Limits of Individual Consent and Models of Distributed Consent in Online
Social Networks
- URL: http://arxiv.org/abs/2006.16140v3
- Date: Mon, 11 Apr 2022 13:24:45 GMT
- Title: Limits of Individual Consent and Models of Distributed Consent in Online
Social Networks
- Authors: Juniper Lovato, Antoine Allard, Randall Harp, Jeremiah Onaolapo and
Laurent H\'ebert-Dufresne
- Abstract summary: A user who consents to allow access to their profile can expose the personal data of their network connections to non-consented access.
We introduce both a platform-specific model of "distributed consent" and a cross-platform model of a "consent passport"
In both models, individuals and groups can coordinate by giving consent conditional on that of their network connections.
- Score: 1.0276024900942875
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Personal data are not discrete in socially-networked digital environments. A
user who consents to allow access to their profile can expose the personal data
of their network connections to non-consented access. Therefore, the
traditional consent model (informed and individual) is not appropriate in
social networks where informed consent may not be possible for all users
affected by data processing and where information is distributed across users.
Here, we outline the adequacy of consent for data transactions. Informed by the
shortcomings of individual consent, we introduce both a platform-specific model
of "distributed consent" and a cross-platform model of a "consent passport." In
both models, individuals and groups can coordinate by giving consent
conditional on that of their network connections. We simulate the impact of
these distributed consent models on the observability of social networks and
find that low adoption would allow macroscopic subsets of networks to preserve
their connectivity and privacy.
Related papers
- From Clicks to Consensus: Collective Consent Assemblies for Data Governance [8.312192184427762]
Notice and consent, the standard for collecting consent, has been criticized.<n>This paper argues that a collective approach to consent is worth exploring.<n>We propose collective consent, operationalized through consent assemblies, as one alternative framework.
arXiv Detail & Related papers (2026-01-23T13:57:04Z) - Personal Data Processing for Behavioural Targeting: Which Legal Basis? [0.2262632497140704]
This paper argues that the cookie consent requirement from the ePrivacy Directive does not provide a legal basis for the processing of personal data.<n>Even if companies could use an opt-out system to comply with the e-Privacy Directive's consent requirement for using a tracking cookie, they would generally have to obtain the data subject's unambiguous consent if they process personal data for behavioural targeting.
arXiv Detail & Related papers (2025-11-25T18:55:53Z) - Differentially Private Data Release on Graphs: Inefficiencies and Unfairness [48.96399034594329]
This paper characterizes the impact of Differential Privacy on bias and unfairness in the context of releasing information about networks.
We consider a network release problem where the network structure is known to all, but the weights on edges must be released privately.
Our work provides theoretical foundations and empirical evidence into the bias and unfairness arising due to privacy in these networked decision problems.
arXiv Detail & Related papers (2024-08-08T08:37:37Z) - Extensible Consent Management Architectures for Data Trusts [0.0]
This paper proposes a framework for consent management in Data Trusts.
Data can flow across a network through "role tunnels" established based on corresponding legal capacities.
arXiv Detail & Related papers (2023-09-28T18:28:50Z) - Protecting User Privacy in Online Settings via Supervised Learning [69.38374877559423]
We design an intelligent approach to online privacy protection that leverages supervised learning.
By detecting and blocking data collection that might infringe on a user's privacy, we can restore a degree of digital privacy to the user.
arXiv Detail & Related papers (2023-04-06T05:20:16Z) - Membership Inference Attacks against Synthetic Data through Overfitting
Detection [84.02632160692995]
We argue for a realistic MIA setting that assumes the attacker has some knowledge of the underlying data distribution.
We propose DOMIAS, a density-based MIA model that aims to infer membership by targeting local overfitting of the generative model.
arXiv Detail & Related papers (2023-02-24T11:27:39Z) - I Prefer not to Say: Protecting User Consent in Models with Optional
Personal Data [20.238432971718524]
We show that the decision not to share data can be considered as information in itself that should be protected to respect users' privacy.
We formalize protection requirements for models which only use the information for which active user consent was obtained.
arXiv Detail & Related papers (2022-10-25T12:16:03Z) - Building a healthier feed: Private location trace intersection driven
feed recommendations [6.913190961680716]
We propose a consent-first private information sharing paradigm for driving social feeds from users' personal private data.
This work presents a novel technique for designing feeds that represent real offline social connections through private set intersections.
arXiv Detail & Related papers (2022-10-04T21:52:52Z) - Cross-Network Social User Embedding with Hybrid Differential Privacy
Guarantees [81.6471440778355]
We propose a Cross-network Social User Embedding framework, namely DP-CroSUE, to learn the comprehensive representations of users in a privacy-preserving way.
In particular, for each heterogeneous social network, we first introduce a hybrid differential privacy notion to capture the variation of privacy expectations for heterogeneous data types.
To further enhance user embeddings, a novel cross-network GCN embedding model is designed to transfer knowledge across networks through those aligned users.
arXiv Detail & Related papers (2022-09-04T06:22:37Z) - Analyzing Wikipedia Membership Dataset and PredictingUnconnected Nodes
in the Signed Networks [0.666659730119789]
We examine how relationships can be predicted between two unconnected people in a social network by using area under Precison-Recall curve and ROC.
Modeling the social network as a signed graph, we compare Triadic model,Latent Information model and Sentiment model and use them to predict peer to peer interactions.
arXiv Detail & Related papers (2021-10-18T09:03:18Z) - Preventing Unauthorized Use of Proprietary Data: Poisoning for Secure
Dataset Release [52.504589728136615]
We develop a data poisoning method by which publicly released data can be minimally modified to prevent others from train-ing models on it.
We demonstrate the success of our approach onImageNet classification and on facial recognition.
arXiv Detail & Related papers (2021-02-16T19:12:34Z) - Second layer data governance for permissioned blockchains: the privacy
management challenge [58.720142291102135]
In pandemic situations, such as the COVID-19 and Ebola outbreak, the action related to sharing health data is crucial to avoid the massive infection and decrease the number of deaths.
In this sense, permissioned blockchain technology emerges to empower users to get their rights providing data ownership, transparency, and security through an immutable, unified, and distributed database ruled by smart contracts.
arXiv Detail & Related papers (2020-10-22T13:19:38Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.