{"title":"Can users control their data in social software? an ethical analysis of control systems","authors":"Rula Sayaf, J. Rule, Dave Clarke","doi":"10.1109/SPW.2013.6914699","DOIUrl":null,"url":null,"abstract":"The concept of data access and data flow control has a central role in the preservation of users¿ privacy in social software. Various frameworks employ access control and accountability approaches to enable users to control who can access their data, and identify who is accountable for misconduct. The technical and legal frameworks realise these two approaches differently. This paper presents the realisations of these approaches in the two frameworks. It discusses the level of control each approach offers, and the entailed privacy and ethical issues. It demonstrates how the two approaches are at variance in the level of control offered and the privacy aspects protected, and how the issue becomes more complex when comparing the realisations of these approaches in the technical and legal frameworks. Such complexities raise an open issue of what the appropriate balance is when employing the various realisations in one system at once.","PeriodicalId":383569,"journal":{"name":"2013 IEEE Security and Privacy Workshops","volume":"250 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE Security and Privacy Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SPW.2013.6914699","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
The concept of data access and data flow control has a central role in the preservation of users¿ privacy in social software. Various frameworks employ access control and accountability approaches to enable users to control who can access their data, and identify who is accountable for misconduct. The technical and legal frameworks realise these two approaches differently. This paper presents the realisations of these approaches in the two frameworks. It discusses the level of control each approach offers, and the entailed privacy and ethical issues. It demonstrates how the two approaches are at variance in the level of control offered and the privacy aspects protected, and how the issue becomes more complex when comparing the realisations of these approaches in the technical and legal frameworks. Such complexities raise an open issue of what the appropriate balance is when employing the various realisations in one system at once.