Social net: using patterns of physical proximity over time to infer shared interests
CHI '02 Extended Abstracts on Human Factors in Computing Systems
Designing and deploying an information awareness interface
CSCW '02 Proceedings of the 2002 ACM conference on Computer supported cooperative work
Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures
IEEE Transactions on Knowledge and Data Engineering
Some Privacy Issues in Knowledge Discovery: The OECD Personal Privacy Guidelines
IEEE Expert: Intelligent Systems and Their Applications
Information Flow Controls vs Interference Controls: An Integrated Approach
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
P3 Systems: Putting the Place Back into Social Networks
IEEE Internet Computing
Social matching: A framework and research agenda
ACM Transactions on Computer-Human Interaction (TOCHI)
Obfuscated databases and group privacy
Proceedings of the 12th ACM conference on Computer and communications security
Information revelation and privacy in online social networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Reality mining: sensing complex social systems
Personal and Ubiquitous Computing
Finding your way with CampusWiki: a location-aware wiki
CHI '07 Extended Abstracts on Human Factors in Computing Systems
A Crypto-Based Approach to Privacy-Preserving Collaborative Data Mining
ICDMW '06 Proceedings of the Sixth IEEE International Conference on Data Mining - Workshops
Seven privacy worries in ubiquitous social computing
Proceedings of the 3rd symposium on Usable privacy and security
Delegation in role-based access control
International Journal of Information Security
Identity Inference as a Privacy Risk in Computer-Mediated Communication
HICSS '09 Proceedings of the 42nd Hawaii International Conference on System Sciences
It's No Secret. Measuring the Security and Reliability of Authentication via "Secret Questions
SP '09 Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
Social Inference Risk Modeling in Mobile and Social Applications
CSE '09 Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 03
Preventing Unwanted Social Inferences with Classification Tree Analysis
ICTAI '09 Proceedings of the 2009 21st IEEE International Conference on Tools with Artificial Intelligence
Inference attacks on location tracks
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Common attributes in an unusual context: predicting the desirability of a social match
Proceedings of the fourth ACM conference on Recommender systems
Hi-index | 0.00 |
Social computing applications are transforming the way we make new social ties, work, learn and play, thus becoming an essential part our social fabric. As a result, people and systems routinely make inferences about people's personal information based on their disclosed personal information. Despite the significance of this phenomenon the opportunity to make social inferences about users and how this process can be managed is poorly understood. In this paper we 1) outline why social inferences are important to study in the context of social computing applications, 2) how we can model, understand and predict social inference opportunities 3) highlight the need for social inference management systems, and 4) discuss the design space and associated research challenges. Collectively, this paper provides the first systematic overview for social inference research in the area of social computing.