1 / 9

For Your Eyes Only

For Your Eyes Only. Are there alternatives to the consensual exploitation on social media? Vincent Toubiana (Bell Labs France). How to prevent content exploitation on Facebook?. There is a really simple solution. Copy/past that text. Reflect some growing concerns

ranae
Download Presentation

For Your Eyes Only

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. For Your Eyes Only Are there alternatives to the consensual exploitation on social media? Vincent Toubiana (Bell Labs France)

  2. How to prevent content exploitation on Facebook? • There is a really simple solution. • Copy/past that text. • Reflect some growing concerns • Focused on User Generated Content, • Addressed to agencies/institutions, • The new one mentions commercial use. June 2012 November 2012

  3. Facebook Privacy Trends • List of Facebook main criticisms: • News feed (September 5, 2006) • Beacon (November 2007) • Content ownership (February 2009) • Default setting modification (December 2009- May 2010) • Open graph protocol (April 2010) • Micro targeting (October 2010) • Tracking cookies in Like button (October 2010) • Facial recognition (June 2011) • Timeline (September 2011) • Custom audience (September 2012) Timeline Default settings Like button Content ownership Beacon NewsFeed Microtargeting Tag suggestion OpenGraph • Most of these features only aim at increasing user participation to the social network and develop user base. • As a side effect users are paying less attention to Facebook tracking.

  4. How are private data used for monetization • What information Facebook uses to target ads • Targeting options too accurate (Micro-targeting [1]), • Retargeting based on email address, phone numbers, • Uses of applications and likes. • Advertising is not based on Generated Content but on declared data and Web-tracking. • Use of private messages to inflate ‘Like’ [2] • Done via personal message sharing, • Did not seem to violate user expectations. [1] Korolova, Aleksandra. "Privacy violations using microtargeted ads: A case study." Data Mining Workshops (ICDMW), 2010 IEEE International Conference on. IEEE, 2010. [2] How private are your private messages? http://blogs.wsj.com/digits/2012/10/03/how-private-are-your-private-messages/

  5. Existing Alternate Business Models • Facebook does not rely exclusively on advertising • Payment generates 14 percent of the revenue in 2012. • With facebook connect used everywhere, could Facebook become a new paypal? • Facebook Gifts represents promising source of revenue. • Significant impact on Facebook share. • Facebook knows what you could offer to your friend, • Avoid providing unwanted recommendations (Target mistake).

  6. Existing Alternate Business Models • Service subscription: • Last.fm • App.net • Pay to follow • Pheed.com • User pay to subscribe to others feed • Mostly useful for celebrities. • How to handle content duplication? • Users unlikely to pay for subscription at this point.

  7. Existing Alternate Business Models • Linked-In subscriptions: • Provide premium access to some services • Offers for recruiters & job seekers • 13 subscription plans (5$ - 299$/month), • Enable premium access to user profiles, • More frequents updates.

  8. Technical Solutions to the Ownership Problem • Distributed social networks • Enforce User Control over their data, • Specific Business models. • Pay to host • Advertising chosen by your friends to target you • Address vertical privacy issues, • Address some “lateral privacy” issues (i.e. settings update), • Create other issues, and not simple to use [1]. • Obfuscation • Pollute the service provider with limited effect on your social-network, • Possible by combining Access Control Policy. • Privacy Friendly widgets • Alternatives to the like button that track you only when you click on it, • Mozilla Social API could preserve users' privacy. [1] Narayanan, Arvind, et al. "A Critical Look at Decentralized Personal Data Architectures." network 25: 8.

  9. Go viral to enforce user privacy • People are looking for simple solutions • Example: Privacy notice • Interestingly, 1M+ people had that notice posted publicly on their timeline or info page, • Users are looking for simple solutions. • Could work in some cases, ask user to change settings, vote • Disable public access to your data, • Limit instant-personalization [1]. • Effects of viral posts: • Regulation, • Competition between social network • See Facebook changes after the release of Google+ [1] Arvind Narayanan, “The Anatomy of a Privacy meme”, http://arvindn.livejournal.com/124597.html

More Related