Skip to main content

2018 | OriginalPaper | Buchkapitel

A Prediction Model of Privacy Control for Online Social Networking Users

verfasst von : Rohit Valecha, Rajarshi Chakraborty, H. Raghav Rao, Shambhu Upadhyaya

Erschienen in: Designing for a Digital and Globalized World

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the growing popularity of social network sites (SNS), organizations have started to leverage them for encouraging both personal and professional data sharing. However, inherent privacy problems in social networks have become a concern for organizations deploying them. So companies have started investing in systems for evaluating employees’ behaviors on SNSs. In evaluating employees’ behaviors on SNSs, this study aims at developing a mechanism for learning users’ behaviors on SNS and predicting their control of privacy on SNS. Privacy prediction is based on the revelation of actual privacy characteristics of users through the analysis of their SNS usage patterns. Using the Design Science research methodology, this study presents the design and instantiation of a prediction model that is trained using survey data and SNS data of graduate students from a prominent Northeastern University in the United States, which is used to generate class labels associated with their privacy control. The prediction model provides a data analytics component for reliable predictions of users’ privacy control using Machine Learning algorithm SVM and a randomized ensemble of decision trees. The results suggest that the prediction model represents a reliable method for predicting privacy control based on user actions on SNS.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Abeel, T., Helleputte, T., Van de Peer, Y., Dupont, P., Saeys, Y.: Robust biomarker identification for cancer diagnosis with ensemble feature selection methods. Bioinformatics 26(3), 392–398 (2009)CrossRef Abeel, T., Helleputte, T., Van de Peer, Y., Dupont, P., Saeys, Y.: Robust biomarker identification for cancer diagnosis with ensemble feature selection methods. Bioinformatics 26(3), 392–398 (2009)CrossRef
Zurück zum Zitat Altman, I.: The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding, No. 156 A4 (1975) Altman, I.: The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding, No. 156 A4 (1975)
Zurück zum Zitat An, S., Liu, W., Venkatesh, S.: Fast cross-validation algorithms for least squares support vector machine and kernel ridge regression. Pattern Recognit. 40, 2154–2162 (2007)CrossRef An, S., Liu, W., Venkatesh, S.: Fast cross-validation algorithms for least squares support vector machine and kernel ridge regression. Pattern Recognit. 40, 2154–2162 (2007)CrossRef
Zurück zum Zitat Arlot, S., Celisse, A.: A survey of cross-validation procedures for model selection. Stat. Surv. 4, 40–79 (2010)MathSciNetCrossRef Arlot, S., Celisse, A.: A survey of cross-validation procedures for model selection. Stat. Surv. 4, 40–79 (2010)MathSciNetCrossRef
Zurück zum Zitat Auria, L., Moro, R.A.: Support vector machines (SVM) as a technique for solvency analysis. DIW Discussion Papers, No. 811 (2008) Auria, L., Moro, R.A.: Support vector machines (SVM) as a technique for solvency analysis. DIW Discussion Papers, No. 811 (2008)
Zurück zum Zitat Basnet, R.: Automated Quality Assessment of Printed Objects Using Subjective and Objective Methods Based on Imaging and Machine Learning Techniques. Rochester Institute of Technology, Rochester (2017) Basnet, R.: Automated Quality Assessment of Printed Objects Using Subjective and Objective Methods Based on Imaging and Machine Learning Techniques. Rochester Institute of Technology, Rochester (2017)
Zurück zum Zitat Bradley, A.P.: The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern Recognit. 30(7), 1145–1159 (1997)CrossRef Bradley, A.P.: The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern Recognit. 30(7), 1145–1159 (1997)CrossRef
Zurück zum Zitat Brandimarte, L., Acquisti, A., Loewenstein, G.: Misplaced confidences privacy and the control paradox. Soc. Psychol. Pers. Sci. 4(3), 340–347 (2013)CrossRef Brandimarte, L., Acquisti, A., Loewenstein, G.: Misplaced confidences privacy and the control paradox. Soc. Psychol. Pers. Sci. 4(3), 340–347 (2013)CrossRef
Zurück zum Zitat Burges, C.J.: A tutorial on support vector machines for pattern recognition. Data Min. Knowl. Discov. 2(2), 121–167 (1998)CrossRef Burges, C.J.: A tutorial on support vector machines for pattern recognition. Data Min. Knowl. Discov. 2(2), 121–167 (1998)CrossRef
Zurück zum Zitat Chong, A.Y.L.: Predicting m-commerce adoption determinants: a neural network approach. Expert Syst. Appl. 40(2), 523–530 (2013)CrossRef Chong, A.Y.L.: Predicting m-commerce adoption determinants: a neural network approach. Expert Syst. Appl. 40(2), 523–530 (2013)CrossRef
Zurück zum Zitat Culnan, M.J.: How did they get my name?: An exploratory investigation of consumer attitudes toward secondary information use. MIS Q. 17, 341–363 (1993)CrossRef Culnan, M.J.: How did they get my name?: An exploratory investigation of consumer attitudes toward secondary information use. MIS Q. 17, 341–363 (1993)CrossRef
Zurück zum Zitat DiMicco, J.M., Geyer, W., Millen, D.R., Dugan, C., Brownholtz, B.: People sensemaking and relationship building on an enterprise social network site. In: 42nd Hawaii International Conference on System Sciences, pp. 1–10. IEEE (2009) DiMicco, J.M., Geyer, W., Millen, D.R., Dugan, C., Brownholtz, B.: People sensemaking and relationship building on an enterprise social network site. In: 42nd Hawaii International Conference on System Sciences, pp. 1–10. IEEE (2009)
Zurück zum Zitat Dinev, T., Hart, P.: Internet privacy concerns and their antecedents-measurement validity and a regression model. Behav. Inf. Technol. 23(6), 413–422 (2004)CrossRef Dinev, T., Hart, P.: Internet privacy concerns and their antecedents-measurement validity and a regression model. Behav. Inf. Technol. 23(6), 413–422 (2004)CrossRef
Zurück zum Zitat Dong, C., Jin, H., Knijnenburg, B.P.: Predicting privacy behavior on online social networks. In: Ninth International AAAI Conference on Web and Social Media (2015) Dong, C., Jin, H., Knijnenburg, B.P.: Predicting privacy behavior on online social networks. In: Ninth International AAAI Conference on Web and Social Media (2015)
Zurück zum Zitat Geurts, P., Ernst, D., Wehenkel, L.: Extremely randomized trees. Mach. Learn. 63(1), 3–42 (2006)CrossRef Geurts, P., Ernst, D., Wehenkel, L.: Extremely randomized trees. Mach. Learn. 63(1), 3–42 (2006)CrossRef
Zurück zum Zitat Geyer, W., Dugan, C., DiMicco, J., Millen, D.R., Brownholtz, B., Muller, M.: Use and reuse of shared lists as a social content type. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1545–1554 (2008) Geyer, W., Dugan, C., DiMicco, J., Millen, D.R., Brownholtz, B., Muller, M.: Use and reuse of shared lists as a social content type. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1545–1554 (2008)
Zurück zum Zitat Gregor, S., Hevner, A.R.: Positioning and presenting design science research for maximum impact. MIS Q. 37(2), 337–355 (2013)CrossRef Gregor, S., Hevner, A.R.: Positioning and presenting design science research for maximum impact. MIS Q. 37(2), 337–355 (2013)CrossRef
Zurück zum Zitat Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 71–80. ACM (2005) Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 71–80. ACM (2005)
Zurück zum Zitat Hastie, T., Rosset, S., Tibshirani, R., Zhu, J.: The entire regularization path for the support vector machine. J. Mach. Learn. Res. 5, 1391–1415 (2004)MathSciNetMATH Hastie, T., Rosset, S., Tibshirani, R., Zhu, J.: The entire regularization path for the support vector machine. J. Mach. Learn. Res. 5, 1391–1415 (2004)MathSciNetMATH
Zurück zum Zitat Heumann, B.W.: An object-based classification of mangroves using a hybrid decision tree—Support vector machine approach. Remote Sens. 3(11), 2440–2460 (2011)CrossRef Heumann, B.W.: An object-based classification of mangroves using a hybrid decision tree—Support vector machine approach. Remote Sens. 3(11), 2440–2460 (2011)CrossRef
Zurück zum Zitat Hevner, A., March, S.T., Park, J., Ram, S.: Design science in information systems research. MIS Q. 28(1), 75–105 (2004)CrossRef Hevner, A., March, S.T., Park, J., Ram, S.: Design science in information systems research. MIS Q. 28(1), 75–105 (2004)CrossRef
Zurück zum Zitat Hoadley, C.M., Xu, H., Lee, J.J., Rosson, M.B.: Privacy as information access and illusory control: the case of the Facebook News Feed privacy outcry. Electron. Commer. Res. Appl. 9(1), 50–60 (2010)CrossRef Hoadley, C.M., Xu, H., Lee, J.J., Rosson, M.B.: Privacy as information access and illusory control: the case of the Facebook News Feed privacy outcry. Electron. Commer. Res. Appl. 9(1), 50–60 (2010)CrossRef
Zurück zum Zitat Johnson, C.A.: Privacy as personal control. Man-Environ. Interact.: Eval. Appl.: Part 2, 83–100 (1974) Johnson, C.A.: Privacy as personal control. Man-Environ. Interact.: Eval. Appl.: Part 2, 83–100 (1974)
Zurück zum Zitat Kairam, S., Brzozowski, M., Huffaker, D., Chi, E.: Talking in circles: selective sharing in Google+. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1065–1074. ACM (2012) Kairam, S., Brzozowski, M., Huffaker, D., Chi, E.: Talking in circles: selective sharing in Google+. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1065–1074. ACM (2012)
Zurück zum Zitat Kisekka, V., Bagchi-Sen, S., Rao, H.R.: Extent of private information disclosure on online social networks: an exploration of Facebook mobile phone users. Comput. Hum. Behav. 29(6), 2722–2729 (2013)CrossRef Kisekka, V., Bagchi-Sen, S., Rao, H.R.: Extent of private information disclosure on online social networks: an exploration of Facebook mobile phone users. Comput. Hum. Behav. 29(6), 2722–2729 (2013)CrossRef
Zurück zum Zitat Koch, M., Schwabe, G., Briggs, R.O.: CSCW and social computing. Bus. Inf. Syst. Eng. 57(3), 149–153 (2015)CrossRef Koch, M., Schwabe, G., Briggs, R.O.: CSCW and social computing. Bus. Inf. Syst. Eng. 57(3), 149–153 (2015)CrossRef
Zurück zum Zitat Kohavi, R.: A study of cross-validation and bootstrap for accuracy estimation and model selection. In: IJCAI, vol. 14, no. 2, pp. 1137–1145 (1995) Kohavi, R.: A study of cross-validation and bootstrap for accuracy estimation and model selection. In: IJCAI, vol. 14, no. 2, pp. 1137–1145 (1995)
Zurück zum Zitat Kostakos, V., Venkatanathan, J., Reynolds, B., Sadeh, N., Toch, E., Shaikh, S.A., Jones, S.: Who’s your best friend?: Targeted privacy attacks in location-sharing social networks. In: Proceedings of the 13th International Conference on Ubiquitous Computing, pp. 177–186. ACM (2011) Kostakos, V., Venkatanathan, J., Reynolds, B., Sadeh, N., Toch, E., Shaikh, S.A., Jones, S.: Who’s your best friend?: Targeted privacy attacks in location-sharing social networks. In: Proceedings of the 13th International Conference on Ubiquitous Computing, pp. 177–186. ACM (2011)
