Monday, February 26, 2018

Resolving Multi-Aware Rare Sequential Topic Patterns in Document Streams

Resolving multi-party privacy conflicts in social media

Introdution

As we know that social media is a website or a applications that enable users to create and share content or to participate in social networking… not the adult or teenage but the old generation and kids in today’s life is involved in social media or social networking, but this is also the fact that there are many negative aspects of social media also…

             Billions of items that are uploaded to social media are co-owned by multiple users yet only the user that uploads the item is allowed to set its privacy settings. This is a massive and serious problem as users Privacy Preferences for co-owned items usually conflicts, so applying the preferences of only one party risks such items being shared with undesired recipient , which can lead to privacy violations with severe consequences (e.g., users losing their jobs, being cyber stalked, etc.)






Individual Privacy Preferences

Negotiating users have their own individual privacy   preferences about the item — i.e., to whom of their online friends they would like to share the item if they were to decide it unilaterally . we assume negotiating users specify their individual privacy preferences using group-based access control, which is nowadays mainstream in Social Media ( eg. Facebook , twitter , instagram etc.) however other excess control approaches for social media could also be used conjuction with our proposed mechanism.  Mainstream Social Media (Facebook, Google+, etc.) have predefined groups and also allow users to define their own groups, each of which is composed of set of friends.



Methodology


We sought to explore situations with different degrees of sensitivity, as users’ behaviour to resolve conflicts may be different depending on how sensitive items are. However, this would have involved participants sharing with us sensitive items of them. Participants sharing sensitive information in user studies about privacy in Social Media was already identified as problematic in

related literature  as participants would always seem  reluctant to share sensitive information, which biases the study towards non-sensitive issues only. Indeed, this reluctance to share information that may be sensitive with researchers during user surveys is not only associated with studies about privacy and Social Media, but it has  also been extensively proven to happen in many other survey situations, including other scientific disciplines such as psychology . A possible alternative to avoid this problem could be one in which participants just selfreport how they behave when they experience a multiparty privacy conflict without asking for any sensitive information of them




CONCLUSION

In this,we present the first mechanism for detecting and resolving privacy conflicts in Social Media that is based on current empirical evidence about privacy negotiations and disclosure driving factors in Social Media and is able to adapt the conflict resolution strategy based on the particular situation. In a nutshell, the mediator firstly inspects the individual privacy policies of all users involved looking for possible conflicts. If conflicts are found, the mediator proposes a solution for each conflict according to a set of concession rules that model how users would actually negotiate in this domain.






























No comments:

Post a Comment

Hybrid scheme of public-key encryption

Hybrid scheme of public-key encryption We introduce a hybrid homomorphic encryption that combines public-key encryption (PKE) and som...