Nothing Special   »   [go: up one dir, main page]

Skip to main content

Unveiling the Privacy Risk: A Trade-Off Between User Behavior and Information Propagation in Social Media

  • Conference paper
  • First Online:
Complex Networks & Their Applications XII (COMPLEX NETWORKS 2023)

Part of the book series: Studies in Computational Intelligence ((SCI,volume 1144))

Included in the following conference series:

  • 1016 Accesses

Abstract

This study delves into the privacy risks associated with user interactions in complex networks such as those generated on social media platforms. In such networks, potentially sensitive information can be extracted and/or inferred from explicitly user-generated content and its (often uncontrolled) dissemination. Hence, this preliminary work first studies an unsupervised model generating a privacy risk score for a given user, which considers both sensitive information released directly by the user and content propagation in the complex network. In addition, a supervised model is studied, which identifies and incorporates features related to privacy risk. The results of both multi-class and binary privacy risk classification for both models are presented, using the Twitter platform as a scenario, and a publicly accessible purpose-built dataset.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Data Availability

The labeled dataset generated and used in this work is available on request from the corresponding author.

Notes

  1. 1.

    https://www.nytimes.com/2023/08/03/technology/twitter-x-tweets-elon-musk.html, accessed on September 1, 2023.

  2. 2.

    This can happen, for example, when a tweet is retweeted or mentioned by users with a large following, thus amplifying its reach.

  3. 3.

    https://scikit-learn.org/stable/supervised_learning.html.

  4. 4.

    https://scikit-learn.org/stable/modules/model_evaluation.html.

  5. 5.

    https://github.com/JustAnotherArchivist/snscrape.

  6. 6.

    https://scikit-learn.org/stable/modules/cross_validation.html.

References

  1. Abrams, M., Weiss, H., Giusti, S., Litner, J.: 47 terms that describe sexual attraction, behavior, and orientation (2023). https://www.healthline.com/health/different-types-of-sexuality. Accessed 1 April 2023

  2. Aghasian, E., Garg, S., Gao, L., Yu, S., Montgomery, J.: Scoring users’ privacy disclosure across multiple online social networks. IEEE Access 5, 13118–13130 (2017)

    Article  Google Scholar 

  3. Akcora, C., Carminati, B., Ferrari, E.: Privacy in social networks: how risky is your social graph?. In: Proceedings of ICDE, vol. 2012, pp. 9–19 (2012)

    Google Scholar 

  4. Caliskan Islam, A., Walsh, J., Greenstadt, R.: Privacy detective: detecting private information and collective privacy behavior in a large social network. In: Proceedings of WPES 2014, pp. 35–46 (2014)

    Google Scholar 

  5. Carminati, B., Ferrari, E., Viviani, M.: Online social networks and security issues. In: Security and Trust in Online Social Networks. Synthesis Lectures on Information Security, Privacy, and Trust, pp. 1–18. Springer, Cham (2014). https://doi.org/10.1007/978-3-031-02339-2_1

  6. Centers for Disease Control and Prevention. List of all diseases (2022). https://www.cdc.gov/health-topics.html. Accessed 2 March 2022

  7. Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. JAIR 16, 321–357 (2002)

    Article  Google Scholar 

  8. De Capitani di Vimercati, S., Foresti, S., Livraga, G., Samarati, P.: Data privacy: definitions and techniques. IJUFKBS 20(6), 793–817 (2012)

    Google Scholar 

  9. De Capitani di Vimercati, S., Foresti, S., Livraga, G., Samarati, P.: \(k\)-Anonymity: from theory to applications. Trans. Data Priv. 16(1), 25–49 (2023)

    Google Scholar 

  10. Eurostat: Explained. Glossary: marital status (2019). https://ec.europa.eu/eurostat/statistics-explained/index.php?title=Glossary:Marital_status. Accessed 2 Mar 2022

  11. Ferrari, E., Viviani, M.: Privacy in social collaboration. In: Michelucci, P. (ed.) Handbook of Human Computation, pp. 857–878. Springer, New York (2013). https://doi.org/10.1007/978-1-4614-8806-4_70

    Chapter  Google Scholar 

  12. Foreman, Z., Bekman, T., Augustine, T., Jafarian, H.: PAVSS: privacy assessment vulnerability scoring system. In: Proceedings of CSCI, vol. 2019, pp. 160–165 (2019)

