Penn State Researchers Tackle Social Network Privacy Gaps

Researchers at Pennsylvania State University's College of Information Science and Technology (IST) and the University of Kansas have partnered in an effort to reduce the gap between perceived and actual privacy for users of social networks.

That gap arises when what users intend to share differs from the information that is actually made available to others.

"People don't clearly understand the boundaries of personal information versus sharing boundaries," said Dongwon Lee, associate professor at IST and principal investigator for the project, in a prepared statement.

Dubbed "Privacy Protection in Social Networks: Bridging the Gap Between User Perception and Privacy Enforcement," the project seeks to develop methods to identify those discrepancies, "design a user-centered and computationally efficient formal model of user privacy in social networks" and develop a mechanism for enforcing privacy policies, according to information released by Penn State.

In addition to infiltrating social networks to steal personal information, "hackers can connect an identity-revealing clue from [a] medical site with a publicly known identity in social media accounts, enabling them to access information that was intended to be private," according to a news release about the project.

Additionally, even users concerned about privacy and aware of possible consequences fail to take protective measures because they don't believe the risk is worth the extra vigilance, according to Lee.

Previous efforts to address the problem have relied either on technological solutions or human-oriented fixes. Lee said his project will work to combine the two approaches.

"We feel that if we take advantage of both frameworks, we'll be able to come up with a better solution," Lee said, in a Penn State news release.

Once complete, the researchers said they hope to implement their tools in a way that will allow users to more easily control their privacy, such as through an app that would work with various social media accounts.

"Hopefully, we will develop better, very vigorous underpinnings of the privacy model and a slew of technological tools to enforce this newly developed model," added Lee.

The research is being funded through a $279,154 grant to IST and a $220,162 grant to U Kansas, both from the National Science Foundation.

About the Author

Joshua Bolkan is contributing editor for Campus Technology, THE Journal and STEAM Universe. He can be reached at [email protected].

Featured

  • Hand holding a stylus over a tablet with futuristic risk management icons

    Why Universities Are Ransomware's Easy Target: Lessons from the 23% Surge

    Academic environments face heightened risk because their collaboration-driven environments are inherently open, making them more susceptible to attack, while the high-value research data they hold makes them an especially attractive target. The question is not if this data will be targeted, but whether universities can defend it swiftly enough against increasingly AI-powered threats.

  • hand typing on laptop with security and email icons

    Copilot Gets Expanded Role in Office, Outlook, and Security

    Microsoft has doubled down on its Copilot strategy, announcing new agents and capabilities that bring deeper intelligence and automation to everyday workflows in Microsoft 365.

  • Graduation cap resting on electronic circuit board

    Preparing Workplace-Ready Graduates in the Age of AI

    Artificial intelligence is transforming workplaces and emerging as an essential tool for employees across industries. The dilemma: Universities must ensure graduates are prepared to use AI in their daily lives without diluting the interpersonal, problem-solving, and decision-making skills that businesses rely on.

  • business man using smart phone in office

    Microsoft Copilot Adds Voice Commands, Teams Collaboration, Local Data Processing

    Microsoft has introduced new features within its Microsoft 365 Copilot offering, aimed at making further foothold in the enterprise, including voice-based interaction, group collaboration tools, and an expansion of in-country data processing.