An Analysis of the Consequences of the General Data Protection Regulation on Social Network Research

@article{Kotsios2019AnAO,
  title={An Analysis of the Consequences of the General Data Protection Regulation on Social Network Research},
  author={Andreas Kotsios and Matteo Magnani and Luca Rossi and Irina A. Shklovski and Davide Vega},
  journal={ACM Transactions on Social Computing},
  year={2019},
  volume={2},
  pages={1 - 22}
}
This article examines the principles outlined in the General Data Protection Regulation in the context of social network data. We provide both a practical guide to General Data Protection Regulation--compliant social network data processing, covering aspects such as data collection, consent, anonymization, and data analysis, and a broader discussion of the problems emerging when the general principles on which the regulation is based are instantiated for this research area. 

Figures and Tables from this paper

Social Network Analysis, Ethics and LGPD, considerations in research
TLDR
This work presents considerations combining the three topics, personal data in the research field of social networks in Brazil respecting the LGPD and ethics precepts, and the Social Network Analysis in Brazil, from the Informatics perspective.
GDPR Compliant Consent Driven Data Protection in Online Social Networks: A Blockchain-Based Approach
TLDR
A comparative study about the criteria for valid consent under GDPR and existing consent seeking practices of OSNs is presented, and it is argued that existing consent mechanisms in OSNs are not GDPR compliant.
Big data, computational social science, and other recent innovations in social network analysis.
TLDR
This review focuses on four broad topics: Collecting Social Network Data from the Web, Non-traditional and Bipartite/Multi-mode Networks, including Discourse and Semantic Networks, and Social-Ecological Networks.
Invisible Data: A Framework for Understanding Visibility Processes in Social Media Data
Social media data are increasingly used to study a variety of social phenomena. This development is based on the assumption that digital traces left on social media can provide insights into the
Risks and Security of Internet and Systems: 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29–31, 2019, Proceedings
TLDR
A user-centered privacy risk quantification framework coupled with granular and usable privacy risk warnings is presented that empowers users to take informed privacy protection decisions prior to unintended data disclosure.
Contrapuntal Connectedness: Analysing Relations Between Social Media Data and Ethnography in Digital Migration Studies
This chapter presents a rethinking of the relationship between ethnography and so-called big social data as being comparable to those between a sum and its parts (Strathern 1991/2004). Taking cue
A Framework for GDPR Compliance in Big Data Systems
TLDR
A framework for GDPR compliance is proposed that identifies the main components for the regulation implementation and compares the main GDPR solutions in Big Data domain and proposes a guideline forGDPR verification and implementation in Big data systems.
Ethical Considerations for Participatory Health through Social Media: Healthcare Workforce and Policy Maker Perspectives
TLDR
Different stakeholders’ opinions fairly agreed that there are common ethical issues that should be considered across the four groups (patients, healthcare professionals, health IT professionals, policy makers) such as data privacy, security, and quality assurance.
CHIEF: Clustering With Higher-Order Motifs in Big Networks
TLDR
CHIEF (Clustering with HIgher-ordEr motiFs), a solution which consists of two motif clustering techniques that outperform baseline approaches in large network analysis, and higher-order motifs outperform traditional triangle motifs in clustering.
...
...

References

SHOWING 1-10 OF 39 REFERENCES
The impact of the EU general data protection regulation on scientific research
TLDR
An overview of the new rules to consider where scientific projects include the processing of personal health data, genetic data or biometric data and other kinds of sensitive information whose use is strictly regulated by the GDPR is provided in order to give the main key facts to researchers to adapt their practices and ensure compliance to the EU law to be enforced in May 2018.
What is important for Data Protection in science in the future? General and specific changes in data protection for scientific use resulting from the EU General Data Protection Regulation
way and 70 flexibility clauses need to be specified on the national level (ibid., p.3).
Introduction to special issue: ethical dilemmas in social network research
Scrutinizing the EU General Data Protection Regulation
TLDR
The implications of the GDPR will become a critical tool to structure flexible governance for data protection in an ongoing paradigmatic legal controversy involving the database originally assembled by one of the world's first genomic biobanks, Shardna.
The EU General Data Protection Regulation: How will it impact the regulation of research biobanks? Setting the legal frame in the Mediterranean and Eastern European area
On 25 May 2018, the EU General Data Protection Regulation (GDPR) will come into force. As with the Data Protection Directive (95/46/EC), the regulation of biobanks for scientific research will be
From Interaction to Participation: The Role of the Imagined Audience in Social Media Community Detection and an Application to Political Communication on Twitter
TLDR
It is shown how to construct an additional data layer about user participation not relying on explicit interactions between users, and how this layer can be used to find different types of communities in the context of Twitter political communication.
Wherefore Art Thou R 3579 X ? Anonymized Social Networks , Hidden Patterns , and Structural
TLDR
There are many ways to compromise users’ privacy and determine whether certain users are connected or not in the graph and several effective, practical attacks with different threat models are demonstrated that demonstrate the problems with this simple anonymization technique.
...
...