Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1753846.1754133acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
extended-abstract

Generating default privacy policies for online social networks

Published: 10 April 2010 Publication History

Abstract

Default privacy policies have a significant impact on the overall dynamics and success of online social networks, as users tend to keep their initial privacy policies. In this work-in-progress, we present a new method for suggesting privacy policies for new users by exploring knowledge of existing policies. The defaults generation process performs a collaborative analysis of the policies, finding personalized and representative suggestions. We show how the process can be extended to a wide range of domains, and present results based on 543 privacy policies obtained from a live location-based social network. Finally, we present a user interaction model that lets the user retain control over the default policies, allowing the user to make knowledgeable decisions regarding which default policy to take.

References

[1]
Bonneau, J., and Preibusch, S. The privacy jungle: On the market for data protection in social networks. In The Eighth Workshop on the Economics of Information Security (2009).
[2]
Gross, R., Acquisti, A., and Heinz, H. J. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society (2005).
[3]
Hill, W., Stead, L., Rosenstein, M., and Furnas, G. Recommending and evaluating choices in a virtual community of use. In CHI '95: Proceedings of the SIGCHI conference on Human factors in computing systems (1995), pp. 194--201.
[4]
Johnson, E. J., and Goldstein, D. G. Do defaults save lives? Science 302 (2003), 1338--1339.
[5]
Lewis, K., Kaufman, J., and Christakis, N. The taste for privacy: An analysis of college student privacy settings in an online social network. Computer-Mediated Communication 14, 1 (2008).
[6]
McKenzie, C. R., Liersch, M. J., and Finkelstein, S. R. Recommendations implicit in policy defaults. Psychological Science (2006).
[7]
Palen, L. Social, individual and technological issues for groupware calendar systems. In CHI '99: Proceedings of the SIGCHI conference on Human factors in computing systems (1999), pp. 17--24.
[8]
Ravichandran, R., Benisch, M., Kelley, P. G., and Sadeh, N. M. Capturing social networking privacy preferences: Can default policies help alleviate tradeos between expressiveness and user burden? In Privacy Enhancing Technologies (2009), pp. 1--18.
[9]
Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M., and Rao, J. Understanding and capturing people's privacy policies in a mobile social networking application. Personal and Ubiquitous Computing 13, 6 (August 2008), 401--412.

Cited By

View all
  • (2022)Privacy Concerns for Visual Assistance TechnologiesACM Transactions on Accessible Computing10.1145/351738415:2(1-43)Online publication date: 19-May-2022
  • (2019)A Systems Dynamics Simulation Study of Network Public Opinion Evolution MechanismJournal of Global Information Management10.4018/JGIM.201910011027:4(189-207)Online publication date: 1-Oct-2019
  • (2019)National Corporate Governance Codes and IT Governance Transparency in Annual ReportsJournal of Global Information Management10.4018/JGIM.201910010527:4(91-118)Online publication date: 1-Oct-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CHI EA '10: CHI '10 Extended Abstracts on Human Factors in Computing Systems
April 2010
2219 pages
ISBN:9781605589305
DOI:10.1145/1753846

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 April 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. default policies
  2. information sharing
  3. location sharing technology
  4. online social networks
  5. privacy

Qualifiers

  • Extended-abstract

Conference

CHI '10
Sponsor:

Acceptance Rates

CHI EA '10 Paper Acceptance Rate 350 of 1,346 submissions, 26%;
Overall Acceptance Rate 6,164 of 23,696 submissions, 26%

Upcoming Conference

CHI 2025
ACM CHI Conference on Human Factors in Computing Systems
April 26 - May 1, 2025
Yokohama , Japan

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Privacy Concerns for Visual Assistance TechnologiesACM Transactions on Accessible Computing10.1145/351738415:2(1-43)Online publication date: 19-May-2022
  • (2019)A Systems Dynamics Simulation Study of Network Public Opinion Evolution MechanismJournal of Global Information Management10.4018/JGIM.201910011027:4(189-207)Online publication date: 1-Oct-2019
  • (2019)National Corporate Governance Codes and IT Governance Transparency in Annual ReportsJournal of Global Information Management10.4018/JGIM.201910010527:4(91-118)Online publication date: 1-Oct-2019
  • (2019)An Empirical Study on Factors Affecting Switching Intention to Cloud Enterprise Resource PlanningJournal of Global Information Management10.4018/JGIM.201910010327:4(46-69)Online publication date: 1-Oct-2019
  • (2018)Role of Instructors' Forum Interactions With Students in Promoting MOOC ContinuanceJournal of Global Information Management10.4018/JGIM.201807010826:3(105-120)Online publication date: 1-Jul-2018
  • (2018)Community Based Feature Selection Method for Detection of Android MalwareJournal of Global Information Management10.4018/JGIM.201807010526:3(54-77)Online publication date: 1-Jul-2018
  • (2018)Optimized Routing for Efficient Data Dissemination in MANET to Meet the Fast-Changing TechnologyJournal of Global Information Management10.4018/JGIM.201807010326:3(25-36)Online publication date: 1-Jul-2018
  • (2018)An Ontological Analysis Framework for Domain-Specific Modeling LanguagesJournal of Database Management10.4018/JDM.201801010229:1(23-42)Online publication date: 1-Jan-2018
  • (2018)Beyond Micro-TasksJournal of Database Management10.4018/JDM.201801010129:1(1-22)Online publication date: 1-Jan-2018
  • (2018)Developing an Information Security Risk Taxonomy and an Assessment Model using Fuzzy Petri NetsJournal of Cases on Information Technology10.4018/JCIT.201807010420:3(48-69)Online publication date: 1-Jul-2018
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media