Strategies for Privacy Negotiation in Online Social Networks

Dilara Keküllüoglu, Nadin Kökciyan, Pinar Yolum

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Preserving privacy of posts in online social networks is difficult. One reason for this is that a post can be related to the poster as well as various others that are related to the post. Hence, it is possible to share information that pertains others without their consent. This pathological situation often leads to privacy violations that are hard to revert. Recent approaches advocate use of agreement technologies to enable stakeholders of a post to discuss the privacy configurations of a post. This allows related individuals to express concerns so that various privacy violations are avoided up front. This paper continues in the same line by proposing to use negotiation for reaching privacy agreements among users and introduces a negotiation architecture that combines semantic privacy rules with utility functions. We study various negotiation strategies that are inspired from negotiations in e-commerce. We discuss meaningful metrics for measuring privacy negotiation outcomes. We compare various strategies on a benchmark set of scenarios, similar to the ones that appear in real life social networks.
Original languageEnglish
Title of host publicationProceedings of the 1st International Workshop on AI for Privacy and Security (PrAISe)
PublisherAssociation for Computing Machinery (ACM)
Pages2:1-2:8
Number of pages8
ISBN (Print)978-1-4503-4304-6
DOIs
Publication statusPublished - 29 Aug 2016
Event1st International Workshop on AI for Privacy and Security - The Hague, Netherlands
Duration: 29 Aug 201630 Aug 2016
http://mas.cmpe.boun.edu.tr/praise2016/

Workshop

Workshop1st International Workshop on AI for Privacy and Security
Abbreviated titlePRAISE 2016
Country/TerritoryNetherlands
CityThe Hague
Period29/08/1630/08/16
Internet address

Keywords / Materials (for Non-textual outputs)

  • Security and privacy
  • Social network security and privacy
  • Computing methodologies
  • Multi-agent systems
  • Privacy
  • Agreement
  • Negotiation

Fingerprint

Dive into the research topics of 'Strategies for Privacy Negotiation in Online Social Networks'. Together they form a unique fingerprint.

Cite this