skip to main content
10.1145/3514094.3534134acmconferencesArticle/Chapter ViewAbstractPublication PagesaiesConference Proceedingsconference-collections
research-article

Aegis: An Agent for Multi-party Privacy Preservation

Published:27 July 2022Publication History

ABSTRACT

The proliferation of social media set the foundation for the culture of over-disclosure where many people document every single event, incident, trip, etc. for everyone to see. Raising the individual's awareness of the privacy issues that they are subjecting themselves to can be challenging. This becomes more complex when the post being shared includes data "owned" by others. The existing approaches aiming to assist users in multi-party disclosure situations need to be revised to go beyond preferences to the "good" of the collective.

This paper proposes an agent called Aegis to calculate the potential risk incurred by multi-party members in order to push privacy-preserving nudges to the sharer. Aegis is inspired by the consequentialist approach in normative ethical problem-solving techniques. The main contribution is the introduction of a social media-specific risk equation based on data valuation and the propagation of the post from intended to unintended audience. The proof-of-concept reports on how Aegis performs based on real-world data from the SNAP dataset and synthetically generated networks.

References

  1. Kevser Zeynep Meral. 2021. Social Media Short Video-Sharing TikTok Application and Ethics. Multidisciplinary Approaches to Ethics in the Digital Era, 147--165. https://doi.org/10.4018/978-1-7998-4117-3.ch010Google ScholarGoogle Scholar
  2. Hanbyul Choi, Jonghwa Park, and Yoonhyuk Jung. 2018. The role of privacy fatigue in online privacy behavior. Computers in Human Behavior 81, 42--51. https://doi.org/10.1016/j.chb.2017.12.001Google ScholarGoogle ScholarCross RefCross Ref
  3. Jose M. Such and Natalia Criado. 2018. Multiparty privacy in social media. Communications of the ACM 61, 74--81. https://doi.org/10.1145/3208039Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Alessandro Acquisti, Laura Brandimarte, and Jeff Hancock. 2022. How privacy's past may shape its future. Science 375, 270--272. https://doi.org/10.1126/science.abj0826Google ScholarGoogle ScholarCross RefCross Ref
  5. Francesca Mosca, and Jose Such. 2021. ELVIRA: An Explainable Agent for Value and Utility-Driven Multiuser Privacy. Proceedings of the 2021 International Conference on Autonomous Agents and Multi-Agent Systems, https://doi.org/10.48448/TQ4J-ZM21Google ScholarGoogle Scholar
  6. Daphne Chang, Erin L. Krupka, Eytan Adar, and Alessandro Acquisti. 2016. Engineering Information Disclosure. Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. https://doi.org/10.1145/2858036.2858346Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Jose Alemany, Elena Del Val, Juan M. Alberola, and Ana Garcia-Fornes. 2019. Metrics for Privacy Assessment When Sharing Information in Online Social Networks. IEEE Access 7, 143631--143645. https://doi.org/10.1109/access.2019.2944723Google ScholarGoogle ScholarCross RefCross Ref
  8. Yun Zhang, Si Shi, Shijun Guo, Xiaogang Chen, and Zhirong Piao. 2021. Audience management, online turbulence and lurking in social networking services: A transactional process of stress perspective. International Journal of Information Management 56, 102233. https://doi.org/10.1016/j.ijinfomgt.2020.102233Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Francesca Rossi. 2016. Ethical Preference-Based Decision Support Systems. Proceedings of the 2016 International Conference on Concurrency Theory. https://doi.org/10.4230/LIPICS.CONCUR.2016.2Google ScholarGoogle Scholar
  10. Julian McAuley and Jure Leskovec. 2012. Discovering Social Circles in Ego Networks. Proceedings of the 2012 International Conference on Neural Information Processing Systems (NIPS). https://doi.org/10.48550/ARXIV.1210.8182Google ScholarGoogle Scholar
  11. Sunil Kumar and Vikas Somani. 2018. Social Media Security Risks, Cyber Threats And Risks Prevention And Mitigation Techniques. International Journal of Advance Research in Computer Science and Management 4, 125--129.Google ScholarGoogle Scholar
  12. Philip Nyblom, Gaute Wangen, and Vasileios Gkioulos. 2020. Risk Perceptions on Social Media Use in Norway. Future Internet 12, 211. https://doi.org/10.3390/fi12120211Google ScholarGoogle ScholarCross RefCross Ref
