SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
(Under)mining Privacy in Social Networks
                                                                   Ben Laurie∗
                                    Monica Chew    Dirk Balfanz
                                         {mmc,balfanz,benl}@google.com
                                                   Google Inc.


1 Introduction                                                                “updates.” A user’s activity stream is typically viewable
                                                                              by their friends, as defined by the social networking site.
Social networking sites like Facebook or MySpace allow                           There are two fundamental ways in which lack of con-
users to keep in touch with their friends, communicate and                    trol over activity streams may compromise a user’s pri-
share content with them, as well as engage in other multi-                    vacy. First, a user may not be aware of all the events that
user applications. What distinguishes such sites from                         are fed into their activity stream. Second, a user may not
other, pre-“web 2.0” applications is that users make ex-                      be aware of the audience who can see their activity stream.
plicit their social network [2]: who your friends are (and                    Below, we mention three real-world examples: two in
— by omission — who they aren’t) is a constant presence                       which users lacked control over the events going into the
in the user interface of such sites. It is perhaps because of                 activity stream, and one in which users lacked control over
this that social networking sites give the impression of a                    the audience who could see the activity stream.
semi-public stage on which one can act in the privacy of
                                                          Facebook Perhaps the most widely publicized recent
one’s social circle.
                                                          frustration of user expectations in social networking is
   This assumption, however, is not always merited. In
                                                          Facebook’s Beacon feature. With this feature, third-party
this paper, we point out three distinct areas where the
                                                          websites such as Blockbuster, eBay, or Travelocity insert
highly-interlinked world of social networking sites can
                                                          events into a Facebook user’s activity stream whenever
compromise user privacy. They are
                                                          that user adds a movie to her queue, makes a purchase,
   • lack of control over activity streams,               books a trip, etc.. However, initially users could not easily
                                                          monitor or control the events fed into their activity streams
   • unwelcome linkage, and
   • deanonymization through merging of social graphs. — the initial default user preferences were to send Bea-
                                                          con information from everywhere, and Facebook users
   In the following sections, we will define each of these could only opt-out of Beacon by specifying each website.
privacy-sensitive areas, giving examples (most real, some Because there was no easy way to opt-out of Beacon, it
hypothetical) for each. Finally, we will derive recommen- garnered an immediate allergic reaction in the press and
                                                          among Facebook users [6, 7]. Facebook eventually re-
dations for usable designs from our observations.
                                                          solved the problem by providing a global opt-out, where
                                                          users do not have to enumerate every website from which
2 Activity Streams                                        they do not want to send information.
An activity stream is a collection of events associated with         coComment coComment, a comment tracking ser-
a single user1 . These events may include changes the user           vice2 , serves as a second example for unexpected events
made to their profile page, the fact that the user added or           showing up in a user’s activity stream. coComment
ran a particular application on the social networking site,          tracks conversations that occur in the comments section
that they shared a news item, or that they communicated              of blogs by a client-side browser extension that records
with one of their friends. Different social networking               comments the user types, and publishes them on the co-
sites use different nomenclatures: on Facebook, activity             Comment server. Initially, the coComment extension sim-
streams are called “mini-feeds”, on Orkut they are called            ply recorded everything the user typed, without regard
                                                                     to whether the website the user was visiting was public
   ∗ The opinions expressed here are those of the authors and do not
                                                                     or not. A coComment user was surprised and dismayed
necessarily reflect the positions of Google.
   1 This collection is ordered in time and potentially infinite – hence
                                                                                2 www.cocomment.com
our choice to call it a “stream”.


                                                                          1
to find their messages to Citibank published on coCom-                 terests, it is certainly possible that he would not want his
ment [9]. In resulting blogposts, the coComment user                  buddies from the gun club to learn of his (in their eyes)
clearly did not understand the mechanisms involved and                anachronistic or useless plant-related hobby, but has no
blamed Citibank for running an insecure website3 . Al-                qualms showing his weapons collection to his fellow hor-
though coComment can be used securely by enabling and                 ticulturists. Maintaining separation of these different per-
disabling the extension every time the user posts a real              sonae is sometimes called impression management [3] in
comment, the cognitive burden placed on the user is too               identity management systems.
high. Citibank “solved” this problem by placing a warn-
                                                                      Trackbacks Suppose Bob maintains a personal blog
ing on its customer service form, and coComment simi-
                                                                      about his bounty-hunting activities, and that blog enables
larly solved the issue by adding a blacklist capability.
                                                                      trackbacks URLs. Trackback URLs on a web page are
Google Reader Google Reader is a syndication service
                                                                      a way to keep track of new stories or blog posts linking
which allows users to subscribe to RSS feeds of various
                                                                      to that web page. They can result from a list of refer-
news and blog sites. Google Reader then aggregates these
                                                                      ral urls kept by the hosting webserver, or the trackback
feeds for easy reading. Google Reader allows users to
                                                                      protocol implemented by several blogging services. Even
mark news items or blog posts of interest, then share these
                                                                      if Bob diligently masks personal information on his own
items with chosen friends. In essence, Google Reader al-
                                                                      blog (for example, by never posting the address of his
lowed the user to create her own RSS feed of “interest-
                                                                      home, which is well-known in his town for having or-
ing” stories. In December 2007, Google Reader launched
                                                                      nate flower decorations), Bob can be “outed” by some-
a new feature that (after displaying a pop-up that allowed
                                                                      one else through trackbacks. Suppose Bob’s friend Alice,
users to opt-out) shared this feed with the user’s Google
                                                                      who is the chair of the local horticulturist club, writes in
Talk contacts, creating an activity stream of shared news
                                                                      her own blog that she visited Bob for dinner, mentions
stories for that user4 .
                                                                      Bob’s name, and links to Bob’s post. A casual reader
   Although the shared items had always been available
                                                                      of Bob’s pseudonymous blog can find his real name, and
as a public feed, some users had actively controlled who
                                                                      learn about his other hobby despite Bob’s vigilance, sim-
the audience of that feed was by disclosing the obfuscated
                                                                      ply by following a trackback URL that an eager software
feed URL to people of their choosing. When Google ex-
                                                                      system added to his blog post.
panded the audience of that particular activity stream to
include Google Talk contacts, users were caught by sur-
                                                                          Accidental linkage Suppose Bob also keeps a Flickr
prise [5]. Google Reader responded by explaining to users
                                                                          account on which he hosts pictures of his guns. How-
how to manage their shared items using existing tools. In
                                                                          ever, because of his interests in flowers, he not only be-
addition, Google Reader included a feature that allowed
                                                                          longs to the “We Like Guns” Flickr group, but also to
users to migrate their shared items to a tag or to their
                                                                          the “Flower Lovers” group. So when Bob uses a fea-
starred items, which could then be shared via an obfus-
                                                                          ture on Flickr that allows him to easily add a photo of
cated URL.
                                                                          his favorite gun to a blog posting, he might be unaware of
                                                                          the fact that the photo added to his blog is, in fact, a link
3 Unwelcome Linkage                                                       back to a Flickr page containing his Flickr name, reveal-
                                                                          ing interest in flowers. An unexpected link, together with
Unwelcome linkage occurs when links on the Internet re- Flickr’s social-networking-style feature of public profile
veal information about an individual that they had not in- pages caused Bob’s horticultural persona to be conflated
tended to reveal. Unwelcome linkage is not limited to with his gun club one.
social networking sites, but may occur wherever graphs
of hyperlinks on the World Wide Web are automatically
created to mirror connections between people in the real 4 Merging Social Graphs
world.
   Consider Bob, who has multiple personae on the Inter- The third privacy-sensitive area comes from the fact that
net: would-be bounty hunter at the gun club, and amateur social networking sites tend to extract a lot of personally-
horticulturist at the rose garden. Given Bob’s disparate in- identifiable information from people (from birth date and
                                                                          address to favorite books, to travel destinations, etc.). It
   3 Citibank serves the online form for contacting customer service over
                                                                          may be possible to de-anonymize users by comparing
HTTPS only after the customer logs in.
                                                                          such information across social networking sites, even if
   4 Google Talk contacts are everyone with whom a user has chatted,

                                                                          the information is partially obfuscated in each networking
which might include co-workers, supervisors, and friends.


