Role-Based Access Control Models
Computer
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
From PIM to GIM: personal information management in group contexts
Communications of the ACM - Personal information management
Usage patterns of collaborative tagging systems
Journal of Information Science
HT06, tagging paper, taxonomy, Flickr, academic article, to read
Proceedings of the seventeenth conference on Hypertext and hypermedia
Socially augmenting employee profiles with people-tagging
Proceedings of the 20th annual ACM symposium on User interface software and technology
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Practices of balancing privacy and publicness in social network services
Proceedings of the 16th ACM international conference on Supporting group work
Social people-tagging vs. social bookmark-tagging
EKAW'10 Proceedings of the 17th international conference on Knowledge engineering and management by the masses
Annotation-based access control for collaborative information spaces
Computers in Human Behavior
Hi-index | 0.00 |
The recent emergence of social systems has transformed the Web from an information pool to a platform for communication and social interaction. As such, the issue of managing privacy of various types of user-created content in these open environments has become more of a concern. Existing social systems often define privacy either as a private/public dichotomy or in terms of a "network of friends relationship, in which all friends" are created equal and all relationships are reciprocal. We explore instead the idea of tagging people to create ego-centric groups of dynamic, non-reciprocal relationships to improve privacy management in this domain. In this paper, we introduce the principles and motivations behind people-tagging, discuss constraints that make people-tagging safe, trustable, and spam-free, describe a research implementation we have created to experiment with the concept, and provide the results of a preliminary empirical evaluation which shows the strength of the idea and indicates areas for future enhancements.