منابع مشابه
Assessing Privacy in Social Media Aggregators
Social Media Aggregator (SMA) applications present a platform enabling users to manage multiple Social Networking Sites (SNS) in one convenient application, which results in a unique concentration of data from several SNS accounts in addition to the user’s mobile phone data available to them. We describe a three-step methodology to assess how privacy is considered in these applications: 1) We i...
متن کاملComparison-Based Privacy: Nudging Privacy in Social Media (Position Paper)
Social media continues to lead imprudent users into oversharing, exposing them to various privacy threats. Recent research thus focusses on nudging the user into the ‘right’ direction. In this paper, we propose Comparison-based Privacy (CbP), a design paradigm for privacy nudges that overcomes the limitations and challenges of existing approaches. CbP is based on the observation that comparison...
متن کاملMining Social Media-Utility Based Privacy Preservation
Online social networks and publication of social network data has led to the risk of leakage of confidential information of individuals. This requires the preservation of privacy before such network data is published by service providers. Privacy in online social networks data has been of utmost concern in recent years. Hence, the research in this field is still in its early years. Several publ...
متن کاملPublic Protests, Social Media and Policy Making Public Protests, Social Media and Policy Making *
We explore the limits of petitions and public protests as mechanisms to aggregate dispersed information. We show that if citizens’ signals are not sufficiently precise, information aggregation is impossible, even if the conflict with the policy-maker is small, no matter how large is the population of informed citizens. We characterize the conditions on conflict and the signal structure that gua...
متن کاملPrivacy-Aware Trust Negotiation
Software engineering and information security have traditionally followed divergent paths but lately some efforts have been made to consider security from the early phases of the Software Development Life Cycle (SDLC). This paper follows this line and concentrates on the incorporation of trust negotiations during the requirements engineering phase. More precisely, we provide an extension to the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Transactions on Autonomous and Adaptive Systems
سال: 2016
ISSN: 1556-4665,1556-4703
DOI: 10.1145/2821512