SlideShare uma empresa Scribd logo
1 de 12
Privacy Codes of Practice
   for the Social Web:
The Analysis of Existing Privacy Codes and
  Emerging Social-Centric Privacy Risks

       Girma Nigusse & Bart De Decker
Introduction
Privacy Codes
1996 1973 1977 1979 1980 1986 1990 1991 1993 1995 1996 1997 1999 2002 2003 2005




                                                                         DPD
          FIPP




                                OECD




                                                                               MCCPI
Web
1996 1973 1977 1979 1980 1986 1990 1991 1993 1995 1996 1997 1999 2002 2003 2005

                                                 WWW
ARPAnet




                 Msg




                                                       Gopher
                       Usenet




                                                                Mosaic

                                                                         IE
                                       Freenet




Social Web
1996 1973 1977 1979 1980 1986 1990 1991 1993 1995 1996 1997 1999 2002 2003 2005




                                                                                       SixDegree




                                                                                                                 Friendster
                                                                                                   LiveJournal




                                                                                                                              MySpace

                                                                                                                                        Facebook
Privacy Risks in
Social Network Sites
profiles mostly represent genuine identities,

profiles regularly updated by users,

default profile visibility is public,

users do not change default settings,

crawling public profiles is easy,
Private Information
    Flow Model
Web = client/server, request/response,
unidirectional




       Private information flow model in the Web
Private Information
       Flow Model
Social Web = interactive,
participatory, content-
regeneration,
multidirectional

Blogging, bookmarking,
tagging, sharing,
befriending etc

                            Private information flow model in the Social Web
1. Transparency

Identity of the SP, purpose, data retention, user
participation, recipients, accountability, and
security.

Befriending = exchanging profile information

Third parties = direct access to user data

Policy authoring = user transparency
2. Consent
Primary and Secondary consent

Third parties = profile information collection is
mostly invisible, no software license agreement,
terms of use or privacy policy

Social software features = boost profile
information sharing, linking, aggregation
without users’ explicit consent

Spillovers = unauthorized disclosure
3. User Participation


 Users’ right to access, challenge its correctness,
 amend, erase, or block their private data.

 Intuitive profile editing tools
4. Data Quality
collected private data should be accurate,
complete, and up-to-date

SNS users update their profile regularly

Profile = digital dossier

Fake characters (Fakesters)

Denigration = pretending to be someone in
order to damage others
5. Security
Avoid unauthorized access, use, alteration,
erasure, or disclosure

Confidentiality (Web) - Visibility (Social Web)
peo-    formation. Users should also take appropriate measures to
es. In    safeguard other users’ private information. In Table 1, ser-
 bility
  most
Gross
                        Discussion
          vice providers, third-party service, and third-party applica-
          tion providers are generally considered as service providers.

 Wills
 rofile    Table 1: The responsibilities (Resp.) and rights of users (U)
 , and    and service providers (SP) in the Web and the Social Web.
 Chen
 , ser-                            Web               Social Web
 man-                        Right      Resp.      Right     Resp.
 y op-     Codes            U SP       U SP       U SP U SP
ures.      Transparency
 com-      Consent
 ermi-     Participation
 osted     Data quality
eover,     Security
t only     Enforcement
ioned
  n the
 s, but     In the Social Web, privacy protection must consider the
Conclusion
Future privacy codes and privacy policy
languages should address:

  Emerging social-centric privacy risks (such
  as spillovers, denigration, visibility etc)

  The current shift in data handling
  responsibility and the model of interaction in
  the Web

Mais conteúdo relacionado

Semelhante a Privacy Codes of Practice for the Social Web: The Analysis of Existing Privacy Codes and Emerging Social-Centric Privacy Risks

OSNs2.pptx
OSNs2.pptxOSNs2.pptx
OSNs2.pptxAndrii53
 
Social Networking: Sharing Information and Privacy Online
Social Networking: Sharing Information and Privacy OnlineSocial Networking: Sharing Information and Privacy Online
Social Networking: Sharing Information and Privacy Onlinejplumer
 
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...Evan Donovan
 
12.10.09 Lumen & CEMA Webinar: Leveraging Social Media to Drive Better Attend...
12.10.09 Lumen & CEMA Webinar: Leveraging Social Media to Drive Better Attend...12.10.09 Lumen & CEMA Webinar: Leveraging Social Media to Drive Better Attend...
12.10.09 Lumen & CEMA Webinar: Leveraging Social Media to Drive Better Attend...Lumen Consulting
 
A full overview of Social Media: a research adventure
A full overview of Social Media: a research adventureA full overview of Social Media: a research adventure
A full overview of Social Media: a research adventureTotal Identity
 
Cable Marketers Deck
Cable Marketers DeckCable Marketers Deck
Cable Marketers DeckTom Martin
 
강장묵 차세대소셜네트워크 Social Network Service
강장묵 차세대소셜네트워크 Social Network Service강장묵 차세대소셜네트워크 Social Network Service
강장묵 차세대소셜네트워크 Social Network ServiceJM code group
 
Managing Social Communities
Managing Social CommunitiesManaging Social Communities
Managing Social CommunitiesSteffen Staab
 
Managing Social Communities
Managing Social CommunitiesManaging Social Communities
Managing Social Communitiesnet2-project
 
Threats and Anti-threats Strategies for Social Networking Websites
Threats and Anti-threats Strategies for Social Networking WebsitesThreats and Anti-threats Strategies for Social Networking Websites
Threats and Anti-threats Strategies for Social Networking WebsitesIJCNCJournal
 
Social Media and Healthcare- HIPAA and Beyond
Social Media and Healthcare- HIPAA and BeyondSocial Media and Healthcare- HIPAA and Beyond
Social Media and Healthcare- HIPAA and BeyondWhitney Hoffman
 
Chief Marketing Officer Congress, Sopot
Chief Marketing Officer Congress, SopotChief Marketing Officer Congress, Sopot
Chief Marketing Officer Congress, SopotRobin Hamman
 
Social Media Strategy for UX and graphic designers
Social Media Strategy for UX and graphic designersSocial Media Strategy for UX and graphic designers
Social Media Strategy for UX and graphic designersMonica Lorenzo
 
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET Journal
 
Using Web 2.0 tools to drive take-up and engagement
Using Web 2.0 tools to drive take-up and engagementUsing Web 2.0 tools to drive take-up and engagement
Using Web 2.0 tools to drive take-up and engagementsimonwakeman
 

Semelhante a Privacy Codes of Practice for the Social Web: The Analysis of Existing Privacy Codes and Emerging Social-Centric Privacy Risks (20)

OSNs.pptx
OSNs.pptxOSNs.pptx
OSNs.pptx
 
OSNs.pptx
OSNs.pptxOSNs.pptx
OSNs.pptx
 
OSNs2.pptx
OSNs2.pptxOSNs2.pptx
OSNs2.pptx
 
Social Networking: Sharing Information and Privacy Online
Social Networking: Sharing Information and Privacy OnlineSocial Networking: Sharing Information and Privacy Online
Social Networking: Sharing Information and Privacy Online
 
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...
 
12.10.09 Lumen & CEMA Webinar: Leveraging Social Media to Drive Better Attend...
12.10.09 Lumen & CEMA Webinar: Leveraging Social Media to Drive Better Attend...12.10.09 Lumen & CEMA Webinar: Leveraging Social Media to Drive Better Attend...
12.10.09 Lumen & CEMA Webinar: Leveraging Social Media to Drive Better Attend...
 
App Activity Streams
App Activity StreamsApp Activity Streams
App Activity Streams
 
A full overview of Social Media: a research adventure
A full overview of Social Media: a research adventureA full overview of Social Media: a research adventure
A full overview of Social Media: a research adventure
 
Social Media A Full Overview
Social Media A Full OverviewSocial Media A Full Overview
Social Media A Full Overview
 
Cable Marketers Deck
Cable Marketers DeckCable Marketers Deck
Cable Marketers Deck
 
강장묵 차세대소셜네트워크 Social Network Service
강장묵 차세대소셜네트워크 Social Network Service강장묵 차세대소셜네트워크 Social Network Service
강장묵 차세대소셜네트워크 Social Network Service
 
Wireless@Kth
Wireless@KthWireless@Kth
Wireless@Kth
 
Managing Social Communities
Managing Social CommunitiesManaging Social Communities
Managing Social Communities
 
Managing Social Communities
Managing Social CommunitiesManaging Social Communities
Managing Social Communities
 