                                                                  2
site5 .                                                                           In the case of unwelcome linkage, the compromising
                                                                               information about a user is already out there on the Web,
   This issue becomes particularly pertinent today as peo-
                                                                               but the user expects that this information is hard-to-find
ple are getting tired of constantly redeclaring their friends
                                                                               and that they will be able to keep it away from certain
in different contexts, leading to the idea that aggregation
                                                                               audiences. This expectation, however, is not in line with
and centralization of these relationships is needed [4].
                                                                               how certain software (like backtracking features of blogs)
The problem here is preserving implicit and explicit ex-
                                                                               works. This area will be increasingly challenging, with
pectations about the use of the data when it is divorced
                                                                               new technologies that eagerly link up portions of the web
from its original context. If, for example, Bob, as a user
                                                                               that users thought separate.
of various networks, mines those for ways to correlate
his friends’ accounts across networks using data such as                          Finally, merging social graphs of different social net-
favorite books and movies to match them, then he has                           working sites may upset the model that users express quite
probably not violated any reasonable expectations of his                       explicitly by creating different personae in different social
friends.                                                                       networks. Those personae may overlap just enough to link
   But if he then publishes that aggregated view he may                        them up and identify them as facets of the same human
very well be revealing things his friends would prefer                         being.
he did not. They may not even know he had access to                               From these observations flow naturally a few design
that data; for example, suppose Alice has an alter-ego,                        implications for social networking sites and social net-
Vinylgirl, and Bob has one, Leatherboy. Alice and Bob                          working features of Web applications, which we summa-
know each other on some ordinary site like Facebook or                         rize below. These are not intended to be comprehensive
LinkedIn, but Leatherboy and Vinylgirl are also friends on                     or definitive solutions, but a set of possible design models
some site for those of different sexuality. Bob (or rather                     as developers continue to innovate in social networking.
his software) might perhaps correlate Alice and Vinylgirl
                                                                               Activity Streams First, users should be explicitly aware
but she may not be happy for Bob to learn this correlation,
                                                                               of every event that gets fed into their activity stream.
and certainly not to publish that information on some cen-
                                                                               While that may not necessarily mean that every time such
tralized social graph repository.
                                                                               an event is generated the user receives a message, applica-
   Of particular importance here is that Alice did not
                                                                               tions should be explicit about which activities of the user
actively participate in revealing her alter-ago. Bob’s
                                                                               generate events for their activity stream.
decision to reveal the correlation between himself and
                                                                                  Second, users should be given control over which
Leatherboy has led to Alice being involuntarily outed.
                                                                               events make it into their activity stream. For example,
Furthermore, the outing could be even more indirect —
                                                                               it would be good if a user could block a single event
for example, Bob might himself have been outed by some
                                                                               from being added to their activity stream, install filters
“friend” of his. A cascade failure could lead to some quite
                                                                               that block classes of events, or disable whole applications
small change in the graph causing a huge amount of data
                                                                               from posting to their activity stream. Users should be able
to be correlate-able.
                                                                               to remove events from the activity stream after they have
                                                                               been added to it by an application.
5 Recommendations
                                                                                  Third, users should be explicitly aware of who the audi-
                                                                               ence is for their activity stream. The user interface of the
In the previous sections we introduced three new areas
                                                                               social networking site should make it easy to list all the
where social networking sites can compromise user pri-
                                                                               principals that can see certain events in the activity stream,
vacy. All three problem areas had in common that while
                                                                               both at event creation time and later, after the event has
the systems worked as intended by their designers, users
                                                                               been added to the activity stream.
were unprepared for the change in the use of their data
                                                                                  Fourth, users should be in control over who the audi-
and their social networks.
                                                                               ence is for their activity stream. It should be easy to re-
   In the case of the activity stream, users form certain ex-
                                                                               move and add principals from that audience, both from the
pectations about which events will be fed into their activ-
                                                                               activity stream as a whole as well as from single events.
ity stream, and who the audience is that gets to see their
                                                                                  Finally, application developers should build their appli-
activity stream. Users will be surprised and confused if
                                                                               cations such that the creation of activity stream events is
social networking sites don’t meet those expectations.
                                                                               more likely to be in sync with the user’s expectation. For
    5 See the deanonymization of the Netflix ratings data by joining pub-
                                                                               example, the coComment software could, instead of post-
licly available data from the Internet Movie Database set by Narayanan
                                                                               ing every entry the user makes into an HTML form, only
and Shmatikov [8], or attacks on deanonymized social graphs by Back-
                                                                               post those entries that appear in an RSS feed discoverable
strom et al. [1].


                                                                           3
from the page to which the HTML form is posted6 .                                   • feeding unanticipated events into their activity
                                                                                      stream, or exposing their activity stream to an unan-
   All of these recommendations pose significant usability
                                                                                      ticipated audience,
challenges in designing interfaces to minimize cognitive
                                                                                    • eagerly and automatically linking between pages
burden while preserving user choice.
                                                                                      representing users’ different personae, and by
                                                                                    • mining different social networks for the purpose of
Unwanted Linkage To combat unwanted linkage, we
again propose to build tools that make explicit what infor-                           merging users’ social graph.
mation is available about users on the Internet (and poten-
                                                                                     In each of those cases, we believe that the root of prob-
tially only one unanticipated trackback URL away). We
                                                                                  lems in the past has been a discrepancy between the men-
propose building a tool for automatic link discovery —
                                                                                  tal model the user formed about the system, and how it
whenever a user creates content on the web, show the user
                                                                                  actually worked. The key to solving the problems, then,
what information would be revealed by finding the transi-
                                                                                  is to align users’ anticipations of the system with its actual
tive closure of profile-related links, so the user can decide
                                                                                  workings.
whether or not publishing that content creates too many
                                                                                     This can either happen by adjusting the system to fit
leaks. The automated link discovery could mitigate nasty
                                                                                  the mental model of the user (e.g., by making coComment
surprises in the case of Bob’s blog, for example. Although
                                                                                  more selective about which items it posts to the user’s ac-
this solution reduces the cognitive burden of the user to
                                                                                  tivity stream), by making explicit how the system works
figure out available inferences from the social graph, it
                                                                                  (e.g., by notifying users what information about them can
does not eliminate the burden entirely.
                                                                                  be inferred from the data available in two different social
   Recently Google released a social graph API that al-
                                                                                  networking sites), or by giving users more control over the
lows developers to find publicly available links to or from
                                                                                  system (e.g., by letting the user have fine-grained control
a particular URL. The social graph API is a potential
                                                                                  over the events fed into their activity stream).
building block for an automatic link discovery tool.
                                                                                     More work is needed in particular in the latter two cat-
   It would also be useful to give users a choice between                         egories: how do we find out, and inform the user, about
“linked” and “link-free” versions of certain services. For                        inferences that can be made about them, given the infor-
example, Bob’s blog should have an easy switch to turn                            mation in different social networking sites; and how do
off trackbacks. Similarly, Flickr could allow users to                            we give users controls they can understand and use that
maintain different aliases for different photo sets and                           allow them to manage their privacy in an increasingly in-
groups for easier separation of different personae.                               terlinked world of social networks.
Merging Social Graphs To address the problem of
merging social graphs we propose tools similar to those
                                                                                  References
used to detect inferences on the Web [10]. Armed with
such tools, users who sign up for their n + 1-th social net-                       [1] Lars Backstrom, Cynthia Dwork, and Jon Kleinberg.
working site could be warned that the information they                                 Wherefore art thou r3579x?: anonymized social net-
provide to that site can be used together with the infor-                              works, hidden patterns, and structural steganogra-
mation they provided on the previous n sites to infer their                            phy. In Proceedings of the 16th international con-
identity. Again, as in the previous two cases, the goal is                             ference on World Wide Web, 2007.
to make explicit the consequences for the user’s privacy if                        [2] danah m. boyd and Nicole B Ellison. Social network
they go through with a certain action (in this case, giving                            sites: Definition, history, and scholarship. Journal of
information to yet another social networking site).                                    Computer-Mediated Communication, 13(1), 2007.
                                                                                   [3] Rachna Dhamija and Lisa Dusseault. The seven
6 Conclusions                                                                          flaws of identity management: Usability and secu-
                                                                                       rity challenges, 2008. IEEE Security and Privacy
                                                                                       Special Issue on Identity Management, To Appear.
In this position paper, we identify three new privacy-
                                                                                   [4] Brad Fitzpatrick and David Recordon. Thoughts on
sensitive areas in the world of interlinked social networks.
                                                                                       the social graph, 2007. http://bradfitz.com/social-
A user’s privacy can be compromised by
                                                                                       graph-problem/.
   6 Many blogs have two RSS feeds discoverable from a blog post:
                                                                                   [5] Miguel Helft.       Google thinks it knows your
the feed of the blog itself, and the feed for comments of this particular
                                                                                       friends, December 2007. http://bits.blogs.nytimes.
post. Looking for this pattern as a heuristic should drastically reduce the
                                                                                       com/2007/12/26/google-thinks-it-knows-your-
amount of “false positives”, i.e., events that were posted but shouldn’t
                                                                                       friends/?ref=technology.
have been.