    Google Scholar 

  13. Geonames - All cities with a population \(>\) 1000 (2023). https://public.opendatasoft.com/explore/dataset/geonames-all-cities-with-a-population-1000. Accessed 1 Apr 2023

  14. Hossin, M., Sulaiman, M.N.: A review on evaluation metrics for data classification evaluations. IJDKP 5(2), 1 (2015)

    Article  Google Scholar 

  15. Järvelin, K., Kekäläinen, J.: Cumulated gain-based evaluation of IR techniques. ACM TOIS 20(4), 422–446 (2002)

    Article  Google Scholar 

  16. joblist.com: List of all jobs (2022). https://www.joblist.com/b/all-jobs. Accessed 2 Mar 2022

  17. Kircaburun, K., Alhabash, S., Tosuntaş, Ş, Griffiths, M.D.: Uses and gratifications of problematic social media use among university students: a simultaneous examination of the big five of personality traits, social media platforms, and social media use motives. IJMHA 18, 525–547 (2020)

    Google Scholar 

  18. Kökciyan, N., Yolum, P.: PriGuard: a semantic approach to detect privacy violations in online social networks. IEEE TKDE 28(10), 2724–2737 (2016)

    Google Scholar 

  19. Liu, K., Terzi, E.: A framework for computing the privacy scores of users in online social networks. ACM TKDD 5(1), 1–30 (2010)

    Article  Google Scholar 

  20. Livraga, G., Motta, A., Viviani. M.: Assessing user privacy on social media: the Twitter case study. In: Proceedings of OASIS 2022, Barcelona, Spain, June (2022)

    Google Scholar 

  21. Matthews, P.: Social media, community development and social capital. CDJ 51(3), 419–435 (2016)

    Article  Google Scholar 

  22. McDonald, A.M., Cranor, L.F.: The cost of reading privacy policies. ISJLP 4, 543 (2008)

    Google Scholar 

  23. Pei, S., Muchnik, L., Tang, S., Zheng, Z., Makse, H.A.: Exploring the complex pattern of information spreading in online blog communities. PLoS ONE 10(5), e0126894 (2015)

    Article  Google Scholar 

  24. Shibchurn, J., Yan, X.: Information disclosure on social networking sites: an intrinsic-extrinsic motivation perspective. CHB 44, 103–117 (2015)

    Google Scholar 

  25. Watson, J., Lipford, H.R., Besmer, A.: Mapping user preference to privacy default settings. ACM TOCHI 22(6), 1–20 (2015)

    Article  Google Scholar 

  26. Wikipedia contributors: List of contemporary ethnic groups – Wikipedia, the free encyclopedia (2022). https://en.wikipedia.org/wiki/List_of_contemporary_ethnic_groups. Accessed 2 Mar 2022

  27. Wikipedia contributors: List of generic names of political parties – Wikipedia, the free encyclopedia (2022). https://en.wikipedia.org/wiki/List_of_generic_names_of_political_parties. Accessed 2 Mar 2022

  28. Wikipedia contributors: List of religions and spiritual traditions – Wikipedia, the free encyclopedia (2022). https://en.wikipedia.org/wiki/List_of_religions_and_spiritual_traditions. Accessed 2 Mar 2022

  29. Wong, T.-T., Yeh, P.-Y.: Reliable accuracy estimates from k-fold cross validation. IEEE TKDE 32(8), 1586–1594 (2019)

    Google Scholar 

  30. Yang, J., Rahardja, S., Fränti, P.: Outlier detection: how to threshold outlier scores?. In: Proceedings of AIIPCC, vol. 2019, pp. 1–6 (2019)

    Google Scholar 

Download references

Acknowledgements

This work was supported in part by project SERICS (PE00000014) under the NRRP MUR program funded by the EU - NGEU, by project KURAMi (20225WTRFN) under the PRIN 2022 MUR program, and by the EC under grants MARSAL (101017171) and GLACIATION (101070141).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marco Viviani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Livraga, G., Olzojevs, A., Viviani, M. (2024). Unveiling the Privacy Risk: A Trade-Off Between User Behavior and Information Propagation in Social Media. In: Cherifi, H., Rocha, L.M., Cherifi, C., Donduran, M. (eds) Complex Networks & Their Applications XII. COMPLEX NETWORKS 2023. Studies in Computational Intelligence, vol 1144. Springer, Cham. https://doi.org/10.1007/978-3-031-53503-1_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-53503-1_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-53502-4

  • Online ISBN: 978-3-031-53503-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics