Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/978-3-319-06811-4_16guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Privacy Implications of Privacy Settings and Tagging in Facebook

Published: 30 August 2013 Publication History

Abstract

Social networks are becoming increasingly popular nowadays. Users share personal information about themselves and other users in order to build and maintain their social network. However, the large amount of personal information available on social networks poses risks of data misuse. Although social networks offer users the possibility to specify privacy settings to regulate access to their information, these settings are often complicated and unintuitive, especially when dealing with new modalities of social communication like tagging. In this paper we investigate the privacy consequences of information sharing in social networks. In particular, we formally analyze the impact of the privacy settings and the use of tagging in Facebook on the visibility of information. To increase users' awareness of the risks of information sharing and empower users to control their information, we present a tool for determining the visibility of users' information based on their privacy settings and tagging.

References

[1]
Apt, K.R.: Introduction to logic programming. In: van Leeuwen, J. ed. The Handbook of Theoretical Computer Science, pp. 495---574. North Holland, Amsterdam 1990
[2]
Atwan, G., Lushing, E.: The Facebook Book. Abrams Image, New York 2008
[3]
Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. SIGCOMM Comp. Commun. Rev. 394, 135---146 2009
[4]
Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings of WWW, pp. 551---560. ACM 2009
[5]
Clarke, E.H.: Multipart pricing of public goods. Public Choice 11, 17---33 1971
[6]
Cutillo, L.A., Molva, R., Önen, M.: Safebook: a privacy preserving online social network leveraging on real-life trust. IEEE Commun. Mag. 47, 94---101 2009
[7]
Faliagka, E., Tsakalidis, A., Vaikousi, D.: Teenagers' use of social network websites and privacy concerns: a survey. In: Proceedings of PCI, pp. 207---211. IEEE 2011
[8]
Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of Workshop on Privacy in the Electronic Society, pp. 71---80. ACM 2005
[9]
Guarda, P., Zannone, N.: Towards the development of privacy-aware systems. Inf. Softw. Technol. 512, 337---350 2009
[10]
Gürses, S.F., Rizk, R., Gunther, O.: Privacy design in online social networks: learning from privacy breaches and community feedback. In: Proceedings of International Conference on Information Systems, Association for Information Systems, pp. 90 2008
[11]
Haron, H., Yusof, F.: Cyber stalking: the social impact of social networking technology. In: Proceedings of International Conference on Education and Management Technology, pp. 237---241. IEEE 2010
[12]
Johnson, C.Y.: Project 'Gaydar' At MIT, an experiment identifies which students are gay, raising new questions about online privacy. Boston Globe 2009
[13]
Larcom, G., Elbirt, A.: Gone phishing. IEEE Technol. Soc. Mag. 253, 52---55 2006
[14]
Li, Q., Li, J., Wang, H., Ginjala, A.: Semantics-enhanced privacy recommendation for social networking sites. In: Proceedings of TrustCom, pp. 226---233. IEEE 2011
[15]
Luo, W., Xie, Q., Hengartner, U.: FaceCloak: an architecture for user privacy on social networking sites. In: Proceedings of CSE, pp. 26---33. IEEE 2009
[16]
Mack, E.: Facebook's 'Like' button illegal in German state. CNET news 2011
[17]
Marlow, C., Naaman, M., Boyd, D., Davis, M.: HT06, tagging paper, taxonomy, Flickr, academic article, to read. In: Proceedings of the Seventeenth Conference on Hypertext and Hypermedia, pp. 31---40. ACM 2006
[18]
Maximilien, E.M., Grandison, T., Liu, K., Sun, T., Richardson, D., Guo, S.: Enabling privacy as a fundamental construct for social networks. In: Proceedings of International Conference on Computational Science and Engineering, pp. 1015---1020. IEEE 2009
[19]
Nagle, F., Singh, L.: Can friends be trusted? exploring privacy in online social networks. In: Proceedings of International Conference on Advances in Social Network Analysis and Mining, pp. 312---315. IEEE 2009
[20]
Qing-jiang, K., Xiao-hao, W., Jun, Z.: The P, $$\alpha $$, K anonymity model for privacy protection of personal information in the social networks. In: Proceedings of International Conference on Information Technology and Artificial Intelligence, pp. 420---423. IEEE 2011
[21]
Shen, H., Dewan, P.: Access control for collaborative environments. In: Proceedings of Conference on Computer-Supported Cooperative Work, pp. 51---58. ACM 1992
[22]
Spiekermann, S., Cranor, L.: Engineering privacy. TSE 351, 67---82 2009
[23]
Squicciarini, A.C., Shehab, M., Wede, J.: Privacy policies for shared content in social network sites. VLDB J. 196, 777---796 2010
[24]
Stone, Z., Zickler, T., Darrell, T.: Autotagging facebook: social network context improves photo annotation. In: Proceedings of Computer Vision and Pattern Recognition Workshops, pp. 1---8. IEEE 2008
[25]
Thomas, K., Grier, C., Nicol, D.M.: unFriendly: multi-party privacy risks in social networks. In: Atallah, M.J., Hopper, N.J. eds. PETS 2010. LNCS, vol. 6205, pp. 236---252. Springer, Heidelberg 2010
[26]
Thomas, R.K.: TeaM-based access control TMAC: a primitive for applying role-based access controls in collaborative environments. In: Proceedings of Workshop on Role-Based Access Control, pp. 13---19. ACM 1997
[27]
Thompson, H.H.: How I Stole Someone's Identity Anatomy of a Social hack. Scientific American 2010
[28]
Tolone, W., Ahn, G.J., Pai, T., Hong, S.P.: Access control in collaborative systems. ACM Comput. Surv. 371, 29---41 2005
[29]
Tootoonchian, A., Saroiu, S., Wolman, A., Ganjali, Y.: Lockr: better privacy for social networks. In: Proceedings of International Conference on Emerging Networking EXperiments and Technologies, pp. 169---180. ACM 2009
[30]
Young, A.L., Quan-Haase, A.: Information revelation and internet privacy concerns on social network sites: a case study of facebook. In: Proceedings of International Conference on Communities and Technologies, pp. 265---274. ACM 2009
[31]
Yuksel, A.S., Yuksel, M.E., Zaim, A.H.: An approach for protecting privacy on social networks. In: Proceedings of International Conference on Systems and Networks Communications, pp. 154---159. IEEE 2010
[32]
Zheleva, E., Getoor, L.: To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In: Proceedings of WWW, pp. 531---540. ACM 2009

Cited By

View all
  • (2019)A Survey on Interdependent PrivacyACM Computing Surveys10.1145/336049852:6(1-40)Online publication date: 16-Oct-2019
  • (2018)Survey on Access Control for Community-Centered Collaborative SystemsACM Computing Surveys10.1145/314602551:1(1-38)Online publication date: 4-Jan-2018
  • (2018)Why do young people tag photos on social networking sites? Explaining user intentionsInternational Journal of Information Management: The Journal for Information Professionals10.1016/j.ijinfomgt.2017.07.00438:1(117-127)Online publication date: 1-Feb-2018

Index Terms

  1. Privacy Implications of Privacy Settings and Tagging in Facebook

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    10th VLDB Workshop on Secure Data Management - Volume 8425
    August 2013
    131 pages
    ISBN:9783319068107
    • Editors:
    • Willem Jonker,
    • Milan Petković

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 30 August 2013

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 10 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)A Survey on Interdependent PrivacyACM Computing Surveys10.1145/336049852:6(1-40)Online publication date: 16-Oct-2019
    • (2018)Survey on Access Control for Community-Centered Collaborative SystemsACM Computing Surveys10.1145/314602551:1(1-38)Online publication date: 4-Jan-2018
    • (2018)Why do young people tag photos on social networking sites? Explaining user intentionsInternational Journal of Information Management: The Journal for Information Professionals10.1016/j.ijinfomgt.2017.07.00438:1(117-127)Online publication date: 1-Feb-2018

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media