Threats and Anti-threats Strategies for Social Networking Websites
Threats and Anti-threats Strategies for Social Networking WebsitesThreats and Anti-threats Strategies for Social Networking Websites
Threats and Anti-threats Strategies for Social Networking Websites
 
Social Media and Healthcare- HIPAA and Beyond
Social Media and Healthcare- HIPAA and BeyondSocial Media and Healthcare- HIPAA and Beyond
Social Media and Healthcare- HIPAA and Beyond
 
Chief Marketing Officer Congress, Sopot
Chief Marketing Officer Congress, SopotChief Marketing Officer Congress, Sopot
Chief Marketing Officer Congress, Sopot
 
Social Media Strategy for UX and graphic designers
Social Media Strategy for UX and graphic designersSocial Media Strategy for UX and graphic designers
Social Media Strategy for UX and graphic designers
 
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
 
Using Web 2.0 tools to drive take-up and engagement
Using Web 2.0 tools to drive take-up and engagementUsing Web 2.0 tools to drive take-up and engagement
Using Web 2.0 tools to drive take-up and engagement
 

Privacy Codes of Practice for the Social Web: The Analysis of Existing Privacy Codes and Emerging Social-Centric Privacy Risks

  • 1. Privacy Codes of Practice for the Social Web: The Analysis of Existing Privacy Codes and Emerging Social-Centric Privacy Risks Girma Nigusse & Bart De Decker
  • 2. Introduction Privacy Codes 1996 1973 1977 1979 1980 1986 1990 1991 1993 1995 1996 1997 1999 2002 2003 2005 DPD FIPP OECD MCCPI Web 1996 1973 1977 1979 1980 1986 1990 1991 1993 1995 1996 1997 1999 2002 2003 2005 WWW ARPAnet Msg Gopher Usenet Mosaic IE Freenet Social Web 1996 1973 1977 1979 1980 1986 1990 1991 1993 1995 1996 1997 1999 2002 2003 2005 SixDegree Friendster LiveJournal MySpace Facebook
  • 3. Privacy Risks in Social Network Sites profiles mostly represent genuine identities, profiles regularly updated by users, default profile visibility is public, users do not change default settings, crawling public profiles is easy,
  • 4. Private Information Flow Model Web = client/server, request/response, unidirectional Private information flow model in the Web
  • 5. Private Information Flow Model Social Web = interactive, participatory, content- regeneration, multidirectional Blogging, bookmarking, tagging, sharing, befriending etc Private information flow model in the Social Web
  • 6. 1. Transparency Identity of the SP, purpose, data retention, user participation, recipients, accountability, and security. Befriending = exchanging profile information Third parties = direct access to user data Policy authoring = user transparency
  • 7. 2. Consent Primary and Secondary consent Third parties = profile information collection is mostly invisible, no software license agreement, terms of use or privacy policy Social software features = boost profile information sharing, linking, aggregation without users’ explicit consent Spillovers = unauthorized disclosure
  • 8. 3. User Participation Users’ right to access, challenge its correctness, amend, erase, or block their private data. Intuitive profile editing tools
  • 9. 4. Data Quality collected private data should be accurate, complete, and up-to-date SNS users update their profile regularly Profile = digital dossier Fake characters (Fakesters) Denigration = pretending to be someone in order to damage others
  • 10. 5. Security Avoid unauthorized access, use, alteration, erasure, or disclosure Confidentiality (Web) - Visibility (Social Web)
  • 11. peo- formation. Users should also take appropriate measures to es. In safeguard other users’ private information. In Table 1, ser- bility most Gross Discussion vice providers, third-party service, and third-party applica- tion providers are generally considered as service providers. Wills rofile Table 1: The responsibilities (Resp.) and rights of users (U) , and and service providers (SP) in the Web and the Social Web. Chen , ser- Web Social Web man- Right Resp. Right Resp. y op- Codes U SP U SP U SP U SP ures. Transparency com- Consent ermi- Participation osted Data quality eover, Security t only Enforcement ioned n the s, but In the Social Web, privacy protection must consider the
  • 12. Conclusion Future privacy codes and privacy policy languages should address: Emerging social-centric privacy risks (such as spillovers, denigration, visibility etc) The current shift in data handling responsibility and the model of interaction in the Web

Notas do Editor