Identifying hidden social circles for advanced privacy configuration

@article{Squicciarini2014IdentifyingHS,
  title={Identifying hidden social circles for advanced privacy configuration},
  author={Anna Cinzia Squicciarini and Sushama Karumanchi and Dan Lin and Nicole DeSisto},
  journal={Comput. Secur.},
  year={2014},
  volume={41},
  pages={40-51}
}
With the dramatic increase of users on social network websites, the needs to assist users to manage their large number of contacts as well as providing privacy protection become more and more evident. Unfortunately, limited tools are available to address such needs and reduce users' workload on managing their social relationships. To tackle this issue, we propose an approach to facilitate online social network users to group their contacts into social circles with common interests. Further, we… Expand

Figures, Tables, and Topics from this paper

A Privacy Protection Model for Online Social Networks
  • J. Ahmed
  • Computer Science
  • SW4LAW+DC@JURIX
  • 2014
TLDR
This model uses type, frequency, and initiation factor of social interactions to calculate relationship strength and mimics real life interaction patterns and makes online social networks more privacy friendly. Expand
Detecting privacy preferences from online social footprints: a literature review
Providing personalized content can be of great value to both users and vendors. However, effective personalization hinges on collecting large amounts of personal data about users. With theExpand
My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks
TLDR
It is shown that the social circle model is efficient yet practical, which provides certain level of privacy protection capabilities to users, while still facilitates socialization, and utilize this model to analyze the most popular social network platforms on the Internet, and demonstrate the potential privacy vulnerabilities in some social networks. Expand
Privacy Issues in Social Networking Websites: Is Facebook Revealing Our Social Life?
With the proliferation and expansion of social networking websites like facebook, google+, myspace, etc., the most important question that arises in the mind of security analysts is that: ?Are theseExpand
Privacy Behaviour and Profile Configuration in Twitter
The dichotomy between users' privacy behaviours and their privacy attitudes is a widely observed phenomenon in online social media. Such a disparity can be mainly attributed to the users' lack ofExpand
Relationship Strength Based Privacy for the Online Social Networks
TLDR
A model is proposed for the privacy in online social networks that restricts the disclosure of personal information to the individuals and reduces the percentage of information disclosure to the less known individuals. Expand
Protecting attributes and contents in online social networks
TLDR
It is shown that large portions of users with online presence are very identifiable, even with a small piece of seed information, and the seed information could be inaccurate, so it is more important to protect attributes and textual content in social networks. Expand
Understanding Privacy Dichotomy in Twitter
TLDR
A series of experiments found a set of clues that users' privacy preferences are similar to the privacy behaviour of their social contacts, signaling that privacy homophily exists in social networks. Expand
Denial of Choice: Group Level Disclosure of Private Information
TLDR
Some preliminary findings from a current study are presented, based on an online survey, that reveal a likelihood of activities associated with other-generated disclosure on OSNs. Expand
Social computing privacy and online relationships
Social computing has revolutionized interpersonal communication. It has introduced the aspect of social relationships which people can utilize to communicate with the vast spectrum of their contacts.Expand
...
1
2
3
4
...

References

SHOWING 1-10 OF 28 REFERENCES
Automatic social group organization and privacy management
TLDR
This work proposes an approach to facilitate online social network users to group their contacts into social circles with common interests and uses the social group practice to automate the privacy setting process for users who add new contacts or upload new data items. Expand
Social Circles: Tackling Privacy in Social Networks
TLDR
This paper proposes to build—and evaluate the usability of—an automated grouping technique that analyzes the user’s social graph for social circles, i.e., clusters of densely and closely connected friends. Expand
Privacy suites: shared privacy for social networks
TLDR
A new paradigm is proposed which allows users to easily choose "suites" of privacy settings which have been specified by friends or trusted experts, only modifying them if they wish, which could dramatically increase the privacy protection that most users experience with minimal time investment. Expand
To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles
TLDR
This work shows how an adversary can exploit an online social network with a mixture of public and private user profiles to predict the private attributes of users, and proposes practical models that use friendship and group membership information to infer sensitive attributes. Expand
A Framework for Computing the Privacy Scores of Users in Online Social Networks
TLDR
This paper proposes a framework to compute a privacy score of a user, which indicates the potential privacy risk caused by his participation in the network, and develops mathematical models to estimate both sensitivity and visibility of the information. Expand
Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook
TLDR
It is found that an individual's privacy concerns are only a weak predictor of his membership to the Facebook, and also privacy concerned individuals join the network and reveal great amounts of personal information. Expand
Persona: an online social network with user-defined privacy
TLDR
This work presents Persona, an OSN where users dictate who may access their information, and describes an implementation of Persona that replicates Facebook applications and shows how Persona provides the functionality of existing online social networks with additional privacy benefits. Expand
Feasibility of structural network clustering for group-based privacy control in social networks
TLDR
It is demonstrated that the particular clustering algorithm, SCAN, which detects hubs and outliers within a network can be beneficial for identifying contacts who are hard to group or for whom privacy preferences are inconsistent with the rest of their group. Expand
Prying Data out of a Social Network
TLDR
This work examines the difficulty of collecting profile and graph information from the popular social networking website Facebook and describes several novel ways in which data can be extracted by third parties, and demonstrates the efficiency of these methods on crawled data. Expand
An Informed Model of Personal Information Release in Social Networking Sites
  • A. Squicciarini, C. Griffin
  • Computer Science, Physics
  • 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing
  • 2012
TLDR
A deception model for online users is developed that uses a game theoretic approach to characterizing a user's willingness to release, withhold or lie about information depending on the behavior of individuals within the user's circle of friends. Expand
...
1
2
3
...