Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2018
DOI: 10.1145/3158373
|View full text |Cite
|
Sign up to set email alerts
|

Preserving Privacy as Social Responsibility in Online Social Networks

Abstract: Online social networks provide an environment for their users to share content with others, where the user who shares a content item is put in charge, generally ignoring others that might be affected by it. However, a content that is shared by one user can very well violate the privacy of other users. To remedy this, ideally, all users who are related to a content should get a say in how the content should be shared. Recent approaches advocate the use of agreement technologies to enable stakeholders of a post … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
30
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(33 citation statements)
references
References 28 publications
(43 reference statements)
0
30
0
Order By: Relevance
“…Addressing the user-user privacy issue requires collaboration among scientists from different disciplines, including computer scientists, GIScientists, and psychologists. For example, Kekulluoglu et al (2017) studied a hybrid negotiation architecture with a reciprocity mechanism to mimic the social responsibility in reality, and a credit system was used to encourage agents/users to respect other's privacy in social media.…”
Section: Privacy Abusementioning
confidence: 99%
“…Addressing the user-user privacy issue requires collaboration among scientists from different disciplines, including computer scientists, GIScientists, and psychologists. For example, Kekulluoglu et al (2017) studied a hybrid negotiation architecture with a reciprocity mechanism to mimic the social responsibility in reality, and a credit system was used to encourage agents/users to respect other's privacy in social media.…”
Section: Privacy Abusementioning
confidence: 99%
“…However, most OSN providers do not allow tagged users to remove/modify the post giving them limited control over their privacy. There are some early proof-of-concept research to solve these collaborative privacy situations automatically [16,21,22], but they have yet to be adopted by any OSN providers. Some users take drastic measures and deactivate/delete their accounts to protect themselves from this type of tagging [6].…”
Section: Networked Privacymentioning
confidence: 99%
“…Another set of approaches consider how entities can resolve privacy conflicts among themselves. They employ techniques like collaborative access policy administration [9,25], argumentation [32], negotiations [29,54], help of a mediator [52], secret key sharing [28] and so on. We review some of these work in comparison to pelte here.…”
Section: Connection To Other Directions In Privacymentioning
confidence: 99%
“…As part of the auction mechanism, pelte can be used to assign bids to images automatically according to privacy value of the image. Similarly, Such and Rovatsos [54] and Keküllüoğlu et al [29] propose negotiation mechanisms for conflicts in OSNs that support ReBAC. pelte would be able to act on behalf of users to provide input to the negotiation mechanisms in case user preferences are requested.…”
Section: Connection To Other Directions In Privacymentioning
confidence: 99%