Automatic social group organization and privacy management

@article{Squicciarini2012AutomaticSG,
  title={Automatic social group organization and privacy management},
  author={Anna Cinzia Squicciarini and Dan Lin and Sushama Karumanchi and Nicole DeSisto},
  journal={8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)},
  year={2012},
  pages={89-96}
}
  • A. Squicciarini, D. Lin, +1 author Nicole DeSisto
  • Published 2012
  • Computer Science
  • 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)
With the dramatic increase of users on social network websites, the needs to assist users to manage their large number of contacts as well as providing privacy protection become more and more evident. Unfortunately, limited tools are available to address such needs and reduce users' workload on managing their social relationships. To tackle this issue, we propose an approach to facilitate online social network users to group their contacts into social circles with common interests. Further, we… Expand
Identifying hidden social circles for advanced privacy configuration
TLDR
This work proposes an approach to facilitate online social network users to group their contacts into social circles with common interests and leverages the social group practice to automate the privacy setting process for users who add new contacts or upload new data items. Expand
A Privacy Protection Model for Online Social Networks
  • J. Ahmed
  • Computer Science
  • SW4LAW+DC@JURIX
  • 2014
TLDR
This model uses type, frequency, and initiation factor of social interactions to calculate relationship strength and mimics real life interaction patterns and makes online social networks more privacy friendly. Expand
Detecting privacy preferences from online social footprints: a literature review
Providing personalized content can be of great value to both users and vendors. However, effective personalization hinges on collecting large amounts of personal data about users. With theExpand
My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks
TLDR
It is shown that the social circle model is efficient yet practical, which provides certain level of privacy protection capabilities to users, while still facilitates socialization, and utilize this model to analyze the most popular social network platforms on the Internet, and demonstrate the potential privacy vulnerabilities in some social networks. Expand
Relationship Strength Based Privacy for the Online Social Networks
TLDR
A model is proposed for the privacy in online social networks that restricts the disclosure of personal information to the individuals and reduces the percentage of information disclosure to the less known individuals. Expand
Protecting attributes and contents in online social networks
TLDR
It is shown that large portions of users with online presence are very identifiable, even with a small piece of seed information, and the seed information could be inaccurate, so it is more important to protect attributes and textual content in social networks. Expand
Challenges in protecting personnel information in social network space
  • Meghna Chaudhary, H. Kumar
  • Political Science
  • 2015 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC)
  • 2015
Social networking sites have become the lifeline for communication among individuals. Social network is a graph between the actors. Actors are represented as nodes. The links between the nodesExpand
Automatic Social Circle Detection Using Multi-View Clustering
TLDR
Results show that multi-View clustering is more accurate for social circle detection; and the proposed approach gains significantly higher similarity ratio than the original multi-view clustering approach. Expand
Understanding Privacy Dichotomy in Twitter
TLDR
A series of experiments found a set of clues that users' privacy preferences are similar to the privacy behaviour of their social contacts, signaling that privacy homophily exists in social networks. Expand
FriendGuard: A Friend Search Engine with Guaranteed Friend Exposure Degree
TLDR
This paper proposes a new friend search engine, namely FriendGuard, which guarantees the degree of friend exposure as set by users, and construction of a unique sub social network that is capable of satisfying query needs as well as controlling the degreeof friend exposure. Expand
...
1
2
3
...

References

SHOWING 1-10 OF 28 REFERENCES
Social Circles: Tackling Privacy in Social Networks
TLDR
This paper proposes to build—and evaluate the usability of—an automated grouping technique that analyzes the user’s social graph for social circles, i.e., clusters of densely and closely connected friends. Expand
To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles
TLDR
This work shows how an adversary can exploit an online social network with a mixture of public and private user profiles to predict the private attributes of users, and proposes practical models that use friendship and group membership information to infer sensitive attributes. Expand
Privacy suites: shared privacy for social networks
TLDR
A new paradigm is proposed which allows users to easily choose "suites" of privacy settings which have been specified by friends or trusted experts, only modifying them if they wish, which could dramatically increase the privacy protection that most users experience with minimal time investment. Expand
A Framework for Computing the Privacy Scores of Users in Online Social Networks
  • Kun Liu, E. Terzi
  • Computer Science
  • 2009 Ninth IEEE International Conference on Data Mining
  • 2009
TLDR
This paper proposes a framework to compute a privacy score of a user, which indicates the potential privacy risk caused by his participation in the network, and develops mathematical models to estimate both sensitivity and visibility of the information. Expand
Feasibility of structural network clustering for group-based privacy control in social networks
TLDR
It is demonstrated that the particular clustering algorithm, SCAN, which detects hubs and outliers within a network can be beneficial for identifying contacts who are hard to group or for whom privacy preferences are inconsistent with the rest of their group. Expand
Multiparty Authorization Framework for Data Sharing in Online Social Networks
TLDR
An access control model is formulated to capture the essence of multiparty authorization requirements and is demonstrated the applicability of the approach by implementing a proof-of-concept prototype hosted in Facebook. Expand
Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook
TLDR
It is found that an individual's privacy concerns are only a weak predictor of his membership to the Facebook, and also privacy concerned individuals join the network and reveal great amounts of personal information. Expand
Prying Data out of a Social Network
TLDR
This work examines the difficulty of collecting profile and graph information from the popular social networking website Facebook and describes several novel ways in which data can be extracted by third parties, and demonstrates the efficiency of these methods on crawled data. Expand
Privacy wizards for social networking sites
TLDR
A template for the design of a social networking privacy wizard based on an active learning paradigm called uncertainty sampling, which is able to recommend high-accuracy privacy settings using less user input than existing policy-specification tools. Expand
Privacy-asa-Service : Models , Algorithms , and Results on the Facebook Platform
The current set of social networking platforms, e.g. Facebook and MySpace, has created a new class of Internet applications called social software. These systems focus on leveraging the real lifeExpand
...
1
2
3
...