vacy, or quit from OSNs platforms. Both actions are
contradicting with the main of OSNs because OSNs
main purpose is to bring people into OSNs ans sup-
port them to be friend with others. By considering
the above issues, we propose a framework which uses
a punishment and rewarding system in order to en-
courage users to consider other users’ opinions in a
data sharing process. We implemented our proposed
framework with a Web 2.0 application, named Trusty
social network. We then analysed the implemented
work with users evaluations. The result has shown
that users want to give their opinions when the con-
tent is being shared not after it is shared. The result
has also shown that using punishment and rewarding
system give users satisfaction on data sharing process.
REFERENCES
Ahmed, F. and Abulaish, M. (2013). A generic statistical
approach for spam detection in online social networks.
Computer Communications, 36(10-11):1120–1129.
Akkuzu, G., Aziz, B., and Adda, M. (2019a). Advantages of
having users’ trust and reputation values on data shar-
ing process in online social networks. In 2019 Sixth
International Conference on Social Networks Analy-
sis, Management and Security (SNAMS), pages 189–
195. IEEE.
Akkuzu, G., Aziz, B., and Adda, M. (2019b). Application
of extended iowa operator for making group decision
on co-owned contents in osns. In 10th IEEE Interna-
tional Conference on Intelligent Systems. Institute of
Electrical Engineers.
Akkuzu, G., Aziz, B., and Adda, M. (2019c). Fuzzy
logic decision based collaborative privacy manage-
ment framework for online social networks. In 3rd
International Workshop on FORmal Methods for Se-
curity Engineering: ForSE.
Au, M. Y. (2019). Removing sensitive parts of an image.
Constantinides, E. and Fountain, S. J. (2008). Web 2.0:
Conceptual foundations and marketing issues. Jour-
nal of direct, data and digital marketing practice,
9(3):231–244.
Cooke, M. and Buckley, N. (2008). Web 2.0, social net-
works and the future of market research. International
Journal of Market Research, 50(2):267–292.
Gonz
´
alez-Manzano, L., Gonz
´
alez-Tablas, A. I., de Fuentes,
J. M., and Ribagorda, A. (2014). Cooped: Co-owned
personal data management. Computers & Security,
47:41–65.
Grabner-Kr
¨
auter, S. (2009). Web 2.0 social networks: the
role of trust. Journal of business ethics, 90(4):505–
522.
Harris, A. L. and Rea, A. (2019). Web 2.0 and virtual world
technologies: A growing impact on is education. Jour-
nal of Information Systems Education, 20(2):3.
Heidemann, J., Klier, M., and Probst, F. (2012). Online
social networks: A survey of a global phenomenon.
Computer networks, 56(18):3866–3878.
Keijzer, M. A., M
¨
as, M., and Flache, A. (2018). Communi-
cation in online social networks fosters cultural isola-
tion. Complexity, 2018.
Krasnova, H., Spiekermann, S., Koroleva, K., and Hilde-
brand, T. (2010). Online social networks: Why we dis-
close. Journal of information technology, 25(2):109–
125.
Mata, F. J. and Quesada, A. (2014). Web 2.0, social net-
works and e-commerce as marketing tools. Journal of
theoretical and applied electronic commerce research,
9(1):56–69.
Rathore, S., Sharma, P. K., Loia, V., Jeong, Y.-S., and Park,
J. H. (2017). Social network security: Issues, chal-
lenges, threats, and solutions. Information sciences,
421:43–69.
Squicciarini, A. C., Shehab, M., and Wede, J. (2010). Pri-
vacy policies for shared content in social network
sites. The VLDB Journal, 19(6):777–796.
Xu, L., Jiang, C., He, N., Han, Z., and Benslimane, A.
(2018). Trust-based collaborative privacy manage-
ment in online social networks. IEEE Transactions
on Information Forensics and Security, 14(1):48–60.
Yu, L., Motipalli, S. M., Lee, D., Liu, P., Xu, H., Liu, Q.,
Tan, J., and Luo, B. (2018). My friend leaks my pri-
vacy: Modeling and analyzing privacy in social net-
works. In Proceedings of the 23nd ACM on Sym-
posium on Access Control Models and Technologies,
pages 93–104.
Towards Secure Data Sharing Processes in Online Social Networks: Trusty
425