Privacy risk analysis of online social networks:
The social benefit derived from Online Social Networks (OSNs) can lure users to reveal unprecedented volumes of personal data to an online audience that is much less trustworthy than their offline social circle. Even if a user hides his personal data from some users and shares with others, privacy s...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
[San Rafael, California, USA]
Morgan & Claypool Publishers
[2021]
|
Schriftenreihe: | Synthesis lectures on information security, privacy, and trust
23 |
Schlagworte: | |
Zusammenfassung: | The social benefit derived from Online Social Networks (OSNs) can lure users to reveal unprecedented volumes of personal data to an online audience that is much less trustworthy than their offline social circle. Even if a user hides his personal data from some users and shares with others, privacy settings of OSNs may be bypassed, thus leading to various privacy harms such as identity theft, stalking, or discrimination. Therefore, users need to be assisted in understanding the privacy risks of their OSN profiles as well as managing their privacy settings so as to keep such risks in check, while still deriving the benefits of social network participation. This book presents to its readers how privacy risk analysis concepts such as privacy harms and risk sources can be used to develop mechanisms for privacy scoring of user profiles and for supporting users in privacy settings management in the context of OSNs. Privacy scoring helps detect and minimize the risks due to the dissemination and use of personal data. The book also discusses many open problems in this area to encourage further research |
Beschreibung: | Part of: Synthesis digital library of engineering and computer science |
Beschreibung: | xiii, 95 Seiten Illustrationen 24 cm |
ISBN: | 1636390188 9781636390185 9781636390208 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV047223936 | ||
003 | DE-604 | ||
005 | 20230223 | ||
007 | t | ||
008 | 210406s2021 a||| |||| 00||| eng d | ||
020 | |a 1636390188 |9 1636390188 | ||
020 | |a 9781636390185 |q pbk |9 978-1-63639-018-5 | ||
020 | |a 9781636390208 |q hbk |9 978-1-63639-020-8 | ||
035 | |a (OCoLC)1371316661 | ||
035 | |a (DE-599)BVBBV047223936 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91G | ||
084 | |a DAT 616 |2 stub | ||
084 | |a DAT 050 |2 stub | ||
100 | 1 | |a De, Sourya Joyee |e Verfasser |4 aut | |
245 | 1 | 0 | |a Privacy risk analysis of online social networks |c Sourya Joyee De, Abdessamad Imine |
264 | 1 | |a [San Rafael, California, USA] |b Morgan & Claypool Publishers |c [2021] | |
264 | 4 | |c © 2021 | |
300 | |a xiii, 95 Seiten |b Illustrationen |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Synthesis lectures on information security, privacy, and trust |v 23 | |
500 | |a Part of: Synthesis digital library of engineering and computer science | ||
505 | 8 | |a 1. Introduction -- 1.1. Chapter overview | |
505 | 8 | |a 2. Terminology and definitions -- 2.1. Attributes -- 2.2. Risk sources -- 2.3. Data inference -- 2.4. Threat -- 2.5. Privacy harm -- 2.6. Privacy risks -- 2.7. Privacy risk analysis | |
505 | 8 | |a 3. Dimensions of privacy scoring in OSNs -- 3.1. Type of data -- 3.2. Assumptions about the user -- 3.3. Privacy settings -- 3.4. Risk sources -- 3.5. Privacy metrics -- 3.6. Data inference -- 3.7. Suggestion of countermeasures | |
505 | 8 | |a 4. Attribute visibility in OSN -- 4.1. Visibility matrix -- 4.2. Construction of visibility matrix -- 4.3. An illustration -- 4.4. Open problems | |
505 | 8 | |a 5. Harm trees for OSNs -- 5.1. Harm trees -- 5.2. Construction of harm trees -- 5.3. Harm expressions -- 5.4. Harm database -- 5.5. Open problems | |
505 | 8 | |a 6. Privacy risk analysis in OSNs -- 6.1. An overview -- 6.2. PrivOSN in details -- 6.3. Residual risks -- 6.4. Open problems | |
505 | 8 | |a 7. Social benefits -- 7.1. Social ties -- 7.2. Social capital -- 7.3. Understanding social benefits -- 7.4. Evaluation of social benefit -- 7.5. Open problems | |
505 | 8 | |a 8. Choosing the right privacy settings -- 8.1. Privacy and social benefit tradeoff in privacy management -- 8.2. An integer programming model -- 8.3. Formulation of the ip problem -- 8.4. Open problems -- 9. Conclusion | |
520 | 3 | |a The social benefit derived from Online Social Networks (OSNs) can lure users to reveal unprecedented volumes of personal data to an online audience that is much less trustworthy than their offline social circle. Even if a user hides his personal data from some users and shares with others, privacy settings of OSNs may be bypassed, thus leading to various privacy harms such as identity theft, stalking, or discrimination. Therefore, users need to be assisted in understanding the privacy risks of their OSN profiles as well as managing their privacy settings so as to keep such risks in check, while still deriving the benefits of social network participation. This book presents to its readers how privacy risk analysis concepts such as privacy harms and risk sources can be used to develop mechanisms for privacy scoring of user profiles and for supporting users in privacy settings management in the context of OSNs. Privacy scoring helps detect and minimize the risks due to the dissemination and use of personal data. The book also discusses many open problems in this area to encourage further research | |
653 | 0 | |a Online social networks / Security measures | |
653 | 0 | |a Computer networks / Security measures | |
653 | 0 | |a Privacy, Right of | |
653 | 0 | |a Computer networks / Security measures | |
653 | 0 | |a Privacy, Right of | |
653 | 6 | |a Electronic books | |
700 | 1 | |a Imine, Abdessamad |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-63639-019-2 |
830 | 0 | |a Synthesis lectures on information security, privacy, and trust |v 23 |w (DE-604)BV041544544 |9 23 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032628490 |
Datensatz im Suchindex
_version_ | 1804182347643355136 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | De, Sourya Joyee Imine, Abdessamad |
author_facet | De, Sourya Joyee Imine, Abdessamad |
author_role | aut aut |
author_sort | De, Sourya Joyee |
author_variant | s j d sj sjd a i ai |
building | Verbundindex |
bvnumber | BV047223936 |
classification_tum | DAT 616 DAT 050 |
contents | 1. Introduction -- 1.1. Chapter overview 2. Terminology and definitions -- 2.1. Attributes -- 2.2. Risk sources -- 2.3. Data inference -- 2.4. Threat -- 2.5. Privacy harm -- 2.6. Privacy risks -- 2.7. Privacy risk analysis 3. Dimensions of privacy scoring in OSNs -- 3.1. Type of data -- 3.2. Assumptions about the user -- 3.3. Privacy settings -- 3.4. Risk sources -- 3.5. Privacy metrics -- 3.6. Data inference -- 3.7. Suggestion of countermeasures 4. Attribute visibility in OSN -- 4.1. Visibility matrix -- 4.2. Construction of visibility matrix -- 4.3. An illustration -- 4.4. Open problems 5. Harm trees for OSNs -- 5.1. Harm trees -- 5.2. Construction of harm trees -- 5.3. Harm expressions -- 5.4. Harm database -- 5.5. Open problems 6. Privacy risk analysis in OSNs -- 6.1. An overview -- 6.2. PrivOSN in details -- 6.3. Residual risks -- 6.4. Open problems 7. Social benefits -- 7.1. Social ties -- 7.2. Social capital -- 7.3. Understanding social benefits -- 7.4. Evaluation of social benefit -- 7.5. Open problems 8. Choosing the right privacy settings -- 8.1. Privacy and social benefit tradeoff in privacy management -- 8.2. An integer programming model -- 8.3. Formulation of the ip problem -- 8.4. Open problems -- 9. Conclusion |
ctrlnum | (OCoLC)1371316661 (DE-599)BVBBV047223936 |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04142nam a2200553 cb4500</leader><controlfield tag="001">BV047223936</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230223 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">210406s2021 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1636390188</subfield><subfield code="9">1636390188</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781636390185</subfield><subfield code="q">pbk</subfield><subfield code="9">978-1-63639-018-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781636390208</subfield><subfield code="q">hbk</subfield><subfield code="9">978-1-63639-020-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1371316661</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047223936</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 616</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">De, Sourya Joyee</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Privacy risk analysis of online social networks</subfield><subfield code="c">Sourya Joyee De, Abdessamad Imine</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[San Rafael, California, USA]</subfield><subfield code="b">Morgan & Claypool Publishers</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xiii, 95 Seiten</subfield><subfield code="b">Illustrationen</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Synthesis lectures on information security, privacy, and trust</subfield><subfield code="v">23</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Part of: Synthesis digital library of engineering and computer science</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1. Introduction -- 1.1. Chapter overview</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2. Terminology and definitions -- 2.1. Attributes -- 2.2. Risk sources -- 2.3. Data inference -- 2.4. Threat -- 2.5. Privacy harm -- 2.6. Privacy risks -- 2.7. Privacy risk analysis</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3. Dimensions of privacy scoring in OSNs -- 3.1. Type of data -- 3.2. Assumptions about the user -- 3.3. Privacy settings -- 3.4. Risk sources -- 3.5. Privacy metrics -- 3.6. Data inference -- 3.7. Suggestion of countermeasures</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4. Attribute visibility in OSN -- 4.1. Visibility matrix -- 4.2. Construction of visibility matrix -- 4.3. An illustration -- 4.4. Open problems</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">5. Harm trees for OSNs -- 5.1. Harm trees -- 5.2. Construction of harm trees -- 5.3. Harm expressions -- 5.4. Harm database -- 5.5. Open problems</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">6. Privacy risk analysis in OSNs -- 6.1. An overview -- 6.2. PrivOSN in details -- 6.3. Residual risks -- 6.4. Open problems</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">7. Social benefits -- 7.1. Social ties -- 7.2. Social capital -- 7.3. Understanding social benefits -- 7.4. Evaluation of social benefit -- 7.5. Open problems</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">8. Choosing the right privacy settings -- 8.1. Privacy and social benefit tradeoff in privacy management -- 8.2. An integer programming model -- 8.3. Formulation of the ip problem -- 8.4. Open problems -- 9. Conclusion</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">The social benefit derived from Online Social Networks (OSNs) can lure users to reveal unprecedented volumes of personal data to an online audience that is much less trustworthy than their offline social circle. Even if a user hides his personal data from some users and shares with others, privacy settings of OSNs may be bypassed, thus leading to various privacy harms such as identity theft, stalking, or discrimination. Therefore, users need to be assisted in understanding the privacy risks of their OSN profiles as well as managing their privacy settings so as to keep such risks in check, while still deriving the benefits of social network participation. This book presents to its readers how privacy risk analysis concepts such as privacy harms and risk sources can be used to develop mechanisms for privacy scoring of user profiles and for supporting users in privacy settings management in the context of OSNs. Privacy scoring helps detect and minimize the risks due to the dissemination and use of personal data. The book also discusses many open problems in this area to encourage further research</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Online social networks / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Privacy, Right of</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Privacy, Right of</subfield></datafield><datafield tag="653" ind1=" " ind2="6"><subfield code="a">Electronic books</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Imine, Abdessamad</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-63639-019-2</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Synthesis lectures on information security, privacy, and trust</subfield><subfield code="v">23</subfield><subfield code="w">(DE-604)BV041544544</subfield><subfield code="9">23</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032628490</subfield></datafield></record></collection> |
id | DE-604.BV047223936 |
illustrated | Illustrated |
index_date | 2024-07-03T16:58:38Z |
indexdate | 2024-07-10T09:06:07Z |
institution | BVB |
isbn | 1636390188 9781636390185 9781636390208 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032628490 |
oclc_num | 1371316661 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM |
owner_facet | DE-91G DE-BY-TUM |
physical | xiii, 95 Seiten Illustrationen 24 cm |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Morgan & Claypool Publishers |
record_format | marc |
series | Synthesis lectures on information security, privacy, and trust |
series2 | Synthesis lectures on information security, privacy, and trust |
spelling | De, Sourya Joyee Verfasser aut Privacy risk analysis of online social networks Sourya Joyee De, Abdessamad Imine [San Rafael, California, USA] Morgan & Claypool Publishers [2021] © 2021 xiii, 95 Seiten Illustrationen 24 cm txt rdacontent n rdamedia nc rdacarrier Synthesis lectures on information security, privacy, and trust 23 Part of: Synthesis digital library of engineering and computer science 1. Introduction -- 1.1. Chapter overview 2. Terminology and definitions -- 2.1. Attributes -- 2.2. Risk sources -- 2.3. Data inference -- 2.4. Threat -- 2.5. Privacy harm -- 2.6. Privacy risks -- 2.7. Privacy risk analysis 3. Dimensions of privacy scoring in OSNs -- 3.1. Type of data -- 3.2. Assumptions about the user -- 3.3. Privacy settings -- 3.4. Risk sources -- 3.5. Privacy metrics -- 3.6. Data inference -- 3.7. Suggestion of countermeasures 4. Attribute visibility in OSN -- 4.1. Visibility matrix -- 4.2. Construction of visibility matrix -- 4.3. An illustration -- 4.4. Open problems 5. Harm trees for OSNs -- 5.1. Harm trees -- 5.2. Construction of harm trees -- 5.3. Harm expressions -- 5.4. Harm database -- 5.5. Open problems 6. Privacy risk analysis in OSNs -- 6.1. An overview -- 6.2. PrivOSN in details -- 6.3. Residual risks -- 6.4. Open problems 7. Social benefits -- 7.1. Social ties -- 7.2. Social capital -- 7.3. Understanding social benefits -- 7.4. Evaluation of social benefit -- 7.5. Open problems 8. Choosing the right privacy settings -- 8.1. Privacy and social benefit tradeoff in privacy management -- 8.2. An integer programming model -- 8.3. Formulation of the ip problem -- 8.4. Open problems -- 9. Conclusion The social benefit derived from Online Social Networks (OSNs) can lure users to reveal unprecedented volumes of personal data to an online audience that is much less trustworthy than their offline social circle. Even if a user hides his personal data from some users and shares with others, privacy settings of OSNs may be bypassed, thus leading to various privacy harms such as identity theft, stalking, or discrimination. Therefore, users need to be assisted in understanding the privacy risks of their OSN profiles as well as managing their privacy settings so as to keep such risks in check, while still deriving the benefits of social network participation. This book presents to its readers how privacy risk analysis concepts such as privacy harms and risk sources can be used to develop mechanisms for privacy scoring of user profiles and for supporting users in privacy settings management in the context of OSNs. Privacy scoring helps detect and minimize the risks due to the dissemination and use of personal data. The book also discusses many open problems in this area to encourage further research Online social networks / Security measures Computer networks / Security measures Privacy, Right of Electronic books Imine, Abdessamad Verfasser aut Erscheint auch als Online-Ausgabe 978-1-63639-019-2 Synthesis lectures on information security, privacy, and trust 23 (DE-604)BV041544544 23 |
spellingShingle | De, Sourya Joyee Imine, Abdessamad Privacy risk analysis of online social networks Synthesis lectures on information security, privacy, and trust 1. Introduction -- 1.1. Chapter overview 2. Terminology and definitions -- 2.1. Attributes -- 2.2. Risk sources -- 2.3. Data inference -- 2.4. Threat -- 2.5. Privacy harm -- 2.6. Privacy risks -- 2.7. Privacy risk analysis 3. Dimensions of privacy scoring in OSNs -- 3.1. Type of data -- 3.2. Assumptions about the user -- 3.3. Privacy settings -- 3.4. Risk sources -- 3.5. Privacy metrics -- 3.6. Data inference -- 3.7. Suggestion of countermeasures 4. Attribute visibility in OSN -- 4.1. Visibility matrix -- 4.2. Construction of visibility matrix -- 4.3. An illustration -- 4.4. Open problems 5. Harm trees for OSNs -- 5.1. Harm trees -- 5.2. Construction of harm trees -- 5.3. Harm expressions -- 5.4. Harm database -- 5.5. Open problems 6. Privacy risk analysis in OSNs -- 6.1. An overview -- 6.2. PrivOSN in details -- 6.3. Residual risks -- 6.4. Open problems 7. Social benefits -- 7.1. Social ties -- 7.2. Social capital -- 7.3. Understanding social benefits -- 7.4. Evaluation of social benefit -- 7.5. Open problems 8. Choosing the right privacy settings -- 8.1. Privacy and social benefit tradeoff in privacy management -- 8.2. An integer programming model -- 8.3. Formulation of the ip problem -- 8.4. Open problems -- 9. Conclusion |
title | Privacy risk analysis of online social networks |
title_auth | Privacy risk analysis of online social networks |
title_exact_search | Privacy risk analysis of online social networks |
title_exact_search_txtP | Privacy risk analysis of online social networks |
title_full | Privacy risk analysis of online social networks Sourya Joyee De, Abdessamad Imine |
title_fullStr | Privacy risk analysis of online social networks Sourya Joyee De, Abdessamad Imine |
title_full_unstemmed | Privacy risk analysis of online social networks Sourya Joyee De, Abdessamad Imine |
title_short | Privacy risk analysis of online social networks |
title_sort | privacy risk analysis of online social networks |
volume_link | (DE-604)BV041544544 |
work_keys_str_mv | AT desouryajoyee privacyriskanalysisofonlinesocialnetworks AT imineabdessamad privacyriskanalysisofonlinesocialnetworks |