Michael Toomim, Xianhang Zhang, J. Fogarty, Nathan Morris
{"title":"Social Access Control for Social Media Using Shared Knowledge Questions","authors":"Michael Toomim, Xianhang Zhang, J. Fogarty, Nathan Morris","doi":"10.1609/icwsm.v2i1.18632","DOIUrl":null,"url":null,"abstract":"Managing privacy of online content is difficult. We present a simple social access control where sharers specify test questions of shared knowledge, such as \"what is our school mascot,\" instead of creating authenticated accounts and specifying explicit access control rules for all potential accessors. This demo will let attendees interact with our Facebook prototype. We will also explain prior studies that elucidate the context of photo sharing security, gauge the difficulty of creating shared knowledge questions, measure their resilience to adversarial attack, and evaluate users' abilities to understand and predict this resilience.","PeriodicalId":338112,"journal":{"name":"Proceedings of the International AAAI Conference on Web and Social Media","volume":"2008 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the International AAAI Conference on Web and Social Media","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1609/icwsm.v2i1.18632","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Managing privacy of online content is difficult. We present a simple social access control where sharers specify test questions of shared knowledge, such as "what is our school mascot," instead of creating authenticated accounts and specifying explicit access control rules for all potential accessors. This demo will let attendees interact with our Facebook prototype. We will also explain prior studies that elucidate the context of photo sharing security, gauge the difficulty of creating shared knowledge questions, measure their resilience to adversarial attack, and evaluate users' abilities to understand and predict this resilience.