Privacy Issues with Social Networking Sites Ai Ho, Abdou Maiga, Esma Aïmeur Département d'informatique et de recherche opérationnelle Université de Montréal.

Slides:



Advertisements
Similar presentations
Its more than a game, its your life…. What do you do online?
Advertisements

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
John D. Gregory Ministry of the Attorney General (Ontario) October 29, 2012.
Safety SAFETY. Protecting Privacy  Don’t broadcast your location.  You Tube settings  Read privacy policies  Real names?  Revealing your status.
Privacy: Facebook, Twitter
Managing Online Identity References: Prepared for Trustworthy Computing Group, Microsoft by Cross-Tab Marketing Services.
UnFriendly: Multi-Party Privacy Risks in Social Networks Kurt Thomas, Chris Grier, David M. Nicol.
The Future of Social Collaboration Randy Williams Enterprise Trainer and Evangelist AvePoint.
What is Personal Publishing? If you’ve ever written a blog entry, posted a comment or reply on a website, uploaded a video to YouTube, posted a picture.
Social media threats. Warning! May contain mild peril.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
SEXUALISED MEDIA AND SOCIAL MEDIA AMONGST TEENS Teens Online – What is really going on Teens Online – What is really going on Discuss Current Online.
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
Social Networking facebook, bebo, MySpace and others.
Security+ Guide to Network Security Fundamentals
Using Digital Credentials On The World-Wide Web M. Winslett.
Communicator’s Council Feb. 28, 2011 Blogs and Social Media.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Social Networking Sites  By:  Frank Wu  Lu Xie  Yuri Chung  Paige Borah.
 Digital marketing: Uses digital media to develop communications and exchanges with customers  Electronic media (E-marketing): Refers to the strategic.
By: Justin Mauss Privacy vs. Convenience. Agenda Finding the Balance: Privacy vs. Convenience Revisit Privacy vs. Convenience Overview of Online Tracking.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Social Networking and On-Line Communities: Classification and Research Trends Maria Ioannidou, Eugenia Raptotasiou, Ioannis Anagnostopoulos.
7. Marketing Tools: Web 2.0.  S econd generation of web technology, services, and tools  Communication, creativity, collaboration, and information sharing.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
World Internet Project: Researching the use of the Internet in New Zealand NetHui 2011.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Digital Citizenship Texting vs. Sexting Cyberbullying.
Social Media & The Chaplain. Social Media Social Media Is Consumer generated media it is media that is designed to be shared, sharing means that it is.
1.8 vs. 5.3 Benefits and Risks of Social Media in Healthcare Andy Malinoski Director of Risk Management Andy Malinoski Director of Risk Management.
 Facebook  Twitter  MySpace  Windows LiveSpace.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
PAWS Workshop April 10, Agenda Grant administrative topics Web 2.0 –Discussion of instructional uses Copyright and open content resources –Discussion.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
2010 Summer Training Series Teaching & Learning: Professional Development Institute Don Blake, NEA.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks S. Creese, M. Goldsmith, J. Nurse, E.
Panther Forum Activity Week 9. Things to remember when you are using social media to communicate with others.
Georgios Kontaxis‡, Michalis Polychronakis‡, Angelos D. Keromytis‡, and Evangelos P.Markatos* ‡Columbia University and *FORTH-ICS USENIX-SEC (August, 2012)
Amanda Lenhart, Senior Researcher, Director of Teens & Technology Mary Madden, Senior Researcher Pew Research Center Family Online Safety Institute November.
Social Networking Computer Applications and Technology Mrs. Adams.
SAFE SOCIAL MEDIA FOR EDUCATORS When used appropriately, social media sites can be a valuable, powerful tool for professional development, sharing of resources,
It’s more than a game, it’s your life… What do you do online?
Four or More: The New Demographic Mary Madden Pew Internet & American Life Project LITA President’s Program ALA – June 27, 2010 (and a bunch of other really.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away.
What are ____ 1 ______? Rules of behavior that you should follow when using computers and the Internet for the rest of your life Plank Jr. High – Tech.
Social Networking By: Ning Year 10 HC. Different types of networks  There’s so many ways people can be connected together. In person, s and social.
Facebook for Beginners One Session Class. What will you learn today? What can you do on Facebook? Creating a profile Privacy Connecting with friends Sending.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
MySpace & Facebook By Veronica Baca. MySpace Tom Anderson August 2003 Social Networking Website Free service Required Age: 14 & over A virtual community.
The hold seems to be with the administration… 85% of students surveyed have no problem using Facebook to communicate according to PEW research.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Goal: By the end of this lesson you should understand how social media are taking away your privacy rights.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
DIGITAL CITIZENSHIP TRAINING BEING A SAFE AND SUCCESSFUL USER OF ICT.
By Samantha Kozar.  What are social networks?  What is Facebook?  What is Gowalla?  What are the capabilities of these sites?  Privacy Settings 
>>0 >>1 >> 2 >> 3 >> 4 >> Privacy and SNS in China Comundus-European Master of Arts in Media, Communication and Cultural Study Jin PENG the case of xiaonei.com.
Internet Safety. Online Concerns: Contact Content Conduct.
Facebook privacy policy
Creating your online identity
Safeguarding your children on-line
Latest Updates on BlackHawk Mines Music : Privacy Policy
Cyberspace Risks and Defenses
SECURITY MECHANISM & E-COMMERCE
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Online Safety: Rights and Responsibilities
Presentation transcript:

Privacy Issues with Social Networking Sites Ai Ho, Abdou Maiga, Esma Aïmeur Département d'informatique et de recherche opérationnelle Université de Montréal Montreal, Canada Shruthi Rajegowda

Social Networking Sites (SNS) Information Build Network NSBA Survey Report : Nine-to-17-year-olds – spend about 9 hours per week on social networking activities NSBA - National School Boards Association Expect Change in Education System Social Media for Education

Most Visited Web Sites – 7 out of top 20 Potential Privacy threats – Identity theft – Disclosure of sensitive information. Social Networking

Privacy Issues Problem 1: Lack of user education/awareness about – Settings defaulted to share users’ personal information – Privacy warnings or privacy settings provided by SNS

Privacy Issues Problem 2: Lack of Privacy Tools to protect user data – Only basic access control – Profile public or private – Privacy setting interface is Complex

Privacy Issues Problem 3: Users cannot control what others may reveal about them – Cannot control Friends’ profile – Risks from third party application Just for FUN!!

Weak Privacy Policy Privacy policy – a disclaimer about using user‘s personal information – Do Social Sites respect its privacy policy? – Policies can change anytime! – Uploaded content is property of users or the site!! – Can you really delete your profile?

Privacy Framework Role: Foundation to address privacy issues – Categorize user data, user privacy concerns and profile viewers – Adapt privacy levels - based on these categorizations – Adapt Tracking level

User data Categorize user profile information into the following groups: – Identity - determine physically who is the user – Demographic profile- age, gender, weight, race, political view…. – Activity - lists all the activities that users perform Adding new friends Commenting on profile Change in personal information – Social Network Relationship status – User friends – User subscribed groups – Added content - blog, photos, music or video clips

User privacy concern Classify data to be shared as a privacy concern – Healthy data – General information about users – Nick name – Hobbies, – Landscape photos – Harmless data - User’s demographic profile – Harmful data – Inappropriate photos Blog entry that may damage the user’s reputation – Poisonous data - Sensitive information that may cause Security risks

Profile Viewers Best Friends – Trustworthy, can share all information Good Friends – Real life friends, can share more information Casual Friends - Based on s imilar interest, limited information share Visitors - could be users or non-users of the SNS, not in friend’s List Group people who can see the profile based on intimacy and trust

Privacy levels Based on Profile Viewers, four levels of privacy

Tracking levels Strong tracking - User does not mind being tracked on SNS Weak tracking – User minds if his/her profile is tagged to friends profile No tracking – No name, no tags, no photos in friends list

Privacy Protection based on User Type

Conclusions Existing solutions do not protect user privacy totally Lack of user awareness Privacy comes with a price Need for Privacy tools – strong and easy to use Need for Legal Law Enforcement to protect privacy

Privacy Protection Work In Progress

References Ai Ho, Abdou Maiga, Esma Aimeur, "Privacy protection issues in social networking sites,", The 7th ACS IEEE International Conference on Computer Systems and Applications,2009 D. Rosenblum, What Anyone Can Know: The Privacy Risks of Social Networking Sites. IEEE Security and Privacy, networking/social-networking-in-education-survey-on-new-generations-social- creative-and-interconnected-lifestyles-NSBA htm hints-at-more-location-features/ dyn/content/article/2010/04/27/AR html