SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Downloaden Sie, um offline zu lesen
PRIVACY DYNAMICS:
LEARNING PRIVACY NORMS
FOR SOCIAL SOFTWARE
Handan Gül Çalıklı, Mark Law, Arosha K. Bandara,
Alessandra Russo, Luke Dickens, Blaine A. Price, Avelie Stuart,
Mark Levine and Bashar Nuseibeh
Social Media Platforms
•  As of November 2015
Facebook ranked at the top
with 1.55 billion active users.
•  Significant increase in the
number of users of LinkedIn,
Twitter and Instagram since
September 2014.
Increase in the
number of users
Increase in user
engagement
Privacy Violations: Sharing with the wrong audience
Problem for Software Engineers?
•  Many app developers are using sharing
functionalities of social media platforms.
•  Some numbers to give an idea about the
size of Facebook’s network of developers [4]
•  More than 30 million apps and websites
use Facebook’s developer tools.
•  Facebook’s users shared 50 billion pieces
of content from apps last year.
[4] Facebook’s annual F8 developer conference, 25th March 2015, San Francisco
Problem: Apps developed by using sharing
functionalities of social media platforms may
violate privacy of many users.
Privacy Dynamics (PD) Architecture
•  Modeled by using Social
Identity Theory (SIT).
•  Core of the architecture
implemented by using
Inductive Logic
Programming (ILP).
Problem
Actual Audience
David: Alice’s
Boss
Charlie: Alice’s
Colleague
Bob: Alice’s
Friend
John
Shared Item
Alice
Imagined Audience
FriendS
[1] E. Litt. Knock knock. Who’s there? The imagined
audience. Journal of Broadcasting and Electronic
Media, 56(3):330-345, 2012.
[1]
Why?
Context collapse[2]:
co-presence of
multiple groups on
OSNs[3]
[2] D. B. Alice E. Marwick. I tweet honestly, I tweet passionately: Twitter users, context collapse and the imagined audience. New
Media and the imagined audience.
[3] A. Lampinen, S. Tamminen, A. Oulsvirta. All my people right here, right now: Management of group co-presence on a social
networking site. In the Proceedings of ACM 2009 International Conference on Supporting Group Work , GROUP’09, pages 281-290,
New York NY, USA, 2009.
Proposed Solution
Privacy Dynamics (PD) Architecture
•  Modeled by using social
identity theory.
•  Core of the architecture
implemented by using
inductive logic
programming.
How it works:
•  monitors user’s sharing behavior,
•  learns user’s privacy norms,
•  when user makes a share request,
makes recommendations to the
user based on these norms.
Social Identity (SI) Theory
•  In social psychology literature,
social identity theory is theoretical
analysis of group processes and
intergroup relations.
•  Social identity theory
refers to our sense of
ourselves as
members of a group
and the meaning that
group has for us.
Social Identity (SI) Theory
•  According to Social Identity
Theory:
•  people belong to multiple
groups
•  social identities are
created through group
memberships.
Back to our Example: John’s
Facebook Newsfeed
John
Bob
Alice
David
Charlie
[2] D. B. Alice E. Marwick. I tweet honestly, I tweet passionately: Twitter users, context collapse and the imagined audience. New Media and the
imagined audience.
[3] A. Lampinen, S. Tamminen, A. Oulsvirta. All my people right here, right now: Management of group co-presence on a social networking site.
In the Proceedings of ACM 2009 International Conference on Supporting Group Work , GROUP’09, pages 281-290, New York NY, USA, 2009.
Bob
Alice
Charlie
David
…….
ColleaguesClose
Friends
Charlie
Bob David
Alice
…….
…….Alice’s
Colleague &
Close Friend
Alice’s
Boss
Context collapse[2]
John’s
mental
groups on
Facebook
[3]
Alice’s
Close
Friend
Bob
Alice
Charlie
David
…….
ColleaguesClose
Friends
Charlie
Bob David
Alice
…….
…….
Example: John’s Facebook Friends
How can John’s Facebook
friends be structured so
that the result converges
to John’s mental groups
on Facebook?
As a start John
can create
some of these
groups using
Facebook’s
functionalities
John’s
mental
groups on
Facebook
Social Identity Map and Conflicts
•  Based on Social Identity Theory, we define two
concepts:
•  Social Identity Map (SI Map)
•  Conflicts
ColleaguesClose
Friends
Charlie
Bob David
Alice
…….
…….
John’s SI map
PrivacyViolation!
For the shared item,
“Colleagues” social identity
group conflicts with “Close
Friends” social identity
group given the value of the
location attributes of
information object to be
shared is “night club”.
Information object o1
<alice, night_club,night_time,
weekday>
Privacy Dynamics (PD) Architecture
Core of the
architecture
Learning Privacy Norms
Inductive Logic
Programming
Share∪SI ∪Obj
Background
Knowledge
Conflict(s)
Conf
Share: Rules of sharing
SI: Social Identity (SI) map
Obj: Values of Object
Attributes
Share History
E+
∪E−
E+: Positive sharing examples
E-: Negative sharing examples
Learning Privacy Norms: An Example
•  Rules of Sharing ( )
•  Rule1: Sharing an object O with person P, who is
in social identity S1 could cause a conflict if the
subject of the object O is in another social identity
S2 which conflicts with S1 for object O.
•  Rule2: All objects O are shared with all people P,
unless there is a conflict.
Share
S1:Colleagues
S2:
Close
Friends
Charlie
Bob
David
Alice
…….
…….
O:party
photo
Alice
CONFLICT!
conflict(O, P):-
subject(O, P2),
in_si(P,S1),in_si(P2,S2),
conflict_si(O,S1,S2).
share(O, P):-
person(P),
object(O),
not conflict(O,P).Back to our Example:
Alice’s boss
Learning Privacy Norms: An Example
•  Back to our Example:
s1:Colleagues
s2: Close
Friends
Charlie
Bob
David
Alice
…….
…….
John’s SI map
Share∪SI ∪ObjBackground
knowledge
Obj :
in_si(charlie,s1).
in_si(david,s1).
in_si(alice,s2).
in_si(bob,s2).
in_si(charlie,s2).
SI :
subject(o1,alice).
location(o1, night_club).
time(o1’ night_time).
day(o1’ week_day).
Party photo o1
subject(o2,alice).
location(o2, office).
time(o2’day_time).
day(o2’ week_day).
Office photo o2
Learning Privacy Norms: An Example
s1:Colleaguess2: Close Friends
Charlie
Bob
David
Alice
…….
…….
Party photo o1 Office photo o2
E+ =
share(o1,alice)
share(o1,bob)
E- =
share(o1,charlie)
share(o1,david)
share(o2,alice)
share(o2,bob)
share(o2,charlie)
share(o2,david)
Learning Privacy Norms: An Example
s1:Colleagues
s2: Close
Friends
Charlie
Bob
David
Alice
…….
…….
O:party
photo
CONFLICT!
conflict_si(O,s1,s2):- location(O, night_club)
Evaluation
Experimental Setup
Answer Set
Programming
Conflictsactual
Inductive
Logic
Programming
Background
knowledge
Examples of
sharingactual
Randomly select i
examples,
i = 0, 1, …,20
Share history
Answer Set
Programming
Conflictspredicted
Actual
Sharing
Behavior
Learned
Sharing
Behavior
Share∪SI ∪Obj
Share: Rules of sharing
SI: Social Identity (SI) map
Obj: Values of Object
Attributes
Compare!
generate SI map & Conflicts
for each p% complete SI map and Conflicts (p = 100, 95, 90, 50)
p%
complete
SI map
generate SI map & Conflicts
for each p% complete SI map and Conflicts (p = 100, 95, 90, 50)
p%
complete
SI map
repeat 100 times
generate SI map & Conflicts
for each p% complete SI map and Conflicts (p = 100, 95, 90, 50)
p%
complete
SI map
repeat 100 times
repeat for n conflicts, n = 10, 20, 40
Synthetic Data Generation
•  Number of people in a social network: 150 (Dunbar’s
number)[4]
•  Range for total number of social identity (SI) groups:[2,10][5]
•  Range for SI group size: [1, 43][5]
•  Pattern of the social network2:
•  25% of SI groups are contained in another SI groups
•  50% of SI groups overlap with another SI group
•  25% of SI groups have no members in common with other SI groups
[4] R. I. M. Dunbar. Neocortes size as a constraint on group size in primates. Journal of Human Evolution, 22(6):469-493, June 1993.
[5] J. Mcauley and J. Lescovic. Discovering social circles in ego networks. ACM Transactions on Knowledge Discoveryand Data,*(1):
4:1-4:28Feb. 2014.
Estimating the Performance
Learned Sharing Behavior
share not share
Actual Sharing
Behavior
share TP FN
not share FP TN
Results (Specificity)
Results (Specificity)
Discussion
•  Current approach depends on providing accurate SI map
•  Timeout was set 5 minutes.
Increasing the timeout may give better results.
•  Assumption: No noise in user’s sharing behavior.
Conclusions & Future Work
•  Privacy Dynamics Architecture, drawing on Social Identity
Theory for two key concepts:
•  Group membership info (SI maps)
•  Privacy norms (conflicts)
•  We used ILP to implement the PI engine to learn privacy
norms à provides human readable privacy rules.
•  Found good results even for 50% incomplete SI maps.
•  Experiment using real data rather than synthetic data
•  Introduce noise in user’s sharing behavior.
Thank you!
Any Questions?
Privacy Dynamics: Learning from the Wisdom of Groups
www.privacydynamics.net

Weitere ähnliche Inhalte

Was ist angesagt?

Social Networks and Computer Science
Social Networks and Computer ScienceSocial Networks and Computer Science
Social Networks and Computer Science
dragonmeteor
 
Introduction to Computational Social Science
Introduction to Computational Social ScienceIntroduction to Computational Social Science
Introduction to Computational Social Science
Talha OZ
 

Was ist angesagt? (12)

Social Networks and Computer Science
Social Networks and Computer ScienceSocial Networks and Computer Science
Social Networks and Computer Science
 
Social Network Analysis in Two Parts
Social Network Analysis in Two PartsSocial Network Analysis in Two Parts
Social Network Analysis in Two Parts
 
Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...
Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...
Network Visualization guest lecture at #DataVizQMSS at @Columbia / #SNA at PU...
 
Mining the Social Web - Lecture 1 - T61.6020 lecture-01-slides
Mining the Social Web - Lecture 1 - T61.6020 lecture-01-slidesMining the Social Web - Lecture 1 - T61.6020 lecture-01-slides
Mining the Social Web - Lecture 1 - T61.6020 lecture-01-slides
 
Social Network Analysis - Lecture 4 in Introduction to Computational Social S...
Social Network Analysis - Lecture 4 in Introduction to Computational Social S...Social Network Analysis - Lecture 4 in Introduction to Computational Social S...
Social Network Analysis - Lecture 4 in Introduction to Computational Social S...
 
Introduction to Computational Social Science - Lecture 1
Introduction to Computational Social Science - Lecture 1Introduction to Computational Social Science - Lecture 1
Introduction to Computational Social Science - Lecture 1
 
Mining the Social Web - Lecture 2 - T61.6020
Mining the Social Web - Lecture 2 - T61.6020Mining the Social Web - Lecture 2 - T61.6020
Mining the Social Web - Lecture 2 - T61.6020
 
Introduction to Computational Social Science
Introduction to Computational Social ScienceIntroduction to Computational Social Science
Introduction to Computational Social Science
 
Bowdoin: Data Driven Socities 2014 - Intro 01/20/14
Bowdoin: Data Driven Socities 2014 - Intro 01/20/14Bowdoin: Data Driven Socities 2014 - Intro 01/20/14
Bowdoin: Data Driven Socities 2014 - Intro 01/20/14
 
Living and breathing the web
Living and breathing the webLiving and breathing the web
Living and breathing the web
 
Supporting Rationale Awareness in Large-Scale Online Open Participative Activ...
Supporting Rationale Awareness in Large-Scale Online Open Participative Activ...Supporting Rationale Awareness in Large-Scale Online Open Participative Activ...
Supporting Rationale Awareness in Large-Scale Online Open Participative Activ...
 
Exploring Social Media with NodeXL
Exploring Social Media with NodeXL Exploring Social Media with NodeXL
Exploring Social Media with NodeXL
 

Andere mochten auch

Andere mochten auch (7)

IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016  7-9 Septermber, 2016, Stuttgart, GermanyIOT-2016  7-9 Septermber, 2016, Stuttgart, Germany
IOT-2016 7-9 Septermber, 2016, Stuttgart, Germany
 
COMMUNICATION AND CONFLICT RESOLUTION ON SOCIAL MEDIA - A PRACTICAL ORIENTED ...
COMMUNICATION AND CONFLICT RESOLUTION ON SOCIAL MEDIA - A PRACTICAL ORIENTED ...COMMUNICATION AND CONFLICT RESOLUTION ON SOCIAL MEDIA - A PRACTICAL ORIENTED ...
COMMUNICATION AND CONFLICT RESOLUTION ON SOCIAL MEDIA - A PRACTICAL ORIENTED ...
 
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIARESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
 
Media and Conflict Resolution
Media and Conflict ResolutionMedia and Conflict Resolution
Media and Conflict Resolution
 
The Lean Tech Stack
The Lean Tech StackThe Lean Tech Stack
The Lean Tech Stack
 
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
 
Make profit with UI-Redressing attacks.
Make profit with UI-Redressing attacks.Make profit with UI-Redressing attacks.
Make profit with UI-Redressing attacks.
 

Ähnlich wie Privacy Dynamics: Learning Privacy Norms for Social Software

TruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social NetworkTruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social Network
Lora Aroyo
 

Ähnlich wie Privacy Dynamics: Learning Privacy Norms for Social Software (20)

Making More Sense Out of Social Data
Making More Sense Out of Social DataMaking More Sense Out of Social Data
Making More Sense Out of Social Data
 
Picturing the Social: Talk for Transforming Digital Methods Winter School
Picturing the Social: Talk for Transforming Digital Methods Winter SchoolPicturing the Social: Talk for Transforming Digital Methods Winter School
Picturing the Social: Talk for Transforming Digital Methods Winter School
 
Methods and Tools for Facilitating Social Participation
Methods and Tools for Facilitating Social ParticipationMethods and Tools for Facilitating Social Participation
Methods and Tools for Facilitating Social Participation
 
Literature review: Dawley on SNKC
Literature review: Dawley on SNKCLiterature review: Dawley on SNKC
Literature review: Dawley on SNKC
 
My Dissertation Defense
My Dissertation Defense My Dissertation Defense
My Dissertation Defense
 
Designing Social
Designing SocialDesigning Social
Designing Social
 
Advanced Social Media Techniques in Higher Education
Advanced Social Media Techniques in Higher EducationAdvanced Social Media Techniques in Higher Education
Advanced Social Media Techniques in Higher Education
 
Social Web lecture for Matching dag IMM 2016
Social Web lecture for Matching dag IMM 2016Social Web lecture for Matching dag IMM 2016
Social Web lecture for Matching dag IMM 2016
 
#Edu14 Seminar on the State of Social Media in Higher Ed
#Edu14 Seminar on the State of Social Media in Higher Ed#Edu14 Seminar on the State of Social Media in Higher Ed
#Edu14 Seminar on the State of Social Media in Higher Ed
 
Designing Social
Designing SocialDesigning Social
Designing Social
 
Using Behaviour Analysis to Detect Cultural Aspects in Social Web Systems
Using Behaviour Analysis to Detect Cultural Aspects in Social Web SystemsUsing Behaviour Analysis to Detect Cultural Aspects in Social Web Systems
Using Behaviour Analysis to Detect Cultural Aspects in Social Web Systems
 
ACCESS Behaviors
ACCESS BehaviorsACCESS Behaviors
ACCESS Behaviors
 
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...
2015 #MMeasure-Marc Smith-NodeXL Mapping social media using social network ma...
 
