Browse Source

Feedback Isabel

Carsten Porth 5 years ago
parent
commit
3d3c04357b
1 changed files with 2 additions and 2 deletions
  1. 2 2
      thesis/content/01-introduction.tex

+ 2 - 2
thesis/content/01-introduction.tex

@@ -1,6 +1,6 @@
 \chapter{Introduction}
 \label{ch:introduction}
-The World Wide Web celebrated its 30th birthday in March 2019. From the beginning in 1989 up to now, the Internet has evolved and has changed the lives of many people forever. Thanks to digitalization, analog processes such as banking and shopping can now be handled conveniently online. Moreover, the ongoing technology improvements catalyze the digitalization and make it possible to be online almost anywhere. With today's smartphones, the functionality known only from computers a few years ago is always at hand. The Internet is also not stopping at the digitalization of social life. Social networks like MySpace and Facebook became popular at the beginning of the 2000s, enabling networking with other users and sharing personal content. Social networks are still very popular today. Facebook, the largest \acf{OSN}, has 2.3 billion active users per month, connecting almost a third of the world's population \cite{facebook2019reportq4}. With the use of such social platforms, the user makes himself a transparent for the service provider of the \ac{OSN}. Personal data is a valuable asset whose protection is of particular importance. By using the platform and sharing this information, the user puts trust in the service provider. Trust that his data will be handled responsibly, stored securely, and not made available to third parties. However, the past has taught us that this is not always the case. Several incidents became public proving the lack of protection and the misuse of personal data.
+The World Wide Web celebrated its 30th birthday in March 2019. From the beginning in 1989 up to now, the Internet has evolved and has changed the lives of many people forever. Thanks to digitalization, analog processes such as banking and shopping can now be handled conveniently online. Moreover, the ongoing technology improvements catalyze the digitalization and make it possible to be online almost anywhere. The Internet is also not stopping at the digitalization of social life. Social networks like MySpace and Facebook became popular at the beginning of the 2000s, enabling networking with other users and sharing personal content. Social networks are still very popular today. Facebook, the largest \acf{OSN}, has 2.3 billion active users per month, connecting almost a third of the world's population \cite{facebook2019reportq4}. With the use of such social platforms, the user makes himself a transparent for the service provider of the \ac{OSN}. Personal data is a valuable asset whose protection is of particular importance. By using the platform and sharing this information, the user puts trust in the service provider. Trust that his data will be handled responsibly, stored securely, and not made available to third parties. However, the past has taught us that this is not always the case. Several incidents became public proving the lack of protection and the misuse of personal data on \acp{OSN}.
 
 \section{Motivation}
 \label{sec:motivation}
@@ -8,7 +8,7 @@ Numerous scandals about data protection in \acp{OSN} have proven that user data
 
 However, although these circumstances are well known, users remain mostly loyal to their \ac{OSN}. As a result of the Cambridge Analytica incident, the number of daily Facebook users dropped only briefly in Europe but is in the meantime back on the previous level \cite{facebook2019reportq4}. Alternative \acp{OSN}, which focus on protecting their users' data, regularly fail to get a sufficiently large user base or establish a business model to ensure their operation. For example, the decentralized \ac{OSN} diaspora* has less than 700\,000 users after nine years and the \ac{OSN} OpenBook\footnote{https://www.openbook.social/en/home} needed a second Kickstarter crowdfunding\footnote{https://www.kickstarter.com/projects/1520156881/openbook-privacy-friendly-fun-and-honest-social-ne} round after the first one failed \cite{openbookXXXXkickstarter}.
 
-The binding to the respective \ac{OSN} is so strong that switching to another, more secure \ac{OSN} does not seem to be an option. To better protect users' data on existing platforms, other ways need to be examined. The Doctoral College \enquote{Privacy and Trust for Mobile Users} works on \enquote{Privacy and Trust in Social Networks (Research Area B)}. Especially the subarea B.2 \enquote{Privacy Protection via Hybrid Social Networks} is about hybrid solutions which propose to add privacy-preserving approaches to established \acp{OSN}. The secure data exchange should be carried out via a \ac{P2P} overlay network. Since data plays a prominent role in the business model of \acp{OSN}, it is necessary to provide anonymized data from the private network to keep the model running. As part of these researches, this work is motivated to provide a detailed concept for a hybrid solution to protect the user's data and verify the idea with a prototype. \cite{rtgXXXXarea-b,rtgXXXXarea-b2}
+The binding to the respective \ac{OSN} is so strong that switching to another, more secure \ac{OSN} does not seem to be an option. To improve the protection of users' data on existing platforms, other ways need to be examined. The Doctoral College \enquote{Privacy and Trust for Mobile Users} works on \enquote{Privacy and Trust in Social Networks (Research Area B)} and researches on the topic of increased privacy protection. Especially the subarea B.2 \enquote{Privacy Protection via Hybrid Social Networks} is about hybrid solutions which propose to add privacy-preserving approaches to established \acp{OSN}. The secure data exchange should be carried out via a \acf{P2P} overlay network. Since data play a prominent role in the business model of \acp{OSN}, it is necessary to provide anonymized data from the private network to keep the model running. As part of these researches, this work is motivated to provide a detailed concept for a hybrid solution to protect the user's data and verify the idea with a prototype. \cite{rtgXXXXarea-b,rtgXXXXarea-b2}
 
 \section{Contribution}
 \label{sec:contribution}