Double-edged Swords: The Good and the Bad of Privacy and Anonymity in Social Media
نویسنده
چکیده
1 NEED FOR PRIVACY AND ANONYMITY IN ONLINE SOCIAL MEDIA SITES Online Social Media sites (OSMs) like Facebook and Twitter drastically changed the way users communicate with each other and share content. OSMs provide inexpensive communication medium that allows anyone to quickly reach millions of users. Consequently, in these platforms anyone can publish content and anyone interested in the content can obtain it, representing a transformative revolution in our society. However, the very strength of OSMs to easily reach millions of users also indicates that there might be dire consequences to the content publishers if it reaches wrong people. For example, A content creator might lose her job simply because her rant in Facebook might be viewed by her boss [3] or even worse, Government organizations might press criminal charges against an activist solely based on her political opinions expressed in OSM posts [2]. To that end, over time, as OSMs gradually become a medium for freedom of expression, specially in times of unrest [9], there is a strong need for protecting users and their freedom of expression. In other words, there is a need for more privacy and anonymity to the users in OSMs so that they can preserve their right to free speech without fear of repercussions from their Government or other authorities. However, there is a cost—more private and anonymous platforms can also be abused to hurt other users, e.g., via spreading hate, cyber bullying or trolling. In this talk, we will emphasize that we can leverage the OSM data as social sensors to understand privacy and anonymity practices in social media and improve upon them. Moreover, we argue that privacy and anonymity are double-edged swords—needed by many (e.g., activists during Arab Spring) but also abused by some to harm others. To that end, we argue that these social sensors might enable the OSM operators to stop the abuse too. We would next expand upon how social sensors can be used to (i) understand the need for privacy and anonymity and (ii) limit the abuse of these technologies
منابع مشابه
Double voter perceptible blind signature based electronic voting protocol
Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...
متن کاملAre internal knowledge transfer strategies double-edged swords?
Purpose – After identifying two kinds of internal knowledge transfer strategies, the purpose of this paper is to examine their effectiveness and whether they induce knowledge spillovers among firms. Design/methodology/approach – This study collected data in China and 219 questionnaires were achieved. Then, structure equation model by LISREL was used for hypotheses testing. Findings – The empiri...
متن کاملA Sudy on Information Privacy Issue on Social Networks
In the recent years, social networks (SN) are now employed for communication and networking, socializing, marketing, as well as one’s daily life. Billions of people in the world are connected though various SN platforms and applications, which results in generating massive amount of data online. This includes personal data or Personally Identifiable Information (PII). While more and more data a...
متن کاملAn Effective Method for Utility Preserving Social Network Graph Anonymization Based on Mathematical Modeling
In recent years, privacy concerns about social network graph data publishing has increased due to the widespread use of such data for research purposes. This paper addresses the problem of identity disclosure risk of a node assuming that the adversary identifies one of its immediate neighbors in the published data. The related anonymity level of a graph is formulated and a mathematical model is...
متن کاملAutophagy and Its Effects: Making Sense of Double-Edged Swords
Autophagy is the mechanism by which cellular material is delivered to lysosomes and degraded. This process has become a major focus of biological and biomedical research with thousands of papers published each year and rapidly growing appreciation that autophagy affects many normal and pathological processes. However, as we learn more about this evolutionarily ancient process, we are discoverin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017