CSE509 Lecture 5
CSE509 Lecture 5CSE509 Lecture 5
CSE509 Lecture 5
 
A Summary of Computational Social Science - Lecture 8 in Introduction to Comp...
A Summary of Computational Social Science - Lecture 8 in Introduction to Comp...A Summary of Computational Social Science - Lecture 8 in Introduction to Comp...
A Summary of Computational Social Science - Lecture 8 in Introduction to Comp...
 
Citizen Sensor Data Mining, Social Media Analytics and Applications
Citizen Sensor Data Mining, Social Media Analytics and ApplicationsCitizen Sensor Data Mining, Social Media Analytics and Applications
Citizen Sensor Data Mining, Social Media Analytics and Applications
 
Social Media, Marketing & Public Libraries
Social Media, Marketing & Public LibrariesSocial Media, Marketing & Public Libraries
Social Media, Marketing & Public Libraries
 
SRS presentation
SRS presentationSRS presentation
SRS presentation
 
TruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social NetworkTruSIS: Trust Accross Social Network
TruSIS: Trust Accross Social Network
 
Social Media Metrics
Social Media MetricsSocial Media Metrics
Social Media Metrics
 

Mehr von Arosha Bandara

Code Club Assembly Presentation
Code Club Assembly PresentationCode Club Assembly Presentation
Code Club Assembly Presentation
Arosha Bandara
 

Mehr von Arosha Bandara (7)

My STEM Journey - Arosha K. Bandara
My STEM Journey - Arosha K. BandaraMy STEM Journey - Arosha K. Bandara
My STEM Journey - Arosha K. Bandara
 
Working at the Edge: Developing a Cross-disciplinary Research Agenda
Working at the Edge: Developing a Cross-disciplinary Research AgendaWorking at the Edge: Developing a Cross-disciplinary Research Agenda
Working at the Edge: Developing a Cross-disciplinary Research Agenda
 
Dealing with the Internet of Insecure Things
Dealing with the Internet of Insecure ThingsDealing with the Internet of Insecure Things
Dealing with the Internet of Insecure Things
 
People in the Machine: Human-centric Software Engineering for Smart Systems
People in the Machine: Human-centric Software Engineering for Smart SystemsPeople in the Machine: Human-centric Software Engineering for Smart Systems
People in the Machine: Human-centric Software Engineering for Smart Systems
 
SEF - Applying for a PhD
SEF - Applying for a PhDSEF - Applying for a PhD
SEF - Applying for a PhD
 
Code Club Assembly Presentation
Code Club Assembly PresentationCode Club Assembly Presentation
Code Club Assembly Presentation
 
See it, shake it, set it
See it, shake it, set itSee it, shake it, set it
See it, shake it, set it
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

Privacy Dynamics: Learning Privacy Norms for Social Software

  • 1. PRIVACY DYNAMICS: LEARNING PRIVACY NORMS FOR SOCIAL SOFTWARE Handan Gül Çalıklı, Mark Law, Arosha K. Bandara, Alessandra Russo, Luke Dickens, Blaine A. Price, Avelie Stuart, Mark Levine and Bashar Nuseibeh
  • 2. Social Media Platforms •  As of November 2015 Facebook ranked at the top with 1.55 billion active users. •  Significant increase in the number of users of LinkedIn, Twitter and Instagram since September 2014. Increase in the number of users Increase in user engagement
  • 3. Privacy Violations: Sharing with the wrong audience
  • 4. Problem for Software Engineers? •  Many app developers are using sharing functionalities of social media platforms. •  Some numbers to give an idea about the size of Facebook’s network of developers [4] •  More than 30 million apps and websites use Facebook’s developer tools. •  Facebook’s users shared 50 billion pieces of content from apps last year. [4] Facebook’s annual F8 developer conference, 25th March 2015, San Francisco Problem: Apps developed by using sharing functionalities of social media platforms may violate privacy of many users.
  • 5. Privacy Dynamics (PD) Architecture •  Modeled by using Social Identity Theory (SIT). •  Core of the architecture implemented by using Inductive Logic Programming (ILP).
  • 7. Actual Audience David: Alice’s Boss Charlie: Alice’s Colleague Bob: Alice’s Friend John Shared Item Alice Imagined Audience FriendS [1] E. Litt. Knock knock. Who’s there? The imagined audience. Journal of Broadcasting and Electronic Media, 56(3):330-345, 2012. [1]
  • 8. Why? Context collapse[2]: co-presence of multiple groups on OSNs[3] [2] D. B. Alice E. Marwick. I tweet honestly, I tweet passionately: Twitter users, context collapse and the imagined audience. New Media and the imagined audience. [3] A. Lampinen, S. Tamminen, A. Oulsvirta. All my people right here, right now: Management of group co-presence on a social networking site. In the Proceedings of ACM 2009 International Conference on Supporting Group Work , GROUP’09, pages 281-290, New York NY, USA, 2009.
  • 10. Privacy Dynamics (PD) Architecture •  Modeled by using social identity theory. •  Core of the architecture implemented by using inductive logic programming. How it works: •  monitors user’s sharing behavior, •  learns user’s privacy norms, •  when user makes a share request, makes recommendations to the user based on these norms.
  • 11. Social Identity (SI) Theory •  In social psychology literature, social identity theory is theoretical analysis of group processes and intergroup relations. •  Social identity theory refers to our sense of ourselves as members of a group and the meaning that group has for us.
  • 12. Social Identity (SI) Theory •  According to Social Identity Theory: •  people belong to multiple groups •  social identities are created through group memberships.
  • 13. Back to our Example: John’s Facebook Newsfeed John Bob Alice David Charlie [2] D. B. Alice E. Marwick. I tweet honestly, I tweet passionately: Twitter users, context collapse and the imagined audience. New Media and the imagined audience. [3] A. Lampinen, S. Tamminen, A. Oulsvirta. All my people right here, right now: Management of group co-presence on a social networking site. In the Proceedings of ACM 2009 International Conference on Supporting Group Work , GROUP’09, pages 281-290, New York NY, USA, 2009. Bob Alice Charlie David ……. ColleaguesClose Friends Charlie Bob David Alice ……. …….Alice’s Colleague & Close Friend Alice’s Boss Context collapse[2] John’s mental groups on Facebook [3] Alice’s Close Friend
  • 14. Bob Alice Charlie David ……. ColleaguesClose Friends Charlie Bob David Alice ……. ……. Example: John’s Facebook Friends How can John’s Facebook friends be structured so that the result converges to John’s mental groups on Facebook? As a start John can create some of these groups using Facebook’s functionalities John’s mental groups on Facebook
  • 15. Social Identity Map and Conflicts •  Based on Social Identity Theory, we define two concepts: •  Social Identity Map (SI Map) •  Conflicts ColleaguesClose Friends Charlie Bob David Alice ……. ……. John’s SI map PrivacyViolation! For the shared item, “Colleagues” social identity group conflicts with “Close Friends” social identity group given the value of the location attributes of information object to be shared is “night club”. Information object o1 <alice, night_club,night_time, weekday>
  • 16. Privacy Dynamics (PD) Architecture Core of the architecture
  • 17. Learning Privacy Norms Inductive Logic Programming Share∪SI ∪Obj Background Knowledge Conflict(s) Conf Share: Rules of sharing SI: Social Identity (SI) map Obj: Values of Object Attributes Share History E+ ∪E− E+: Positive sharing examples E-: Negative sharing examples
  • 18. Learning Privacy Norms: An Example •  Rules of Sharing ( ) •  Rule1: Sharing an object O with person P, who is in social identity S1 could cause a conflict if the subject of the object O is in another social identity S2 which conflicts with S1 for object O. •  Rule2: All objects O are shared with all people P, unless there is a conflict. Share S1:Colleagues S2: Close Friends Charlie Bob David Alice ……. ……. O:party photo Alice CONFLICT! conflict(O, P):- subject(O, P2), in_si(P,S1),in_si(P2,S2), conflict_si(O,S1,S2). share(O, P):- person(P), object(O), not conflict(O,P).Back to our Example: Alice’s boss
  • 19. Learning Privacy Norms: An Example •  Back to our Example: s1:Colleagues s2: Close Friends Charlie Bob David Alice ……. ……. John’s SI map Share∪SI ∪ObjBackground knowledge Obj : in_si(charlie,s1). in_si(david,s1). in_si(alice,s2). in_si(bob,s2). in_si(charlie,s2). SI : subject(o1,alice). location(o1, night_club). time(o1’ night_time). day(o1’ week_day). Party photo o1 subject(o2,alice). location(o2, office). time(o2’day_time). day(o2’ week_day). Office photo o2
  • 20. Learning Privacy Norms: An Example s1:Colleaguess2: Close Friends Charlie Bob David Alice ……. ……. Party photo o1 Office photo o2 E+ = share(o1,alice) share(o1,bob) E- = share(o1,charlie) share(o1,david) share(o2,alice) share(o2,bob) share(o2,charlie) share(o2,david)
  • 21. Learning Privacy Norms: An Example s1:Colleagues s2: Close Friends Charlie Bob David Alice ……. ……. O:party photo CONFLICT! conflict_si(O,s1,s2):- location(O, night_club)
  • 23. Experimental Setup Answer Set Programming Conflictsactual Inductive Logic Programming Background knowledge Examples of sharingactual Randomly select i examples, i = 0, 1, …,20 Share history Answer Set Programming Conflictspredicted Actual Sharing Behavior Learned Sharing Behavior Share∪SI ∪Obj Share: Rules of sharing SI: Social Identity (SI) map Obj: Values of Object Attributes Compare!
  • 24. generate SI map & Conflicts for each p% complete SI map and Conflicts (p = 100, 95, 90, 50) p% complete SI map
  • 25. generate SI map & Conflicts for each p% complete SI map and Conflicts (p = 100, 95, 90, 50) p% complete SI map repeat 100 times
  • 26. generate SI map & Conflicts for each p% complete SI map and Conflicts (p = 100, 95, 90, 50) p% complete SI map repeat 100 times repeat for n conflicts, n = 10, 20, 40
  • 27. Synthetic Data Generation •  Number of people in a social network: 150 (Dunbar’s number)[4] •  Range for total number of social identity (SI) groups:[2,10][5] •  Range for SI group size: [1, 43][5] •  Pattern of the social network2: •  25% of SI groups are contained in another SI groups •  50% of SI groups overlap with another SI group •  25% of SI groups have no members in common with other SI groups [4] R. I. M. Dunbar. Neocortes size as a constraint on group size in primates. Journal of Human Evolution, 22(6):469-493, June 1993. [5] J. Mcauley and J. Lescovic. Discovering social circles in ego networks. ACM Transactions on Knowledge Discoveryand Data,*(1): 4:1-4:28Feb. 2014.
  • 28. Estimating the Performance Learned Sharing Behavior share not share Actual Sharing Behavior share TP FN not share FP TN
  • 31. Discussion •  Current approach depends on providing accurate SI map •  Timeout was set 5 minutes. Increasing the timeout may give better results. •  Assumption: No noise in user’s sharing behavior.
  • 32. Conclusions & Future Work •  Privacy Dynamics Architecture, drawing on Social Identity Theory for two key concepts: •  Group membership info (SI maps) •  Privacy norms (conflicts) •  We used ILP to implement the PI engine to learn privacy norms à provides human readable privacy rules. •  Found good results even for 50% incomplete SI maps. •  Experiment using real data rather than synthetic data •  Introduce noise in user’s sharing behavior.
  • 33. Thank you! Any Questions? Privacy Dynamics: Learning from the Wisdom of Groups www.privacydynamics.net