SlideShare uma empresa Scribd logo
1 de 33
Baixar para ler offline
PRIVACY DYNAMICS:
LEARNING PRIVACY NORMS
FOR SOCIAL SOFTWARE
Handan Gül Çalıklı, Mark Law, Arosha K. Bandara,
Alessandra Russo, Luke Dickens, Blaine A. Price, Avelie Stuart,
Mark Levine and Bashar Nuseibeh
Social Media Platforms
•  As of November 2015
Facebook ranked at the top
with 1.55 billion active users.
•  Significant increase in the
number of users of LinkedIn,
Twitter and Instagram since
September 2014.
Increase in the
number of users
Increase in user
engagement
Privacy Violations: Sharing with the wrong audience
Problem for Software Engineers?
•  Many app developers are using sharing
functionalities of social media platforms.
•  Some numbers to give an idea about the
size of Facebook’s network of developers [4]
•  More than 30 million apps and websites
use Facebook’s developer tools.
•  Facebook’s users shared 50 billion pieces
of content from apps last year.
[4] Facebook’s annual F8 developer conference, 25th March 2015, San Francisco
Problem: Apps developed by using sharing
functionalities of social media platforms may
violate privacy of many users.
Privacy Dynamics (PD) Architecture
•  Modeled by using Social
Identity Theory (SIT).
•  Core of the architecture
implemented by using
Inductive Logic
Programming (ILP).
Problem
Actual Audience
David: Alice’s
Boss
Charlie: Alice’s
Colleague
Bob: Alice’s
Friend
John
Shared Item
Alice
Imagined Audience
FriendS
[1] E. Litt. Knock knock. Who’s there? The imagined
audience. Journal of Broadcasting and Electronic
Media, 56(3):330-345, 2012.
[1]
Why?
Context collapse[2]:
co-presence of
multiple groups on
OSNs[3]
[2] D. B. Alice E. Marwick. I tweet honestly, I tweet passionately: Twitter users, context collapse and the imagined audience. New
Media and the imagined audience.
[3] A. Lampinen, S. Tamminen, A. Oulsvirta. All my people right here, right now: Management of group co-presence on a social
networking site. In the Proceedings of ACM 2009 International Conference on Supporting Group Work , GROUP’09, pages 281-290,
New York NY, USA, 2009.
Proposed Solution
Privacy Dynamics (PD) Architecture
•  Modeled by using social
identity theory.
•  Core of the architecture
implemented by using
inductive logic
programming.
How it works:
•  monitors user’s sharing behavior,
•  learns user’s privacy norms,
•  when user makes a share request,
makes recommendations to the
user based on these norms.
Social Identity (SI) Theory
•  In social psychology literature,
social identity theory is theoretical
analysis of group processes and
intergroup relations.
•  Social identity theory
refers to our sense of
ourselves as
members of a group
and the meaning that
group has for us.
Social Identity (SI) Theory
•  According to Social Identity
Theory:
•  people belong to multiple
groups
•  social identities are
created through group
memberships.
Back to our Example: John’s
Facebook Newsfeed
John
Bob
Alice
David
Charlie
[2] D. B. Alice E. Marwick. I tweet honestly, I tweet passionately: Twitter users, context collapse and the imagined audience. New Media and the
imagined audience.
[3] A. Lampinen, S. Tamminen, A. Oulsvirta. All my people right here, right now: Management of group co-presence on a social networking site.
In the Proceedings of ACM 2009 International Conference on Supporting Group Work , GROUP’09, pages 281-290, New York NY, USA, 2009.
Bob
Alice
Charlie
David
…….
ColleaguesClose
Friends
Charlie
Bob David
Alice
…….
…….Alice’s
Colleague &
Close Friend
Alice’s
Boss
Context collapse[2]
John’s
mental
groups on
Facebook
[3]
Alice’s
Close
Friend
Bob
Alice
Charlie
David
…….
ColleaguesClose
Friends
Charlie
Bob David
Alice
…….
…….
Example: John’s Facebook Friends
How can John’s Facebook
friends be structured so
that the result converges
to John’s mental groups
on Facebook?
As a start John
can create
some of these
groups using
Facebook’s
functionalities
John’s
mental
groups on
Facebook
Social Identity Map and Conflicts
•  Based on Social Identity Theory, we define two
concepts:
•  Social Identity Map (SI Map)
•  Conflicts
ColleaguesClose
Friends
Charlie
Bob David
Alice
…….
…….
John’s SI map
PrivacyViolation!
For the shared item,
“Colleagues” social identity
group conflicts with “Close
Friends” social identity
group given the value of the
location attributes of
information object to be
shared is “night club”.
Information object o1
<alice, night_club,night_time,
weekday>
Privacy Dynamics (PD) Architecture
Core of the
architecture
Learning Privacy Norms
Inductive Logic
Programming
Share∪SI ∪Obj
Background
Knowledge
Conflict(s)
Conf
Share: Rules of sharing
SI: Social Identity (SI) map
Obj: Values of Object
Attributes
Share History
E+
∪E−
E+: Positive sharing examples
E-: Negative sharing examples
Learning Privacy Norms: An Example
•  Rules of Sharing ( )
•  Rule1: Sharing an object O with person P, who is
in social identity S1 could cause a conflict if the
subject of the object O is in another social identity
S2 which conflicts with S1 for object O.
•  Rule2: All objects O are shared with all people P,
unless there is a conflict.
Share
S1:Colleagues
S2:
Close
Friends
Charlie
Bob
David
Alice
…….
…….
O:party
photo
Alice
CONFLICT!
conflict(O, P):-
subject(O, P2),
in_si(P,S1),in_si(P2,S2),
conflict_si(O,S1,S2).
share(O, P):-
person(P),
object(O),
not conflict(O,P).Back to our Example:
Alice’s boss
Learning Privacy Norms: An Example
•  Back to our Example:
s1:Colleagues
s2: Close
Friends
Charlie
Bob
David
Alice
…….
…….
John’s SI map
Share∪SI ∪ObjBackground
knowledge
Obj :
in_si(charlie,s1).
in_si(david,s1).
in_si(alice,s2).
in_si(bob,s2).
in_si(charlie,s2).
SI :
subject(o1,alice).
location(o1, night_club).
time(o1’ night_time).
day(o1’ week_day).
Party photo o1
subject(o2,alice).
location(o2, office).
time(o2’day_time).
day(o2’ week_day).
Office photo o2
Learning Privacy Norms: An Example
s1:Colleaguess2: Close Friends
Charlie
Bob
David
Alice
…….
…….
Party photo o1 Office photo o2
E+ =
share(o1,alice)
share(o1,bob)
E- =
share(o1,charlie)
share(o1,david)
share(o2,alice)
share(o2,bob)
share(o2,charlie)
share(o2,david)
Learning Privacy Norms: An Example
s1:Colleagues
s2: Close
Friends
Charlie
Bob
David
Alice
…….
…….
O:party
photo
CONFLICT!
conflict_si(O,s1,s2):- location(O, night_club)
Evaluation
Experimental Setup
Answer Set
Programming
Conflictsactual
Inductive
Logic
Programming
Background
knowledge
Examples of
sharingactual
Randomly select i
examples,
i = 0, 1, …,20
Share history
Answer Set
Programming
Conflictspredicted
Actual
Sharing
Behavior
Learned
Sharing
Behavior
Share∪SI ∪Obj
Share: Rules of sharing
SI: Social Identity (SI) map
Obj: Values of Object
Attributes
Compare!
generate SI map & Conflicts
for each p% complete SI map and Conflicts (p = 100, 95, 90, 50)
p%
complete
SI map
generate SI map & Conflicts
for each p% complete SI map and Conflicts (p = 100, 95, 90, 50)
p%
complete
SI map
repeat 100 times
generate SI map & Conflicts
for each p% complete SI map and Conflicts (p = 100, 95, 90, 50)
p%
complete
SI map
repeat 100 times
repeat for n conflicts, n = 10, 20, 40
Synthetic Data Generation
•  Number of people in a social network: 150 (Dunbar’s
number)[4]
•  Range for total number of social identity (SI) groups:[2,10][5]
•  Range for SI group size: [1, 43][5]
•  Pattern of the social network2:
•  25% of SI groups are contained in another SI groups
•  50% of SI groups overlap with another SI group
•  25% of SI groups have no members in common with other SI groups
[4] R. I. M. Dunbar. Neocortes size as a constraint on group size in primates. Journal of Human Evolution, 22(6):469-493, June 1993.
[5] J. Mcauley and J. Lescovic. Discovering social circles in ego networks. ACM Transactions on Knowledge Discoveryand Data,*(1):
4:1-4:28Feb. 2014.
Estimating the Performance
Learned Sharing Behavior
share not share
Actual Sharing
Behavior
share TP FN
not share FP TN
Results (Specificity)
Results (Specificity)
Discussion
•  Current approach depends on providing accurate SI map
•  Timeout was set 5 minutes.
Increasing the timeout may give better results.
•  Assumption: No noise in user’s sharing behavior.
Conclusions & Future Work
•  Privacy Dynamics Architecture, drawing on Social Identity
Theory for two key concepts:
•  Group membership info (SI maps)
•  Privacy norms (conflicts)
•  We used ILP to implement the PI engine to learn privacy
norms à provides human readable privacy rules.
•  Found good results even for 50% incomplete SI maps.
•  Experiment using real data rather than synthetic data
•  Introduce noise in user’s sharing behavior.
Thank you!
Any Questions?
Privacy Dynamics: Learning from the Wisdom of Groups
www.privacydynamics.net

Mais conteúdo relacionado

Mais procurados

Social Networks and Computer Science
Social Networks and Computer ScienceSocial Networks and Computer Science
Social Networks and Computer Sciencedragonmeteor
 
Social Network Analysis in Two Parts
Social Network Analysis in Two PartsSocial Network Analysis in Two Parts
Social Network Analysis in Two PartsPatti Anklam
 
Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...
Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...
Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...Denis Parra Santander
 
Mining the Social Web - Lecture 1 - T61.6020 lecture-01-slides
Mining the Social Web - Lecture 1 - T61.6020 lecture-01-slidesMining the Social Web - Lecture 1 - T61.6020 lecture-01-slides
Mining the Social Web - Lecture 1 - T61.6020 lecture-01-slidesMichael Mathioudakis
 
Social Network Analysis - Lecture 4 in Introduction to Computational Social S...
Social Network Analysis - Lecture 4 in Introduction to Computational Social S...Social Network Analysis - Lecture 4 in Introduction to Computational Social S...
Social Network Analysis - Lecture 4 in Introduction to Computational Social S...Lauri Eloranta
 
Introduction to Computational Social Science - Lecture 1
Introduction to Computational Social Science - Lecture 1Introduction to Computational Social Science - Lecture 1
Introduction to Computational Social Science - Lecture 1Lauri Eloranta
 
Mining the Social Web - Lecture 2 - T61.6020
Mining the Social Web - Lecture 2 - T61.6020Mining the Social Web - Lecture 2 - T61.6020
Mining the Social Web - Lecture 2 - T61.6020Michael Mathioudakis
 
Introduction to Computational Social Science
Introduction to Computational Social ScienceIntroduction to Computational Social Science
Introduction to Computational Social ScienceTalha OZ
 
Living and breathing the web
Living and breathing the webLiving and breathing the web
Living and breathing the webJenna Condie
 
Supporting Rationale Awareness in Large-Scale Online Open Participative Activ...
Supporting Rationale Awareness in Large-Scale Online Open Participative Activ...Supporting Rationale Awareness in Large-Scale Online Open Participative Activ...
Supporting Rationale Awareness in Large-Scale Online Open Participative Activ...Lu Xiao
 
Exploring Social Media with NodeXL
Exploring Social Media with NodeXL Exploring Social Media with NodeXL
Exploring Social Media with NodeXL Shalin Hai-Jew
 

Mais procurados (12)

Social Networks and Computer Science
Social Networks and Computer ScienceSocial Networks and Computer Science
Social Networks and Computer Science
 
Social Network Analysis in Two Parts
Social Network Analysis in Two PartsSocial Network Analysis in Two Parts
Social Network Analysis in Two Parts
 
Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...
Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...
Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...
 
Mining the Social Web - Lecture 1 - T61.6020 lecture-01-slides
Mining the Social Web - Lecture 1 - T61.6020 lecture-01-slidesMining the Social Web - Lecture 1 - T61.6020 lecture-01-slides
Mining the Social Web - Lecture 1 - T61.6020 lecture-01-slides
 
Social Network Analysis - Lecture 4 in Introduction to Computational Social S...
Social Network Analysis - Lecture 4 in Introduction to Computational Social S...Social Network Analysis - Lecture 4 in Introduction to Computational Social S...
Social Network Analysis - Lecture 4 in Introduction to Computational Social S...
 
