LEAF:A Privacy-Conscious Social Network-Based Intervention Tool for IPV Survivors

LEAF:A Privacy-Conscious Social Network-Based Intervention Tool for IPV Survivors

LEAF:A Privacy-conscious Social Network-based Intervention Tool for IPV Survivors Balaji Palanisamy Sheldon Sensenig James Joshi Rose Constantinoy School of Information Sciences, University of Pittsburgh ySchool of Nursing, University of Pittsburgh fbpalan, sms233, jjoshi, [email protected] Abstract—Destructive relationship behavior directed from one acronym stands for lending encouragement, affirming futures. party to another in domestic relationships, both physical and These embody the vision for a system to provide support to emotional, is a common problem. When the behavior occurs those in difficult situations. in intimate relationships this is called intimate partner violence (IPV). There are many resources available to survivors of IPV LEAF is primarily focused on providing a secure privacy- in getting out of abusive situations, but the information is not conscious social-network based support system for survivors readily available and is not always easy to find. Furthermore, of intimate partner violence (IPV). We note that destructive once the survivor has escaped from the abusive situation, there relationship behavior directed from one party to another in are not many support type resources that are easily accessible, domestic relationships, both physical and emotional, is a especially to people lacking transportation and to those residing in rural or suburban areas. LEAF is being created to address the common problem. When the behavior occurs in intimate issues that arise from limits in physical community support. The relationships this is called intimate partner violence. LEAF acronym stands for lending encouragement, affirming futures. aims to provide an easily accessible support system to those These embody the vision for a system to provide support to those who have escaped from the abusive situation, especially to in difficult situations. The system contains three components: a people lacking transportation and to those residing in rural or web portal, a privacy-conscious social network, and a mobile app. By providing a web portal, LEAF aims to be a location suburban areas. where abuse survivors and others can find relevant information. The privacy-conscious social network is a central part of The social network provides an online support community the LEAF system. In many social communication systems, unrestricted by geographical diversity. LEAF incorporates new we find that there is often a loss in privacy in order to accom- techniques for anonymous communication in social networks to modate for the required communication trust [6]. Messages in enable information flow over distributed protected content, while safeguarding both personal information and privacy of individ- conventional social networks [3], [4], [5] are typically linked uals from unauthorized disclosure. We believe the outcomes of with users through friendship relationship in order to obtain this system will have the potential for a significant impact on higher trust among the communicating entities. In contrast, the use of specialized anonymous online social networks in the completely anonymous discussion forums such as [17] present health care sector including the IPV support system addressed a highly private environment for discussing sensitive topics, in this work. however, the increased privacy in these systems comes only at the cost of reduced trust among the communicating parties. I. INTRODUCTION The specialized social network in LEAF aims at bringing the Social support is an important component of health and best of both the worlds: namely ensuring a highly trusted well-being throughout life. Online social networks (OSNs) communication network and at the same time, guaranteeing provide a powerful refection of the structure and dynamics of a high degree of user privacy. The system contains three the society of the 21st century and the interaction of the In- components: a web portal, a social network, and a mobile ternet generation with both technology and people. OSNs thus app. By providing a web portal, LEAF aims to be a location present unprecedented opportunities for social interactions, where abuse survivors and others can find relevant information. information sharing and communication for applications in The social network provides an online support community various domains including healthcare (e.g., MedicalMingle [1], unrestricted by geographical diversity. The mobile phone app PatientsLikeMe [2]), and other applications that have a social is to enable users to quickly obtain help if they find themselves dimension. Unfortunately, most existing social networks fail to in a compromising situation. serve the purpose for people in difficult health situations due The rest of this paper is organized as follows: In Section II to many privacy related concerns related to unstable privacy we discuss the functional requirements of the LEAF system. In policies and difficulty in managing personal settings. For Section III, we present the technical details of the anonymous people dealing with sensitive issues, such as various diseases, communication techniques in LEAF. Section IV presents the emotional issues, or abuse, the existing OSNs do not meet their LEAF platform and implementation. We review the related need of social support limited to trusted individuals. These literature in Section V and we conclude in Section VI. people need a system that protects their personal privacy, while allowing them to interact with others that can provide II. FUNCTIONAL REQUIREMENTS emotional, medical, and physical support. The LEAF system is This section presents the general architectural requirements to fulfill this need. LEAF is being created to address the issues as well as the functional requirements of each of the LEAF that arise from limits in physical community support. The system components. A. Architecture Note that the IPV survivors may show symptoms of physical wounds, trauma, emotional stress, etc. and may not want to Architectural requirements of LEAF fall into several cate- openly participate in interactions and seek intervention or help gories namely security and privacy, administration, and acces- because of privacy concerns. Thus, a critical requirement here sibility. is to possibly allow users to interact anonymously in the online 1) Security and Privacy: Security and Privacy is an im- social network. Such an anonymous trusted social network will portant requirement of the LEAF system. As users may be support the IPV survivors (i) to proactively manage their well- in physical danger from abusers, it is necessary to prevent being; e.g., by fostering sharing of experiences among IPV any information that may be used to harm an individual from survivors, regular delivery of educational/awareness materials; leaving the system. This includes information on user physical and (ii) to provide timely intervention in case of impending location and contact information as well as any user provided abuse, or health conditions; such an intervention may include content. Information within the system also must be kept alerting nearby help (e.g., alerting relative/friend/neighbor in secure. Various content, including user information, must be the survivor’s current city/location). In general, various actors restricted to certain users. in this system (IPV survivors, care-givers, clinicians, doctors, To prevent Information from leaving LEAF requires secure nurses, social workers and lawyers) may need different types servers, error free programming, and non-disclosure of data. of privacy protection based on their needs. For instance, Server security includes both physically securing access to the while some communications require only source anonymity hardware and using various security tools to prevent remote to be protected, some others might require both source and access to server content. Non-disclosure of data is a matter of destination anonymity. Similarly, some communications may policy. Terms of use for all users should include requiring con- require only the participants to be private. Accordingly, the fidentiality of other user information. It also means that a pol- privacy requirements can be classified as follows: icy concerning usage of data outside the system (i.e. individual • Protecting source privacy: Here, the message sender or aggregate data for research, including social network graph requires her identity to be protected such that it is released structures) must be defined and clearly explained to users. either through anonymization or is kept private all the Integrity and availability are addressed internally through the time. For instance, while the sender may allow any use of access controls and usage limitations. Access controls friends or friends of friends read her messages, she might permit the different types of users to use relevant parts of require that her identity is kept anonymous and cannot the system while prohibiting access to all other areas. Social be inferred. A key challenge here is to ensure that the Network The LEAF social network is a central part of the message gets sufficiently anonymized and propagates on LEAF system and its implementation requires user controls, the social network with minimal information disclosure. interaction functionality, content controls, and security. One of Also, it is critical that the messages are forwarded to the the key distinguishing features of the LEAF social network is right set of potential participants for the discussion. E.g., its ability to communicate in a trusted as well as anonymous

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    9 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us