Criado, N and Such, JM (2015) Implicit Contextual Integrity in Online Social Networks. Information Sciences, 325. pp. 48-69. ISSN 0020-0255
|
Text
InformationAssistantAgents.pdf - Accepted Version Available under License Creative Commons Attribution Non-commercial No Derivatives. Download (928kB) | Preview |
Abstract
Many real incidents demonstrate that users of Online Social Networks need mechanisms that help them manage their interactions by increasing the awareness of the different contexts that coexist in Online Social Networks and preventing them from exchanging inappropriate information in those contexts or disseminating sensitive information from some contexts to others. Contextual integrity is a privacy theory that conceptualises the appropriateness of information sharing based on the contexts in which this information is to be shared. Computational models of Contextual Integrity assume the existence of well-defined contexts, in which individuals enact pre-defined roles and information sharing is governed by an explicit set of norms. However, contexts in Online Social Networks are known to be implicit, unknown a priori and ever changing; users relationships are constantly evolving; and the information sharing norms are implicit. This makes current Contextual Integrity models not suitable for Online Social Networks. In this paper, we propose the first computational model of \emph{Implicit} Contextual Integrity, presenting an information model for Implicit Contextual Integrity as well as a so-called Information Assistant Agent that uses the information model to learn implicit contexts, relationships and the information sharing norms in order to help users avoid inappropriate information exchanges and undesired information disseminations. Through an experimental evaluation, we validate the properties of the model proposed. In particular, Information Assistant Agents are shown to: (i) infer the information sharing norms even if a small proportion of the users follow the norms and in presence of malicious users; (ii) help reduce the exchange of inappropriate information and the dissemination of sensitive information with only a partial view of the system and the information received and sent by their users; and (iii) minimise the burden to the users in terms of raising unnecessary alerts.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | 01 Mathematical Sciences, 08 Information And Computing Sciences, 09 Engineering |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Divisions: | Computer Science & Mathematics |
Publisher: | Elsevier |
Date Deposited: | 09 Jul 2015 08:28 |
Last Modified: | 02 Mar 2022 11:54 |
DOI or ID number: | 10.1016/j.ins.2015.07.013 |
URI: | https://researchonline.ljmu.ac.uk/id/eprint/1524 |
View Item |