Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1654988.1654992acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy

Published: 09 November 2009 Publication History

Abstract

Social networking services well know that some users are unwilling to freely share the information they store with the service (e.g. profile information). To address this, ser vices typically provide various privacy "knobs" that the user may adjust to limit access by content type or user identity. However, the main purpose of social networks, community building, is largely at odds with this, hence it is unsurprising that privacy breaches in social networks are increasingly discovered. We argue that this tension between social networking goals and privacy suggests that research efforts should be focused more on efficient methods for detecting privacy breaches in social networks and on building user awareness of privacy risks and the trade-off between privacy and utility. We support our argument with a simple method for discovering LinkedIn contacts ostensibly hidden by privacy settings. This method appears discoverable with a straightforward analysis of the LinkedIn system and its features (indeed, LinkedIn is likely aware of this method), however Linkedin's privacy instructions suggest to users that implementing a privacy setting will prevent such discovery.

References

[1]
L. Backstrom, C. Dwork and J. Kleinberg. Wherefore art thou r3579x? Anonymized social networks, hidden patterns and structural steganogrpahy. WWW 2007.
[2]
J. Becker and H. Chen. Measuring privacy risk in online social networks. Web 2.0 Security & Privacy 2009.
[3]
J. He, W. Chu and Z. Liu. Inferring Privacy Information From Social Networks. IEEE International Conference on Intelligence and Security Informatics, 2006.
[4]
D. Crandall, D. Cosley, D. Huttenlocher, J. Kleinberg and S. Suri. Feedback effects between similarity and social influence in online communities. KDD 2008.
[5]
J. Douceur. The Sybil attack. First International Workshop on Peer-to-Peer Systems, 2002.
[6]
C. Dwork. Differential privacy: A survey of results. Theory and Applications of Models of Computation., April, 2008.
[7]
C. Dwork, A. Goldberg, and M. Naor. On memory-bound functions for fighting spam. In Advances in Cryptology - CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 426-444. Springer, 2003.
[8]
A. Felt and D. Evans. Privacy protection for social networking platforms. Web 2.0 Security & Privacy 2008.
[9]
L. Freeman. The Development of Social Network Analysis. Vancouver: Empirical Press, 2006.
[10]
R. Gross and A. Acquisti. Information revelation and privacy in online social networks (the Facebook case). WPES 2005.
[11]
L. Izquierdo and R. Hanneman. Introduction to the formal analysis of social networks using Mathematica.
[12]
T. Jagatic, N. Johnson, M. Jakobsson and F. Menczer. Social Phishing. Communications of the ACM, October, 2007.
[13]
G. Lebanon, M. Scannapieco, M. Fouad and E. Bertino. Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk. Privacy in Statistical Databases 2006.
[14]
http://www.facebook.com.
[15]
LinkedIn. http://www.linkedin.com
[16]
http://www.linkedin.com/static?key=pop/pop more browse connections.
[17]
http://www.linkedin.com/search
[18]
Amazon's Mechanical Turk. https://www.mturk.com/mturk/welcome
[19]
M. Prabaker, J. Rao, I. Fette, P. Kelley, L. Cranor, J. Hong and N. Sadeh. Understanding and capturing people's privacy policies in a people finder application. 2007 Ubicomp Workshop on Privacy.
[20]
R. Reeder, P. Kelley, A, McDonald and L. Cranor. A user study of the expandable grid applied to P3P privacy policy visualization. WPES 2008.
[21]
J. Scott. Social Network Analysis: A Handbook. Sage Publications, 2000.
[22]
Socrata blog entry, October 10, 2008. Do you hide your LinkedIn connections? http://blog.socrata.com/2007/10/10/do-you-hide-your-linked-in-connections/
[23]
S. Webb, J. Caverlee and C. Pu. Social Honeypots: Making friends with a spammer near you. CEAS 2007.
[24]
J. Widman. Go phish! How to guard your privacy on Facebook. PCWorld, May 1, 2009.
[25]
E. Zheleva and L. Getoor. To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles. WWW 2009

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
AISec '09: Proceedings of the 2nd ACM workshop on Security and artificial intelligence
November 2009
72 pages
ISBN:9781605587813
DOI:10.1145/1654988
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 November 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. data mining
  2. linkedin
  3. policy
  4. privacy
  5. social network

Qualifiers

  • Research-article

Conference

CCS '09
Sponsor:

Acceptance Rates

Overall Acceptance Rate 94 of 231 submissions, 41%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)18
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2016)Nudging Pakistani users towards privacy on social networks2016 SAI Computing Conference (SAI)10.1109/SAI.2016.7556122(1147-1154)Online publication date: Jul-2016
  • (2013)Unveiling Privacy Setting Breaches in Online Social NetworksSecurity and Privacy in Communication Networks10.1007/978-3-319-04283-1_20(323-341)Online publication date: 2013
  • (2012)Stalking onlineProceedings of the second ACM conference on Data and Application Security and Privacy10.1145/2133601.2133607(37-48)Online publication date: 7-Feb-2012
  • (2011)A secret sharing based privacy enforcement mechanism for untrusted social networking operatorsProceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence10.1145/2072521.2072525(13-18)Online publication date: 29-Nov-2011
  • (2010)Social networking applications in health careProceedings of the 2010 ICSE Workshop on Software Engineering in Health Care10.1145/1809085.1809091(39-49)Online publication date: 3-May-2010
  • (2010)Social networks for health care: Addressing regulatory gaps with privacy-by-design2010 Eighth International Conference on Privacy, Security and Trust10.1109/PST.2010.5593252(134-143)Online publication date: Aug-2010

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media