Abstract
The rise of social networking sites (SNS) such as Facebook, MySpace, and LinkedIn has provided a platform for individuals to easily stay in touch with friends, family, and colleagues and actively encourage their users to share personal information. With the wealth of activities available on SNS, the amount and variety of personal information shared is considerable and diverse. Additionally, due to its digital nature, this information can be easily copied, modified, and disclosed without the explicit consent of their owner. Moreover, as the Internet never really forgets, once the information is out on the Web, there is no real hope for an individual to exercise their right to be forgotten. As a consequence, maintaining sovereignty on personal data is more challenging than ever due to the proliferation of personal information on the Web and the increasing analytical power available to large institutions (and to everyone else with a credit card) through people search engines (Weitzner et al. 2008). Moreover, standard security and privacy techniques such as access control mechanisms or simple watermarking techniques are no longer sufficient to protect privacy in the age of SNS (Kagal and Abelson 2010). Personal information disclosed from SNS could affect users’ lives, with privacy risks ranging from simple embarrassment to ruining their reputation, or even identity theft. Recently, a health department official in Washington used the message functionality of Facebook to get in touch with a teenager about her sexually transmitted disease (STD). The girl received a message saying that she needed to call the Spokane Regional Health District for important information about her health. The actual STD diagnosis was not included in the post, but the girl’s mother says this is still a violation of her privacy (Allen 2011).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Bibliography
Aïmeur, Esma, Sébastien Gambs and Ai Ho. 2009. ‘UPP: User Privacy Policy for Social Networking Sites’. In International Conference on Internet and Web Applications and Services, 267–72. Los Alamitos, CA, USA: IEEE Computer Society. doi:http://doi.ieeecomputersociety.org/10.1109/ICIW.2009.45.
Allen, Amy. 2011. ‘Facebook Message Warns Girl About STD Infection’. 18 August. http://www.myfoxspokane.com/news/kcpq-facebook-message-warnsgirl-about-std-infection-20110818,0,925517. story [Accessed: 22 August 2011].
Benenson, Fred. 2009. ‘The Official Unofficial Creative Commons Facebook Application–Creative Commons’. Creative Commons. May. http://creativecommons.org/weblog/entry/14563 [Accessed: 29 November 2010].
Carminati, Barbara and Elena Ferrari. 2008. ‘Privacy-Aware Collaborative Access Control in Web-Based Social Networks’. In Data and Applications Security XXII, 5094/2008: 81–96. http://dx.doi.org/10.1007/978–3–540–70567–3_7.
Carminati, Barbara, Elena Ferrari and Andrea Perego. 2006. ‘Rule-Based Access Control for Social Networks’. In On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 1734–44.
Carroll, Michael. 2006. ‘Creative Commons and the New Intermediaries’. Michigan State Law Review (January 1): 45–65.
Cederquist, J. G., R. Corin, M. A. C. Dekker, S. Etalle, J. I. den Hartog, and G. Lenzini. 2007. ‘Audit-Based Compliance Control’. International Journal of Information Security 6 (2): 133–51.
Chaum, David, and Eugène Van Heyst. 1991. ‘Group Signatures’. In Proceedings of the 10th Annual International Conference on Theory and Application of Cryptographic Techniques, 257–65. Brighton, UK: Springer-Verlag.
Ding, Li, Tim Finin, Yun Peng, Paulo Pinheiro Da Silva and Deborah L. 2005. ‘Tracking RDF Graph Provenance Using RDF Molecules’. Proceedings of The Fourth International Semantic Web Conference.
Furht, Borko and Darko Kirovski. 2006. Multimedia Watermarking Techniques and Applications. Auerbach Publication.
Gil, Y. and C. Fritz. 2010. ‘Reasoning about the Appropriate Use of Private Data Through Computational Workflows’. In Intelligent Information Privacy Management, Papers from the AAAI Spring Symposium, 69–74.
Goble, C. 2002. ‘Position Statement: Musings on Provenance, Workflow and (semantic web) Annotations for Bioinformatics’. In Proceedings of the Workshop on Data Derivation and Provenance. Available at: http://people.cs.uchicago.edu/~yongzh/papers/provenance_workshop_3.doc [Accessed: 1 May 2012].
Gupta, Shubham. 2010. ‘Digital Rights Management: Necessary Evil or Evil that’s not Necessary?’ Techquark. September. http://www.techquark.com/2010/09/digital-rights-management-necessary.html [Accessed: 15 December 2010].
Hartig, O. 2009. ‘Provenance Information in the Web of Data’. In Proceedings of the Linked Data on the Web Workshop, LDOW’09, Madrid, Spain, 2009, 1–9.
Jagadeesan, Radha, Alan Jeffrey, Corin Pitcher and James Riely. 2009. ‘Towards a Theory of Accountability and Audit’. In Computer Security–ESORICS 2009, 5789: 152–167.
Kagal, L. and H. Abelson. 2010. ‘Access Control is an Inadequate Framework for Privacy Protection’. In W3C Workshop on Privacy for Advanced Web APIs. July. http://www.w3.org/2010/api-privacy-ws/papers/privacy-ws-23.pdf [Accessed: 1 May 2012].
Kang, T. and L. Kagal. 2010. ‘Enabling Privacy-Awareness in Social Networks’. In Intelligent Information Privacy Management Symposium at the AAAI Spring Symposium. Vol. 2010 [Online]. Available: http://dig.csail.mit.edu/2010/Papers/Privacy2010/tkang-rmp/paper.pdf [Accessed: 1 May 2012].
Korba, Larry and Steve Kenny. 2003. ‘Towards Meeting the Privacy Challenge: Adapting DRM’. In Digital Rights Management, 2696: 118–36.
Lecture Notes in Computer Science. Springer: Berlin/Heidelberg. http://dx.doi.org/10.1007/978– 3–540–44993–5_8 [Accessed: 1 May 2012].
Lecture Notes in Computer Science. Springer Berlin/Heidelberg. http://dx.doi.org/10.1007/978–3–642–04444–1_10 [Accessed: 1 May 2012].
Lemonde.fr and AFF. 2010. Un Licenciement Pour Des Propos Tenus Sur Facebook Jugé Légal–LeMonde.fr. LeMonde.fr. 19 November. http://www.lemonde.fr/technologies/article/2010/11/19/un-licenciement-pour-des-propos-tenus-surfacebook-juge-legal_1442142_651865.html [Accessed: 1 May 2012].
Lin, K.-J., J. Zou and Yan Wang. 2010. ‘Accountability Computing for E-society’. In Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference On, 34–41. doi:10.1109/AINA.2010.167.
Moreau, Luc, Juliana Freire, Joe Futrelle, Robert McGrath, Jim Myers and Patrick Paulson. 2008. ‘The Open Provenance Model: An Overview’. In Provenance and Annotation of Data and Processes, 323–6.
Nemati, Hamid. 2008. Information Security and Ethics: Concepts, Methodologies, Tools, and Applications. Idea Group Reference.
Prashanth. 2010. ‘Top 10 Reverse Image Search Engines | Computer Talks’. CompTalks.com. December. http://www.comptalks.com/top-10-reverse-imagesearch-engines/ [Accessed: 15 December 2010].
Rodríguez, E., V. Rodríguez, A. Carreras and J. Delgado. 2009. ‘A Digital Rights Management Approach to Privacy in Online Social Networks’. In Proceedings of the 1st Workshop on Privacy and Protection in Web-Based Social Networks (within ICAIL’09), Barcelona, Spain.
Ruffolo, Rafael. 2007. Study says DRM Violates Canadian Privacy Law–PCWorld. PCWorld. 20 September. http://www.pcworld.com/article/137404/study_says_drm_violates_canadian_privacy_law.html [Accessed: 31 January 2011].
Schedler, Andreas, Larry Jay Diamond and Marc F. Plattner. 1999. The Self-Restraining State: Power and Accountability in New Democracies. Lynne Rienner Publishers.
Seitz, Juergen. 2005. Digital Watermarking for Digital Media. Information Science Publishing.
Shoemaker, Chris. 2002. ‘Hidden Bits: A Survey of Techniques for Digital Watermarking’. http://www.vu.union.edu/~shoemakc/watermarking/watermarking.html [Accessed: 08 May 2010].
Silva, Paulo Pinheiro da, Silva Deborah, Deborah L McGuinness and Rob Mccool. 2003. ‘Knowledge Provenance Infrastructure’. Data Engineering Bulletin 26 (4): 26–32.
Silva, Paulo Pinheiro da, Deborah L. McGuinness and Richard Fikes. 2006. ‘A Proof Markup Language for Semantic Web Services’. Information Systems 31 (4): 381–95.
Squicciarini, Anna and Smitha Sundareswaran. 2009. ‘Web-Traveler Policies for Images on Social Networks’. World Wide Web 12 (4) (December 1): 461–84. doi:10.1007/s11280–009–0070–8.
Squicciarini, Annac, Mohamed Shehab and Joshua Wede. 2010. ‘Privacy Policies for Shared Content in Social Network Sites.’ The VLDB Journal (June). doi:10.1007/s00778–010–0193–7. http://www.springerlink.com/content/f8105336537783mj/. (29 June): 1–20.
Subramanya, S.R. and B.K. Yi. 2006. ‘Digital Rights Management.’ IEEE Potentials 25 (2): 31–4.
Weitzner, D. J., H. Abelson, T. Berners-Lee, J. Feigenbaum, J. Hendler and G. J Sussman. 2008. ‘Information Accountability’. Communications of the ACM 51 (6 June): 82–7. doi:10.1145/1349026.1349043.
Whitehouse, Andrew. 2010. ‘How to Protect Photos Online’. Guardian.co.uk. http://www.guardian.co.uk/technology/askjack/2010/oct/14/protect-photosonline [Accessed: 08 November 2010].
Zlomek, Martin. 2007. ‘Video Watermarking’. Prague: Charles University. http://www.watermarking.eu/thesis.pdf [Accessed: 1 May-2012].
Editor information
Editors and Affiliations
Copyright information
© 2012 Esma Aïmeur, Sébastien Gambs and Ai Ho
About this chapter
Cite this chapter
Aïmeur, E., Gambs, S., Ho, A. (2012). Maintaining Sovereignty over Personal Data in Social Networking Sites. In: Guagnin, D., Hempel, L., Ilten, C., Kroener, I., Neyland, D., Postigo, H. (eds) Managing Privacy through Accountability. Palgrave Macmillan, London. https://doi.org/10.1057/9781137032225_8
Download citation
DOI: https://doi.org/10.1057/9781137032225_8
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-349-35045-2
Online ISBN: 978-1-137-03222-5
eBook Packages: Palgrave Business & Management CollectionBusiness and Management (R0)