Abstract
The significant change in our social lives and communication habits caused by the rise of Social Network Sites (SNSs) has not only brought along benefits but is also accompanied by privacy threats. In this paper we present our research efforts on SNS privacy and social identity management. First, we outline the results of an empirical study showing significant discrepancies between Facebook users’ actual privacy settings and their perception as well as their preferences. Based on this evident need for improving privacy, we present a novel conceptualization of privacy that serves as the basis for tackling the challenges. Finally, the paper provides an overview of solutions we developed as part of our research efforts on privacy in SNSs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
The default settings used in the study were those of December 2011 and may have changed since then.
References
Beato, F., Kohlweiss, M., Wouters, K.: Scramble! your social network data. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 211–225. Springer, Heidelberg (2011)
Bortoli, S., Palpanas, T., Bouquet, P.: Decentralised social network management. Int. J. Web Based Communities 7(3), 276–297 (2011)
Buchegger, S., Schiöberg, D., Vu, L.H., Datta, A.: PeerSoN: P2P social networking - early experiences and insights. In: Proceedings of the 2nd ACM Workshop on Social Network Systems (SocialNets), pp. 46–52 (2009)
Cetto, A., Netter, M., Pernul, G., Richthammer, C., Riesner, M., Roth, C., Sänger, J.: Friend inspector: a serious game to enhance privacy awareness in social networks. In: Proceedings of the 2nd International Workshop on Intelligent Games for Empowerment and Inclusion (IDGEI) (2014)
Chen, C.H., Härdle, W.K., Unwin, A.: Handbook of Data Visualization. Springer, Heidelberg (2008)
Colantonio, A., Di Pietro, R., Ocello, A., Verde, N.V.: Visual role mining: a picture is worth a thousand roles. IEEE Trans. Knowl. Data Eng. 24(6), 1120–1133 (2012)
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3), 224–274 (2001)
Grimmelmann, J.: Saving Facebook. Iowa Law Rev. 94(8), 1137–1206 (2009)
Kelley, P.G., Brewer, R., Mayer, Y., Cranor, L.F., Sadeh, N.: An investigation into Facebook friend grouping. In: Campos, P., Graham, N., Jorge, J., Nunes, N., Palanque, P., Winckler, M. (eds.) INTERACT 2011, Part III. LNCS, vol. 6948, pp. 216–233. Springer, Heidelberg (2011)
Kiili, K.: Digital game-based learning: towards an experiential gaming model. Internet High. Educ. 8(1), 13–24 (2005)
Netter, M.: Privacy-preserving Infrastructure for Social Identity Management. Ph.D. thesis, University of Regensburg (2013)
Netter, M., Hassan, S., Pernul, G.: An autonomous social web privacy infrastructure with context-aware access control. In: Fischer-Hübner, S., Katsikas, S., Quirchmayr, G. (eds.) TrustBus 2012. LNCS, vol. 7449, pp. 65–78. Springer, Heidelberg (2012)
Netter, M., Riesner, M., Pernul, G.: Assisted social identity management - enhancing privacy in the social web. In: Proceedings of the 10th International Conference on Wirtschaftsinformatik (WI) (2011)
Netter, M., Riesner, M., Weber, M., Pernul, G.: Privacy settings in online social networks - preferences, perception, and reality. In: Proceedings of the 46th Hawaii International Conference on System Sciences (HICSS), pp. 3219–3228 (2013)
Netter, M., Weber, M., Diener, M., Pernul, G.: Visualizing social roles - design and evaluation of a bird’s-eye view of social network privacy settings. In: Proceedings of the 22nd European Conference on Information Systems (ECIS), pp. 1–16 (2014)
Peterson, C.: Losing face: an environmental analysis of privacy on Facebook. SSRN eLibrary (2010)
Reeder, R.W., Bauer, L., Cranor, L.F., Reiter, M.K., Bacon, K., How, K., Strong, H.: Expandable grids for visualizing and authoring computer security policies. In: Proceedings of the 26th SIGCHI Conference on Human Factors in Computing Systems (CHI), pp. 1473–1482 (2008)
Richthammer, C., Netter, M., Riesner, M., Pernul, G.: Taxonomy for social network data types from the viewpoint of privacy and user control. In: Proceedings of the 8th International Conference on Availability, Reliability and Security (ARES 2013). IEEE (2013, accepted)
Richthammer, C., Netter, M., Riesner, M., Sänger, J., Pernul, G.: Taxonomy of social network data types. EURASIP J. Inf. Sec. 2014(11), 1–17 (2014)
Riesner, M.: Provider-Independent Social Identity Management for Personal and Professional Applications. Ph.D. thesis, University of Regensburg (2013)
Riesner, M., Netter, M., Pernul, G.: An analysis of implemented and desirable settings for identity management on social networking sites. In: Proceedings of the 7th International Conference on Availability, Reliability and Security (ARES), pp. 103–112 (2012)
Riesner, M., Netter, M., Pernul, G.: Analyzing settings for social identity management on social networking sites: classification, current state, and proposed developments. Inf. Sec. Tech. Rep. 17(4), 185–198 (2013)
Riesner, M., Pernul, G.: Maintaining a consistent representation of self across multiple social networking sites - a data-centric perspective. In: Proceedings of the Workshop on Security and Privacy in Social Networks (SPSN), pp. 860–867. IEEE (2012)
Riesner, M., Pernul, G.: Provider-independent online social identity management - enhancing privacy consistently across multiple social networking sites. In: Proceedings of the 45th Hawaii International Conference on System Sciences (HICSS), pp. 800–809 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Netter, M., Pernul, G., Richthammer, C., Riesner, M. (2015). Privacy in Social Networks: Existing Challenges and Proposals for Solutions. In: Camp, O., Weippl, E., Bidan, C., Aïmeur, E. (eds) Information Systems Security and Privacy. ICISSP 2015. Communications in Computer and Information Science, vol 576. Springer, Cham. https://doi.org/10.1007/978-3-319-27668-7_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-27668-7_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27667-0
Online ISBN: 978-3-319-27668-7
eBook Packages: Computer ScienceComputer Science (R0)