                                                                              4
[6] Caroline McCarthy. MoveOn.org takes on Face-
     book’s ‘Beacon’ ads, November 2007. http://www.
     news.com/8301-13577 3-9821170-36.html.
 [7] Ellen Nakashima. Feeling betrayed, Facebook
     users force site to honor their privacy, Novem-
     ber 2007.       http://www.washingtonpost.com/wp-
     dyn/content/article/2007/11/29/AR2007112902503.
     html?hpid=topnews&sub=AR.
 [8] Arvind Narayanan and Vitaly Shmatikov. How to
     break anonymity of the netflix prize dataset, 2006.
 [9] John Ratcliffe-Lee. Huge security hole in Citibank’s
     online account center, March 2007. http://jratlee.
     tumblr.com/post/189652.
[10] J. Staddon, P. Golle, and B. Zimny. Web-based infer-
     ence detection. In Proceedings of USENIX Security
     2007, 2007.




                                                            5

Weitere ähnliche Inhalte

Was ist angesagt?

Opening up social networks - Renato Iannella
Opening up social networks - Renato IannellaOpening up social networks - Renato Iannella
Opening up social networks - Renato IannellaWeb Directions
 
Making Links, Reaching out or Moving Closer connecting with your networked Co...
Making Links, Reaching out or Moving Closer connecting with your networked Co...Making Links, Reaching out or Moving Closer connecting with your networked Co...
Making Links, Reaching out or Moving Closer connecting with your networked Co...Penny Hagen
 
Seven Social Media Secrets
Seven Social Media SecretsSeven Social Media Secrets
Seven Social Media SecretsiStrategy
 
Assignment #12 (iiiii) (p1)planning for documentary
Assignment #12 (iiiii) (p1)planning for documentaryAssignment #12 (iiiii) (p1)planning for documentary
Assignment #12 (iiiii) (p1)planning for documentaryAbc Abc
 
N1 how to guide: blogging for profit
N1 how to guide: blogging for profitN1 how to guide: blogging for profit
N1 how to guide: blogging for profitAndrew Grant
 
Guide social networks EN (Government of Catalonia)
Guide social networks EN (Government of Catalonia)Guide social networks EN (Government of Catalonia)
Guide social networks EN (Government of Catalonia)gencat .
 
News gator socialsites_features
News gator socialsites_featuresNews gator socialsites_features
News gator socialsites_featuresSankaran D
 
NASA and Social Media - Ragan Conference
NASA and Social Media - Ragan ConferenceNASA and Social Media - Ragan Conference
NASA and Social Media - Ragan ConferenceStephanie Schierholz
 
Assignment 12 (ii)_-_planning_for_documentary_draft_2[1] kfjdgdh
Assignment 12 (ii)_-_planning_for_documentary_draft_2[1] kfjdgdhAssignment 12 (ii)_-_planning_for_documentary_draft_2[1] kfjdgdh
Assignment 12 (ii)_-_planning_for_documentary_draft_2[1] kfjdgdhAbc Abc
 
Assignment 12 (ii) planning for documentary draft two
Assignment 12 (ii)   planning for documentary draft twoAssignment 12 (ii)   planning for documentary draft two
Assignment 12 (ii) planning for documentary draft twoksumbland
 
Bay Area Childrens Theatre DMA
Bay Area Childrens Theatre DMABay Area Childrens Theatre DMA
Bay Area Childrens Theatre DMADevon Smith
 
Understanding The Engagement Factor
Understanding The Engagement FactorUnderstanding The Engagement Factor
Understanding The Engagement Factor4Good.org
 
An Artist's guide to social media
An Artist's guide to social mediaAn Artist's guide to social media
An Artist's guide to social mediaAlexia GUGGEMOS
 
Fresh Grad Social Media Strategy
Fresh Grad Social Media StrategyFresh Grad Social Media Strategy
Fresh Grad Social Media StrategyDeborah Choi
 
Assignment 12 (ii) planning for documentary draft three
Assignment 12 (ii)   planning for documentary draft threeAssignment 12 (ii)   planning for documentary draft three
Assignment 12 (ii) planning for documentary draft threeksumbland
 

Was ist angesagt? (20)

Opening up social networks - Renato Iannella
Opening up social networks - Renato IannellaOpening up social networks - Renato Iannella
Opening up social networks - Renato Iannella
 
Making Links, Reaching out or Moving Closer connecting with your networked Co...
Making Links, Reaching out or Moving Closer connecting with your networked Co...Making Links, Reaching out or Moving Closer connecting with your networked Co...
Making Links, Reaching out or Moving Closer connecting with your networked Co...
 
La web 2.0
La web 2.0La web 2.0
La web 2.0
 
Seven Social Media Secrets
Seven Social Media SecretsSeven Social Media Secrets
Seven Social Media Secrets
 
Assignment #12 (iiiii) (p1)planning for documentary
Assignment #12 (iiiii) (p1)planning for documentaryAssignment #12 (iiiii) (p1)planning for documentary
Assignment #12 (iiiii) (p1)planning for documentary
 
N1 how to guide: blogging for profit
N1 how to guide: blogging for profitN1 how to guide: blogging for profit
N1 how to guide: blogging for profit
 
Guide social networks EN (Government of Catalonia)
Guide social networks EN (Government of Catalonia)Guide social networks EN (Government of Catalonia)
Guide social networks EN (Government of Catalonia)
 
News gator socialsites_features
News gator socialsites_featuresNews gator socialsites_features
News gator socialsites_features
 
NASA and Social Media - Ragan Conference
NASA and Social Media - Ragan ConferenceNASA and Social Media - Ragan Conference
NASA and Social Media - Ragan Conference
 
Assignment 12 (ii)_-_planning_for_documentary_draft_2[1] kfjdgdh
Assignment 12 (ii)_-_planning_for_documentary_draft_2[1] kfjdgdhAssignment 12 (ii)_-_planning_for_documentary_draft_2[1] kfjdgdh
Assignment 12 (ii)_-_planning_for_documentary_draft_2[1] kfjdgdh
 
Assignment 12 (ii) planning for documentary draft two
Assignment 12 (ii)   planning for documentary draft twoAssignment 12 (ii)   planning for documentary draft two
Assignment 12 (ii) planning for documentary draft two
 
Bay Area Childrens Theatre DMA
Bay Area Childrens Theatre DMABay Area Childrens Theatre DMA
Bay Area Childrens Theatre DMA
 
Social Media at NASA, 2012 Edition
Social Media at NASA, 2012 EditionSocial Media at NASA, 2012 Edition
Social Media at NASA, 2012 Edition
 
Understanding The Engagement Factor
Understanding The Engagement FactorUnderstanding The Engagement Factor
Understanding The Engagement Factor
 
Creating Social Media Worth Following at NASA
Creating Social Media Worth Following at NASACreating Social Media Worth Following at NASA
Creating Social Media Worth Following at NASA
 
An Artist's guide to social media
An Artist's guide to social mediaAn Artist's guide to social media
An Artist's guide to social media
 
NASA Socials & the Mars Curiosity Landing
NASA Socials & the Mars Curiosity LandingNASA Socials & the Mars Curiosity Landing
NASA Socials & the Mars Curiosity Landing
 
Fresh Grad Social Media Strategy
Fresh Grad Social Media StrategyFresh Grad Social Media Strategy
Fresh Grad Social Media Strategy
 
Assignment 12 (ii) planning for documentary draft three
Assignment 12 (ii)   planning for documentary draft threeAssignment 12 (ii)   planning for documentary draft three
Assignment 12 (ii) planning for documentary draft three
 
How NASA Uses Social Media to Connect
How NASA Uses Social Media to ConnectHow NASA Uses Social Media to Connect
How NASA Uses Social Media to Connect
 

Andere mochten auch

Webマイニングと情報論的学習理論
Webマイニングと情報論的学習理論Webマイニングと情報論的学習理論
Webマイニングと情報論的学習理論Hiroshi Ono
 
Page 1 Splog Detection Using Self-similarity Analysis on Blog Temporal Dynamics
Page 1 Splog Detection Using Self-similarity Analysis on Blog Temporal Dynamics Page 1 Splog Detection Using Self-similarity Analysis on Blog Temporal Dynamics
Page 1 Splog Detection Using Self-similarity Analysis on Blog Temporal Dynamics Hiroshi Ono
 
Hyper Estraierの設計と実装
Hyper Estraierの設計と実装Hyper Estraierの設計と実装
Hyper Estraierの設計と実装Hiroshi Ono
 
東京大学工学部計数工学科応用音響学 D2 Clustering
東京大学工学部計数工学科応用音響学 D2 Clustering東京大学工学部計数工学科応用音響学 D2 Clustering
東京大学工学部計数工学科応用音響学 D2 ClusteringHiroshi Ono
 
Parallel_Computing_future
Parallel_Computing_futureParallel_Computing_future
Parallel_Computing_futureHiroshi Ono
 
genpaxospublic-090703114743-phpapp01.pdf
genpaxospublic-090703114743-phpapp01.pdfgenpaxospublic-090703114743-phpapp01.pdf
genpaxospublic-090703114743-phpapp01.pdfHiroshi Ono
 
pragmaticrealworldscalajfokus2009-1233251076441384-2.pdf
pragmaticrealworldscalajfokus2009-1233251076441384-2.pdfpragmaticrealworldscalajfokus2009-1233251076441384-2.pdf
pragmaticrealworldscalajfokus2009-1233251076441384-2.pdfHiroshi Ono
 
program_draft3.pdf
program_draft3.pdfprogram_draft3.pdf
program_draft3.pdfHiroshi Ono
 
SACSIS2009_TCP.pdf
SACSIS2009_TCP.pdfSACSIS2009_TCP.pdf
SACSIS2009_TCP.pdfHiroshi Ono
 
scalaliftoff2009.pdf
scalaliftoff2009.pdfscalaliftoff2009.pdf
scalaliftoff2009.pdfHiroshi Ono
 
Mis Pasatiempos Favoritos
Mis Pasatiempos FavoritosMis Pasatiempos Favoritos
Mis Pasatiempos Favoritosmarypazgd
 
Peran Pers Berantas Korupsi oleh Bibit Samad R (7 Desember 2011)
Peran Pers Berantas Korupsi   oleh Bibit Samad R (7 Desember 2011)Peran Pers Berantas Korupsi   oleh Bibit Samad R (7 Desember 2011)
Peran Pers Berantas Korupsi oleh Bibit Samad R (7 Desember 2011)ajijogja
 
Kalenadarz wydarzeń na grudzień 2011.
Kalenadarz wydarzeń na grudzień 2011.Kalenadarz wydarzeń na grudzień 2011.
Kalenadarz wydarzeń na grudzień 2011.studenci
 
Mat em funcoes trigonometricas sol vol1 cap9 parte 1
Mat em funcoes trigonometricas sol vol1 cap9 parte 1Mat em funcoes trigonometricas sol vol1 cap9 parte 1
Mat em funcoes trigonometricas sol vol1 cap9 parte 1trigono_metrico
 
Mat utfrs 24. unidades de medidas si
Mat utfrs 24. unidades de medidas siMat utfrs 24. unidades de medidas si
Mat utfrs 24. unidades de medidas sitrigono_metria
 
Aktiviti sekolah 2011
Aktiviti sekolah 2011Aktiviti sekolah 2011
Aktiviti sekolah 2011葡萄 红
 
Que es-la-robotica
Que es-la-roboticaQue es-la-robotica
Que es-la-roboticaSulma Campos
 
A info-obesidade e os desafios da nova publicidade
A info-obesidade e os desafios da nova publicidadeA info-obesidade e os desafios da nova publicidade
A info-obesidade e os desafios da nova publicidadeMichel Lent Schwartzman
 

Andere mochten auch (20)

Webマイニングと情報論的学習理論
Webマイニングと情報論的学習理論Webマイニングと情報論的学習理論
Webマイニングと情報論的学習理論
 
Page 1 Splog Detection Using Self-similarity Analysis on Blog Temporal Dynamics
Page 1 Splog Detection Using Self-similarity Analysis on Blog Temporal Dynamics Page 1 Splog Detection Using Self-similarity Analysis on Blog Temporal Dynamics
Page 1 Splog Detection Using Self-similarity Analysis on Blog Temporal Dynamics
 
Hyper Estraierの設計と実装
Hyper Estraierの設計と実装Hyper Estraierの設計と実装
Hyper Estraierの設計と実装
 
東京大学工学部計数工学科応用音響学 D2 Clustering
東京大学工学部計数工学科応用音響学 D2 Clustering東京大学工学部計数工学科応用音響学 D2 Clustering
東京大学工学部計数工学科応用音響学 D2 Clustering
 
Parallel_Computing_future
Parallel_Computing_futureParallel_Computing_future
Parallel_Computing_future
 
genpaxospublic-090703114743-phpapp01.pdf
genpaxospublic-090703114743-phpapp01.pdfgenpaxospublic-090703114743-phpapp01.pdf
genpaxospublic-090703114743-phpapp01.pdf
 
pragmaticrealworldscalajfokus2009-1233251076441384-2.pdf
pragmaticrealworldscalajfokus2009-1233251076441384-2.pdfpragmaticrealworldscalajfokus2009-1233251076441384-2.pdf
pragmaticrealworldscalajfokus2009-1233251076441384-2.pdf
 
program_draft3.pdf
program_draft3.pdfprogram_draft3.pdf
program_draft3.pdf
 
SACSIS2009_TCP.pdf
SACSIS2009_TCP.pdfSACSIS2009_TCP.pdf
SACSIS2009_TCP.pdf
 
scalaliftoff2009.pdf
scalaliftoff2009.pdfscalaliftoff2009.pdf
scalaliftoff2009.pdf
 
Mis Pasatiempos Favoritos
Mis Pasatiempos FavoritosMis Pasatiempos Favoritos
Mis Pasatiempos Favoritos
 
Peran Pers Berantas Korupsi oleh Bibit Samad R (7 Desember 2011)
Peran Pers Berantas Korupsi   oleh Bibit Samad R (7 Desember 2011)Peran Pers Berantas Korupsi   oleh Bibit Samad R (7 Desember 2011)
Peran Pers Berantas Korupsi oleh Bibit Samad R (7 Desember 2011)
 
Adornos navidad
Adornos  navidadAdornos  navidad
Adornos navidad
 
Bamford Script
Bamford ScriptBamford Script
Bamford Script
 
Kalenadarz wydarzeń na grudzień 2011.
Kalenadarz wydarzeń na grudzień 2011.Kalenadarz wydarzeń na grudzień 2011.
Kalenadarz wydarzeń na grudzień 2011.
 
Mat em funcoes trigonometricas sol vol1 cap9 parte 1
Mat em funcoes trigonometricas sol vol1 cap9 parte 1Mat em funcoes trigonometricas sol vol1 cap9 parte 1
Mat em funcoes trigonometricas sol vol1 cap9 parte 1
 
Mat utfrs 24. unidades de medidas si
Mat utfrs 24. unidades de medidas siMat utfrs 24. unidades de medidas si
Mat utfrs 24. unidades de medidas si
 
Aktiviti sekolah 2011
Aktiviti sekolah 2011Aktiviti sekolah 2011
Aktiviti sekolah 2011
 
Que es-la-robotica
Que es-la-roboticaQue es-la-robotica
Que es-la-robotica
 
A info-obesidade e os desafios da nova publicidade
A info-obesidade e os desafios da nova publicidadeA info-obesidade e os desafios da nova publicidade
A info-obesidade e os desafios da nova publicidade
 

Ähnlich wie s3p2

Web 2.0 / Library 2.0 Part One
Web 2.0 / Library 2.0 Part OneWeb 2.0 / Library 2.0 Part One
Web 2.0 / Library 2.0 Part OneEddie Byrne
 
Social networks , Job Searching and Research - 1
Social networks , Job Searching and Research - 1Social networks , Job Searching and Research - 1
Social networks , Job Searching and Research - 1Carlo Vaccari
 
Web2.0.2012 - lesson 9 - social networks
Web2.0.2012 - lesson 9 - social networksWeb2.0.2012 - lesson 9 - social networks
Web2.0.2012 - lesson 9 - social networksCarlo Vaccari
 
Activitystreams 002
Activitystreams 002Activitystreams 002
Activitystreams 002face0
 
Web 2.0 Map For User 2.0
Web 2.0 Map For User 2.0Web 2.0 Map For User 2.0
Web 2.0 Map For User 2.0Danish Ahmed
 
Library 2.0 Presentation (Ltr Group 2)
Library 2.0 Presentation (Ltr Group 2)Library 2.0 Presentation (Ltr Group 2)
Library 2.0 Presentation (Ltr Group 2)jenpost87
 
Library 2.0 Presentation
Library 2.0 PresentationLibrary 2.0 Presentation
Library 2.0 Presentationbethbouwman
 
Web 20-library-20-part-one-7907
Web 20-library-20-part-one-7907Web 20-library-20-part-one-7907
Web 20-library-20-part-one-7907Vrij Kishor Mishra
 
Social Media Glossary
Social Media GlossarySocial Media Glossary
Social Media GlossaryJames Kane
 
Library 2.0 Presentation: SC&I 550 Fall 2009
Library 2.0 Presentation: SC&I 550 Fall 2009Library 2.0 Presentation: SC&I 550 Fall 2009
Library 2.0 Presentation: SC&I 550 Fall 2009guest4bff3e6
 
Tools Cards
Tools CardsTools Cards
Tools CardsLasa UK
 
Everything You Need To Know About Social Media
Everything You Need To Know About Social MediaEverything You Need To Know About Social Media
Everything You Need To Know About Social MediaLisa Trank
 
Kaplan and haenlein 2010 Users of the world, unite! The challenges and opport...
Kaplan and haenlein 2010 Users of the world, unite! The challenges and opport...Kaplan and haenlein 2010 Users of the world, unite! The challenges and opport...
Kaplan and haenlein 2010 Users of the world, unite! The challenges and opport...Twittercrisis
 
Kaplan -- What is social media
Kaplan -- What is social mediaKaplan -- What is social media
Kaplan -- What is social mediaNikki Usher
 
Executive Summary Ayub Jake Salik Mba Itm Thesis 2008
Executive Summary Ayub Jake Salik Mba  Itm Thesis 2008Executive Summary Ayub Jake Salik Mba  Itm Thesis 2008
Executive Summary Ayub Jake Salik Mba Itm Thesis 2008Ayub Jake Salik, BE, MBA
 
Lesson 1: Intoduction to ICT
Lesson 1: Intoduction to ICTLesson 1: Intoduction to ICT
Lesson 1: Intoduction to ICTLyka Larita
 
Apps, APIs and Opportunities: Platform integration and opportunities
Apps, APIs and Opportunities: Platform integration and opportunitiesApps, APIs and Opportunities: Platform integration and opportunities
Apps, APIs and Opportunities: Platform integration and opportunitiesViadeo
 
Top Social Media Websites Database
Top Social Media Websites DatabaseTop Social Media Websites Database
Top Social Media Websites DatabaseDemand Metric
 

Ähnlich wie s3p2 (20)

Web 2.0 / Library 2.0 Part One
Web 2.0 / Library 2.0 Part OneWeb 2.0 / Library 2.0 Part One
Web 2.0 / Library 2.0 Part One
 
Social networks , Job Searching and Research - 1
Social networks , Job Searching and Research - 1Social networks , Job Searching and Research - 1
Social networks , Job Searching and Research - 1
 
Web2.0.2012 - lesson 9 - social networks
Web2.0.2012 - lesson 9 - social networksWeb2.0.2012 - lesson 9 - social networks
Web2.0.2012 - lesson 9 - social networks
 
Activitystreams 002
Activitystreams 002Activitystreams 002
Activitystreams 002
 
Web 2.0 Map For User 2.0
Web 2.0 Map For User 2.0Web 2.0 Map For User 2.0
Web 2.0 Map For User 2.0
 
Library 2.0 Presentation (Ltr Group 2)
Library 2.0 Presentation (Ltr Group 2)Library 2.0 Presentation (Ltr Group 2)
Library 2.0 Presentation (Ltr Group 2)
 
Library 2.0 Presentation
Library 2.0 PresentationLibrary 2.0 Presentation
Library 2.0 Presentation
 
Web 20-library-20-part-one-7907
Web 20-library-20-part-one-7907Web 20-library-20-part-one-7907
Web 20-library-20-part-one-7907
 
Social Media Glossary
Social Media GlossarySocial Media Glossary
Social Media Glossary
 
Fb Another Breach In The Wall
Fb Another Breach In The WallFb Another Breach In The Wall
Fb Another Breach In The Wall
 
Library 2.0 Presentation: SC&I 550 Fall 2009
Library 2.0 Presentation: SC&I 550 Fall 2009Library 2.0 Presentation: SC&I 550 Fall 2009
Library 2.0 Presentation: SC&I 550 Fall 2009
 
D3 unit 2 explorer
D3 unit 2 explorerD3 unit 2 explorer
D3 unit 2 explorer
 
Tools Cards
Tools CardsTools Cards
Tools Cards
 
Everything You Need To Know About Social Media
Everything You Need To Know About Social MediaEverything You Need To Know About Social Media
Everything You Need To Know About Social Media
 
Kaplan and haenlein 2010 Users of the world, unite! The challenges and opport...
Kaplan and haenlein 2010 Users of the world, unite! The challenges and opport...Kaplan and haenlein 2010 Users of the world, unite! The challenges and opport...
Kaplan and haenlein 2010 Users of the world, unite! The challenges and opport...
 
Kaplan -- What is social media
Kaplan -- What is social mediaKaplan -- What is social media
Kaplan -- What is social media
 
Executive Summary Ayub Jake Salik Mba Itm Thesis 2008
Executive Summary Ayub Jake Salik Mba  Itm Thesis 2008Executive Summary Ayub Jake Salik Mba  Itm Thesis 2008
Executive Summary Ayub Jake Salik Mba Itm Thesis 2008
 
Lesson 1: Intoduction to ICT
Lesson 1: Intoduction to ICTLesson 1: Intoduction to ICT
Lesson 1: Intoduction to ICT
 
Apps, APIs and Opportunities: Platform integration and opportunities
Apps, APIs and Opportunities: Platform integration and opportunitiesApps, APIs and Opportunities: Platform integration and opportunities
Apps, APIs and Opportunities: Platform integration and opportunities
 
Top Social Media Websites Database
Top Social Media Websites DatabaseTop Social Media Websites Database
Top Social Media Websites Database
 

Mehr von Hiroshi Ono

Voltdb - wikipedia
Voltdb - wikipediaVoltdb - wikipedia
Voltdb - wikipediaHiroshi Ono
 
Gamecenter概説
Gamecenter概説Gamecenter概説
Gamecenter概説Hiroshi Ono
 
EventDrivenArchitecture
EventDrivenArchitectureEventDrivenArchitecture
EventDrivenArchitectureHiroshi Ono
 
program_draft3.pdf
program_draft3.pdfprogram_draft3.pdf
program_draft3.pdfHiroshi Ono
 
nodalities_issue7.pdf
nodalities_issue7.pdfnodalities_issue7.pdf
nodalities_issue7.pdfHiroshi Ono
 
genpaxospublic-090703114743-phpapp01.pdf
genpaxospublic-090703114743-phpapp01.pdfgenpaxospublic-090703114743-phpapp01.pdf
genpaxospublic-090703114743-phpapp01.pdfHiroshi Ono
 
kademlia-1227143905867010-8.pdf
kademlia-1227143905867010-8.pdfkademlia-1227143905867010-8.pdf
kademlia-1227143905867010-8.pdfHiroshi Ono
 
pragmaticrealworldscalajfokus2009-1233251076441384-2.pdf
pragmaticrealworldscalajfokus2009-1233251076441384-2.pdfpragmaticrealworldscalajfokus2009-1233251076441384-2.pdf
pragmaticrealworldscalajfokus2009-1233251076441384-2.pdfHiroshi Ono
 
downey08semaphores.pdf
downey08semaphores.pdfdowney08semaphores.pdf
downey08semaphores.pdfHiroshi Ono
 
BOF1-Scala02.pdf
BOF1-Scala02.pdfBOF1-Scala02.pdf
BOF1-Scala02.pdfHiroshi Ono
 
TwitterOct2008.pdf
TwitterOct2008.pdfTwitterOct2008.pdf
TwitterOct2008.pdfHiroshi Ono
 
stateyouredoingitwrongjavaone2009-090617031310-phpapp02.pdf
stateyouredoingitwrongjavaone2009-090617031310-phpapp02.pdfstateyouredoingitwrongjavaone2009-090617031310-phpapp02.pdf
stateyouredoingitwrongjavaone2009-090617031310-phpapp02.pdfHiroshi Ono
 
scalaliftoff2009.pdf
scalaliftoff2009.pdfscalaliftoff2009.pdf
scalaliftoff2009.pdfHiroshi Ono
 
stateyouredoingitwrongjavaone2009-090617031310-phpapp02.pdf
stateyouredoingitwrongjavaone2009-090617031310-phpapp02.pdfstateyouredoingitwrongjavaone2009-090617031310-phpapp02.pdf
stateyouredoingitwrongjavaone2009-090617031310-phpapp02.pdfHiroshi Ono
 
nodalities_issue7.pdf
nodalities_issue7.pdfnodalities_issue7.pdf
nodalities_issue7.pdfHiroshi Ono
 
genpaxospublic-090703114743-phpapp01.pdf
genpaxospublic-090703114743-phpapp01.pdfgenpaxospublic-090703114743-phpapp01.pdf
genpaxospublic-090703114743-phpapp01.pdfHiroshi Ono
 
kademlia-1227143905867010-8.pdf
kademlia-1227143905867010-8.pdfkademlia-1227143905867010-8.pdf
kademlia-1227143905867010-8.pdfHiroshi Ono
 
pragmaticrealworldscalajfokus2009-1233251076441384-2.pdf
pragmaticrealworldscalajfokus2009-1233251076441384-2.pdfpragmaticrealworldscalajfokus2009-1233251076441384-2.pdf
pragmaticrealworldscalajfokus2009-1233251076441384-2.pdfHiroshi Ono
 
downey08semaphores.pdf
downey08semaphores.pdfdowney08semaphores.pdf
downey08semaphores.pdfHiroshi Ono
 

Mehr von Hiroshi Ono (20)

Voltdb - wikipedia
Voltdb - wikipediaVoltdb - wikipedia
Voltdb - wikipedia
 
Gamecenter概説
Gamecenter概説Gamecenter概説
Gamecenter概説
 
EventDrivenArchitecture
EventDrivenArchitectureEventDrivenArchitecture
EventDrivenArchitecture
 
program_draft3.pdf
program_draft3.pdfprogram_draft3.pdf
program_draft3.pdf
 
nodalities_issue7.pdf
nodalities_issue7.pdfnodalities_issue7.pdf
nodalities_issue7.pdf
 
genpaxospublic-090703114743-phpapp01.pdf
genpaxospublic-090703114743-phpapp01.pdfgenpaxospublic-090703114743-phpapp01.pdf
genpaxospublic-090703114743-phpapp01.pdf
 
kademlia-1227143905867010-8.pdf
kademlia-1227143905867010-8.pdfkademlia-1227143905867010-8.pdf
kademlia-1227143905867010-8.pdf
 
pragmaticrealworldscalajfokus2009-1233251076441384-2.pdf
pragmaticrealworldscalajfokus2009-1233251076441384-2.pdfpragmaticrealworldscalajfokus2009-1233251076441384-2.pdf
pragmaticrealworldscalajfokus2009-1233251076441384-2.pdf
 
downey08semaphores.pdf
downey08semaphores.pdfdowney08semaphores.pdf
downey08semaphores.pdf
 
BOF1-Scala02.pdf
BOF1-Scala02.pdfBOF1-Scala02.pdf
BOF1-Scala02.pdf
 
TwitterOct2008.pdf
TwitterOct2008.pdfTwitterOct2008.pdf
TwitterOct2008.pdf
 
camel-scala.pdf
camel-scala.pdfcamel-scala.pdf
camel-scala.pdf
 
stateyouredoingitwrongjavaone2009-090617031310-phpapp02.pdf
stateyouredoingitwrongjavaone2009-090617031310-phpapp02.pdfstateyouredoingitwrongjavaone2009-090617031310-phpapp02.pdf
stateyouredoingitwrongjavaone2009-090617031310-phpapp02.pdf
 
scalaliftoff2009.pdf
scalaliftoff2009.pdfscalaliftoff2009.pdf
scalaliftoff2009.pdf
 
stateyouredoingitwrongjavaone2009-090617031310-phpapp02.pdf
stateyouredoingitwrongjavaone2009-090617031310-phpapp02.pdfstateyouredoingitwrongjavaone2009-090617031310-phpapp02.pdf
stateyouredoingitwrongjavaone2009-090617031310-phpapp02.pdf
 
nodalities_issue7.pdf
nodalities_issue7.pdfnodalities_issue7.pdf
nodalities_issue7.pdf
 
genpaxospublic-090703114743-phpapp01.pdf
genpaxospublic-090703114743-phpapp01.pdfgenpaxospublic-090703114743-phpapp01.pdf
genpaxospublic-090703114743-phpapp01.pdf
 
kademlia-1227143905867010-8.pdf
kademlia-1227143905867010-8.pdfkademlia-1227143905867010-8.pdf
kademlia-1227143905867010-8.pdf
 
pragmaticrealworldscalajfokus2009-1233251076441384-2.pdf
pragmaticrealworldscalajfokus2009-1233251076441384-2.pdfpragmaticrealworldscalajfokus2009-1233251076441384-2.pdf
pragmaticrealworldscalajfokus2009-1233251076441384-2.pdf
 
downey08semaphores.pdf
downey08semaphores.pdfdowney08semaphores.pdf
downey08semaphores.pdf
 

Kürzlich hochgeladen

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 

Kürzlich hochgeladen (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 

s3p2

  • 1. (Under)mining Privacy in Social Networks Ben Laurie∗ Monica Chew Dirk Balfanz {mmc,balfanz,benl}@google.com Google Inc. 1 Introduction “updates.” A user’s activity stream is typically viewable by their friends, as defined by the social networking site. Social networking sites like Facebook or MySpace allow There are two fundamental ways in which lack of con- users to keep in touch with their friends, communicate and trol over activity streams may compromise a user’s pri- share content with them, as well as engage in other multi- vacy. First, a user may not be aware of all the events that user applications. What distinguishes such sites from are fed into their activity stream. Second, a user may not other, pre-“web 2.0” applications is that users make ex- be aware of the audience who can see their activity stream. plicit their social network [2]: who your friends are (and Below, we mention three real-world examples: two in — by omission — who they aren’t) is a constant presence which users lacked control over the events going into the in the user interface of such sites. It is perhaps because of activity stream, and one in which users lacked control over this that social networking sites give the impression of a the audience who could see the activity stream. semi-public stage on which one can act in the privacy of Facebook Perhaps the most widely publicized recent one’s social circle. frustration of user expectations in social networking is This assumption, however, is not always merited. In Facebook’s Beacon feature. With this feature, third-party this paper, we point out three distinct areas where the websites such as Blockbuster, eBay, or Travelocity insert highly-interlinked world of social networking sites can events into a Facebook user’s activity stream whenever compromise user privacy. They are that user adds a movie to her queue, makes a purchase, • lack of control over activity streams, books a trip, etc.. However, initially users could not easily monitor or control the events fed into their activity streams • unwelcome linkage, and • deanonymization through merging of social graphs. — the initial default user preferences were to send Bea- con information from everywhere, and Facebook users In the following sections, we will define each of these could only opt-out of Beacon by specifying each website. privacy-sensitive areas, giving examples (most real, some Because there was no easy way to opt-out of Beacon, it hypothetical) for each. Finally, we will derive recommen- garnered an immediate allergic reaction in the press and among Facebook users [6, 7]. Facebook eventually re- dations for usable designs from our observations. solved the problem by providing a global opt-out, where users do not have to enumerate every website from which 2 Activity Streams they do not want to send information. An activity stream is a collection of events associated with coComment coComment, a comment tracking ser- a single user1 . These events may include changes the user vice2 , serves as a second example for unexpected events made to their profile page, the fact that the user added or showing up in a user’s activity stream. coComment ran a particular application on the social networking site, tracks conversations that occur in the comments section that they shared a news item, or that they communicated of blogs by a client-side browser extension that records with one of their friends. Different social networking comments the user types, and publishes them on the co- sites use different nomenclatures: on Facebook, activity Comment server. Initially, the coComment extension sim- streams are called “mini-feeds”, on Orkut they are called ply recorded everything the user typed, without regard to whether the website the user was visiting was public ∗ The opinions expressed here are those of the authors and do not or not. A coComment user was surprised and dismayed necessarily reflect the positions of Google. 1 This collection is ordered in time and potentially infinite – hence 2 www.cocomment.com our choice to call it a “stream”. 1
  • 2. to find their messages to Citibank published on coCom- terests, it is certainly possible that he would not want his ment [9]. In resulting blogposts, the coComment user buddies from the gun club to learn of his (in their eyes) clearly did not understand the mechanisms involved and anachronistic or useless plant-related hobby, but has no blamed Citibank for running an insecure website3 . Al- qualms showing his weapons collection to his fellow hor- though coComment can be used securely by enabling and ticulturists. Maintaining separation of these different per- disabling the extension every time the user posts a real sonae is sometimes called impression management [3] in comment, the cognitive burden placed on the user is too identity management systems. high. Citibank “solved” this problem by placing a warn- Trackbacks Suppose Bob maintains a personal blog ing on its customer service form, and coComment simi- about his bounty-hunting activities, and that blog enables larly solved the issue by adding a blacklist capability. trackbacks URLs. Trackback URLs on a web page are Google Reader Google Reader is a syndication service a way to keep track of new stories or blog posts linking which allows users to subscribe to RSS feeds of various to that web page. They can result from a list of refer- news and blog sites. Google Reader then aggregates these ral urls kept by the hosting webserver, or the trackback feeds for easy reading. Google Reader allows users to protocol implemented by several blogging services. Even mark news items or blog posts of interest, then share these if Bob diligently masks personal information on his own items with chosen friends. In essence, Google Reader al- blog (for example, by never posting the address of his lowed the user to create her own RSS feed of “interest- home, which is well-known in his town for having or- ing” stories. In December 2007, Google Reader launched nate flower decorations), Bob can be “outed” by some- a new feature that (after displaying a pop-up that allowed one else through trackbacks. Suppose Bob’s friend Alice, users to opt-out) shared this feed with the user’s Google who is the chair of the local horticulturist club, writes in Talk contacts, creating an activity stream of shared news her own blog that she visited Bob for dinner, mentions stories for that user4 . Bob’s name, and links to Bob’s post. A casual reader Although the shared items had always been available of Bob’s pseudonymous blog can find his real name, and as a public feed, some users had actively controlled who learn about his other hobby despite Bob’s vigilance, sim- the audience of that feed was by disclosing the obfuscated ply by following a trackback URL that an eager software feed URL to people of their choosing. When Google ex- system added to his blog post. panded the audience of that particular activity stream to include Google Talk contacts, users were caught by sur- Accidental linkage Suppose Bob also keeps a Flickr prise [5]. Google Reader responded by explaining to users account on which he hosts pictures of his guns. How- how to manage their shared items using existing tools. In ever, because of his interests in flowers, he not only be- addition, Google Reader included a feature that allowed longs to the “We Like Guns” Flickr group, but also to users to migrate their shared items to a tag or to their the “Flower Lovers” group. So when Bob uses a fea- starred items, which could then be shared via an obfus- ture on Flickr that allows him to easily add a photo of cated URL. his favorite gun to a blog posting, he might be unaware of the fact that the photo added to his blog is, in fact, a link 3 Unwelcome Linkage back to a Flickr page containing his Flickr name, reveal- ing interest in flowers. An unexpected link, together with Unwelcome linkage occurs when links on the Internet re- Flickr’s social-networking-style feature of public profile veal information about an individual that they had not in- pages caused Bob’s horticultural persona to be conflated tended to reveal. Unwelcome linkage is not limited to with his gun club one. social networking sites, but may occur wherever graphs of hyperlinks on the World Wide Web are automatically created to mirror connections between people in the real 4 Merging Social Graphs world. Consider Bob, who has multiple personae on the Inter- The third privacy-sensitive area comes from the fact that net: would-be bounty hunter at the gun club, and amateur social networking sites tend to extract a lot of personally- horticulturist at the rose garden. Given Bob’s disparate in- identifiable information from people (from birth date and address to favorite books, to travel destinations, etc.). It 3 Citibank serves the online form for contacting customer service over may be possible to de-anonymize users by comparing HTTPS only after the customer logs in. such information across social networking sites, even if 4 Google Talk contacts are everyone with whom a user has chatted, the information is partially obfuscated in each networking which might include co-workers, supervisors, and friends. 2
