Cloak and swagger: Understanding data sensitivity through the lens of user anonymity

Sai Teja Peddinti, Aleksandra Korolova, Elie Bursztein, Geetanjali Sampemane

Research output: Chapter in Book/Report/Conference proceedingConference contribution

23 Scopus citations

Abstract

Most of what we understand about data sensitivity is through user self-report (e.g., surveys), this paper is the first to use behavioral data to determine content sensitivity, via the clues that users give as to what information they consider private or sensitive through their use of privacy enhancing product features. We perform a large-scale analysis of user anonymity choices during their activity on Quora, a popular question-and-answer site. We identify categories of questions for which users are more likely to exercise anonymity and explore several machine learning approaches towards predicting whether a particular answer will be written anonymously. Our findings validate the viability of the proposed approach towards an automatic assessment of data sensitivity, show that data sensitivity is a nuanced measure that should be viewed on a continuum rather than as a binary concept, and advance the idea that machine learning over behavioral data can be effectively used in order to develop product features that can help keep users safe.

Original languageEnglish (US)
Title of host publicationProceedings - IEEE Symposium on Security and Privacy
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages493-508
Number of pages16
ISBN (Electronic)9781479946860
DOIs
StatePublished - Nov 13 2014
Externally publishedYes
Event35th IEEE Symposium on Security and Privacy, SP 2014 - San Jose, United States
Duration: May 18 2014May 21 2014

Publication series

NameProceedings - IEEE Symposium on Security and Privacy
ISSN (Print)1081-6011

Other

Other35th IEEE Symposium on Security and Privacy, SP 2014
Country/TerritoryUnited States
CitySan Jose
Period5/18/145/21/14

All Science Journal Classification (ASJC) codes

  • Safety, Risk, Reliability and Quality
  • Software
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Cloak and swagger: Understanding data sensitivity through the lens of user anonymity'. Together they form a unique fingerprint.

Cite this