Online User Data Removal Team Sports: Cassidy Burden, Leela - - PowerPoint PPT Presentation

online user data removal
SMART_READER_LITE
LIVE PREVIEW

Online User Data Removal Team Sports: Cassidy Burden, Leela - - PowerPoint PPT Presentation

Online User Data Removal Team Sports: Cassidy Burden, Leela Karunakaran, Robert Ly, Ross McNulty, Sneha Shrotriya Research Plan Mark arket Res esearch - Robert o User Behavior Leg Legality an and Eth thics - Sneha o Standards,


slide-1
SLIDE 1

Online User Data Removal

Team Sports: Cassidy Burden, Leela Karunakaran, Robert Ly, Ross McNulty, Sneha Shrotriya

slide-2
SLIDE 2

Research Plan

  • Mark

arket Res esearch - Robert

  • User Behavior
  • Leg

Legality an and Eth thics - Sneha

  • Standards, Automation Scale
  • Bac

Backend Systems s - Cassidy

  • Rate Limiting, Server vs. Client
  • Appli

licatio ion Prog

  • gramming In

Interfaces s (A (APIs PIs) - Leela

  • Data Removal Scale, Existing Third-Party Apps
  • Us

User er In Interface an and Us User er Exp Experience (UI (UI/U /UX) - Ross

  • Design Standards, Subtasks for Data Deletion, Application Platform
slide-3
SLIDE 3

Market Research

  • Who deletes personal social media data and why?
  • How can we make this process easier?
slide-4
SLIDE 4

Market Research - User Behavior

20 40 60 Reddit Tumblr Twitter Snapchat Instagram Facebook Stud udent nts Us Using ng Plat atfo form

Soc Socia ial Media ia Us Use e of

  • f UT

UT St Students

1 46% 2 18% 3 8% 4 6% 5 or more 22%

Num umber of

  • f Pos
  • sts

ts Dele Deleted at On Once by y UT UT Stu Students ts

Figure 1 Figure 2

slide-5
SLIDE 5

Figure 3

Market Research - User Behavior

slide-6
SLIDE 6

Ethics and Legality

  • What legal and industry standards exist for automation?
  • What unintended consequences can automation have?
slide-7
SLIDE 7

Ethics and Legality - Standards

  • Software Law
  • Ebay, Inc. v. Bidder’s Edge, Inc.
  • Platform terms of use
  • Limited automation
slide-8
SLIDE 8

Human control Computer control Computer

  • ffers no

assistance Computer

  • ffers user set
  • f actions

Computer executes with user approval Computer takes action without notifying user Current position Desired position Figure 4

Ethics and Legality – Automation Scale

slide-9
SLIDE 9

Backend Systems

  • How will we delete data?
  • What environment are we using?
slide-10
SLIDE 10

Backend Systems - Rate Limiting

  • Limits how fast apps/users can use services
  • Slows automation and risks blacklisting
  • Impossible to avoid detection
  • Stops robots

Figure 5

slide-11
SLIDE 11

Backend Systems - Server vs. Client

  • Server-Side
  • Processing done on our servers
  • Website cannot easily do web-scraping
  • Client-side
  • Processing left to users
  • Must be ported for different platforms
slide-12
SLIDE 12

Application Programmable Interfaces

  • Which social media APIs allow data removal?
  • What scripts and applications exist for data removal?
slide-13
SLIDE 13

No Deletion Support Deletion- Friendly APIs LinkedIn Pinterest Vine Google+ Instagram Reddit Facebook Twitter Tumblr Figure 6

APIs - Data Removal Scale

slide-14
SLIDE 14

APIs – Existing Third-Party Application

  • Absterge: Facebook
  • TwitWipe: Twitter
  • TumblrCleanr: Tumblr
  • Shreddit: Reddit
slide-15
SLIDE 15

User Interface and Experience

  • How can we make our interface intuitive?
  • How will users progress through our application?
  • How will users run our application?
slide-16
SLIDE 16

UI/UX - Design Standards

Figure 7 Figure 8

slide-17
SLIDE 17

Login Link Social Platforms Select Platform Data to Delete Confirm Deletion Application Performs Deletion Exit or Repeat Process

Figure 9

UI/UX - Design Standards

slide-18
SLIDE 18

UI/UX - Application Platform

  • Web App

○ Visited sparingly

  • Browser extension

○ Seen regularly ○ Browser must be kept open

slide-19
SLIDE 19

Next Steps

  • Market Research - Define feature specs
  • Legality & Ethics - Choose automation scope
  • Backend Systems - Determine environment
  • APIs - Decide target platforms
  • UI/UX - Create interface prototype
slide-20
SLIDE 20

Questions?

slide-21
SLIDE 21

References

Market Research

  • M. Duggan et al., “Social Media Update 2014,” PewResearchCenter, Washington, D.C.,
  • Rep. Jan. 9, 2015.
  • J. T. Child et al., “Blogging privacy rule orientations, privacy management, and content

deletion practices: The variability of online privacy management activity at different stages of social media use.” COMPUT HUM BEHAV, vol. 28, no. 5, pp. 1859-1872, Sep. 2012. (March, 2015). Leading social networks worldwide as of March 2015, ranked by number of active users (in millions) [Online]. Available: http://www.statista.com/statistics/272014/global-social-networks-ranked-by- number-of-users/

Legality and Ethics

  • S. Vihavainen, et.al, "The Clash between Privacy and Automation in Social Media,"

Pervasive Computing, IEEE , vol.13, no.1, pp.56,63, Jan.-Mar. 2014.

  • L. Graham, "Keep your bots to yourself [software law]," Software, IEEE , vol.17, no.6,

pp.106,107, Nov/Dec 2000.

  • M. Michael and K. Michael, "Privacy - The times they are a-changin' [Introduction],"

Technology and Society Magazine, IEEE , vol.31, no.4, pp.20,21, winter 2012

slide-22
SLIDE 22

References (cont.)

Backend Systems

Sardar, T.H.; Ansari, Z., "Detection and confirmation of web robot requests for cleaning the voluminous web log data," IMpact of E-Technology on US (IMPETUS), 2014 International Conference on the , vol., no., pp.13,19, 10-11 Jan. 2014 URL: http:ds//ieeexplore.ieee.org/xpls/icp.jsp?arnumber=6775871 Dev.twitter.com, 'API Rate Limits | Twitter Developers', 2015. [Online]. Available: https://dev.twitter.com/rest/public/rate-limiting. Mozilla Developer Network, 'Same-origin policy', 2015. [Online]. Available: https://developer.mozilla.org/en-US/docs/Web/Security/Same-origin_policy.

APIs

Sardar, T.H.; Ansari, Z., "Detection and confirmation of web robot requests for cleaning the voluminous web log data," IMpact of E-Technology on US (IMPETUS), 2014 International Conference on the , vol., no., pp.13,19, 10-11 Jan. 2014 URL: http:ds//ieeexplore.ieee.org/xpls/icp.jsp?arnumber=6775871 Dev.twitter.com, 'API Rate Limits | Twitter Developers', 2015. [Online]. Available: https://dev.twitter.com/rest/public/rate-limiting. Mozilla Developer Network, 'Same-origin policy', 2015. [Online]. Available: https://developer.mozilla.org/en-US/docs/Web/Security/Same-origin_policy.

slide-23
SLIDE 23

UI/UX

Usability.gov, 'User Interface Design Basics', 2015. [Online]. Available: http://www.usability.gov/what-and-why/user-interface-design.html Miller, J., "The user experience [Internet]," Internet Computing, IEEE, vol.9, no.5, pp.90,92, Sept.-Oct. 2005 doi: 10.1109/MIC.2005.113 Mozilla Developer Network, 'Add-on guidelines', 2015. [Online]. Available: https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines

References (cont.)