sesa 11(1): e3

Research Article

How did you know that about me? Protecting users against unwanted inferences

Download815 downloads
  • @ARTICLE{10.4108/trans.sesa.2011.e3,
        author={Sara Motahari and Julia Mayer and Quentin Jones},
        title={How did you know that about me? Protecting users against unwanted inferences},
        journal={EAI Endorsed Transactions on Security and Safety},
        volume={1},
        number={1},
        publisher={ICST},
        journal_a={SESA},
        year={2011},
        month={9},
        keywords={inference problem, privacy, social computing, ubiquitous computing},
        doi={10.4108/trans.sesa.2011.e3}
    }
    
  • Sara Motahari
    Julia Mayer
    Quentin Jones
    Year: 2011
    How did you know that about me? Protecting users against unwanted inferences
    SESA
    ICST
    DOI: 10.4108/trans.sesa.2011.e3
Sara Motahari1,*, Julia Mayer1, Quentin Jones1
  • 1: New Jersey Institute of Technology, Newark, New Jersey, NJ 07103-3513, USA
*Contact email: Sara.gatmir-motahari@sprint.com

Abstract

The widespread adoption of social computing applications is transforming our world. It has changed the way we routinely communicate and navigate our environment and enabled political revolutions. However, despite these applications’ ability to support social action, their use puts individual privacy at considerable risk. This is in large part due to the fact that the public sharing of personal information through social computing applications enables potentially unwanted inferences about users’ identity, location, or other related personal information. This paper provides a systematic overview of the social inference problem. It highlights the public’s and research community’s general lack of awareness of the problem and associated risks to user privacy. A social inference risk prediction framework is presented and associated empirical studies that attest to its validity. This framework is then used to outline the major research and practical challenges that need to be addressed if we are to deploy effective social inference protection systems. Challenges examined include how to address the computational complexity of social inference risk modeling and designing user interfaces that inform users about social inference opportunities.