Skip to main content

Maintaining Sovereignty over Personal Data in Social Networking Sites

  • Chapter
Managing Privacy through Accountability

Abstract

The rise of social networking sites (SNS) such as Facebook, MySpace, and LinkedIn has provided a platform for individuals to easily stay in touch with friends, family, and colleagues and actively encourage their users to share personal information. With the wealth of activities available on SNS, the amount and variety of personal information shared is considerable and diverse. Additionally, due to its digital nature, this information can be easily copied, modified, and disclosed without the explicit consent of their owner. Moreover, as the Internet never really forgets, once the information is out on the Web, there is no real hope for an individual to exercise their right to be forgotten. As a consequence, maintaining sovereignty on personal data is more challenging than ever due to the proliferation of personal information on the Web and the increasing analytical power available to large institutions (and to everyone else with a credit card) through people search engines (Weitzner et al. 2008). Moreover, standard security and privacy techniques such as access control mechanisms or simple watermarking techniques are no longer sufficient to protect privacy in the age of SNS (Kagal and Abelson 2010). Personal information disclosed from SNS could affect users’ lives, with privacy risks ranging from simple embarrassment to ruining their reputation, or even identity theft. Recently, a health department official in Washington used the message functionality of Facebook to get in touch with a teenager about her sexually transmitted disease (STD). The girl received a message saying that she needed to call the Spokane Regional Health District for important information about her health. The actual STD diagnosis was not included in the post, but the girl’s mother says this is still a violation of her privacy (Allen 2011).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Bibliography

  • Aïmeur, Esma, Sébastien Gambs and Ai Ho. 2009. ‘UPP: User Privacy Policy for Social Networking Sites’. In International Conference on Internet and Web Applications and Services, 267–72. Los Alamitos, CA, USA: IEEE Computer Society. doi:http://doi.ieeecomputersociety.org/10.1109/ICIW.2009.45.

    Google Scholar 

  • Allen, Amy. 2011. ‘Facebook Message Warns Girl About STD Infection’. 18 August. http://www.myfoxspokane.com/news/kcpq-facebook-message-warnsgirl-about-std-infection-20110818,0,925517. story [Accessed: 22 August 2011].

    Google Scholar 

  • Benenson, Fred. 2009. ‘The Official Unofficial Creative Commons Facebook Application–Creative Commons’. Creative Commons. May. http://creativecommons.org/weblog/entry/14563 [Accessed: 29 November 2010].

    Google Scholar 

  • Carminati, Barbara and Elena Ferrari. 2008. ‘Privacy-Aware Collaborative Access Control in Web-Based Social Networks’. In Data and Applications Security XXII, 5094/2008: 81–96. http://dx.doi.org/10.1007/978–3–540–70567–3_7.

    Chapter  Google Scholar 

  • Carminati, Barbara, Elena Ferrari and Andrea Perego. 2006. ‘Rule-Based Access Control for Social Networks’. In On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 1734–44.

    Chapter  Google Scholar 

  • Carroll, Michael. 2006. ‘Creative Commons and the New Intermediaries’. Michigan State Law Review (January 1): 45–65.

    Google Scholar 

  • Cederquist, J. G., R. Corin, M. A. C. Dekker, S. Etalle, J. I. den Hartog, and G. Lenzini. 2007. ‘Audit-Based Compliance Control’. International Journal of Information Security 6 (2): 133–51.

    Article  Google Scholar 

  • Chaum, David, and Eugène Van Heyst. 1991. ‘Group Signatures’. In Proceedings of the 10th Annual International Conference on Theory and Application of Cryptographic Techniques, 257–65. Brighton, UK: Springer-Verlag.

    Google Scholar 

  • Ding, Li, Tim Finin, Yun Peng, Paulo Pinheiro Da Silva and Deborah L. 2005. ‘Tracking RDF Graph Provenance Using RDF Molecules’. Proceedings of The Fourth International Semantic Web Conference.

    Google Scholar 

  • Furht, Borko and Darko Kirovski. 2006. Multimedia Watermarking Techniques and Applications. Auerbach Publication.

    Book  Google Scholar 

  • Gil, Y. and C. Fritz. 2010. ‘Reasoning about the Appropriate Use of Private Data Through Computational Workflows’. In Intelligent Information Privacy Management, Papers from the AAAI Spring Symposium, 69–74.

    Google Scholar 

  • Goble, C. 2002. ‘Position Statement: Musings on Provenance, Workflow and (semantic web) Annotations for Bioinformatics’. In Proceedings of the Workshop on Data Derivation and Provenance. Available at: http://people.cs.uchicago.edu/~yongzh/papers/provenance_workshop_3.doc [Accessed: 1 May 2012].

    Google Scholar 

  • Gupta, Shubham. 2010. ‘Digital Rights Management: Necessary Evil or Evil that’s not Necessary?’ Techquark. September. http://www.techquark.com/2010/09/digital-rights-management-necessary.html [Accessed: 15 December 2010].

    Google Scholar 

  • Hartig, O. 2009. ‘Provenance Information in the Web of Data’. In Proceedings of the Linked Data on the Web Workshop, LDOW’09, Madrid, Spain, 2009, 1–9.

    Google Scholar 

  • Jagadeesan, Radha, Alan Jeffrey, Corin Pitcher and James Riely. 2009. ‘Towards a Theory of Accountability and Audit’. In Computer Security–ESORICS 2009, 5789: 152–167.

    Chapter  Google Scholar 

  • Kagal, L. and H. Abelson. 2010. ‘Access Control is an Inadequate Framework for Privacy Protection’. In W3C Workshop on Privacy for Advanced Web APIs. July. http://www.w3.org/2010/api-privacy-ws/papers/privacy-ws-23.pdf [Accessed: 1 May 2012].

    Google Scholar 

  • Kang, T. and L. Kagal. 2010. ‘Enabling Privacy-Awareness in Social Networks’. In Intelligent Information Privacy Management Symposium at the AAAI Spring Symposium. Vol. 2010 [Online]. Available: http://dig.csail.mit.edu/2010/Papers/Privacy2010/tkang-rmp/paper.pdf [Accessed: 1 May 2012].

    Google Scholar 

  • Korba, Larry and Steve Kenny. 2003. ‘Towards Meeting the Privacy Challenge: Adapting DRM’. In Digital Rights Management, 2696: 118–36.

    Chapter  Google Scholar 

  • Lecture Notes in Computer Science. Springer: Berlin/Heidelberg. http://dx.doi.org/10.1007/978– 3–540–44993–5_8 [Accessed: 1 May 2012].

  • Lecture Notes in Computer Science. Springer Berlin/Heidelberg. http://dx.doi.org/10.1007/978–3–642–04444–1_10 [Accessed: 1 May 2012].

  • Lemonde.fr and AFF. 2010. Un Licenciement Pour Des Propos Tenus Sur Facebook Jugé Légal–LeMonde.fr. LeMonde.fr. 19 November. http://www.lemonde.fr/technologies/article/2010/11/19/un-licenciement-pour-des-propos-tenus-surfacebook-juge-legal_1442142_651865.html [Accessed: 1 May 2012].

    Google Scholar 

  • Lin, K.-J., J. Zou and Yan Wang. 2010. ‘Accountability Computing for E-society’. In Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference On, 34–41. doi:10.1109/AINA.2010.167.

    Chapter  Google Scholar 

  • Moreau, Luc, Juliana Freire, Joe Futrelle, Robert McGrath, Jim Myers and Patrick Paulson. 2008. ‘The Open Provenance Model: An Overview’. In Provenance and Annotation of Data and Processes, 323–6.

    Chapter  Google Scholar 

  • Nemati, Hamid. 2008. Information Security and Ethics: Concepts, Methodologies, Tools, and Applications. Idea Group Reference.

    Book  Google Scholar 

  • Prashanth. 2010. ‘Top 10 Reverse Image Search Engines | Computer Talks’. CompTalks.com. December. http://www.comptalks.com/top-10-reverse-imagesearch-engines/ [Accessed: 15 December 2010].

    Google Scholar 

  • Rodríguez, E., V. Rodríguez, A. Carreras and J. Delgado. 2009. ‘A Digital Rights Management Approach to Privacy in Online Social Networks’. In Proceedings of the 1st Workshop on Privacy and Protection in Web-Based Social Networks (within ICAIL’09), Barcelona, Spain.

    Google Scholar 

  • Ruffolo, Rafael. 2007. Study says DRM Violates Canadian Privacy Law–PCWorld. PCWorld. 20 September. http://www.pcworld.com/article/137404/study_says_drm_violates_canadian_privacy_law.html [Accessed: 31 January 2011].

    Google Scholar 

  • Schedler, Andreas, Larry Jay Diamond and Marc F. Plattner. 1999. The Self-Restraining State: Power and Accountability in New Democracies. Lynne Rienner Publishers.

    Google Scholar 

  • Seitz, Juergen. 2005. Digital Watermarking for Digital Media. Information Science Publishing.

    Book  Google Scholar 

  • Shoemaker, Chris. 2002. ‘Hidden Bits: A Survey of Techniques for Digital Watermarking’. http://www.vu.union.edu/~shoemakc/watermarking/watermarking.html [Accessed: 08 May 2010].

    Google Scholar 

  • Silva, Paulo Pinheiro da, Silva Deborah, Deborah L McGuinness and Rob Mccool. 2003. ‘Knowledge Provenance Infrastructure’. Data Engineering Bulletin 26 (4): 26–32.

    Google Scholar 

  • Silva, Paulo Pinheiro da, Deborah L. McGuinness and Richard Fikes. 2006. ‘A Proof Markup Language for Semantic Web Services’. Information Systems 31 (4): 381–95.

    Article  Google Scholar 

  • Squicciarini, Anna and Smitha Sundareswaran. 2009. ‘Web-Traveler Policies for Images on Social Networks’. World Wide Web 12 (4) (December 1): 461–84. doi:10.1007/s11280–009–0070–8.

    Article  Google Scholar 

  • Squicciarini, Annac, Mohamed Shehab and Joshua Wede. 2010. ‘Privacy Policies for Shared Content in Social Network Sites.’ The VLDB Journal (June). doi:10.1007/s00778–010–0193–7. http://www.springerlink.com/content/f8105336537783mj/. (29 June): 1–20.

    Google Scholar 

  • Subramanya, S.R. and B.K. Yi. 2006. ‘Digital Rights Management.’ IEEE Potentials 25 (2): 31–4.

    Article  Google Scholar 

  • Weitzner, D. J., H. Abelson, T. Berners-Lee, J. Feigenbaum, J. Hendler and G. J Sussman. 2008. ‘Information Accountability’. Communications of the ACM 51 (6 June): 82–7. doi:10.1145/1349026.1349043.

    Article  Google Scholar 

  • Whitehouse, Andrew. 2010. ‘How to Protect Photos Online’. Guardian.co.uk. http://www.guardian.co.uk/technology/askjack/2010/oct/14/protect-photosonline [Accessed: 08 November 2010].

    Google Scholar 

  • Zlomek, Martin. 2007. ‘Video Watermarking’. Prague: Charles University. http://www.watermarking.eu/thesis.pdf [Accessed: 1 May-2012].

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2012 Esma Aïmeur, Sébastien Gambs and Ai Ho

About this chapter

Cite this chapter

Aïmeur, E., Gambs, S., Ho, A. (2012). Maintaining Sovereignty over Personal Data in Social Networking Sites. In: Guagnin, D., Hempel, L., Ilten, C., Kroener, I., Neyland, D., Postigo, H. (eds) Managing Privacy through Accountability. Palgrave Macmillan, London. https://doi.org/10.1057/9781137032225_8

Download citation

Publish with us

Policies and ethics