期刊文献+

社会网络应用中数据迁移的隐私风险模式研究

The Research of Privacy Threat Model for Data Portability in Social Network Applications
下载PDF
导出
摘要 由于在社会网络应用程序站点上自愿添加个人身份信息的人数不断增加,站点服务商可以从中获益,但是同时数据误用的风险会威胁个人用户的隐私信息以及服务商的商业模式。本文根据最近的调查,分析了开发隐私保护社会网络应用的主要需求,在此基础上提出了隐私风险模式,以增强数据或社会网络迁移过程中的信息隐私保护。通过确定与个人身份信息迁移过程中重要的问题设计出了该隐私风险模式。 Social network application providers benefit from the increasing amount of personally identifiable information willingly displayed on their sites,at the same time,risks of data misuse threaten the information privacy of individual users as well as the providers' business model.From recent research,this paper reported the major requirements for developing privacy-preserving social network applications and proposed a privacy threat model that can be used to enhance the information privacy in data or social network portability initiatives by determining the issues at stake related to the processing of personally identifiable information.
作者 马振萍
出处 《现代情报》 CSSCI 2011年第1期24-28,共5页 Journal of Modern Information
关键词 隐私 社会网络应用 数据迁移 社会网络迁移 privacy social network applications data portability social network portability
  • 相关文献

参考文献10

  • 1Kolbitsch,J.&Maurer,H.The transformation of the Web:How emerging communities shape the information we consume[J].Journal of Universal Computer Science, 2006, 12 (2) : 187 - 213.
  • 2Acquit, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the facebook. In privacy- Enhancing Technologies, LNCS vol. 4258, 6th Workshop on Privacy Enhancing Technologies (pp. 36- 58), Berlin/Heidel berg: Springer.
  • 3Flinn, S., & Lumsden, J. (2005). User perceptions of privacy and security on the Web [EB]. http://www.lib.unb. ca/Texts/PST/ 2005/pdf/flinn. pdf, retrieved 2008 - 02 - 27.
  • 4Acquisti, A., & Grossklags, J. (2004). Privacy attitudes and privacy behaviour. In J. Camp, & R. Lewis (Eds.), Economics of Information Security, 2004, 12 (13): 165-178, New York, NY: Springer.
  • 5Felt, A., & Evans, D. (2007). Privacy protection for social netwotking APIs [EB]. http://www.cs.virginia.edu/felt/privacy/,retrieved 2008 - 02 - 27.
  • 6Adamic, L.A., & Adar, E.. Friends and Neighbors on the Web, in First Monday, 2003, 8 (6).
  • 7Techcrunch (2008). Data is the new links. Tan berners - lee says sites that don't give usera their data back are boring [ EB ]. In: Techcrunch, http://www.techcrunch.com/2008/02/28/data - is - the - new - links - tim - bemers - lee - sayssites- that - dont - give - users - their - data - back - are - boring/,retrieved 2008 - 02 - 28.
  • 8Weiss, S. (2007). The need for a paradigm shift in addressing privacy risks in socialnetworking applications.In:Post-Proceedings:The Future of Identity in the Infromati on Society;Third International Summer School organized by IFIP WG 9.2,9.6/11.7, 11.6 in cooperation with FIDIS Network of Excellence (pp. 161- 171), Sweden: Karlstad.
  • 9张国荣.社会网络数据的隐私保护[J].网络安全技术与应用,2009(7):42-44. 被引量:4
  • 10罗亦军,刘强,王宇.社会网络的隐私保护研究综述[J].计算机应用研究,2010,27(10):3601-3604. 被引量:9

二级参考文献33

  • 1王欢,郭玉锦.网络社区及其交往特点[J].北京邮电大学学报(社会科学版),2003,5(4):19-21. 被引量:44
  • 2王平.基于社会网络分析的组织隐性知识共享研究[J].情报资料工作,2006,27(2):102-104. 被引量:34
  • 3HANNEMAN R A, RIDDLE M. Introduction to social network methods [ M/OL]. (2005). http://www. faculty, ucr. edu/- hannemart/nettext/.
  • 4LESKOVEC J, HORVITZ E. Planetary-scale views on a large instantmessaging network [ C ]//Proc of the 17th International Conference on World Wide Web. 2008:915-924.
  • 5REITER M K, RUBIN A D. Crowds:anonymity for Web transactions [J]. ACM Trans on Information and System Security, 1998,1 ( 1 ) :55-92.
  • 6GOLDSCHLAG D, REED M, SYVERSON P. Onion routing for anonymous and private Internet connections [ J]. Communications of the ACM,1999 ,42( 2 ) :39-41.
  • 7DINGLEDINE R, MATHEWSON N, SYVERSON P. Tor: the second-generation onion router[ C ]//Proc of the 13th USE NIX Security Symposium. 2004 : 303- 320.
  • 8CAVERLEE J, WEBB S. A large-scale study of Myspace:observations and implications for online social networks [ C ]//Proc of International Conference on Weblogs and Social Media. 2008.
  • 9GROSS R, ACQUISTI A. Information revelation and privacy in online social networks[ C ]//Proc of ACM Workshop on Privacy in the Elec- tronic Society. 2005:71-80.
  • 10HUBERMAN B A,ADAR E,FINE L R. Valuating privacy[ J]. IEEE Security and Privacy,2005,3(5 ) :22-25.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部