  • 3. site5 . In the case of unwelcome linkage, the compromising information about a user is already out there on the Web, This issue becomes particularly pertinent today as peo- but the user expects that this information is hard-to-find ple are getting tired of constantly redeclaring their friends and that they will be able to keep it away from certain in different contexts, leading to the idea that aggregation audiences. This expectation, however, is not in line with and centralization of these relationships is needed [4]. how certain software (like backtracking features of blogs) The problem here is preserving implicit and explicit ex- works. This area will be increasingly challenging, with pectations about the use of the data when it is divorced new technologies that eagerly link up portions of the web from its original context. If, for example, Bob, as a user that users thought separate. of various networks, mines those for ways to correlate his friends’ accounts across networks using data such as Finally, merging social graphs of different social net- favorite books and movies to match them, then he has working sites may upset the model that users express quite probably not violated any reasonable expectations of his explicitly by creating different personae in different social friends. networks. Those personae may overlap just enough to link But if he then publishes that aggregated view he may them up and identify them as facets of the same human very well be revealing things his friends would prefer being. he did not. They may not even know he had access to From these observations flow naturally a few design that data; for example, suppose Alice has an alter-ego, implications for social networking sites and social net- Vinylgirl, and Bob has one, Leatherboy. Alice and Bob working features of Web applications, which we summa- know each other on some ordinary site like Facebook or rize below. These are not intended to be comprehensive LinkedIn, but Leatherboy and Vinylgirl are also friends on or definitive solutions, but a set of possible design models some site for those of different sexuality. Bob (or rather as developers continue to innovate in social networking. his software) might perhaps correlate Alice and Vinylgirl Activity Streams First, users should be explicitly aware but she may not be happy for Bob to learn this correlation, of every event that gets fed into their activity stream. and certainly not to publish that information on some cen- While that may not necessarily mean that every time such tralized social graph repository. an event is generated the user receives a message, applica- Of particular importance here is that Alice did not tions should be explicit about which activities of the user actively participate in revealing her alter-ago. Bob’s generate events for their activity stream. decision to reveal the correlation between himself and Second, users should be given control over which Leatherboy has led to Alice being involuntarily outed. events make it into their activity stream. For example, Furthermore, the outing could be even more indirect — it would be good if a user could block a single event for example, Bob might himself have been outed by some from being added to their activity stream, install filters “friend” of his. A cascade failure could lead to some quite that block classes of events, or disable whole applications small change in the graph causing a huge amount of data from posting to their activity stream. Users should be able to be correlate-able. to remove events from the activity stream after they have been added to it by an application. 5 Recommendations Third, users should be explicitly aware of who the audi- ence is for their activity stream. The user interface of the In the previous sections we introduced three new areas social networking site should make it easy to list all the where social networking sites can compromise user pri- principals that can see certain events in the activity stream, vacy. All three problem areas had in common that while both at event creation time and later, after the event has the systems worked as intended by their designers, users been added to the activity stream. were unprepared for the change in the use of their data Fourth, users should be in control over who the audi- and their social networks. ence is for their activity stream. It should be easy to re- In the case of the activity stream, users form certain ex- move and add principals from that audience, both from the pectations about which events will be fed into their activ- activity stream as a whole as well as from single events. ity stream, and who the audience is that gets to see their Finally, application developers should build their appli- activity stream. Users will be surprised and confused if cations such that the creation of activity stream events is social networking sites don’t meet those expectations. more likely to be in sync with the user’s expectation. For 5 See the deanonymization of the Netflix ratings data by joining pub- example, the coComment software could, instead of post- licly available data from the Internet Movie Database set by Narayanan ing every entry the user makes into an HTML form, only and Shmatikov [8], or attacks on deanonymized social graphs by Back- post those entries that appear in an RSS feed discoverable strom et al. [1]. 3
  • 4. from the page to which the HTML form is posted6 . • feeding unanticipated events into their activity stream, or exposing their activity stream to an unan- All of these recommendations pose significant usability ticipated audience, challenges in designing interfaces to minimize cognitive • eagerly and automatically linking between pages burden while preserving user choice. representing users’ different personae, and by • mining different social networks for the purpose of Unwanted Linkage To combat unwanted linkage, we again propose to build tools that make explicit what infor- merging users’ social graph. mation is available about users on the Internet (and poten- In each of those cases, we believe that the root of prob- tially only one unanticipated trackback URL away). We lems in the past has been a discrepancy between the men- propose building a tool for automatic link discovery — tal model the user formed about the system, and how it whenever a user creates content on the web, show the user actually worked. The key to solving the problems, then, what information would be revealed by finding the transi- is to align users’ anticipations of the system with its actual tive closure of profile-related links, so the user can decide workings. whether or not publishing that content creates too many This can either happen by adjusting the system to fit leaks. The automated link discovery could mitigate nasty the mental model of the user (e.g., by making coComment surprises in the case of Bob’s blog, for example. Although more selective about which items it posts to the user’s ac- this solution reduces the cognitive burden of the user to tivity stream), by making explicit how the system works figure out available inferences from the social graph, it (e.g., by notifying users what information about them can does not eliminate the burden entirely. be inferred from the data available in two different social Recently Google released a social graph API that al- networking sites), or by giving users more control over the lows developers to find publicly available links to or from system (e.g., by letting the user have fine-grained control a particular URL. The social graph API is a potential over the events fed into their activity stream). building block for an automatic link discovery tool. More work is needed in particular in the latter two cat- It would also be useful to give users a choice between egories: how do we find out, and inform the user, about “linked” and “link-free” versions of certain services. For inferences that can be made about them, given the infor- example, Bob’s blog should have an easy switch to turn mation in different social networking sites; and how do off trackbacks. Similarly, Flickr could allow users to we give users controls they can understand and use that maintain different aliases for different photo sets and allow them to manage their privacy in an increasingly in- groups for easier separation of different personae. terlinked world of social networks. Merging Social Graphs To address the problem of merging social graphs we propose tools similar to those References used to detect inferences on the Web [10]. Armed with such tools, users who sign up for their n + 1-th social net- [1] Lars Backstrom, Cynthia Dwork, and Jon Kleinberg. working site could be warned that the information they Wherefore art thou r3579x?: anonymized social net- provide to that site can be used together with the infor- works, hidden patterns, and structural steganogra- mation they provided on the previous n sites to infer their phy. In Proceedings of the 16th international con- identity. Again, as in the previous two cases, the goal is ference on World Wide Web, 2007. to make explicit the consequences for the user’s privacy if [2] danah m. boyd and Nicole B Ellison. Social network they go through with a certain action (in this case, giving sites: Definition, history, and scholarship. Journal of information to yet another social networking site). Computer-Mediated Communication, 13(1), 2007. [3] Rachna Dhamija and Lisa Dusseault. The seven 6 Conclusions flaws of identity management: Usability and secu- rity challenges, 2008. IEEE Security and Privacy Special Issue on Identity Management, To Appear. In this position paper, we identify three new privacy- [4] Brad Fitzpatrick and David Recordon. Thoughts on sensitive areas in the world of interlinked social networks. the social graph, 2007. http://bradfitz.com/social- A user’s privacy can be compromised by graph-problem/. 6 Many blogs have two RSS feeds discoverable from a blog post: [5] Miguel Helft. Google thinks it knows your the feed of the blog itself, and the feed for comments of this particular friends, December 2007. http://bits.blogs.nytimes. post. Looking for this pattern as a heuristic should drastically reduce the com/2007/12/26/google-thinks-it-knows-your- amount of “false positives”, i.e., events that were posted but shouldn’t friends/?ref=technology. have been. 4
  • 5. [6] Caroline McCarthy. MoveOn.org takes on Face- book’s ‘Beacon’ ads, November 2007. http://www. news.com/8301-13577 3-9821170-36.html. [7] Ellen Nakashima. Feeling betrayed, Facebook users force site to honor their privacy, Novem- ber 2007. http://www.washingtonpost.com/wp- dyn/content/article/2007/11/29/AR2007112902503. html?hpid=topnews&sub=AR. [8] Arvind Narayanan and Vitaly Shmatikov. How to break anonymity of the netflix prize dataset, 2006. [9] John Ratcliffe-Lee. Huge security hole in Citibank’s online account center, March 2007. http://jratlee. tumblr.com/post/189652. [10] J. Staddon, P. Golle, and B. Zimny. Web-based infer- ence detection. In Proceedings of USENIX Security 2007, 2007. 5