|
|
Research on the Regulation of Co-owned Privacy Information in Social Media Under the Conflict of Privacy Boundaries |
Zhu Hou |
School of Information Management, Sun Yat-sen University, Guangzhou 510006 |
|
|
Abstract With the popularization of social media applications, the phenomenon of privacy leakage is becoming increasingly serious. Because privacy can be leaked by the privacy owner, application providers, and others, governments, industries, and the providers have all attempted to take measures to relieve this phenomenon. However, because of the obscurity of privacy boundaries, some articles about social media include the privacy of several different users. Users often leak others’ privacy because of their low cognition ability. Aiming to define co-owned privacy management, this paper proposes tactics by users, providers, and coordinated user-providers and then tests these tactics through computational experiments. The results show that both user and provider tactics can promote relationships in social networks; provider tactics can enhance such relationships better than user tactics, user tactics require the participation of providers, and coordinated user-provider tactics not only perform well but are also feasible. Therefore, this paper proposes a coordinated user-provider mechanism of co-owned privacy management based on simulation and theoretical analyses, generating some inspiration for governing co-owned privacy.
|
Received: 15 June 2020
|
|
|
|
1 Pensa R G, Di Blasi G. A privacy self-assessment framework for online social networks[J]. Expert Systems with Applications, 2017, 86: 18-31. 2 Ilia P, Polakis I, Athanasopoulos E, et al. Face/Off: preventing privacy leakage from photos in social networks[C]// Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York: ACM Press, 2015: 781-792. 3 Such J M, Porter J, Preibusch S, et al. Photo privacy conflicts in social media: a large-scale empirical study[C]// Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. New York: ACM Press, 2017: 3821-3832. 4 Such J M, Criado N. Multiparty privacy in social media[J]. Communications of the ACM, 2018, 61(8): 74-81. 5 Harrison J R, Lin Z A, Carroll G R, et al. Simulation modeling in organizational and management research[J]. Academy of Management Review, 2007, 32(4): 1229-1245. 6 Xu F, Michael K, Chen X. Factors affecting privacy disclosure on social network sites: an integrated model[J]. Electronic Commerce Research, 2013, 13(2): 151-168. 7 李纲, 王丹丹. 社交网站用户个人信息披露意愿影响因素研究——以新浪微博为例[J]. 情报资料工作, 2015, 36(1): 35-40. 8 李睿, 张锐剑, 李文立, 等. 移动互联网环境下的隐私泄露容忍度测度方法[J]. 管理评论, 2016, 28(7): 102-111. 9 Baek Y M, Bae Y, Jeong I, et al. Changing the default setting for information privacy protection: what and whose personal information can be better protected?[J]. The Social Science Journal, 2014, 51(4): 523-533. 10 Zhu H, Huang C, Li H. Information diffusion model based on privacy setting in online social networking services[J]. Computer Journal, 2015, 58(4): 536-548. 11 Warren S D, Brandeis L D. The right to privacy[J]. Harvard Law Review, 1890, 4(5): 193-220. 12 Westin A F. Privacy and freedom[M]. New York: Atheneum, 1967. 13 Stone E F, Stone D L. Privacy in organizations: theoretical issues, research findings, and protection mechanisms[M]// Research in Personnel and Human Resources Management. Greenwich: JAI Press, 1990, 8: 349-411. 14 Thomas K, Grier C, Nicol D M. unFriendly: multi-party privacy risks in social networks[C]// Proceedings of the International Symposium on Privacy Enhancing Technologies Symposium. Heidelberg: Springer, 2010: 236-252. 15 Such J M, Rovatsos M. Privacy policy negotiation in social media[J]. ACM Transactions on Autonomous and Adaptive Systems, 2016, 11(1): 1-29. 16 Squicciarini A C, Shehab M, Wede J. Privacy policies for shared content in social network sites[J]. The VLDB Journal, 2010, 19(6): 777-796. 17 Hu H X, Ahn G J, Jorgensen J. Detecting and resolving privacy conflicts for collaborative data sharing in online social networks[C]// Proceedings of the 27th Annual Computer Security Applications Conference. New York: ACM Press, 2011: 103-112. 18 Xu L, Jiang C X, He N Q, et al. Trust-based collaborative privacy management in online social networks[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(1): 48-60. 19 牛静, 赵一菲. 社交媒体中的隐私披露问题及伦理原则——基于人际交往的视角[J]. 青年记者, 2018(28): 56-58 20 王波伟, 李秋华. 大数据时代微信朋友圈的隐私边界及管理规制——基于传播隐私管理的理论视角[J]. 情报理论与实践, 2016, 39(11): 37-42. 21 周潇潇. 共同隐私的权利冲突及解决方式[J]. 法制博览, 2018(8): 212. 22 Stutzman F D, Gross R, Acquisti A. Silent listeners: the evolution of privacy and disclosure on Facebook[J]. Journal of Privacy and Confidentiality, 2013, 4(2): 7-41. 23 Houghton D J, Joinson A N. Privacy, social network sites, and social relations[J]. Journal of Technology in Human Services, 2010, 28(1/2): 74-94. 24 Avgerou A D, Stamatiou Y C. Privacy awareness diffusion in social networks[J]. IEEE Security & Privacy, 2015, 13(6): 44-50. |
|
|
|