online user data removal
play

Online User Data Removal Team Sports: Cassidy Burden, Leela - PowerPoint PPT Presentation

Online User Data Removal Team Sports: Cassidy Burden, Leela Karunakaran, Robert Ly, Ross McNulty, Sneha Shrotriya Research Plan Mark arket Res esearch - Robert o User Behavior Leg Legality an and Eth thics - Sneha o Standards,


  1. Online User Data Removal Team Sports: Cassidy Burden, Leela Karunakaran, Robert Ly, Ross McNulty, Sneha Shrotriya

  2. Research Plan ● Mark arket Res esearch - Robert o User Behavior ● Leg Legality an and Eth thics - Sneha o Standards, Automation Scale ● Bac Backend Systems s - Cassidy o Rate Limiting, Server vs. Client ● Appli licatio ion Prog ogramming In Interfaces s (A (APIs PIs) - Leela o Data Removal Scale, Existing Third-Party Apps ● Us User er In Interface an and Us User er Exp Experience (UI (UI/U /UX) - Ross o Design Standards, Subtasks for Data Deletion, Application Platform

  3. Market Research ● Who deletes personal social media data and why? ● How can we make this process easier?

  4. Market Research - User Behavior Num umber of of Pos osts ts Dele Deleted at Soc Socia ial Media ia Us Use e of of UT UT Once by On y UT UT Stu Students ts Students St Facebook 5 or more 22% Instagram 1 46% Snapchat 4 Twitter 6% Tumblr 3 Reddit 8% 2 0 20 40 60 18% Stud udent nts Us Using ng Plat atfo form Figure 1 Figure 2

  5. Market Research - User Behavior Figure 3

  6. Ethics and Legality ● What legal and industry standards exist for automation? ● What unintended consequences can automation have?

  7. Ethics and Legality - Standards ● Software Law o Ebay, Inc. v. Bidder’s Edge, Inc. ● Platform terms of use o Limited automation

  8. Ethics and Legality – Automation Scale Computer Computer Computer Computer takes action offers user set executes with without offers no user approval assistance of actions notifying user Human Computer control control Current position Desired position Figure 4

  9. Backend Systems ● How will we delete data? ● What environment are we using?

  10. Backend Systems - Rate Limiting ● Limits how fast apps/users can use services ● Slows automation and risks blacklisting ● Impossible to avoid detection ● Stops robots Figure 5

  11. Backend Systems - Server vs. Client ● Server-Side o Processing done on our servers o Website cannot easily do web-scraping ● Client-side o Processing left to users o Must be ported for different platforms

  12. Application Programmable Interfaces ● Which social media APIs allow data removal? ● What scripts and applications exist for data removal?

  13. APIs - Data Removal Scale Google+ Facebook LinkedIn Pinterest Instagram Twitter Vine Reddit Tumblr No Deletion Deletion- Support Friendly APIs Figure 6

  14. APIs – Existing Third-Party Application ● Absterge: Facebook ● TwitWipe: Twitter ● TumblrCleanr: Tumblr ● Shreddit: Reddit

  15. User Interface and Experience ● How can we make our interface intuitive? ● How will users progress through our application? ● How will users run our application?

  16. UI/UX - Design Standards Figure 7 Figure 8

  17. UI/UX - Design Standards Link Social Select Platform Login Platforms Data to Delete Application Exit or Repeat Confirm Performs Process Deletion Deletion Figure 9

  18. UI/UX - Application Platform ● Web App ○ Visited sparingly ● Browser extension ○ Seen regularly ○ Browser must be kept open

  19. Next Steps ● Market Research - Define feature specs ● Legality & Ethics - Choose automation scope ● Backend Systems - Determine environment ● APIs - Decide target platforms ● UI/UX - Create interface prototype

  20. Questions?

  21. References Market Research M. Duggan et al., “Social Media Update 2014,” PewResearchCenter, Washington, D.C., Rep. Jan. 9, 2015. J. T. Child et al., “Blogging privacy rule orientations, privacy management, and content deletion practices: The variability of online privacy management activity at different stages of social media use.” COMPUT HUM BEHAV, vol. 28, no. 5, pp. 1859-1872, Sep. 2012. (March, 2015). Leading social networks worldwide as of March 2015, ranked by number of active users (in millions) [Online]. Available: http://www.statista.com/statistics/272014/global-social-networks-ranked-by- number-of-users/ Legality and Ethics S. Vihavainen, et.al , "The Clash between Privacy and Automation in Social Media," Pervasive Computing, IEEE , vol.13, no.1, pp.56,63, Jan.-Mar. 2014. L. Graham, "Keep your bots to yourself [software law]," Software, IEEE , vol.17, no.6, pp.106,107, Nov/Dec 2000. M. Michael and K. Michael, "Privacy - The times they are a-changin' [Introduction]," Technology and Society Magazine, IEEE , vol.31, no.4, pp.20,21, winter 2012

  22. References (cont.) Backend Systems Sardar, T.H.; Ansari, Z., "Detection and confirmation of web robot requests for cleaning the voluminous web log data," IMpact of E-Technology on US (IMPETUS), 2014 International Conference on the , vol., no., pp.13,19, 10-11 Jan. 2014 URL: http:ds//ieeexplore.ieee.org/xpls/icp.jsp?arnumber=6775871 Dev.twitter.com, 'API Rate Limits | Twitter Developers', 2015. [Online]. Available: https://dev.twitter.com/rest/public/rate-limiting. Mozilla Developer Network, 'Same-origin policy', 2015. [Online]. Available: https://developer.mozilla.org/en-US/docs/Web/Security/Same-origin_policy. APIs Sardar, T.H.; Ansari, Z., "Detection and confirmation of web robot requests for cleaning the voluminous web log data," IMpact of E-Technology on US (IMPETUS), 2014 International Conference on the , vol., no., pp.13,19, 10-11 Jan. 2014 URL: http:ds//ieeexplore.ieee.org/xpls/icp.jsp?arnumber=6775871 Dev.twitter.com, 'API Rate Limits | Twitter Developers', 2015. [Online]. Available: https://dev.twitter.com/rest/public/rate-limiting. Mozilla Developer Network, 'Same-origin policy', 2015. [Online]. Available: https://developer.mozilla.org/en-US/docs/Web/Security/Same-origin_policy.

  23. References (cont.) UI/UX Usability.gov, 'User Interface Design Basics', 2015. [Online]. Available: http://www.usability.gov/what-and-why/user-interface-design.html Miller, J., "The user experience [Internet]," Internet Computing, IEEE , vol.9, no.5, pp.90,92, Sept.-Oct. 2005 doi: 10.1109/MIC.2005.113 Mozilla Developer Network, 'Add-on guidelines', 2015. [Online]. Available: https://developer.mozilla.org/en-US/Add-ons/Add-on_guidelines

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend