Facial reconstruction

Search LJMU Research Online

Browse Repository | Browse E-Theses

Implicit Contextual Integrity in Online Social Networks

Criado, N and Such, JM (2015) Implicit Contextual Integrity in Online Social Networks. Information Sciences, 325. pp. 48-69. ISSN 0020-0255

[img] Text
InformationAssistantAgents.pdf - Accepted Version
Available under License Creative Commons Attribution Non-commercial No Derivatives.

Download (928kB)

Abstract

Many real incidents demonstrate that users of Online Social Networks need mechanisms that help them manage their interactions by increasing the awareness of the different contexts that coexist in Online Social Networks and preventing them from exchanging inappropriate information in those contexts or disseminating sensitive information from some contexts to others. Contextual integrity is a privacy theory that conceptualises the appropriateness of information sharing based on the contexts in which this information is to be shared. Computational models of Contextual Integrity assume the existence of well-defined contexts, in which individuals enact pre-defined roles and information sharing is governed by an explicit set of norms. However, contexts in Online Social Networks are known to be implicit, unknown a priori and ever changing; users relationships are constantly evolving; and the information sharing norms are implicit. This makes current Contextual Integrity models not suitable for Online Social Networks. In this paper, we propose the first computational model of \emph{Implicit} Contextual Integrity, presenting an information model for Implicit Contextual Integrity as well as a so-called Information Assistant Agent that uses the information model to learn implicit contexts, relationships and the information sharing norms in order to help users avoid inappropriate information exchanges and undesired information disseminations. Through an experimental evaluation, we validate the properties of the model proposed. In particular, Information Assistant Agents are shown to: (i) infer the information sharing norms even if a small proportion of the users follow the norms and in presence of malicious users; (ii) help reduce the exchange of inappropriate information and the dissemination of sensitive information with only a partial view of the system and the information received and sent by their users; and (iii) minimise the burden to the users in terms of raising unnecessary alerts.

Item Type: Article
Uncontrolled Keywords: 01 Mathematical Sciences, 08 Information And Computing Sciences, 09 Engineering
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Computer Science
Publisher: Elsevier
Date Deposited: 09 Jul 2015 08:28
Last Modified: 06 Sep 2017 18:53
DOI or Identification number: 10.1016/j.ins.2015.07.013
URI: http://researchonline.ljmu.ac.uk/id/eprint/1524

Actions (login required)

View Item View Item