2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications 2014
DOI: 10.1109/trustcom.2014.10
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Sharing for Online Social Networks: A Trade-off Between Privacy Risk and Social Benefit

Abstract: Abstract-Online social networks such as Facebook allow users to control which friend sees what information, but it can be a laborious process for users to specify every receiver for each piece of information they share. Therefore, users usually group their friends into social circles, and select the most appropriate social circle to share particular information with. However, social circles are not formed for setting privacy policies, and even the most appropriate social circle still cannot adapt to the change… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0
1

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3
2

Relationship

5
4

Authors

Journals

citations
Cited by 31 publications
(33 citation statements)
references
References 14 publications
(15 reference statements)
0
32
0
1
Order By: Relevance
“…To protect privacy, a worker can control when to report availability to the platform or choose to send heartbeat messages without location information (which means only participating in location-independent tasks). Moreover, privacy policies, regulatory strategies, and computational algorithms (e.g., anonymity and obfuscation) [Krumm 2009;Yang et al 2014;Barhamgi et al 2016] could be used for protecting privacy data, which will be employed in the future work.…”
Section: Fig 3 Overview Of Crowd Service Frameworkmentioning
confidence: 99%
“…To protect privacy, a worker can control when to report availability to the platform or choose to send heartbeat messages without location information (which means only participating in location-independent tasks). Moreover, privacy policies, regulatory strategies, and computational algorithms (e.g., anonymity and obfuscation) [Krumm 2009;Yang et al 2014;Barhamgi et al 2016] could be used for protecting privacy data, which will be employed in the future work.…”
Section: Fig 3 Overview Of Crowd Service Frameworkmentioning
confidence: 99%
“…Due to data sensitivity, we cannot release the entire datasets as is without permission. After careful anonymisation through adaptive sharing 16 and cloud-based privacy protection, 17 we will be able to provide the fully captured tracks of aircraft of the period of the past three weeks to peer researchers.…”
Section: E Threats To Validitymentioning
confidence: 99%
“…A considerable body of research has been devoted to address the information sharing problem raised by the increasing number of privacy incidents and regrets happening in OSNs [8], [26]- [34]. However, these approaches do not consider the situation when users may have made poor sharing decisions in the past.…”
Section: Related Work Conclusion and Future Workmentioning
confidence: 99%
“…However, these benefits come with an increased risk of privacy violation from oversharing or underusing privacy controls [4]- [8]. Many OSN platforms currently support privacy management through features such as static (user-defined) friendship groups as reusable shortcuts for sharing a single post with multiple contacts.…”
Section: Introductionmentioning
confidence: 99%