Skip to main content

Latent Semantic Analysis for Privacy Preserving Peer Feedback

  • Conference paper
  • First Online:
Risks and Security of Internet and Systems (CRiSIS 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8924))

Included in the following conference series:

Abstract

Today’s e-learning systems enable students to communicate with peers (or co-learners) to ask or provide feedback, leading to more efficient learning. Unfortunately, this new option comes with significantly increased risks to the privacy of the feedback requester as well as the peers involved in the feedback process. In fact, peers may unintentionally disclose personal information which may cause great threats to them like cyber-bullying, which in turn may create an unfavorable learning environment leading individuals to abandon learning. In this paper, we propose an approach to minimize data self-disclosure and privacy risks in e-learning contexts. It consists first of mining peers’ feedback to remove negative comments (reducing bullying and harassment) based on machine learning classifier and natural language processing techniques. Second, it consists of striping sentences that potentially reveal personal information in order to protect learners from self-disclosure risks, based on Latent Semantic Analysis (LSA).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Thoms, B., Eryilmaz, E.: How media choice affects learner interactions in distance learning classes. Comput. Educ. 75, 112–126 (2014)

    Article  Google Scholar 

  2. Pridmore, J., Overocker, J.: Privacy in virtual worlds: a US perspective. J. Virtual Worlds Res. 7(1), 1–14 (2014)

    Google Scholar 

  3. Lee, U., Yi, E., Ko, M.: Mobile Q&A: beyond text-only Q&A and privacy concerns. In: Proceedings of CHI 2013, pp. 1–4. ACM (2013)

    Google Scholar 

  4. Selmi, M., Aimeur, E., Hage, H.: Privacy framework for peer affective feedback. In: 2013 International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), pp. 1049–1056. IEEE (2013)

    Google Scholar 

  5. Helou, C., Guandouz, A., Aïmeur, E.: A privacy awareness system for facebook users. J. Inf. Secur. Res. 31, 15–29 (2012)

    Google Scholar 

  6. Squicciarini, A., Karumanchi, S., Lin, D., DeSisto, N.: Identifying hidden social circles for advanced privacy configuration. Comput. Secur. 41, 40–51 (2014)

    Article  Google Scholar 

  7. Weber, R.H.: Internet of things-new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010)

    Article  Google Scholar 

  8. Stutzman, F., Vitak, J., Ellison, N.B., Gray, R., Lampe, C.: Privacy in interaction: exploring disclosure and social capital in facebook. In: ICWSM (2012)

    Google Scholar 

  9. Berendt, B., Günther, O., Spiekermann, S.: Privacy in e-commerce: stated preferences vs. actual behavior. Commun. ACM 48(4), 101–106 (2005)

    Article  Google Scholar 

  10. Buckel, T., Thiesse, F.: Predicting the disclosure of personal information on social networks: an empirical investigation. In: Wirtschaftsinformatik, p. 101 (2013)

    Google Scholar 

  11. Zhao, C., Hinds, P., Gao, G.: How and to whom people share: the role of culture in self-disclosure in online communities. In: Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work, pp. 67–76. ACM (2012)

    Google Scholar 

  12. Krasnova, H., Spiekermann, S., Koroleva, K., Hildebrand, T.: Online social networks: why we disclose. J. Inf. Technol. 25(2), 109–125 (2010)

    Article  Google Scholar 

  13. Li, N., Li, T., Venkatasubramanian, M.: t-closeness: privacy beyond k-anonymity and l-diversity. In: IEEE 23rd International Conference on Data Engineering (ICDE 2007), pp. 106–115. IEEE (2007)

    Google Scholar 

  14. Anwar, M., Greer, J.: Facilitating trust in privacy-preserving e-learning environments. IEEE Trans. Learn. Technol. 5(1), 62–73 (2012)

    Article  Google Scholar 

  15. Pisey, M.S.H., Ramteke, P.L., Deshmukh, P., Burghate, B.R.: Privacy access control mechanism for online social network. Int. J. Comput. Sci. Appl. 6(2), 172–179 (2013)

    Google Scholar 

  16. Mesch, G.S., Beker, G.: Are norms of disclosure of online and offline personal information associated with the disclosure of personal information online? Hum. Commun. Res. 36(4), 570–592 (2010)

    Article  Google Scholar 

  17. Sánchez, D., Batet, M., Viejo, A.: Automatic general-purpose sanitization of textual documents. IEEE Trans. Inf. Forensics Secur. 8, 853–862 (2013)

    Article  Google Scholar 

  18. Abril, D., Navarro-Arribas, G., Torra, V.: On the declassification of confidential documents. In: Torra, V., Narakawa, Y., Yin, J., Long, J. (eds.) MDAI 2011. LNCS, vol. 6820, pp. 235–246. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  19. Ortigosa, A., Martín, J.M., Carro, R.M.: Sentiment analysis in Facebook and its application to e-learning. Comput. Hum. Behav. 31, 527–541 (2014)

    Article  Google Scholar 

  20. Pang, B., Lee, L., Vaithyanathan, S.: Thumbs up? Sentiment classification using machine learning techniques. In: Proceedings of the ACL 2002 Conference on Empirical Methods in Natural Language Processing, vol. 10. Association for Computational Linguistics, pp. 79–86 (2002)

    Google Scholar 

  21. Wang, Y., Ma, J.: A comprehensive method for text summarization based on latent semantic analysis. In: Zhou, G., Li, J., Zhao, D., Feng, Y. (eds.) NLPCC 2013. CCIS, vol. 400, pp. 394–401. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  22. Bouckaert, R.R., Frank, E., Hall, M.A., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: WEKA—experiences with a Java open-source project. J. Mach. Learn. Res. 11, 2533–2541 (2010)

    MATH  Google Scholar 

  23. Martínez-Cámara, E., Martín-Valdivia, M.T., Ureña-López, L.A.: Opinion classification techniques applied to a Spanish corpus. In: Muñoz, R., Montoyo, A., Métais, E. (eds.) NLDB 2011. LNCS, vol. 6716, pp. 169–176. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mouna Selmi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Selmi, M., Hage, H., Aïmeur, E. (2015). Latent Semantic Analysis for Privacy Preserving Peer Feedback. In: Lopez, J., Ray, I., Crispo, B. (eds) Risks and Security of Internet and Systems. CRiSIS 2014. Lecture Notes in Computer Science(), vol 8924. Springer, Cham. https://doi.org/10.1007/978-3-319-17127-2_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-17127-2_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-17126-5

  • Online ISBN: 978-3-319-17127-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics