Abstract Collaborative tagging describes the process by which many users add metadata (tags) in the form of keywords to share content. The main purpose of tagging is to categorize the web resources based on their content. The collaborative tagging services has grown in popularity on the web leads to cross referencing, thereby recognizing the privacy threat. In this paper, we proposed privacy-enhancing technology called tag suppression, used to protect end-users privacy.
Index Terms— Policy-based collaborative tagging, social bookmarking, tag suppression, privacy-enhancing technology, Shannon’s entropy, privacy-utility tradeoff
INTRODUCTION
Collaborative tagging is a new way to assign keywords to the internet resources by its users. It plays
…show more content…
For example, Delicious, LibraryThing.com and CiteULike.org.
Freely chosen keywords are used instead of a controlled vocabulary. Like any other uncontrolled vocabularies the user defined tags also share problems called ambiguity.
Traditionally, collaborative tagging services granted by Social bookmarking sites only. It is presently supported by practically several kind of public web application, and it is used to explain any type of online or offline resources. Social bookmarking is a mechanism to bookmark the links on the web using social bookmark manager, which allows users to store web links online with some descriptors (or) keywords called tags. A tag is a non-hierarchical keyword or term assigned to a piece of information.
The main purpose of collaborative tagging is to maintain label-based resource finding and searching. For example, collection of tags by social bookmarking services can be broken to increase web access functionalities, like data filtering and finding. To accomplish this improved use, the present architecture of collaborative tagging services must be extended by including two layers.
1) Policy layer
2) Privacy
…show more content…
From that privacy attackers take accurate snapshot of user profile by tagging the resources on the web accurately. To avoid this consequence, the users may implement a privacy enhancing technology based on data perturbation. The data perturbation technique used here is tag suppression technique; it has the purpose of preventing the attackers from the user profile and allows users to suppress the tags based on their preferences from this perturbation technique not able to collect the sensitive information. Simple technique protects user privacy to a certain degree, but at the cost of the semantic loss incurred by suppressing tags. Other approaches based on data perturbation include the submission of false tags. For example, a user wishing to tag the webpage www.chennaiproject.net with “project” could use the tag “books” instead, to conceal their interest for this resource. The user distorts their actual profile, although at the expense of a far greater impact on semantic functionality than suppression does—resources are assigned tags that do not describe, in principle, the actual content of such resources. A more intelligent form of tag perturbation consists in replacing (specific) user tags with (general) tag categories. In conceptual terms, and resorting to the example above, the user would use the
“Human beings are not meant to lose their anonymity and privacy,” Sarah Chalke. When using the web, web users’ information tend to be easily accessible to government officials or hackers. In Nicholas Carr’s “Tracking Is an Assault on Liberty,” Jim Harpers’ “Web Users Get As Much As They Give,” and Lori Andrews “Facebook is Using You” the topic of internet tracking stirred up many mixed views; however, some form of compromise can be reached on this issue, laws that enforces companies to inform the public on what personal information is being taken, creating advisements on social media about how web users can be more cautious to what kind of information they give out online, enabling your privacy settings and programs, eliminating weblining,
In Lecture 26 of INFO 3200’s Spring 2014 offering, the instructor talks about the concept of privacy in new media and society. This is a popular topic of conversation in the public sphere. In a world in which the easiest way to keep track of someone is to do so online, it is essential that we know and control what information others get access to.
Part of the allure of the Internet has always been the anonymity it offers its users. As the Internet has grown however, causing capitalists and governments to enter the picture, the old rules are changing fast. E-commerce firms employ the latest technologies to track minute details on customer behavior. The FBI's Carnivore email-tracking system is being increasingly used to infringe on the privacy of netizens. Corporations now monitor their employees' web and email usage. In addition to these privacy infringements, Internet users are also having their use censored, as governments, corporations, and other institutions block access to certain sites. However, as technology can be used to wage war on personal freedoms, it can also be employed in the fight against censorship and invasion of privacy.
Are the benefits of electronic communication at the expense of our privacy? How does the Internet affect the availability and use of our personal information? The Internet brings another dimension to the issue of privacy. Whether you are voting on-line or buying a book from Amazon.com you must consider how much personal information has been collected about you, with or without your consent, and how it can be used. Policies governing privacy on the Internet are still not clearly defined and many on-line users do not understand how the information they provide will be used. How much...
Marshall, Patrick. “Privacy Under Attack.” CQ Researcher. 15 Jun. 2001. <http://0-library.cqpress.com.sculib.scu.edu/cqresearcher/search.php>. (requires access to SCU library online databases)
In today’s fast paced technology, search engines have become vastly popular use for people’s daily routines. A search engine is an information retrieval system that allows someone to search the...
Social computing has to do with computations carried out by groups of people for instance in collaborative filtering, online auctions, prediction markets and reputation systems.
As we evolve in the information age, online privacy rights have grown over the past years. In 1986, a federal law was passed to protect an individual’s electronical information. “This law was produced to make a fair balance among the privacy expectations of citizens and the legitimate needs of law enforcement” (EPIC). With the Internet developing intensely, there is a great deal at stake such as the theft of your identification. But where it all begins is when you access the Internet. This is the first step in being aware of your privacy because you go through the process in signing up with an Internet Service Provider (ISP). With this process you have a IP address attached to your ISP. This is the primary step on how your information starts
Register, R. (2013). The importance of metadata for E-content. EContent Quarterly, 1(1), 30-44. Retrieved from http://search.proquest.com/docview/1467943727?accountid=10043
Computers can also tie information together in an impersonal and systematic way that can lead to invasions of privacy. Take for example the situation wh...
The transfer and preservation of Information is a major part of the digital age. People try to control their flow of information and the amount of information websites,organisations and even the government has on them. And even with the various ways of protecting information, there are still issues of privacy, freedom of information and the conflict between the public and private domains on who really owns or governs these information.
Today, our society has access to mankind’s collective knowledge with the internet. Constantly updated, the internet keeps everyone in the loop. If there is a traffic jam, Google Maps will notify you. If there is a new movie release, Fandango will ask to reserve tickets for you. If there is a limited-time sale, Amazon will email you. Information constantly bombards us. The internet moves fast, and we must try to keep up to stay in
Collaborative learning is an educational approach that involves groups of learners working together to reach a consensus through negotiation to solve a problem, complete a task, or create a product (Bruffee, 1993). Learning occurs through active engagement among peers, wherein the main characteristics of collaborative learning are: a common task or activity; small group learning, co-operative behaviour; interdependence; and individual responsibility and accountability (Lejeune, 2003).
Web 3.0 also means that if the user was to search for something such as ‘man’ it would not just display results just for ‘man’ it will also know to display ...
Social Networking is a modern and the easiest way to Communicate Online. It has revolutionized the way we communicate over large distances. We can get into contact immediately with Family, Friends, and other people from around the globe using any of the modern Communication mediums such as a Mobile Device or a Computer. There are many possible ways of Social Networking. You can use Social Networking Websites, Blogging, IMs (Instant Messengers), Chatrooms, and Dating Sites to get connected to people.