16 research outputs found
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL
Social relationships are a natural basis on which humans make trust
decisions. Online Social Networks (OSNs) are increasingly often used to let
users base trust decisions on the existence and the strength of social
relationships. While most OSNs allow users to discover the length of the social
path to other users, they do so in a centralized way, thus requiring them to
rely on the service provider and reveal their interest in each other. This
paper presents Social PaL, a system supporting the privacy-preserving discovery
of arbitrary-length social paths between any two social network users. We
overcome the bootstrapping problem encountered in all related prior work,
demonstrating that Social PaL allows its users to find all paths of length two
and to discover a significant fraction of longer paths, even when only a small
fraction of OSN users is in the Social PaL system - e.g., discovering 70% of
all paths with only 40% of the users. We implement Social PaL using a scalable
server-side architecture and a modular Android client library, allowing
developers to seamlessly integrate it into their apps.Comment: A preliminary version of this paper appears in ACM WiSec 2015. This
is the full versio
Bootstrapping Trust in Online Dating: Social Verification of Online Dating Profiles
Online dating is an increasingly thriving business which boasts
billion-dollar revenues and attracts users in the tens of millions.
Notwithstanding its popularity, online dating is not impervious to worrisome
trust and privacy concerns raised by the disclosure of potentially sensitive
data as well as the exposure to self-reported (and thus potentially
misrepresented) information. Nonetheless, little research has, thus far,
focused on how to enhance privacy and trustworthiness. In this paper, we report
on a series of semi-structured interviews involving 20 participants, and show
that users are significantly concerned with the veracity of online dating
profiles. To address some of these concerns, we present the user-centered
design of an interface, called Certifeye, which aims to bootstrap trust in
online dating profiles using existing social network data. Certifeye verifies
that the information users report on their online dating profile (e.g., age,
relationship status, and/or photos) matches that displayed on their own
Facebook profile. Finally, we present the results of a 161-user Mechanical Turk
study assessing whether our veracity-enhancing interface successfully reduced
concerns in online dating users and find a statistically significant trust
increase.Comment: In Proceedings of Financial Cryptography and Data Security (FC)
Workshop on Usable Security (USEC), 201
The Web of False Information: Rumors, Fake News, Hoaxes, Clickbait, and Various Other Shenanigans
A new era of Information Warfare has arrived. Various actors, including
state-sponsored ones, are weaponizing information on Online Social Networks to
run false information campaigns with targeted manipulation of public opinion on
specific topics. These false information campaigns can have dire consequences
to the public: mutating their opinions and actions, especially with respect to
critical world events like major elections. Evidently, the problem of false
information on the Web is a crucial one, and needs increased public awareness,
as well as immediate attention from law enforcement agencies, public
institutions, and in particular, the research community. In this paper, we make
a step in this direction by providing a typology of the Web's false information
ecosystem, comprising various types of false information, actors, and their
motives. We report a comprehensive overview of existing research on the false
information ecosystem by identifying several lines of work: 1) how the public
perceives false information; 2) understanding the propagation of false
information; 3) detecting and containing false information on the Web; and 4)
false information on the political stage. In this work, we pay particular
attention to political false information as: 1) it can have dire consequences
to the community (e.g., when election results are mutated) and 2) previous work
show that this type of false information propagates faster and further when
compared to other types of false information. Finally, for each of these lines
of work, we report several future research directions that can help us better
understand and mitigate the emerging problem of false information dissemination
on the Web
Trustworthiness in Social Big Data Incorporating Semantic Analysis, Machine Learning and Distributed Data Processing
This thesis presents several state-of-the-art approaches constructed for the purpose of (i) studying the trustworthiness of users in Online Social Network platforms, (ii) deriving concealed knowledge from their textual content, and (iii) classifying and predicting the domain knowledge of users and their content. The developed approaches are refined through proof-of-concept experiments, several benchmark comparisons, and appropriate and rigorous evaluation metrics to verify and validate their effectiveness and efficiency, and hence, those of the applied frameworks
Assessing the veracity of identity assertions via OSNs
Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the veracity of assertions that online users make about their identity attributes, such as age or profession. We propose FaceTrust, a system that uses online social networks to provide lightweight identity credentials while preserving a user's anonymity. Face-Trust employs a “game with a purpose” design to elicit the opinions of the friends of a user about the user's self-claimed identity attributes, and uses attack-resistant trust inference to assign veracity scores to identity attribute assertions. FaceTrust provides credentials, which a user can use to corroborate his assertions. We evaluate our proposal using a live Facebook deployment and simulations on a crawled social graph. The results show that our veracity scores strongly correlate with the ground truth, even when a large fraction of the social network users is dishonest and employs the Sybil attac
CELL PHONES AT THE SCHOOL HOUSE: EXPECTATIONS OF PRIVACY, INTERPRETATIONS OF PROTECTION AND THE RESPONSE OF SCHOOLS
Through combined traditional legal and documentary research, in addition to a review of current social scientific academic literature on youth perception and behavior, this study sought to answer these questions:
1. What is a student’s “reasonable expectation of privacy” in a handheld internet connected device as defined by the federal circuit and appellate courts?
2. What are students’ expectations of privacy in handheld internet connected devices as identified by social science and evidenced in popular culture?
3. Do these expectations align?
The federal court cases identified in this research illustrate that courts have yet to interpret the application of the Fourth Amendment to student cell phones at schools with sufficient depth and uniformity to inform policymakers concerning a consistent, universally applicable expectation of privacy for student cell phones. Not only do the decisions in these cases give erratic guidance, almost all of them fail to fully contemplate the very strong, emotional expectations of privacy that many students evidence in their cell phones through social media.
A lack of clear direction from the courts, the absence of meaningful social scientific data, and limited legislative action leave schools and school leaders in the position of enacting and enforcing policy relying on information that is ambiguous and open to mixed interpretation. This investigation evidences a need for quality social science research to inform courts and policymakers about the actual privacy beliefs of modern public-school students and how these beliefs may potentially inform future lawmaking and policy development
Post-Truth Imaginations
This book engages with post-truth as a problem of societal order and for scholarly analysis. It claims that post-truth discourse is more deeply entangled with main Western imaginations of knowledge societies than commonly recognised. Scholarly responses to post-truth have not fully addressed these entanglements, treating them either as something to be morally condemned or as accusations against which scholars have to defend themselves (for having somehow contributed to it). Aiming for wider problematisations, the authors of this book use post-truth to open scholarly and societal assumptions to critical scrutiny. Contributions are both conceptual and empirical, dealing with topics such as: the role of truth in public; deep penetrations of ICTs into main societal institutions; the politics of time in neoliberalism; shifting boundaries between fact – value, politics – science, nature – culture; and the importance of critique for public truth-telling. Case studies range from the politics of nuclear power and election meddling in the UK, over smart technologies and techno-regulation in Europe, to renewables in Australia. The book ends where the Corona story begins: as intensifications of Modernity’s complex dynamics, requiring new starting points for critique
Recommended from our members
Privacy and a free press: locating the public interest
The term “the public interest” is oft-cited but seldom defined. It is in essence both an umbrella term and a short-hand for a concept (or concepts) that we know we need to understand but have difficulty explaining. However, given both the prevalence and the importance of the concept to the law in specific disputes, confronting its essential nature becomes imperative to resolving those clashes. One such instance comes in the form of the conflict of privacy and a free press. One of the foremost legal problems of our time, the clash of Article 8 and Article 10 rights does not lend itself to simple resolutions given the frequency of what might be described as ‘intractable’ or ‘zero-sum’ cases – where both rights cannot be simultaneously realised to the satisfaction of the parties involved. This thesis therefore seeks to understand where the elusive ‘public interest’ lies in such cases. To do so it firstly examines where the public interest is located in each of the respective rights, and then how those rights are to be balanced. This thesis contends that it is not enough simply to understand the nature of the two rights which are being balanced, but that it is crucial to understand how the act of balancing itself impacts upon the outcome. All of this cannot be divorced from the wider social and political context in which the contest between conflicting rights takes place. This thesis therefore systematically examines each of these pieces of the puzzle to garner an in depth understanding of them individually and how they react with each other. This is done in order to produce a set tools – definitions, understandings, and conclusions – which can be applied to factual situations in order to illuminate the location of the public interest in conflicts between privacy and a free press
The Proceedings of the 23rd Annual International Conference on Digital Government Research (DGO2022) Intelligent Technologies, Governments and Citizens June 15-17, 2022
The 23rd Annual International Conference on Digital Government Research theme is “Intelligent Technologies, Governments and Citizens”. Data and computational algorithms make systems smarter, but should result in smarter government and citizens. Intelligence and smartness affect all kinds of public values - such as fairness, inclusion, equity, transparency, privacy, security, trust, etc., and is not well-understood. These technologies provide immense opportunities and should be used in the light of public values. Society and technology co-evolve and we are looking for new ways to balance between them. Specifically, the conference aims to advance research and practice in this field.
The keynotes, presentations, posters and workshops show that the conference theme is very well-chosen and more actual than ever. The challenges posed by new technology have underscored the need to grasp the potential. Digital government brings into focus the realization of public values to improve our society at all levels of government. The conference again shows the importance of the digital government society, which brings together scholars in this field. Dg.o 2022 is fully online and enables to connect to scholars and practitioners around the globe and facilitate global conversations and exchanges via the use of digital technologies. This conference is primarily a live conference for full engagement, keynotes, presentations of research papers, workshops, panels and posters and provides engaging exchange throughout the entire duration of the conference