  13. Alessandro Acquisti, Idris Adjerid, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor, Saranga Komanduri, Pedro Giovanni Leon, Norman Sadeh, Florian Schaub, Manya Sleeper, Yang Wang, and Shomir Wilson. 2018. Nudges for Privacy and Security. ACM Computing Surveys 50, 1--41. https://doi.org/10.1145/3054926Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Tobias Mirsch, Christiane Lehrer, and Reinhard Jung. 2018. Making Digital Nudging Applicable: The Digital Nudge Design Method. Proceedings of the 2018 International Conference on Information Systems (ICIS).Google ScholarGoogle Scholar
  15. Omar Mahmoud. 2016. Book Review: Inside the Nudge Unit: How Small Changes can Make a Big Difference. International Journal of Market Research 58, 155--157. https://doi.org/10.2501/ijmr-2016-010Google ScholarGoogle ScholarCross RefCross Ref
  16. Karen Renaud, Verena Zimmerman, Joseph Maguire, and Steve Draper. 2017. Lessons Learned from Evaluating Eight Password Nudges in the Wild. 2017 LASER Workshop: Learning from Authoritative Security Experiment Results.Google ScholarGoogle Scholar
  17. Karen Renaud and Verena Zimmerman. 2017. Enriched nudges lead to stronger password replacements but implement mindfully. 2017 Information Security for South Africa (ISSA). https://doi.org/10.1109/issa.2017.8251779Google ScholarGoogle Scholar
  18. Nicolás E. Díaz Ferreyra, Tobias Kroll, Esma Aïmeur, Stefan Stieglitz, and Maritta Heisel. 2020. Preventative Nudges: Introducing Risk Cues for Supporting Online Self-Disclosure Decisions. Information 11, 399. https://doi.org/10.3390/info11080399Google ScholarGoogle Scholar
  19. Sourya Joyee De and Daniel Le Metayer. 2018. Privacy Risk Analysis to Enable Informed Privacy Settings. 2018 IEEE European Symposium on Security and Privacy Workshops. https://doi.org/10.1109/eurospw.2018.00019Google ScholarGoogle ScholarCross RefCross Ref
  20. Gaurav Misra and Jose M. Such. 2016. How Socially Aware Are Social Media Privacy Controls? Computer 49, 96--99. https://doi.org/10.1109/mc.2016.83Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Andrew Besmer and Heather Richter Lipford. 2010. Moving beyond untagging. Proceedings of the 28th international conference on Human factors in computing systems - CHI '10. https://doi.org/10.1145/1753326.1753560Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Onuralp Ulusoy and Pinar Yolum. 2020. Collaborative Privacy Management with Auctioning Mechanisms. Advances in Automated Negotiations, 45--62. https://doi.org/10.1007/978-981-15-5869-6_4Google ScholarGoogle Scholar
  23. Florian Schaub. 2018. Context-Adaptive Privacy Mechanisms. Handbook of Mobile Data Privacy, 337--372. https://doi.org/10.1007/978-3-319-98161-1_13Google ScholarGoogle Scholar
  24. Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2015. Privacy and human behavior in the age of information. Science 347, 509--514. https://doi.org/10.1126/science.aaa1465Google ScholarGoogle ScholarCross RefCross Ref
  25. Alan F. Westin. 1967. Privacy and Freedom.Google ScholarGoogle Scholar
  26. Rim Ben Salem, Esma Aïmeur, and Hicham Hage. 2021. The Privacy versus Disclosure Appetite Dilemma: Mitigation by Recommendation. Workshop on Online Misinformation- and Harm-Aware Recommender Systems, ACM Recommender Systems Conference (RecSys), 2021.Google ScholarGoogle Scholar
  27. Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Cranor, and Norman Sadeh. 2017. Privacy Expectations and Preferences in an IoT World. Proceedings of the Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017).Google ScholarGoogle Scholar
  28. Ned Augenblick and Aaron Bodoh-Creed. 2018. To reveal or not to reveal: Privacy preferences and economic frictions. Games and Economic Behavior 110, 318--329. https://doi.org/10.1016/j.geb.2017.10.014Google ScholarGoogle ScholarCross RefCross Ref
  29. Spyros Kokolakis. 2017. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & Security 64, 122--134. https://doi.org/10.1016/j.cose.2015.07.002Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Hicham Hage, Esma Aïmeur, and Amel Guedidi. 2020. Understanding the Landscape of Online Deception. Advances in Media, Entertainment, and the Arts, 290--317. https://doi.org/10.4018/978-1-7998-2543-2.ch014Google ScholarGoogle Scholar
  31. John N. Hooker. 1996. Three Kinds of Ethics.Google ScholarGoogle Scholar
  32. Walter Sinnott-Armstrong. 2003. Consequentialism, The Stanford Encyclopedia of Philosophy (Fall 2021 Edition).Google ScholarGoogle Scholar
  33. Stephanie Diepeveen, Tom Ling, Marc Suhrcke, Martin Roland, and Theresa M Marteau. 2013. Public acceptability of government intervention to change health-related behaviours: a systematic review and narrative synthesis. BMC Public Health 13. https://doi.org/10.1186/1471--2458--13--756Google ScholarGoogle Scholar
  34. C. Evers, D. R. Marchiori, A. F. Junghans, J. Cremers, and D. T. D. De Ridder. 2018. Citizen approval of nudging interventions promoting healthy eating: the role of intrusiveness and trustworthiness. BMC Public Health 18. https://doi.org/10.1186/s12889-018-6097-yGoogle ScholarGoogle Scholar
  35. George R. Milne, George Pettinico, Fatima M. Hajjat, and Ereni Markos. 2016. Information Sensitivity Typology: Mapping the Degree and Type of Risk Consumers Perceive in Personal Data Sharing. Journal of Consumer Affairs 51, 133--161. https://doi.org/10.1111/joca.12111Google ScholarGoogle ScholarCross RefCross Ref
  36. Nica Latto. 2021. Data Brokers: Everything You Need to Know. Avast. Retrieved June 10, 2022 from https://www.avast.com/c-data-brokers.Google ScholarGoogle Scholar
  37. Retrieved June 10, 2022 from https://www.invisibly.comGoogle ScholarGoogle Scholar
  38. Heahter Sullivan. 2021. Consumers can get paid for their internet data. Retrieved June 10, 2022 from https://www.fox26houston.com/news/consumers-can-get-paid-for-their-internet-data.Google ScholarGoogle Scholar
  39. Christina Farr. 2019. Hospital execs say they are getting flooded with requests for your health data. CNBC. Retrieved June 10, 2022 from https://www.cnbc.com/2019/12/18/hospital-execs-say-theyre-flooded-with-requests-for-your-health-data.html.Google ScholarGoogle Scholar
  40. Zachary Ignoffo and Miklos Zoltan. 2022. Dark Web Price Index 2021. Privacy Affairs. Retrieved June 10, 2022 from https://www.privacyaffairs.com/dark-web-price-index-2021/Google ScholarGoogle Scholar
  41. Alessandro Acquisti. 2015. Online privacy matters. Perspectives@SMU.Google ScholarGoogle Scholar
  42. Jens Grossklags, Alessandro Acquisti, and H John Heinz. 2007. When 25 Cents is Too Much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information. Economics.Google ScholarGoogle Scholar
  43. Alessandro Acquisti, Leslie K. John, and George Loewenstein. 2013. What Is Privacy Worth? The Journal of Legal Studies 42, 249--274. https://doi.org/10.1086/671754Google ScholarGoogle ScholarCross RefCross Ref
  44. Jeffrey Prince and Scott Wallsten. 2020. How Much is Privacy Worth Around the World and Across Platforms? SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3528386Google ScholarGoogle Scholar
  45. Eva-Maria Schomakers, Chantal Lidynia, Dirk Müllmann, and Martina Ziefle. 2019. Internet users' perceptions of information sensitivity -- insights from Germany. International Journal of Information Management 46, 142--150. https://doi.org/10.1016/j.ijinfomgt.2018.11.018Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Ereni Markos, George R. Milne, and James W. Peltier. 2017. Information Sensitivity and Willingness to Provide Continua: A Comparative Privacy Study of the United States and Brazil. Journal of Public Policy & Marketing 36, 79--96. https://doi.org/10.1509/jppm.15.159Google ScholarGoogle ScholarCross RefCross Ref
  47. John M.M. Rumbold and Barbara K. Pierscionek. 2018. What Are Data? A Categorization of the Data Sensitivity Spectrum. Big Data Research 12, 49--59. https://doi.org/10.1016/j.bdr.2017.11.001Google ScholarGoogle ScholarCross RefCross Ref
  48. Duncan J. Watts. 2002. A simple model of global cascades on random networks. Proceedings of the National Academy of Sciences 99, 5766--5771. https://doi.org/10.1073/pnas.082090499Google ScholarGoogle ScholarCross RefCross Ref
  49. Jure Leskovec and Andrej Krevl. SNAP Datasets: Stanford Large Network Dataset Collection. Retrieved June 10, 2022 from https://snap.stanford.edu/data/index.html#socnets.Google ScholarGoogle Scholar
  50. Aylin Caliskan Islam, Jonathan Walsh, and Rachel Greenstadt. 2014. Privacy Detective. Proceedings of the 13th Workshop on Privacy in the Electronic Society. https://doi.org/10.1145/2665943.2665958Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Geetha Raju, Karthika Subbaraj, and Ponnurangam Kumaraguru. 2021. Tweet-scan-post: a system for analysis of sensitive private data disclosure in online social media. Knowledge and Information Systems 63, 2365--2404. https://doi.org/10.1007/s10115-021-01592-2Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Yelena Petrykina, Hadas Schwartz-Chassidim, and Eran Toch. 2021. Nudging users towards online safety using gamified environments. Computers & Security 108, 102270. https://doi.org/10.1016/j.cose.2021.102270Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Aegis: An Agent for Multi-party Privacy Preservation

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      AIES '22: Proceedings of the 2022 AAAI/ACM Conference on AI, Ethics, and Society
      July 2022
      939 pages
      ISBN:9781450392471
      DOI:10.1145/3514094

      Copyright © 2022 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 27 July 2022

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate61of162submissions,38%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader