Studyspark Study Document

Privacy in Social Networks Regarding Machine Learning Research Paper

Pages:8 (2537 words)

Sources:10

Subject:Technology

Topic:Machine Learning

Document Type:Research Paper

Document:#98311751


Abstract

This paper discusses the issue of privacy in social networks with respect to advances in machine learning. It shows how machine learning protocols have been developed both to enhance and secure privacy as well as to invade privacy and collect, analyze, predict data based on users’ information and experience online. The conflict between these two directions in machine learning is likely to lead to a system wherein machine learning algorithms are actively engaged in the subversion of one another, with one attempting to conceal data and the other attempting to uncover it. This paper concludes with recommendations for social networks and the issue of privacy regarding machine learning.

Introduction

Social networks have allowed an ocean of personal data to form that is now sitting there waiting for machine learning algorithms to collect it, analyze it, and recognize individuals on social media (Oh, Benenson, Fritz & Schiele, 2016). Machine learning algorithms are thus being used more and more in social networks to collect data on users and to assess their browsing and personal information—and in doing so they could soon be predicting someone’s recreational activities or political affiliation through a simple analysis of an individual’s social media use, such as posts on Twitter or the friends one has on Facebook (Lindsey, 2019). As a result, the privacy of individual social media users may be in jeopardy. This paper will review the findings of the related literature on this subject and discuss them and the recommendations for addressing this issue in the future.

Review of Literature

Privacy and information sharing may seem like two diametrically opposed concepts in the context of social media, and to a high degree they are. Mobile devices allow users to set information sharing settings that allow algorithms on other applications to identify a person’s location, habits, and view other information to personalize ads and so on. The information that is available for viewing by machine learning programs is enormous, and many users do not even realize it. Machine learning algorithms often know more about a user’s habits and choices than the user does. Bilogrevic et al. (2016) point out that “by analyzing people’s sharing behaviors in different contexts, it is shown in these works that it is possible to determine the features that most influence users’ sharing decisions, such as the identity of the person that is requesting the information and the current location” (p. 126). The problem is that users do not know how to articulate their own personal information settings desires, nor are these desires static. For that reasons Bilogrevic et al. (2016) created a program that uses machine learning AI to automatically set those settings based on user interaction on the Web, reducing the user’s worry about when it is appropriate to share information and when it is not. The program developed by Bilogrevic et al. (2016) will do it for them.

Such a program is one example of the way privacy concerns and machine learning advancements are meeting in the realm of social media. One reason it is needed is, as Oh et al. (2016) show, there is no such thing as privacy on the Internet, and AI is being developed to collect as much data on what is out there as possible. The implications for one’s privacy are enormous, especially as more and more people put their entire lives online (Oh et al., 2016). Yet while there are machine learning programs being developed to collect information on users in order to recognize them, create profiles of them, and predict their behaviors, there are machine learning programs like the one developed by Bilogrevic (2016) that are simultaneously being designed to protect and preserve users’ privacy.

Another such example is in the study by Mohassel and Zhang (2017). Mohassel and Zhang (2017) use a two-server model with machine learning algorithms for the purposes of training linear regression, logistic regression and neural networks models: “in this model, in a setup phase, the data owners (clients) process, encrypt and/or secret-share their data among two non-colluding servers. In the computation phase, the two servers can train various models on the clients’ joint data without learning any information beyond the trained model” (p. 19). Their protocol as a result is 1100- 1300× faster that previous protocols developed by engineers to protect end users’ privacy in an Internet environment where scanning algorithms and constantly looking for data on users to develop their own profiles. Their protocol acts as a wall between the user…

Some parts of this document are missing

Click here to view full document

…which the problem is likely ever to be solved once and for all. The Internet has opened up a world of coding that in a state of constant revolution.

The recommendations based on these findings are for legislation to be developed and passed that will address the issue of using machine learning to violate privacy rights on social networks. Just as legislation emerged following the embarrassment of a U.S. Supreme Court Justice nominee in the 1980s, today’s legislators need to understand the parameters and risks of machine learning with respect to data privacy on social networks. AI can be used to protect and to violate privacy rights, and laws should be in place that dictate what is acceptable behavior on the part of machine learning developers and what is not. Until that time comes, the contest between advancing machine learning protocols to protect or to collect will only escalate.

Social networks need to be protected as personal data is left behind or made available by users, who often do not even know how to navigate the web in terms of sharing information or making data visible to machine learning algorithms. End users are some of the least informed or least prepared individuals and are typically the number one threat/risk to a system’s security. They are targeted through phishing methods and unless trained to know better can make an organization extremely vulnerable. The same goes for protecting their own data and maintaining their own privacy rights. Many users are simply uneducated about the tools available and how to use them. Thus, the other recommendation is to educate the public more broadly on how to preserve personal information on the Web.

Conclusions

Social networks are vulnerable to data harvesting algorithms and machine learning has only advanced the degree to which personal data may be gathered and interpreted for predictive purposes. The anticipated behaviors of users can be predicated upon past inferences by machine learning algorithms, but machine learning can also be used to protect the privacy of users and share only the information that the user is comfortable sharing. Machine learning protocols have even been developed that conceal data from Big Data harvesters. And yet there is no end in sight for this war over…


Sample Source(s) Used

References

Balle, B., Gascón, A., Ohrimenko, O., Raykova, M., Schoppmmann, P., & Troncoso, C. (2019, November). PPML'19: Privacy Preserving Machine Learning. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 2717-2718). ACM.

Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Gazaki, M., & Hubaux, J. P. (2016). A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Pervasive and Mobile Computing, 25, 125-142.

Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., ... & Seth, K. (2017, October). Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1175-1191). ACM.

Hunt, T., Song, C., Shokri, R., Shmatikov, V., & Witchel, E. (2018). Chiron: Privacy-preserving machine learning as a service. arXiv preprint arXiv:1803.05961.

Lindsey, N. (2019). New Research Study Shows That Social Media Privacy Might Not Be Possible. Retrieved from https://www.cpomagazine.com/data-privacy/new-research-study-shows-that-social-media-privacy-might-not-be-possible/

Mohassel, P., & Zhang, Y. (2017, May). Secureml: A system for scalable privacy-preserving machine learning. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 19-38). IEEE.

Mooney, S. J., & Pejaver, V. (2018). Big data in public health: terminology, machine learning, and privacy. Annual review of public health, 39, 95-112.

Oh, S. J., Benenson, R., Fritz, M., & Schiele, B. (2016, October). Faceless person recognition: Privacy implications in social media. In European Conference on Computer Vision (pp. 19-35). Springer, Cham.

Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Privacy for High School Students

Pages: 40 (12892 words) Sources: 1+ Subject: Teaching Document: #13864282

Internet: Privacy for High School Students An Analysis of Privacy Issues and High School Students in the United States Today In the Age of Information, the issue of invasion of privacy continues to dominate the headlines. More and more people, it seems, are becoming victims of identity theft, one of the major forms of privacy invasion, and personal information on just about everyone in the world is available at the click of

Studyspark Study Document

Wealth of Networks Communication General It Is

Pages: 14 (4609 words) Sources: 12 Subject: Communication - Journalism Document: #53726270

Wealth of Networks Communication (general) It is said that the Western culture is going through some sort of cultural war in terms of communication and technology (Braman 153-182). The battlegrounds are seen in the courts, the legislatures, international bodies, local communities, and distant countries that individually may not have much power to affect the outcome though they do have a vital interest in who wins. The war is global -- and is

Studyspark Study Document

Integration of Technology in Social Classroom

Pages: 20 (7347 words) Sources: 20 Subject: Teaching Document: #92157390

Integrating Technology in My High School Social Studies Classroom The utilization of technology in education has gained a lot of popularity in the recent years. Great enhancements in computer software and hardware in the past decades have been noted and this has resulted to the increase of computer integration in education. The employment of computers in education unlocks a fresh area of knowledge in addition to providing a means which has

Studyspark Study Document

Open Source Social Science

Pages: 13 (3536 words) Sources: 1+ Subject: Education - Computers Document: #873402

Open source software has recently emerged as the frontrunner for many industries as the primary method of code production, as it is widely predicted to provide more options for its users in a quicker, quality improved, and cost effective format than the more traditional proprietary software. Linux, the dominant player in the market, is a considerable threat to the Microsoft operating system, which has successfully established itself in the global

Studyspark Study Document

Application of a Pedagogic Model to the Teaching of Technology to Special Education Students...

Pages: 230 (60754 words) Sources: 148 Subject: Teaching - Technology Document: #60817292

Pedagogic Model for Teaching of Technology to Special Education Students

Almost thirty years ago, the American federal government passed an act mandating the availability of a free and appropriate public education for all handicapped children. In 1990, this act was updated and reformed as the Individuals with Disabilities Education Act, which itself was reformed in 1997. At each step, the goal was to make education more equitable and more

Studyspark Study Document

Cyber Crime Malicious Activities Like Identity Theft,

Pages: 7 (2334 words) Sources: 5 Subject: Teaching Document: #4044629

Cyber Crime Malicious activities like identity theft, harassment and phishing activities are conducted by the cyber criminals by making use of the anonymous context of the cyber world to their advantage. Phishing scams are conducted in such a manner by the scammers that websites are created by them and emails are sent out in order to trick the account holders into revealing sensitive information like passwords and account numbers. These crimes

Join thousands of other students and

"spark your studies".