time.com/time/business/article/0,8599,1964873,00.htmlGoogle Scholar
- Goffmann, E. 1059. The presentation of self in everyday life. New York, Anchor Books.Google Scholar
- Gross, R. and Acquisti, A. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM workshop on Privacy in the electronic society (2005). ACM, New York, NY, USA, 71--80. Google ScholarDigital Library
- Intelius People Search. Retrieved Nov 10, 2011. http://www.intelius.com/Google Scholar
- Jones, Q. and Grandhi, S. A. P3 Systems: Putting the Place Back into Social Networks IEEE Internet Computing, 2005, 38--47. Google ScholarDigital Library
- Krumm, J. 2007. Inference Attacks on Location Tracks. Fifth International Conference on Pervasive Computing (Toronto, Ontario, Canada, May 13-16, 2007). Google ScholarDigital Library
- Lennon, M. Oct 12, 2010. Survey Reveals How Stupid People are With Their Passwords. Retrieved Nov 10, 2011. http://www.securityweek.com/survey-reveals-how-stupid-people-are-their-passwordsGoogle Scholar
- Mayer, J. M., Motahari, S., Schuler, R. P. and Jones, Q. 2010. Common attributes in an unusual context: predicting the desirability of a social match. In Proceedings of the fourth ACM conference on Recommender systems. ACM, New York, NY, USA, 337--340. Google ScholarDigital Library
- Motahari, S., Manikopoulos, C., Hiltz, R. and Jones, Q. 2007. Seven privacy worries in ubiquitous social computing. In ACM International Conference Proceeding Series; Proceedings of the 3rd symposium on Usable privacy and security, 171--172. Google ScholarDigital Library
- Motahari, S., Ziavras, S. and Jones, Q., 2009. Preventing Unwanted Social Inferences with Classification Tree Analysis. In IEEE International Conference on Tools with Artificial Intelligence (IEEE ICTAI). Google ScholarDigital Library
- Motahari, S., Ziavras, S., Naaman, M., Ismail, M. and Jones, Q. 2009. Social Inference Risk Modeling in Mobile and Social Applications IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT). Google ScholarDigital Library
- Motahari, S., Ziavras, S., Schular, R. and Jones, Q. 2008. Identity Inference as a Privacy Risk in Computer-Mediated Communication. IEEE Hawaii International Conference on System Sciences (HICSS-42), 1--10. Google ScholarDigital Library
- Narayanan, A. and Shmatikov, V., 2005. Obfuscated Databases and Group Privacy. in 12th ACM conference on Computer and communications security, 102--111. Google ScholarDigital Library
- O'Leary, D. E. 1995. Some Privacy Issues in Knowledge Discovery: The OECD Personal Privacy Guidelines. IEEE Expert: Intelligent Systems and Their Applications 10 (2), 48--52. Google ScholarDigital Library
- Robertson, S. 2004. Understanding inverse document frequency: on theoretical arguments for IDF, Journal of Documentation. Vol. 60 Iss: 5, pp. 503--520.Google ScholarCross Ref
- Rodewig, C. March 7, 2012. Geotagging poses security risks. Retrieved Macrh 10, 2012. The Official Homepage of the United States Army. http://www.army.mil/article/75165/Geotagging_poses_security_risks/Google Scholar
- Samarati, P. and Sweeney, L. 1998. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and cell suppression. Technical report, SRI International.Google Scholar
- Schechter, S., Bernheim Brush, A. J., Egelman, S. 2009. It's no secret: Measuring the security and reliability of authentication via 'secret' questions. In 30th IEEE Symposium on Security and Privacy. Google ScholarDigital Library
- Schuler, R. P., Laws, N., Bajaj, S., Grandhi, S. A. and Jones, Q. 2007. Finding Your Way with CampusWiki: A Location-Aware Wiki to Support Community Building The ACM's Conference on Human Factors in Computing Systems CHI2007, San Jose California, USA. Google ScholarDigital Library
- Shannon, C. E. 1950. Prediction and entropy of printed English. The Bell System Technical Journal, 30, 50--64.Google ScholarCross Ref
- Sweeney, L. 2002. Achieving k-Anonymity Privacy Protection Using Generalization And Suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10, 571--588. Google ScholarDigital Library
- Sweeney, L. 2004. Uniqueness of simple demographics in the U.S. population. Technical report, Carnegie Mellon University, Laboratory for International Data Privacy.Google Scholar
- Tenenbaum, J. B., Griffiths T. L., 2001. Generalization, similarity, and Bayesian inference. Behav. Brain Sci. 24: 629--40; discussion 652--791.Google ScholarCross Ref
- Terry, M., Mynatt , E. D., Ryall, K., Leigh, D., 2002. Social net: using patterns of physical proximity over time to infer shared interests, CHI '02 extended abstracts on Human factors in computing systems, (Minneapolis, Minnesota, USA, April 20--25, 2002). Google ScholarDigital Library
- Terveen, L., and McDonald, D. 2005. Social Matching: A Framework and Research Agenda. In ACM Transactions of Computer Human Interaction. Google ScholarDigital Library
- Weiser, M. 1991. The Computer for the 21st Century. Scientific American.Google Scholar
- Yam, M. Jan 22, 2010. Your Top 20 Most Common Passwords. Retrieved Nov 10, 2011. http://www.tomshardware.com/news/imperva-rockyou-most-common-passwords,9486.htmlGoogle Scholar
- ZabaSearch. Free People Search and Public Information Search Engine. Retrieved Nov 10, 2011. http://www.zabasearch.com/Google Scholar
- Zetter, K., (2008, Sept 18). Palin E-Mail Hacker Says It Was Easy. Wired. Retrieved March 8, 2012. http://www.wired.com/threatlevel/2008/09/palin-e-mail-ha/Google Scholar
- Zhan, J. and Matwin, S. 2006. A Crypto-Based Approach to Privacy-Preserving Collaborative DataMining Sixth IEEE International Conference on Data Mining Workshops, 546--550. Google ScholarDigital Library
Index Terms
- Towards an understanding of social inference opportunities in social computing
Recommendations
Self-Presentation Strategies among Users of Social Networking Sites
This study explored the strategies of self-presentation ingratiation, supplication, and enhancement among United Arab Emirates users n = 230 of popular social networking sites SNS. The size of social networks, degree of network connectivity, and ...
Social Computing: An Examination of Self, Social, and Use Factors
This article explores the influence of social, self, and use factors on the intention to perform social computing actions in online social sites. A survey was conducted using peer-to-peer file sharing as representative of a social computing action. ...
Uses and gratifications of social networking sites for bridging and bonding social capital
Applying uses and gratifications theory (UGT) and social capital theory, our study examined users of four social networking sites (SNSs) (Facebook, Twitter, Instagram, and Snapchat), and their influence on online bridging and bonding social capital. ...
Comments