Introduction to Computational Social Science - Lecture 1
Introduction to Computational Social Science - Lecture 1Introduction to Computational Social Science - Lecture 1
Introduction to Computational Social Science - Lecture 1
 
Mining the Social Web - Lecture 2 - T61.6020
Mining the Social Web - Lecture 2 - T61.6020Mining the Social Web - Lecture 2 - T61.6020
Mining the Social Web - Lecture 2 - T61.6020
 
Introduction to Computational Social Science
Introduction to Computational Social ScienceIntroduction to Computational Social Science
Introduction to Computational Social Science
 
Bowdoin: Data Driven Socities 2014 - Intro 01/20/14
Bowdoin: Data Driven Socities 2014 - Intro 01/20/14Bowdoin: Data Driven Socities 2014 - Intro 01/20/14
Bowdoin: Data Driven Socities 2014 - Intro 01/20/14
 
Living and breathing the web
Living and breathing the webLiving and breathing the web
Living and breathing the web
 
Supporting Rationale Awareness in Large-Scale Online Open Participative Activ...
Supporting Rationale Awareness in Large-Scale Online Open Participative Activ...Supporting Rationale Awareness in Large-Scale Online Open Participative Activ...
Supporting Rationale Awareness in Large-Scale Online Open Participative Activ...
 
Exploring Social Media with NodeXL
Exploring Social Media with NodeXL Exploring Social Media with NodeXL
Exploring Social Media with NodeXL
 

Destaque

IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016  7-9 Septermber, 2016, Stuttgart, GermanyIOT-2016  7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016 7-9 Septermber, 2016, Stuttgart, GermanyCharith Perera
 
COMMUNICATION AND CONFLICT RESOLUTION ON SOCIAL MEDIA - A PRACTICAL ORIENTED ...
COMMUNICATION AND CONFLICT RESOLUTION ON SOCIAL MEDIA - A PRACTICAL ORIENTED ...COMMUNICATION AND CONFLICT RESOLUTION ON SOCIAL MEDIA - A PRACTICAL ORIENTED ...
COMMUNICATION AND CONFLICT RESOLUTION ON SOCIAL MEDIA - A PRACTICAL ORIENTED ...Komfo
 
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIARESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIANexgen Technology
 
The Lean Tech Stack
The Lean Tech StackThe Lean Tech Stack
The Lean Tech StackBill Scott
 
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Kiran K.V.S.
 

Destaque (7)

IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016  7-9 Septermber, 2016, Stuttgart, GermanyIOT-2016  7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
 
COMMUNICATION AND CONFLICT RESOLUTION ON SOCIAL MEDIA - A PRACTICAL ORIENTED ...
COMMUNICATION AND CONFLICT RESOLUTION ON SOCIAL MEDIA - A PRACTICAL ORIENTED ...COMMUNICATION AND CONFLICT RESOLUTION ON SOCIAL MEDIA - A PRACTICAL ORIENTED ...
COMMUNICATION AND CONFLICT RESOLUTION ON SOCIAL MEDIA - A PRACTICAL ORIENTED ...
 
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIARESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
 
Media and Conflict Resolution
Media and Conflict ResolutionMedia and Conflict Resolution
Media and Conflict Resolution
 
The Lean Tech Stack
The Lean Tech StackThe Lean Tech Stack
The Lean Tech Stack
 
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
 
Make profit with UI-Redressing attacks.
Make profit with UI-Redressing attacks.Make profit with UI-Redressing attacks.
Make profit with UI-Redressing attacks.
 

Semelhante a Privacy Dynamics: Learning Privacy Norms for Social Software

Making More Sense Out of Social Data
Making More Sense Out of Social DataMaking More Sense Out of Social Data
Making More Sense Out of Social DataThe Open University
 
Picturing the Social: Talk for Transforming Digital Methods Winter School
Picturing the Social: Talk for Transforming Digital Methods Winter SchoolPicturing the Social: Talk for Transforming Digital Methods Winter School
Picturing the Social: Talk for Transforming Digital Methods Winter SchoolFarida Vis
 
Literature review: Dawley on SNKC
Literature review: Dawley on SNKCLiterature review: Dawley on SNKC
Literature review: Dawley on SNKCmch2014
 
My Dissertation Defense
My Dissertation Defense My Dissertation Defense
My Dissertation Defense Laura Pasquini
 
Advanced Social Media Techniques in Higher Education
Advanced Social Media Techniques in Higher EducationAdvanced Social Media Techniques in Higher Education
Advanced Social Media Techniques in Higher EducationChristopher Rice
 
Social Web lecture for Matching dag IMM 2016
Social Web lecture for Matching dag IMM 2016Social Web lecture for Matching dag IMM 2016
Social Web lecture for Matching dag IMM 2016Victor de Boer
 
#Edu14 Seminar on the State of Social Media in Higher Ed
#Edu14 Seminar on the State of Social Media in Higher Ed#Edu14 Seminar on the State of Social Media in Higher Ed
#Edu14 Seminar on the State of Social Media in Higher EdLaura Pasquini
 
Using Behaviour Analysis to Detect Cultural Aspects in Social Web Systems
Using Behaviour Analysis to Detect Cultural Aspects in Social Web SystemsUsing Behaviour Analysis to Detect Cultural Aspects in Social Web Systems
Using Behaviour Analysis to Detect Cultural Aspects in Social Web SystemsMatthew Rowe
 
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...Marc Smith
 
A Summary of Computational Social Science - Lecture 8 in Introduction to Comp...
A Summary of Computational Social Science - Lecture 8 in Introduction to Comp...A Summary of Computational Social Science - Lecture 8 in Introduction to Comp...
A Summary of Computational Social Science - Lecture 8 in Introduction to Comp...Lauri Eloranta
 
Citizen Sensor Data Mining, Social Media Analytics and Applications
Citizen Sensor Data Mining, Social Media Analytics and ApplicationsCitizen Sensor Data Mining, Social Media Analytics and Applications
Citizen Sensor Data Mining, Social Media Analytics and ApplicationsAmit Sheth
 
Social Media, Marketing & Public Libraries
Social Media, Marketing & Public LibrariesSocial Media, Marketing & Public Libraries
Social Media, Marketing & Public LibrariesDarren Sharp
 
SRS presentation
SRS presentationSRS presentation
SRS presentationslavaxx
 
TruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social NetworkTruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social NetworkLora Aroyo
 

Semelhante a Privacy Dynamics: Learning Privacy Norms for Social Software (20)

Making More Sense Out of Social Data
Making More Sense Out of Social DataMaking More Sense Out of Social Data
Making More Sense Out of Social Data
 
Picturing the Social: Talk for Transforming Digital Methods Winter School
Picturing the Social: Talk for Transforming Digital Methods Winter SchoolPicturing the Social: Talk for Transforming Digital Methods Winter School
Picturing the Social: Talk for Transforming Digital Methods Winter School
 
Methods and Tools for Facilitating Social Participation
Methods and Tools for Facilitating Social ParticipationMethods and Tools for Facilitating Social Participation
Methods and Tools for Facilitating Social Participation
 
Literature review: Dawley on SNKC
Literature review: Dawley on SNKCLiterature review: Dawley on SNKC
Literature review: Dawley on SNKC
 
My Dissertation Defense
My Dissertation Defense My Dissertation Defense
My Dissertation Defense
 
Designing Social
Designing SocialDesigning Social
Designing Social
 
Advanced Social Media Techniques in Higher Education
Advanced Social Media Techniques in Higher EducationAdvanced Social Media Techniques in Higher Education
Advanced Social Media Techniques in Higher Education
 
Social Web lecture for Matching dag IMM 2016
Social Web lecture for Matching dag IMM 2016Social Web lecture for Matching dag IMM 2016
Social Web lecture for Matching dag IMM 2016
 
#Edu14 Seminar on the State of Social Media in Higher Ed
#Edu14 Seminar on the State of Social Media in Higher Ed#Edu14 Seminar on the State of Social Media in Higher Ed
#Edu14 Seminar on the State of Social Media in Higher Ed
 
Designing Social
Designing SocialDesigning Social
Designing Social
 
Using Behaviour Analysis to Detect Cultural Aspects in Social Web Systems
Using Behaviour Analysis to Detect Cultural Aspects in Social Web SystemsUsing Behaviour Analysis to Detect Cultural Aspects in Social Web Systems
Using Behaviour Analysis to Detect Cultural Aspects in Social Web Systems
 
ACCESS Behaviors
ACCESS BehaviorsACCESS Behaviors
ACCESS Behaviors
 
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...
 
CSE509 Lecture 5
CSE509 Lecture 5CSE509 Lecture 5
CSE509 Lecture 5
 
A Summary of Computational Social Science - Lecture 8 in Introduction to Comp...
A Summary of Computational Social Science - Lecture 8 in Introduction to Comp...A Summary of Computational Social Science - Lecture 8 in Introduction to Comp...
A Summary of Computational Social Science - Lecture 8 in Introduction to Comp...
 
Citizen Sensor Data Mining, Social Media Analytics and Applications
Citizen Sensor Data Mining, Social Media Analytics and ApplicationsCitizen Sensor Data Mining, Social Media Analytics and Applications
Citizen Sensor Data Mining, Social Media Analytics and Applications
 
Social Media, Marketing & Public Libraries
Social Media, Marketing & Public LibrariesSocial Media, Marketing & Public Libraries
Social Media, Marketing & Public Libraries
 
SRS presentation
SRS presentationSRS presentation
SRS presentation
 
TruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social NetworkTruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social Network
 
Social Media Metrics
Social Media MetricsSocial Media Metrics
Social Media Metrics
 

Mais de Arosha Bandara

My STEM Journey - Arosha K. Bandara
My STEM Journey - Arosha K. BandaraMy STEM Journey - Arosha K. Bandara
My STEM Journey - Arosha K. BandaraArosha Bandara
 
Working at the Edge: Developing a Cross-disciplinary Research Agenda
Working at the Edge: Developing a Cross-disciplinary Research AgendaWorking at the Edge: Developing a Cross-disciplinary Research Agenda
Working at the Edge: Developing a Cross-disciplinary Research AgendaArosha Bandara
 
Dealing with the Internet of Insecure Things
Dealing with the Internet of Insecure ThingsDealing with the Internet of Insecure Things
Dealing with the Internet of Insecure ThingsArosha Bandara
 
People in the Machine: Human-centric Software Engineering for Smart Systems
People in the Machine: Human-centric Software Engineering for Smart SystemsPeople in the Machine: Human-centric Software Engineering for Smart Systems
People in the Machine: Human-centric Software Engineering for Smart SystemsArosha Bandara
 
SEF - Applying for a PhD
SEF - Applying for a PhDSEF - Applying for a PhD
SEF - Applying for a PhDArosha Bandara
 
Code Club Assembly Presentation
Code Club Assembly PresentationCode Club Assembly Presentation
Code Club Assembly PresentationArosha Bandara
 
See it, shake it, set it
See it, shake it, set itSee it, shake it, set it
See it, shake it, set itArosha Bandara
 

Mais de Arosha Bandara (7)

My STEM Journey - Arosha K. Bandara
My STEM Journey - Arosha K. BandaraMy STEM Journey - Arosha K. Bandara
My STEM Journey - Arosha K. Bandara
 
Working at the Edge: Developing a Cross-disciplinary Research Agenda
Working at the Edge: Developing a Cross-disciplinary Research AgendaWorking at the Edge: Developing a Cross-disciplinary Research Agenda
Working at the Edge: Developing a Cross-disciplinary Research Agenda
 
Dealing with the Internet of Insecure Things
Dealing with the Internet of Insecure ThingsDealing with the Internet of Insecure Things
Dealing with the Internet of Insecure Things
 
People in the Machine: Human-centric Software Engineering for Smart Systems
People in the Machine: Human-centric Software Engineering for Smart SystemsPeople in the Machine: Human-centric Software Engineering for Smart Systems
People in the Machine: Human-centric Software Engineering for Smart Systems
 
SEF - Applying for a PhD
SEF - Applying for a PhDSEF - Applying for a PhD
SEF - Applying for a PhD
 
Code Club Assembly Presentation
Code Club Assembly PresentationCode Club Assembly Presentation
Code Club Assembly Presentation
 
See it, shake it, set it
See it, shake it, set itSee it, shake it, set it
See it, shake it, set it
 

Último

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Último (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Privacy Dynamics: Learning Privacy Norms for Social Software

  • 1. PRIVACY DYNAMICS: LEARNING PRIVACY NORMS FOR SOCIAL SOFTWARE Handan Gül Çalıklı, Mark Law, Arosha K. Bandara, Alessandra Russo, Luke Dickens, Blaine A. Price, Avelie Stuart, Mark Levine and Bashar Nuseibeh
  • 2. Social Media Platforms •  As of November 2015 Facebook ranked at the top with 1.55 billion active users. •  Significant increase in the number of users of LinkedIn, Twitter and Instagram since September 2014. Increase in the number of users Increase in user engagement
  • 3. Privacy Violations: Sharing with the wrong audience
  • 4. Problem for Software Engineers? •  Many app developers are using sharing functionalities of social media platforms. •  Some numbers to give an idea about the size of Facebook’s network of developers [4] •  More than 30 million apps and websites use Facebook’s developer tools. •  Facebook’s users shared 50 billion pieces of content from apps last year. [4] Facebook’s annual F8 developer conference, 25th March 2015, San Francisco Problem: Apps developed by using sharing functionalities of social media platforms may violate privacy of many users.
  • 5. Privacy Dynamics (PD) Architecture •  Modeled by using Social Identity Theory (SIT). •  Core of the architecture implemented by using Inductive Logic Programming (ILP).
  • 7. Actual Audience David: Alice’s Boss Charlie: Alice’s Colleague Bob: Alice’s Friend John Shared Item Alice Imagined Audience FriendS [1] E. Litt. Knock knock. Who’s there? The imagined audience. Journal of Broadcasting and Electronic Media, 56(3):330-345, 2012. [1]
  • 8. Why? Context collapse[2]: co-presence of multiple groups on OSNs[3] [2] D. B. Alice E. Marwick. I tweet honestly, I tweet passionately: Twitter users, context collapse and the imagined audience. New Media and the imagined audience. [3] A. Lampinen, S. Tamminen, A. Oulsvirta. All my people right here, right now: Management of group co-presence on a social networking site. In the Proceedings of ACM 2009 International Conference on Supporting Group Work , GROUP’09, pages 281-290, New York NY, USA, 2009.
  • 10. Privacy Dynamics (PD) Architecture •  Modeled by using social identity theory. •  Core of the architecture implemented by using inductive logic programming. How it works: •  monitors user’s sharing behavior, •  learns user’s privacy norms, •  when user makes a share request, makes recommendations to the user based on these norms.
  • 11. Social Identity (SI) Theory •  In social psychology literature, social identity theory is theoretical analysis of group processes and intergroup relations. •  Social identity theory refers to our sense of ourselves as members of a group and the meaning that group has for us.
  • 12. Social Identity (SI) Theory •  According to Social Identity Theory: •  people belong to multiple groups •  social identities are created through group memberships.
  • 13. Back to our Example: John’s Facebook Newsfeed John Bob Alice David Charlie [2] D. B. Alice E. Marwick. I tweet honestly, I tweet passionately: Twitter users, context collapse and the imagined audience. New Media and the imagined audience. [3] A. Lampinen, S. Tamminen, A. Oulsvirta. All my people right here, right now: Management of group co-presence on a social networking site. In the Proceedings of ACM 2009 International Conference on Supporting Group Work , GROUP’09, pages 281-290, New York NY, USA, 2009. Bob Alice Charlie David ……. ColleaguesClose Friends Charlie Bob David Alice ……. …….Alice’s Colleague & Close Friend Alice’s Boss Context collapse[2] John’s mental groups on Facebook [3] Alice’s Close Friend
  • 14. Bob Alice Charlie David ……. ColleaguesClose Friends Charlie Bob David Alice ……. ……. Example: John’s Facebook Friends How can John’s Facebook friends be structured so that the result converges to John’s mental groups on Facebook? As a start John can create some of these groups using Facebook’s functionalities John’s mental groups on Facebook
  • 15. Social Identity Map and Conflicts •  Based on Social Identity Theory, we define two concepts: •  Social Identity Map (SI Map) •  Conflicts ColleaguesClose Friends Charlie Bob David Alice ……. ……. John’s SI map PrivacyViolation! For the shared item, “Colleagues” social identity group conflicts with “Close Friends” social identity group given the value of the location attributes of information object to be shared is “night club”. Information object o1 <alice, night_club,night_time, weekday>
  • 16. Privacy Dynamics (PD) Architecture Core of the architecture
  • 17. Learning Privacy Norms Inductive Logic Programming Share∪SI ∪Obj Background Knowledge Conflict(s) Conf Share: Rules of sharing SI: Social Identity (SI) map Obj: Values of Object Attributes Share History E+ ∪E− E+: Positive sharing examples E-: Negative sharing examples
  • 18. Learning Privacy Norms: An Example •  Rules of Sharing ( ) •  Rule1: Sharing an object O with person P, who is in social identity S1 could cause a conflict if the subject of the object O is in another social identity S2 which conflicts with S1 for object O. •  Rule2: All objects O are shared with all people P, unless there is a conflict. Share S1:Colleagues S2: Close Friends Charlie Bob David Alice ……. ……. O:party photo Alice CONFLICT! conflict(O, P):- subject(O, P2), in_si(P,S1),in_si(P2,S2), conflict_si(O,S1,S2). share(O, P):- person(P), object(O), not conflict(O,P).Back to our Example: Alice’s boss
  • 19. Learning Privacy Norms: An Example •  Back to our Example: s1:Colleagues s2: Close Friends Charlie Bob David Alice ……. ……. John’s SI map Share∪SI ∪ObjBackground knowledge Obj : in_si(charlie,s1). in_si(david,s1). in_si(alice,s2). in_si(bob,s2). in_si(charlie,s2). SI : subject(o1,alice). location(o1, night_club). time(o1’ night_time). day(o1’ week_day). Party photo o1 subject(o2,alice). location(o2, office). time(o2’day_time). day(o2’ week_day). Office photo o2
  • 20. Learning Privacy Norms: An Example s1:Colleaguess2: Close Friends Charlie Bob David Alice ……. ……. Party photo o1 Office photo o2 E+ = share(o1,alice) share(o1,bob) E- = share(o1,charlie) share(o1,david) share(o2,alice) share(o2,bob) share(o2,charlie) share(o2,david)
  • 21. Learning Privacy Norms: An Example s1:Colleagues s2: Close Friends Charlie Bob David Alice ……. ……. O:party photo CONFLICT! conflict_si(O,s1,s2):- location(O, night_club)
  • 23. Experimental Setup Answer Set Programming Conflictsactual Inductive Logic Programming Background knowledge Examples of sharingactual Randomly select i examples, i = 0, 1, …,20 Share history Answer Set Programming Conflictspredicted Actual Sharing Behavior Learned Sharing Behavior Share∪SI ∪Obj Share: Rules of sharing SI: Social Identity (SI) map Obj: Values of Object Attributes Compare!
  • 24. generate SI map & Conflicts for each p% complete SI map and Conflicts (p = 100, 95, 90, 50) p% complete SI map
  • 25. generate SI map & Conflicts for each p% complete SI map and Conflicts (p = 100, 95, 90, 50) p% complete SI map repeat 100 times
  • 26. generate SI map & Conflicts for each p% complete SI map and Conflicts (p = 100, 95, 90, 50) p% complete SI map repeat 100 times repeat for n conflicts, n = 10, 20, 40
  • 27. Synthetic Data Generation •  Number of people in a social network: 150 (Dunbar’s number)[4] •  Range for total number of social identity (SI) groups:[2,10][5] •  Range for SI group size: [1, 43][5] •  Pattern of the social network2: •  25% of SI groups are contained in another SI groups •  50% of SI groups overlap with another SI group •  25% of SI groups have no members in common with other SI groups [4] R. I. M. Dunbar. Neocortes size as a constraint on group size in primates. Journal of Human Evolution, 22(6):469-493, June 1993. [5] J. Mcauley and J. Lescovic. Discovering social circles in ego networks. ACM Transactions on Knowledge Discoveryand Data,*(1): 4:1-4:28Feb. 2014.
  • 28. Estimating the Performance Learned Sharing Behavior share not share Actual Sharing Behavior share TP FN not share FP TN
  • 31. Discussion •  Current approach depends on providing accurate SI map •  Timeout was set 5 minutes. Increasing the timeout may give better results. •  Assumption: No noise in user’s sharing behavior.
  • 32. Conclusions & Future Work •  Privacy Dynamics Architecture, drawing on Social Identity Theory for two key concepts: •  Group membership info (SI maps) •  Privacy norms (conflicts) •  We used ILP to implement the PI engine to learn privacy norms à provides human readable privacy rules. •  Found good results even for 50% incomplete SI maps. •  Experiment using real data rather than synthetic data •  Introduce noise in user’s sharing behavior.
  • 33. Thank you! Any Questions? Privacy Dynamics: Learning from the Wisdom of Groups www.privacydynamics.net