Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Capturing Social Networking Privacy Preferences:

Can Default Policies Help Alleviate Tradeoffs between Expressiveness and User Burden?

  • Conference paper
Privacy Enhancing Technologies (PETS 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5672))

Included in the following conference series:

Abstract

Social networking sites such as Facebook and MySpace thrive on the exchange of personal content such as pictures and activities. These sites are discovering that people’s privacy preferences are very rich and diverse. In theory, providing users with more expressive settings to specify their privacy policies would not only enable them to better articulate their preferences, but could also lead to greater user burden. In this article, we evaluate to what extent providing users with default policies can help alleviate some of this burden. Our research is conducted in the context of location-sharing applications, where users are expected to specify conditions under which they are willing to let others see their locations. We define canonical policies that attempt to abstract away user-specific elements such as a user’s default schedule, or canonical places, such as “work” and “home.” We learn a set of default policies from this data using decision-tree and clustering algorithms. We examine trade-offs between the complexity / understandability of default policies made available to users, and the accuracy with which they capture the ground truth preferences of our user population. Specifically, we present results obtained using data collected from 30 users of location-enabled phones over a period of one week. They suggest that providing users with a small number of canonical default policies to choose from can help reduce user burden when it comes to customizing the rich privacy settings they seem to require.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Duine project, http://www.telin.nl/project/Home.cfm?id=387&language=en

  2. Loopt, http://www.loopt.com

  3. Mobikade, http://www.mkade.com

  4. Mobimii, http://www.mobimii.com

  5. Wikimapia, http://www.wikimapia.com

  6. Barkhuus, L., Dey, A.K.: Location-based services for mobile telephony: a study of users’ privacy concerns. In: Rauterberg, M., Menozzi, M., Wesson, J. (eds.) INTERACT. IOS Press, Amsterdam (2003)

    Google Scholar 

  7. Benisch, M., Kelley, P.G., Sadeh, N., Sandholm, T., Cranor, L.F., Drielsma, P.H., Tsai, J.: The impact of expressiveness on the effectiveness of privacy mechanisms for location sharing. Technical Report CMU-ISR-08-141, Carnegie Mellon University (2008)

    Google Scholar 

  8. Breese, J.S., Heckerman, D., Kadie, C.: In: Empirical Analysis of Predictive Algorithms for Collaborative Filtering (1998)

    Google Scholar 

  9. Consolvo, S., Smith, I.E., Matthews, T., LaMarca, A., Tabert, J., Powledge, P.: Location disclosure to social relations: why, when, & what people want to share. In: CHI 2005: Proceedings of the SIGCHI conference on Human factors in computing systems, pp. 81–90. ACM, New York (2005)

    Chapter  Google Scholar 

  10. Faltings, B., Pu, P., Torrens, M., Viappiani, P.: Designing example-critiquing interaction. In: Vanderdonckt, J., Nunes, N.J., Rich, C. (eds.) Intelligent User Interfaces, pp. 22–29. ACM, New York (2004)

    Google Scholar 

  11. Herlocker, J.L., Konstan, J.A., Borchers, A., Riedl, J.: An algorithmic framework for performing collaborative filtering. In: SIGIR 1999: Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval, pp. 230–237. ACM, New York (1999)

    Chapter  Google Scholar 

  12. Hofmann, T.: Latent semantic models for collaborative filtering. ACM Trans. Inf. Syst. 22(1), 89–115 (2004)

    Article  Google Scholar 

  13. Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: MobiSys 2004: Proceedings of the 2nd international conference on Mobile systems, applications, and services, pp. 177–189. ACM, New York (2004)

    Chapter  Google Scholar 

  14. Kaasinen, E.: User needs for location-aware mobile services. Personal Ubiquitous Comput 7(1), 70–79 (2003)

    Article  Google Scholar 

  15. Kawsar, F., Nakajima, T.: Persona: a portable tool for augmenting proactive applications with multimodal personalization support. In: MUM 2007: Proceedings of the 6th international conference on Mobile and ubiquitous multimedia, pp. 160–168. ACM, New York (2007)

    Chapter  Google Scholar 

  16. Kelley, P.G., Drielsma, P.H., Sadeh, N.M., Cranor, L.F.: User-controllable learning of security and privacy policies. In: Balfanz, D., Staddon, J. (eds.) AISec, pp. 11–18. ACM, New York (2008)

    Chapter  Google Scholar 

  17. Ashraf, K., Kay, C.: Context-aware telephony: privacy preferences and sharing patterns. In: CSCW 2006: Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work, pp. 469–478. ACM, New York (2006)

    Google Scholar 

  18. Scott, L., Jennifer, M., Dey, A.K.: Who wants to know what when? privacy preference determinants in ubiquitous computing. In: CHI 2003: CHI 2003 extended abstracts on Human factors in computing systems, pp. 724–725. ACM, New York (2003)

    Google Scholar 

  19. Quinlan, R.J.: C4.5: Programs for Machine Learning. Morgan Kaufmann Series in Machine Learning. Morgan Kaufmann, San Francisco (1993)

    Google Scholar 

  20. Resnick, P., Iacovou, N., Suchak, M., Bergstrom, P., Riedl, J.: Grouplens: An open architecture for collaborative filtering of netnews. In: Proceedings of the ACM 1994 Conference on Computer Supported Cooperative Work, pp. 175–186. ACM Press, New York (1994)

    Chapter  Google Scholar 

  21. Sadeh, N., Gandon, F., Kwon, O.B.: Ambient intelligence: The mycampus experience. Technical Report CMU-ISRI-05-123, Carnegie Mellon University (2005)

    Google Scholar 

  22. Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M., Rao, J.: Understanding and capturing peoples privacy policies in a mobile social networking application. Personal and Ubiquitous Computing

    Google Scholar 

  23. Salakhutdinov, R., Mnih, A., Hinton, G.: Restricted boltzmann machines for collaborative filtering. In: ICML 2007: Proceedings of the 24th international conference on Machine learning, pp. 791–798. ACM, New York (2007)

    Chapter  Google Scholar 

  24. Sarwar, B., Karypis, G., Konstan, J., Riedl, J.: Item-based collaborative filtering recommendation algorithms (2001)

    Google Scholar 

  25. Want, R., Hopper, A., Falcao, V., Gibbons, J.: The active badge location system. ACM Trans. Inf. Syst. 10(1), 91–102 (1992)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ravichandran, R., Benisch, M., Kelley, P.G., Sadeh, N.M. (2009). Capturing Social Networking Privacy Preferences:. In: Goldberg, I., Atallah, M.J. (eds) Privacy Enhancing Technologies. PETS 2009. Lecture Notes in Computer Science, vol 5672. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03168-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03168-7_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03167-0

  • Online ISBN: 978-3-642-03168-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics