skip to main content
10.1145/2389176.2389212acmconferencesArticle/Chapter ViewAbstractPublication PagesgroupConference Proceedingsconference-collections
research-article

Towards an understanding of social inference opportunities in social computing

Published:27 October 2012Publication History

ABSTRACT

Social computing applications are transforming the way we make new social ties, work, learn and play, thus becoming an essential part our social fabric. As a result, people and systems routinely make inferences about people's personal information based on their disclosed personal information. Despite the significance of this phenomenon the opportunity to make social inferences about users and how this process can be managed is poorly understood. In this paper we 1) outline why social inferences are important to study in the context of social computing applications, 2) how we can model, understand and predict social inference opportunities 3) highlight the need for social inference management systems, and 4) discuss the design space and associated research challenges. Collectively, this paper provides the first systematic overview for social inference research in the area of social computing.

References

  1. Asbury Park Press DataUniverse Portal to Public Government Data. Retrieved Nov 10, 2011. http://www.app.com/section/DATAGoogle ScholarGoogle Scholar
  2. Biskup, J. and Bonatti, P. 2004. Controlled query evaluation for enforcing confidentiality in complete information systems. International Journal of Information Security, 3 (1), 14--27.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Black, G., 2011. Publicity Rights and Image. Oxford: Hart Publishing, page 61--62.Google ScholarGoogle Scholar
  4. Blaschke, C. and Valencia, A. 2002. Automatic ontology construction from the literature. Genome Informatics Series. 13201--213.Google ScholarGoogle Scholar
  5. Brodsky, A., Farkas, C. and Jajodia, S. 2000. Secure databases: constraints, inference channels, and monitoring disclosures. IEEE Transactions on Knowledge and Data Engineering, 2 (6), 900--919. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Cadiz, J. J., Venolia G. D., Jancke G., Gupta A., 2002. Designing and deploying an information awareness interface. CSCW 2002: 314--323. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Crampton, J. and Khambhammettu, H. 2008. Delegation in role-based access control International Journal of Information Security, 7 (2), 123--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Cuppens, F. and Trouessin, G. 1994. Information Flow Controls vs Inference Controls: An Integrated Approach Third European Symposium on Research in Computer Security Springer Berlin / Heidelberg, 447--468. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Dey, A., Lederer, S., Beckmann, C., Mankoff, J. 2003. Managing Personal Information Disclosure in Ubiquitous Computing Environments. Technical Report CSD-03-1257. UC Berkeley, Berkeley, CA, USA.Google ScholarGoogle Scholar
  10. Eagle, N., Pentland, A. 2006. Reality mining: sensing complex social systems, Personal and Ubiquitous Computing, v. 10 n. 4, p. 255--268. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Fletcher, D. February 18, 2010. Please Rob Me: The Risks of Online Oversharing. Retrieved March 5, 2012. http://www.time.com/time/business/article/0,8599,1964873,00.htmlGoogle ScholarGoogle Scholar
  12. Goffmann, E. 1059. The presentation of self in everyday life. New York, Anchor Books.Google ScholarGoogle Scholar
  13. Gross, R. and Acquisti, A. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM workshop on Privacy in the electronic society (2005). ACM, New York, NY, USA, 71--80. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Intelius People Search. Retrieved Nov 10, 2011. http://www.intelius.com/Google ScholarGoogle Scholar
  15. Jones, Q. and Grandhi, S. A. P3 Systems: Putting the Place Back into Social Networks IEEE Internet Computing, 2005, 38--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Krumm, J. 2007. Inference Attacks on Location Tracks. Fifth International Conference on Pervasive Computing (Toronto, Ontario, Canada, May 13-16, 2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Lennon, M. Oct 12, 2010. Survey Reveals How Stupid People are With Their Passwords. Retrieved Nov 10, 2011. http://www.securityweek.com/survey-reveals-how-stupid-people-are-their-passwordsGoogle ScholarGoogle Scholar
  18. Mayer, J. M., Motahari, S., Schuler, R. P. and Jones, Q. 2010. Common attributes in an unusual context: predicting the desirability of a social match. In Proceedings of the fourth ACM conference on Recommender systems. ACM, New York, NY, USA, 337--340. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Motahari, S., Manikopoulos, C., Hiltz, R. and Jones, Q. 2007. Seven privacy worries in ubiquitous social computing. In ACM International Conference Proceeding Series; Proceedings of the 3rd symposium on Usable privacy and security, 171--172. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Motahari, S., Ziavras, S. and Jones, Q., 2009. Preventing Unwanted Social Inferences with Classification Tree Analysis. In IEEE International Conference on Tools with Artificial Intelligence (IEEE ICTAI). Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Motahari, S., Ziavras, S., Naaman, M., Ismail, M. and Jones, Q. 2009. Social Inference Risk Modeling in Mobile and Social Applications IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT). Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Motahari, S., Ziavras, S., Schular, R. and Jones, Q. 2008. Identity Inference as a Privacy Risk in Computer-Mediated Communication. IEEE Hawaii International Conference on System Sciences (HICSS-42), 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Narayanan, A. and Shmatikov, V., 2005. Obfuscated Databases and Group Privacy. in 12th ACM conference on Computer and communications security, 102--111. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. O'Leary, D. E. 1995. Some Privacy Issues in Knowledge Discovery: The OECD Personal Privacy Guidelines. IEEE Expert: Intelligent Systems and Their Applications 10 (2), 48--52. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Robertson, S. 2004. Understanding inverse document frequency: on theoretical arguments for IDF, Journal of Documentation. Vol. 60 Iss: 5, pp. 503--520.Google ScholarGoogle ScholarCross RefCross Ref
  26. Rodewig, C. March 7, 2012. Geotagging poses security risks. Retrieved Macrh 10, 2012. The Official Homepage of the United States Army. http://www.army.mil/article/75165/Geotagging_poses_security_risks/Google ScholarGoogle Scholar
  27. Samarati, P. and Sweeney, L. 1998. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and cell suppression. Technical report, SRI International.Google ScholarGoogle Scholar
  28. Schechter, S., Bernheim Brush, A. J., Egelman, S. 2009. It's no secret: Measuring the security and reliability of authentication via 'secret' questions. In 30th IEEE Symposium on Security and Privacy. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Schuler, R. P., Laws, N., Bajaj, S., Grandhi, S. A. and Jones, Q. 2007. Finding Your Way with CampusWiki: A Location-Aware Wiki to Support Community Building The ACM's Conference on Human Factors in Computing Systems CHI2007, San Jose California, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Shannon, C. E. 1950. Prediction and entropy of printed English. The Bell System Technical Journal, 30, 50--64.Google ScholarGoogle ScholarCross RefCross Ref
  31. Sweeney, L. 2002. Achieving k-Anonymity Privacy Protection Using Generalization And Suppression. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10, 571--588. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Sweeney, L. 2004. Uniqueness of simple demographics in the U.S. population. Technical report, Carnegie Mellon University, Laboratory for International Data Privacy.Google ScholarGoogle Scholar
  33. Tenenbaum, J. B., Griffiths T. L., 2001. Generalization, similarity, and Bayesian inference. Behav. Brain Sci. 24: 629--40; discussion 652--791.Google ScholarGoogle ScholarCross RefCross Ref
  34. Terry, M., Mynatt , E. D., Ryall, K., Leigh, D., 2002. Social net: using patterns of physical proximity over time to infer shared interests, CHI '02 extended abstracts on Human factors in computing systems, (Minneapolis, Minnesota, USA, April 20--25, 2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Terveen, L., and McDonald, D. 2005. Social Matching: A Framework and Research Agenda. In ACM Transactions of Computer Human Interaction. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Weiser, M. 1991. The Computer for the 21st Century. Scientific American.Google ScholarGoogle Scholar
  37. Yam, M. Jan 22, 2010. Your Top 20 Most Common Passwords. Retrieved Nov 10, 2011. http://www.tomshardware.com/news/imperva-rockyou-most-common-passwords,9486.htmlGoogle ScholarGoogle Scholar
  38. ZabaSearch. Free People Search and Public Information Search Engine. Retrieved Nov 10, 2011. http://www.zabasearch.com/Google ScholarGoogle Scholar
  39. Zetter, K., (2008, Sept 18). Palin E-Mail Hacker Says It Was Easy. Wired. Retrieved March 8, 2012. http://www.wired.com/threatlevel/2008/09/palin-e-mail-ha/Google ScholarGoogle Scholar
  40. Zhan, J. and Matwin, S. 2006. A Crypto-Based Approach to Privacy-Preserving Collaborative DataMining Sixth IEEE International Conference on Data Mining Workshops, 546--550. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Towards an understanding of social inference opportunities in social computing

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      GROUP '12: Proceedings of the 2012 ACM International Conference on Supporting Group Work
      October 2012
      342 pages
      ISBN:9781450314862
      DOI:10.1145/2389176

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 27 October 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate125of405submissions,31%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader