Home   >   CSC-OpenAccess Library   >    Manuscript Information
Improved Automated Framework to Improve Users' Awareness of Online Social Networks
Sameer Abufardeh, Rahaf Barakat
Pages - 72 - 89     |    Revised -     |    Published -
Volume - 17   Issue - 4    |    Publication Date - October 2023  Table of Contents
MORE INFORMATION
KEYWORDS
Online Social Networks OSN, Privacy, Risky, Sensitive, Dangerous, Trust.
ABSTRACT
The widespread usage of Online Social Networks (OSN) has introduced new privacy threats. These threats emerge when users intentionally but unknowingly share their information with a broader audience than intended(Ismail et al., 2021; Zhu et al., n.d.; Pew Research, 2019; Pew Forbes, 2022; Pew Ming, 2021; Bright et al., 2022; Cain et al., 2021). This paper introduces an improved framework for Users' Awareness of Online Social Networks. In our initial work, we identified critical privacy issues related to posting on social networks. We proposed a unique twophase approach to address this problem (Barakat et al., 2016). The first phase involved recognizing key phrases in potential posts, particularly those that revealed location information. In this paper, we have expanded the detection rules to identify the location and other types of sensitive information, such as work and interests. We have developed a set of detection rules for this purpose and tested them with over 1500 actual Facebook posts. The initial detection system achieved a success rate of 85%, but the new system has improved the detection rate to approximately 88%.

Additionally, we conducted experiments with 500 actual Facebook posts from Arabic language users. However, the detection rates were lower due to the presence of English words mixed with the Arabic text.The second phase of our approach involves automatically grouping friends into sets called Circles of Trust. This allows messages containing sensitive information to be restricted to the appropriate Circles of Trust. We discuss an approach for initially assigning friends to circles and the mechanisms for moving friends among circles as their relationship with the poster changes. This aspect has slight improvement but is still needs improvement.
Ali, B., Villegas, W., & Maheswaran, M. (2007). A trust based approach for protecting user data in social networks. In K. A. Lyons and C. Couturier, (Eds.). Proceedings of the 2007 conference of the center for advanced studies on collaborative research, CASCON' 07, (pp. 288-293).
C. Zhang, J. Sun, and X. Zhu. (2012). "Privacy and Security for Online Social Networks: Challenges and Opportunities," Network. IEEE. 24 (4), pp. 13-18.
Carminati, B., Ferrari, E., & Perego, A. (2009). Enforcing access control in web-based social networks, ACM Transactions on Information & System Security, 13(1): 1-38.
Caverlee, J., Liu, L., & Webb, S. (2008). Social trust: Tamper-resilient trust establishment in online communities. In Proceedings of the 8th ACM/IEEE-CS Joint Conference on Digital Libraries (JCDL'08). (pp. 104-114).
Caverlee, J., Liu, L., & Webb, S. (2010). The social trust framework for trusted social information management: Architecture and algorithms. Information Sciences 180(1): 95-112.
Chen, X. & Shi, S. (2009). A literature review of privacy research on social network sites, In MINES '09 1, (pp. 93-97).
Cloak. (2015). Reclaim your privacy. http://www.reclaimprivacy.org
Facebook "Friend" Suspected in Burglary. (n.d.)"http://www.cbsnews.com/news/facebook-friend-suspected-in-burglary/
Golbeck, J. (2005). Personalizing applications through the integration of inferred trust values in semantic web-based social networks. In Processing of the ISWC Semantic Network Analysis Workshop.
Golbeck, J., Parsia, B., & Hendler, J. (2003). Trust networks on the semantic web. In Proceedings of the 7th International Workshop on Cooperative Intelligent Agents (pp. 238-249).
H. Kataoka, A. Utsumi, Y. Hirose, and H. Yoshiura.(2010). "Disclosure control of natural language information to enable secure and enjoyable communication over the internet," in Security Protocols, ser. Lecture Notes in Computer Science, 2010, pp. 178–188.
Hamdi, S., Gancarski, A. L., Bouzeghoub, A., & BenYahia, S. (2012). Iris: A novel method of direct trust computation for generating trusted social networks. In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 616-623).
Hoang-Quoc Nguyen-Son, Quoc-Binh Nguyen, Minh-Triet Tran, Dinh-Thuc Nguyen, Hiroshi Yoshiura, Isao Echizen. (2012). "Automatic Anonymization of Natural Languages Texts Posted on Social Networking Services and Automatic Detection of Disclosure",2012 Seventh International Conference on Availability, Reliability and Security.
J. Bonneau, J.Anderson, L. Church.(2009). "Privacy Suites: shared privacy for social networks," in ACM International Conf. Proc. of the 5th Symposium on Usable Privacy and Security, 2009, pp.1-2.
Justin Becker, Hao Chen. (2009). "Measuring Privacy Risk in Online Social Networks" In Proceedings of W2SP 2009: Web 2.0 Security and Privacy.
K. Poulsen. Myspace predator caught by code. (n.d.).http://www.wired.com/news/technology/0,71948-0.html.
Kim, Y. A. (2008). Building a web of trust without explicit trust ratings. In Proceedings of the 24th IEEE International Conference on Data Engineering Workshop (pp. 531-536).
Kohavi, R., and Provost, F. (1998). On Applied Research in Machine Learning. In Editorial for the Special Issue on Applications of Machine Learning and the Knowledge Discovery Process.
L. Banks and S. F. Wu. (2009). "All Friends are Not Created Equal: An Interaction Intensity Based Approach to Privacy in Online Social Networks," Proc. WSPOSN '09.
Lenhart, A., & Madden, M. (2007). Teens, privacy, & online social networks. Pew Internet and American Life Project Report. http://www.pewinternet.org/2007/04/18/teens-privacy-and-online-social-networks.
Liu, H., Lim, E., Lauw, H., Le, M., Sun, A., Srivastava, J., & Kim, Y. (2008). Predicting trusts among users of online communities: An Epinions case study. In Proceedings of the 9th ACM Conference on Electronic Commerce (pp. 310-319).
M. Hart, C. Castille, R. Johnson, and A. Stent. (2009). "Usable Privacy Controls for Blogs," In Proceedings of the International Conference on Computational Science and Engineering, pp. 401-408.
M. Hart, R. Johnson, and A. Stent. (2007). "More Content - Less Control: Access Control in the Web 2.0," Proceedings of the Web 2.0 Security & Privacy Workshop.
Midori Hirose, Akira Utsumi, Isao Echizen, Hiroshi Yoshiura.(2012). "A Private Information Detector for Controlling Circulation of Private Information through Social Networks," ares, pp.473-478, 2012 Seventh International Conference on Availability, Reliability, and Security.
Moalla, S., Hamdi, S., & Defude, B. (2010). A new trust management model in p2p systems. In Proceedings of the 6th IEEE International Conference on Signal-Image Technologies and Internet-Based System, SITIS', (pp. 241-246).
N. Zakaria, K. Y. Lau, N.M.A. Alias, W. Husain.(n.d.). "Protecting the privacy of children in social networking sites with rule-based privacy tool" High Capacity optimal Networks and Enabling Technologies (HONET) pp. 253-257, 2011.
Nepal, S. & Sherchan, W. (2011). STrust: A trust model for social networks. In Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 841-846).
Pennebaker, J. W. and Francis, M. E. Linguistic Inquiry and Word Count. Lawrence Erlbaum. (1999).http://www.liwc.net/.
Pew Bright, L. F., Logan, K., & Lim, H. S. (2022). Social Media Fatigue and Privacy: An Exploration of Antecedents to Consumers' Concerns regarding the Security of Their Personal Information on Social Media Platforms. Journal of Interactive Advertising, 1-16.
Pew Forbes (2022). The Top Security Threats of 2022. https://www.forbes.com/sites/splunk/2022/03/01/the-top-security-threats-of2022/?sh=4315d2a12e5d.
Pew Ming, S. S. Y. (2021). Research on Influencing Factors of Information Privacy Concerns of Social Media Users. Information and Documentation Services, 42(3), 94-104.
Pew Research. (2019). Social media fact sheet. https://www.pewresearch.org/internet/fact-sheet/social-media/.
Police: Thieves Robbed Homes Based On Facebook, Social Media Sites. (n.d.).http://www.wmur.com/Police-Thieves-Robbed-Homes-Based-On-Facebook-Social-Media-Sites/11861116.
R Barakat, S Abufardeh, K Magel. (2016). "Automated framework to improve users' awareness on Online Social Network Automated framework to improve users' awareness on Online Social Networks". 2016 IEEE International Conference on Electro Information Technology (EIT).
R Ismail, A., M. R. Hamzah, H. Hussin. (2021). "The roles of trust and perceived risks on online self-disclosure." AIP Conference Proceedings. Vol. 2347. No. 1. AIP Publishing LLC, 2021.
Ralph Cain, J. A., Imre, I. (2021). Everybody wants some: Collection and control of personal information, privacy concerns, and social media use. New Media & Society, https://doi.org/10.1177/14614448211000327.
Ralph Gross, Alessandro Acquisti. (2005). "Information Revelation and Privacy in Online Social Networks (The Facebook case)" Pre-proceedings version. ACM Workshop on Privacy in the Electronic Society (WPES).
Sarah Palin email hack. (n.d.).http://en.wikipedia.org/iki/Sarah_Palin_email_hack.
Sterling, G. (2013). Pew: 94% of teenagers use Facebook, have 425 Facebook friends, but Twitter and Instagram adoption way up, Pew Research Center. http://marketingland.com/pew-the-average-teenager-has-425-4-facebook-friends-44847.
Wanita Sherchan , Surya Nepal , Cecile Paris.(2013). A survey of trust in social networks, ACM Computing Surveys (CSUR), v.45 n.4, p.1-33.
Watanabe, N. and Yoshiura, H. (2010). "Detecting Revelation of Private Information on Online Social Networks," 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany, 2010, pp. 502-505, doi: 10.1109/IIHMSP.2010.128.
Yosef Lehrman. (2010). "The Weakest Link: The Risks Associated with Social Networking Websites" New York Police Department, Journal of Strategic Security, Vol. 3 No. 2 .
Zhan, J. & Fang,X. (2011). A novel trust computing system for social networks. In Proceedings of the IEEE International Conference on Privacy, Security, Risk and Trust (pp. 1284-1289).
Zhang, Y., Chen, H., & Wu, Z. (2006). A social network-based trust model for the semantic web. In Proceedings of the 6th International Conference on Autonomic and Trusted Computing (pp. 183-192).
Zhu, Tianqing, et al.(n.d.) "The dynamic privacy-preserving mechanisms for online dynamic social networks." IEEE Transactions on Knowledge and Data Engineering 34.6 (2020): 2962-2974.
Associate Professor Sameer Abufardeh
Computer, Electrical, and Software Engineering Dept, Embry–Riddle Aeronautical University, Prescott, AZ, 86301 - United States of America
abufards@erau.edu
Dr. Rahaf Barakat
School of Science and Technology, Georgia Gwinnett College, Lawrenceville, GA 30043 - United States of America


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS