Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Privacy Scoring over OSNs: Shared Data Granularity as a Latent Dimension

Published: 10 October 2023 Publication History

Abstract

Privacy scoring aims at measuring the privacy violation risk of a user over an online social network (OSN) based on attribute values shared in the user’s OSN profile page and the user’s position in the network. Existing studies on privacy scoring rely on possibly biased or emotional survey data. In this study, we work with real-world data collected from the professional LinkedIn OSN and show that probabilistic scoring models derived from the item response theory fit real-world data better than naive approaches. We also introduce the granularity of the data an OSN user shares on her profile as a latent dimension of the OSN privacy scoring problem. Incorporating data granularity into our model, we build the most comprehensive solution to the OSN privacy scoring problem. Extensive experimental evaluation of various scoring models indicates the effectiveness of the proposed solution.

References

[1]
J. Alemany, E. del Val, J. Alberola, and Ana García-Fornes. 2018. Estimation of privacy risk through centrality metrics. Future Generation Computer Systems 82 (2018), 63–76.
[2]
Frank B. Baker and Seock-Ho Kim. 2004. Item Response Theory: Parameter Estimation Techniques. CRC Press, Boca Raton, FL.
[3]
Susan B. Barnes. 2006. A privacy paradox: Social networking in the United States. First Monday 11, 9 (2006), 1–7.
[4]
Livio Bioglio and Ruggero G. Pensa. 2017. Impact of neighbors on the privacy of individuals in online social networks. Procedia Computer Science 108 (2017), 28–37.
[5]
Ulrik Brandes and Daniel Fleischer. 2005. Centrality measures based on current flow. In STACS 2005. Lecture Notes in Computer Science, Vol. 3404. Springer, 533–544.
[6]
Alex Braunstein, Laura Granka, and Jessica Staddon. 2011. Indirect content privacy surveys: Measuring privacy without asking about it. In Proceedings of the 7th Symposium on Usable Privacy and Security. ACM, New York, NY, 15.
[7]
Sergey Brin and Lawrence Page. 1998. The anatomy of a large-scale hypertextual web search engine. Computer Networks and ISDN Systems 30, 1-7 (1998), 107–117.
[8]
Onder Coban, Ali Inan, and Selma Ayse Ozel. 2020. Towards the design and implementation of an OSN crawler: A case of Turkish Facebook users. International Journal of Information Security Science 9, 2 (2020), 76–93.
[9]
Onder Coban, Ali Inan, and Selma Ayse Ozel. 2022. Inverse document frequency-based sensitivity scoring for privacy analysis. Signal, Image and Video Processing 16 (2022), 735–743.
[10]
Onder Çoban, Selma Ayşe Özel, and Ali İnan. 2021. Named entity recognition over FBNER: A new Facebook dataset in Turkish. In Proceedings of the 2021 Innovations in Intelligent Systems and Applications Conference (ASYU’21). IEEE, Los Alamitos, CA, 1–6.
[11]
Nicholas Confessore. 2018. Cambridge analytica and Facebook: The scandal and the fallout so far. New York Times 4 (2018), March 17.
[12]
Chandler Davis. 1962. The norm of the Schur product operation. Numerische Mathematik 4, 1 (1962), 343–344.
[13]
Sourya Joyee De and Abdessamad Imine. 2017. Privacy scoring of social network user profiles through risk analysis. In Proceedings of the International Conference on Risks and Security of Internet and Systems. 227–243.
[14]
Sourya Joyee De and Daniel Le Métayer. 2016. PRIAM: A privacy risk analysis methodology. In Data Privacy Management and Security Assurance. Lecture Notes in Computer Science, Vol. 9963. Springer, 221–229.
[15]
Josep Domingo-Ferrer. 2010. Rational privacy disclosure in social networks. In Proceedings of the International Conference on Modeling Decisions for Artificial Intelligence. 255–265.
[16]
Linton C. Freeman. 1977. A set of measures of centrality based on betweenness. Sociometry 40, 1 (1977), 35–41.
[17]
Shitong Fu and Zhiqiang Yao. 2022. Privacy risk estimation of online social networks. In Proceedings of the 2022 International Conference on Networking and Network Applications (NaNA’22). IEEE, Los Alamitos, CA, 1–8.
[18]
X. Han, H. Huang, and L. Wang. 2019. F-PAD: Private attribute disclosure risk estimation in online social networks. IEEE Transactions on Dependable and Secure Computing 16, 6 (Nov. 2019), 1054–1069.
[19]
Glen Jeh and Jennifer Widom. 2003. Scaling personalized web search. In Proceedings of the 12th International Conference on World Wide Web. ACM, New York, NY, 271–279.
[20]
Yasir Kilic and Ali Inan. 2019. Implementing a web crawler with an attacker perspective on a professional purpose online social network. In Proceedings of the International Conference on All Aspects of Cyber Security. 27–32.
[21]
Yasir Kilic and Ali Inan. 2019. Privacy scoring over professional online social networks: More central users are under higher risks. In Proceedings of the 2nd International Conference on Advanced Technologies, Computer Engineering, and Science. 157–161.
[22]
Paul F. Lazarsfeld and Robert K. Merton. 1954. Friendship as a social process: A substantive and methodological analysis. Freedom and Control in Modern Society 18, 1 (1954), 18–66.
[23]
Jure Leskovec and Andrej Krevl. 2014. Stanford Large Network Dataset Collection. Retrieved June 21, 2023 from http://snap.stanford.edu/data.
[24]
Kun Liu and Evimaria Terzi. 2009. A framework for computing the privacy scores of users in online social networks. In Proceedings of the 2009 9th IEEE International Conference on Data Mining. IEEE, Los Alamitos, CA, 288–297.
[25]
Kun Liu and Evimaria Terzi. 2010. A framework for computing the privacy scores of users in online social networks. ACM Transactions on Knowledge Discovery from Data 5, 1 (2010), 6.
[26]
Monica Marrero, Julian Urbano, Sonia Sanchez-Cuadrado, Jorge Morato, and Juan Miguel Gomez-Berbis. 2013. Named entity recognition: Fallacies, challenges and opportunities. Computer Standards & Interfaces 35, 5 (2013), 482–489.
[27]
Raj Kumar Nepali and Yong Wang. 2013. SONET: A SOcial NETwork model for privacy monitoring and ranking. In Proceedings of the 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops. IEEE, Los Alamitos, CA, 162–166.
[28]
Esteban Ortiz-Ospina. 2019. The rise of social media. Our World in Data. Retrieved March 17, 2020 from https://ourworldindata.org/rise-of-social-media.
[29]
Ruggero G. Pensa and Gianpiero Di Blasi. 2016. A centrality-based measure of user privacy in online social networks. In Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. IEEE, Los Alamitos, CA, 1438–1439.
[30]
Ruggero G. Pensa, Gianpiero Di Blasi, and Livio Bioglio. 2019. Network-aware privacy risk estimation in online social networks. Social Network Analysis and Mining 9, 1 (2019), 15.
[31]
Georgios Petkos, Symeon Papadopoulos, and Yiannis Kompatsiaris. 2015. PScore: A framework for enhancing privacy awareness in online social networks. In Proceedings of the 2015 10th International Conference on Availability, Reliability, and Security. IEEE, Los Alamitos, CA, 592–600.
[32]
Peter J. Rousseeuw. 1987. Silhouettes: A graphical aid to the interpretation and validation of cluster analysis. Journal of Computational and Applied Mathematics 20 (1987), 53–65.
[33]
F. Samejima. 1997. Graded response model. In Handbookof Modern Item Response Theory, W. van der Liden and R. Hambleton (Eds.). Springer, 85–100.
[34]
Claude Elwood Shannon. 1948. A mathematical theory of communication. Bell System Technical Journal 27, 3 (1948), 379–423.
[35]
Michal Sramka. 2015. Evaluating privacy risks in social networks from the user’s perspective. In Advanced Research in Data Privacy. Springer International, Cham, Switzerland, 251–267.
[36]
Agrima Srivastava and G. Geethakumari. 2013. Measuring privacy leaks in online social networks. In Proceedings of the 2013 International Conference on Advances in Computing, Communications, and Informatics (ICACCI’13). IEEE, Los Alamitos, CA, 2095–2100.
[37]
Turkish Statistical Institute (TUIK). 2023. Adrese Dayalı Nüfus Kayıt Sistemi Sonuçları, 2022. Retrieved June 21, 2023 from https://data.tuik.gov.tr/Bulten/Index?p=Adrese-Dayali-Nufus-Kayit-Sistemi-Sonuclari-2022-49685.
[38]
B. S. Vidyalakshmi, Raymond K. Wong, and Chi-Hung Chi. 2015. Privacy scoring of social network users as a service. In Proceedings of the 2015 IEEE International Conference on Services Computing. IEEE, Los Alamitos, CA, 218–225.
[39]
Haizhou Wang and Mingzhou Song. 2011. Ckmeans.1d.dp: Optimal k-means clustering in one dimension by dynamic programming. R Journal 3, 2 (2011), 29.
[40]
Mudasir Ahmad Wani, Nancy Agarwal, Suraiya Jabin, and Syed Zeeshan Hussai. 2018. Design of iMacros-based data crawler and the behavioral analysis of Facebook users. arXiv:1802.09566 [cs.SI] (2018).
[41]
Tjalling J. Ypma. 1995. Historical development of the Newton–Raphson method. SIAM Review 37, 4 (1995), 531–551.
[42]
Elena Zheleva and Lise Getoor. 2011. Privacy in Social Networks: A Survey. Springer, New York, NY, 277–306.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on the Web
ACM Transactions on the Web  Volume 17, Issue 4
November 2023
331 pages
ISSN:1559-1131
EISSN:1559-114X
DOI:10.1145/3608910
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 October 2023
Online AM: 17 June 2023
Accepted: 26 May 2023
Revised: 29 March 2023
Received: 07 April 2022
Published in TWEB Volume 17, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Privacy scoring
  2. online social network (OSN)
  3. item response theory (IRT)
  4. data granularity
  5. LinkedIn

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 181
    Total Downloads
  • Downloads (Last 12 months)90
  • Downloads (Last 6 weeks)6
Reflects downloads up to 25 Jan 2025

Other Metrics

Citations

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media