Zurück zum Zitat Laufer, R.S., Wolfe, M.: Privacy as a concept and a social issue: a multidimensional developmental theory. J. Soc. Issues 33(3), 22–42 (1977)CrossRef Laufer, R.S., Wolfe, M.: Privacy as a concept and a social issue: a multidimensional developmental theory. J. Soc. Issues 33(3), 22–42 (1977)CrossRef
Zurück zum Zitat Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inf. Syst. Res. 15(4), 336–355 (2004)CrossRef Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inf. Syst. Res. 15(4), 336–355 (2004)CrossRef
Zurück zum Zitat Margulis, S.T.: Conceptions of privacy: current status and next steps. J. Soc. Issues 33(3), 5–21 (1977)CrossRef Margulis, S.T.: Conceptions of privacy: current status and next steps. J. Soc. Issues 33(3), 5–21 (1977)CrossRef
Zurück zum Zitat Margulis, S.T.: On the status and contribution of Westin’s and Altman’s theories of privacy. J. Soc. Issues 59(2), 411–429 (2003a)CrossRef Margulis, S.T.: On the status and contribution of Westin’s and Altman’s theories of privacy. J. Soc. Issues 59(2), 411–429 (2003a)CrossRef
Zurück zum Zitat Margulis, S.T.: Privacy as a social issue and behavioral concept. J. Soc. Issues 59(2), 243–261 (2003b)CrossRef Margulis, S.T.: Privacy as a social issue and behavioral concept. J. Soc. Issues 59(2), 243–261 (2003b)CrossRef
Zurück zum Zitat McLaren, T.S., Head, M.M., Yuan, Y., Chan, Y.E.: A multilevel model for measuring fit between a firm’s competitive strategies and information systems capabilities. MIS Q. 35(4), 909–929 (2011)CrossRef McLaren, T.S., Head, M.M., Yuan, Y., Chan, Y.E.: A multilevel model for measuring fit between a firm’s competitive strategies and information systems capabilities. MIS Q. 35(4), 909–929 (2011)CrossRef
Zurück zum Zitat Mingers, J.: An empirical comparison of selection measures for decision-tree induction. Mach. Learn. 3(4), 319–342 (1989) Mingers, J.: An empirical comparison of selection measures for decision-tree induction. Mach. Learn. 3(4), 319–342 (1989)
Zurück zum Zitat Morris, C.W., Autret, A., Boddy, L.: Support vector machines for identifying organisms—A comparison with strongly partitioned radial basis function networks. Ecol. Model. 146(1), 57–67 (2001)CrossRef Morris, C.W., Autret, A., Boddy, L.: Support vector machines for identifying organisms—A comparison with strongly partitioned radial basis function networks. Ecol. Model. 146(1), 57–67 (2001)CrossRef
Zurück zum Zitat Mountrakis, G., Im, J., Ogole, C.: Support vector machines in remote sensing: a review. ISPRS J. Photogramm. Remote Sens. 66(3), 247–259 (2011)CrossRef Mountrakis, G., Im, J., Ogole, C.: Support vector machines in remote sensing: a review. ISPRS J. Photogramm. Remote Sens. 66(3), 247–259 (2011)CrossRef
Zurück zum Zitat Mullen, C., Hamilton, N.F.: Adolescents’ response to parental Facebook friend requests: the comparative influence of privacy management, parent-child relational quality, attitude and peer influence. Comput. Hum. Behav. 60, 165–172 (2016)CrossRef Mullen, C., Hamilton, N.F.: Adolescents’ response to parental Facebook friend requests: the comparative influence of privacy management, parent-child relational quality, attitude and peer influence. Comput. Hum. Behav. 60, 165–172 (2016)CrossRef
Zurück zum Zitat Nachev, A., Stoyanov, B.: Product quality analysis using support vector machines. Inf. Models Anal. 1, 179–192 (2012) Nachev, A., Stoyanov, B.: Product quality analysis using support vector machines. Inf. Models Anal. 1, 179–192 (2012)
Zurück zum Zitat Pal, M., Foody, G.M.: Evaluation of SVM, RVM and SMLR for accurate image classification with limited ground data. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 5, 1344–1355 (2012)CrossRef Pal, M., Foody, G.M.: Evaluation of SVM, RVM and SMLR for accurate image classification with limited ground data. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 5, 1344–1355 (2012)CrossRef
Zurück zum Zitat Peffers, K., Tuunanen, T., Rothenberger, M.A., Chatterjee, S.: A design science research methodology for information systems research. J. Manag. Inf. Syst. 24(3), 45–77 (2007)CrossRef Peffers, K., Tuunanen, T., Rothenberger, M.A., Chatterjee, S.: A design science research methodology for information systems research. J. Manag. Inf. Syst. 24(3), 45–77 (2007)CrossRef
Zurück zum Zitat Petronio, S.S.: Boundaries of Privacy: Dialectics of Disclosure. State University of New York Press, Albany (2002). xix, p. 268 Petronio, S.S.: Boundaries of Privacy: Dialectics of Disclosure. State University of New York Press, Albany (2002). xix, p. 268
Zurück zum Zitat Powers, D.M.W.: Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation. J. Mach. Learn. Technol. 2(1), 37–63 (2011)MathSciNet Powers, D.M.W.: Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation. J. Mach. Learn. Technol. 2(1), 37–63 (2011)MathSciNet
Zurück zum Zitat Puniskis, D., Laurutis, R., Dirmeikis, R.: An artificial neural nets for spam e-mail recognition. Electron. Electr. Eng. (2006). ISSN 1392-1215 Puniskis, D., Laurutis, R., Dirmeikis, R.: An artificial neural nets for spam e-mail recognition. Electron. Electr. Eng. (2006). ISSN 1392-1215
Zurück zum Zitat Schwegmann, B., Matzner, M., Janiesch, C.: A method and tool for predictive event-driven process analytics. In: Wirtschaftsinformatik, p. 46 (2013) Schwegmann, B., Matzner, M., Janiesch, C.: A method and tool for predictive event-driven process analytics. In: Wirtschaftsinformatik, p. 46 (2013)
Zurück zum Zitat Sheehan, K.B., Hoy, M.G.: Dimensions of privacy concern among online consumers. J. Public Policy Mark. 19(1), 62–73 (2000)CrossRef Sheehan, K.B., Hoy, M.G.: Dimensions of privacy concern among online consumers. J. Public Policy Mark. 19(1), 62–73 (2000)CrossRef
Zurück zum Zitat Shmueli, G., Koppius, O.: Predictive analytics in information systems research. MIS Q. 35(3), 553–572 (2010)CrossRef Shmueli, G., Koppius, O.: Predictive analytics in information systems research. MIS Q. 35(3), 553–572 (2010)CrossRef
Zurück zum Zitat Skeels, M.M., Grudin, J.: When social networks cross boundaries. In: Proceedings of the ACM 2009 International Conference on Supporting Group Work, GROUP 2009. ACM, New York (2009) Skeels, M.M., Grudin, J.: When social networks cross boundaries. In: Proceedings of the ACM 2009 International Conference on Supporting Group Work, GROUP 2009. ACM, New York (2009)
Zurück zum Zitat Smith, H.J., Milberg, S.J., Burke, S.J.: Information privacy: measuring individuals’ concerns about organizational practices. MIS Q. 20(2), 167–196 (1996)CrossRef Smith, H.J., Milberg, S.J., Burke, S.J.: Information privacy: measuring individuals’ concerns about organizational practices. MIS Q. 20(2), 167–196 (1996)CrossRef
Zurück zum Zitat Staddon, J., Huffaker, D., Brown, L., Sedley, A.: Are privacy concerns a turn-off?: Engagement and privacy in social networks. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, Washington, DC (2012) Staddon, J., Huffaker, D., Brown, L., Sedley, A.: Are privacy concerns a turn-off?: Engagement and privacy in social networks. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, Washington, DC (2012)
Zurück zum Zitat Stehman, S.V.: Selecting and interpreting measures of thematic classification accuracy. Remote Sens. Environ. 62(1), 77–89 (1997)CrossRef Stehman, S.V.: Selecting and interpreting measures of thematic classification accuracy. Remote Sens. Environ. 62(1), 77–89 (1997)CrossRef
Zurück zum Zitat Tan, W.K., Nguyen, T.T.D., Tha, K.K.O., Yu, X.: Designing groupware that fosters social capital creation: can Facebook support global virtual team?. In: AMCIS 2009 Proceedings, p. 525 (2009) Tan, W.K., Nguyen, T.T.D., Tha, K.K.O., Yu, X.: Designing groupware that fosters social capital creation: can Facebook support global virtual team?. In: AMCIS 2009 Proceedings, p. 525 (2009)
Zurück zum Zitat Tuv, E., Borisov, A., Runger, G., Torkkola, K.: Feature selection with ensembles, artificial variables, and redundancy elimination. J. Mach. Learn. Res. 10, 1341–1366 (2009)MathSciNetMATH Tuv, E., Borisov, A., Runger, G., Torkkola, K.: Feature selection with ensembles, artificial variables, and redundancy elimination. J. Mach. Learn. Res. 10, 1341–1366 (2009)MathSciNetMATH
Zurück zum Zitat Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P.G., Cranor, L.F.: I regretted the minute I pressed share: a qualitative study of regrets on Facebook. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, p. 10. ACM, July 2011 Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P.G., Cranor, L.F.: I regretted the minute I pressed share: a qualitative study of regrets on Facebook. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, p. 10. ACM, July 2011
Zurück zum Zitat Wehner, B., Ritter, C., Leist, S.: Enterprise social networks: a literature review and research agenda. Comput. Netw. 114, 125–142 (2017)CrossRef Wehner, B., Ritter, C., Leist, S.: Enterprise social networks: a literature review and research agenda. Comput. Netw. 114, 125–142 (2017)CrossRef
Zurück zum Zitat Wellman, B., Wortley, S.: Different strokes from different folks: community ties and social support. Am. J. Sociol. 96(3), 558–588 (1990)CrossRef Wellman, B., Wortley, S.: Different strokes from different folks: community ties and social support. Am. J. Sociol. 96(3), 558–588 (1990)CrossRef
Zurück zum Zitat Westin, A.F.: Privacy and Freedom. Atheneum, New York (1967) Westin, A.F.: Privacy and Freedom. Atheneum, New York (1967)
Zurück zum Zitat Westin, A.F.: Social and political dimensions of privacy. J. Soc. Issues 59(2), 431–453 (2003)CrossRef Westin, A.F.: Social and political dimensions of privacy. J. Soc. Issues 59(2), 431–453 (2003)CrossRef
Zurück zum Zitat Wu, X., Kumar, V., Quinlan, J.R., Ghosh, J., Yang, Q., Motoda, H., McLachlan, G.J., Ng, A., Liu, B., Yu, P.S., Zhou, Z.-H., Steinbach, M., Hand, D.J., Steinberg, D.: Top 10 algorithms in data mining. Knowl. Inf. Syst. 14(1), 1–37 (2008)CrossRef Wu, X., Kumar, V., Quinlan, J.R., Ghosh, J., Yang, Q., Motoda, H., McLachlan, G.J., Ng, A., Liu, B., Yu, P.S., Zhou, Z.-H., Steinbach, M., Hand, D.J., Steinberg, D.: Top 10 algorithms in data mining. Knowl. Inf. Syst. 14(1), 1–37 (2008)CrossRef
Zurück zum Zitat Xu, H.: The effects of self-construal and perceived control on privacy concerns. In: ICIS 2007 Proceedings, p. 125 (2007) Xu, H.: The effects of self-construal and perceived control on privacy concerns. In: ICIS 2007 Proceedings, p. 125 (2007)
Zurück zum Zitat Xu, H., Dinev, T., Smith, J., Hart, P.: Information privacy concerns: linking individual perceptions with institutional privacy assurances. J. Assoc. Inf. Syst. 12(12), 798 (2011) Xu, H., Dinev, T., Smith, J., Hart, P.: Information privacy concerns: linking individual perceptions with institutional privacy assurances. J. Assoc. Inf. Syst. 12(12), 798 (2011)
Metadaten
Titel
A Prediction Model of Privacy Control for Online Social Networking Users
verfasst von
Rohit Valecha
Rajarshi Chakraborty
H. Raghav Rao
Shambhu Upadhyaya
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-91800-6_20