About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
sesa 11(1): e3

Research Article

How did you know that about me? Protecting users against unwanted inferences

Download1079 downloads
Cite
BibTeX Plain Text
  • @ARTICLE{10.4108/trans.sesa.2011.e3,
        author={Sara Motahari and Julia Mayer and Quentin Jones},
        title={How did you know that about me? Protecting users against unwanted inferences},
        journal={EAI Endorsed Transactions on Security and Safety},
        volume={1},
        number={1},
        publisher={ICST},
        journal_a={SESA},
        year={2011},
        month={9},
        keywords={inference problem, privacy, social computing, ubiquitous computing},
        doi={10.4108/trans.sesa.2011.e3}
    }
    
  • Sara Motahari
    Julia Mayer
    Quentin Jones
    Year: 2011
    How did you know that about me? Protecting users against unwanted inferences
    SESA
    ICST
    DOI: 10.4108/trans.sesa.2011.e3
Sara Motahari1,*, Julia Mayer1, Quentin Jones1
  • 1: New Jersey Institute of Technology, Newark, New Jersey, NJ 07103-3513, USA
*Contact email: Sara.gatmir-motahari@sprint.com

Abstract

The widespread adoption of social computing applications is transforming our world. It has changed the way we routinely communicate and navigate our environment and enabled political revolutions. However, despite these applications’ ability to support social action, their use puts individual privacy at considerable risk. This is in large part due to the fact that the public sharing of personal information through social computing applications enables potentially unwanted inferences about users’ identity, location, or other related personal information. This paper provides a systematic overview of the social inference problem. It highlights the public’s and research community’s general lack of awareness of the problem and associated risks to user privacy. A social inference risk prediction framework is presented and associated empirical studies that attest to its validity. This framework is then used to outline the major research and practical challenges that need to be addressed if we are to deploy effective social inference protection systems. Challenges examined include how to address the computational complexity of social inference risk modeling and designing user interfaces that inform users about social inference opportunities.

Keywords
inference problem, privacy, social computing, ubiquitous computing
Received
2011-02-15
Published
2011-09-27
Publisher
ICST
http://dx.doi.org/10.4108/trans.sesa.2011.e3

Copyright © 2011 Motahari et al., licensed to ICST. This is an open access article distributed under the terms of the Creative Commons Attribution licence http://creativecommons.org/licences/by/3.0/, which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.

EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL