Skip to main content
Erschienen in: Social Network Analysis and Mining 1/2018

01.12.2018 | Review Article

An investigation into the requirements of privacy in social networks and factors contributing to users’ concerns about violation of their privacy

verfasst von: Razieh Malekhosseini, Mehdi Hosseinzadeh, Keyvan Navi

Erschienen in: Social Network Analysis and Mining | Ausgabe 1/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Social networks are specific types of social media which consolidate the ability of omnipresent connection for users and devices to share user-centric data objects among interested users. Taking advantage of the characteristics of both mobile social networks (MSNs) and online social networks (OSNs), MSNs are capable of providing an efficient and effective mobile environment for users to access, distribute, and share data. OSNs provide capability of search, data sharing, and online social interactions for users through Internet sites. However, the lack of a protective infrastructure in these networks has turned them into convenient targets for various risks. This is the main purpose why social networks including MSNs and OSNs carry disparate and intricate safety concerns specially privacy-preserving challenges and what has been done to improve these challenges. In addition, what types of data should be protected and what are the different architectures provided for each of these networks? In this paper, we aim to provide a clear categorization on privacy challenges and a deep exploration over some recent solutions in MSNs and OSNs. In particular, in MSNs, proposed scheme to protect data types is categorized, and in OSNs, all types of proposed architectures, along with the proposed mechanisms for privacy, are classified. To conclude, several major open research issues are discussed, and future research directions are outlined.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Abbas F, Rajput U, Wan J, Eun H, Oh H (2016) Say Hello Again: Privacy Preserving Matchmaking Using Cloud in Encounter Based Mobile Social Networks. In: Proceeding in: 16th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing Abbas F, Rajput U, Wan J, Eun H, Oh H (2016) Say Hello Again: Privacy Preserving Matchmaking Using Cloud in Encounter Based Mobile Social Networks. In: Proceeding in: 16th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing
Zurück zum Zitat Acquisti A, Gross R (2006) Imagined communities: Awareness, information sharing, and privacy on the Facebook. In: 6th Workshop on Privacy Enhancing Technologies, pp 36–58 Acquisti A, Gross R (2006) Imagined communities: Awareness, information sharing, and privacy on the Facebook. In: 6th Workshop on Privacy Enhancing Technologies, pp 36–58
Zurück zum Zitat Afifty Y (2008) Access control in a peer-to-peer social network. Master Thesis, EPFL, Lausanne, Switzerland Afifty Y (2008) Access control in a peer-to-peer social network. Master Thesis, EPFL, Lausanne, Switzerland
Zurück zum Zitat Aiello ML, Ruffo G (2012) LotusNet:Tunable privacy for distributed online social network services. Elsevier J Comput Commun 35(1):75–88CrossRef Aiello ML, Ruffo G (2012) LotusNet:Tunable privacy for distributed online social network services. Elsevier J Comput Commun 35(1):75–88CrossRef
Zurück zum Zitat Ardagna CA, Jajodia S, Samarati P, Stavrou A (2013) Providing users’ anonymity in mobile hybrid networks. ACM Trans Internet Technol 12(3):1–33CrossRef Ardagna CA, Jajodia S, Samarati P, Stavrou A (2013) Providing users’ anonymity in mobile hybrid networks. ACM Trans Internet Technol 12(3):1–33CrossRef
Zurück zum Zitat Baden R, Bender A, Spring N, Bhattacharjee B, Starin D (2009) Persona: an online social network with user defined privacy, and scholarship. In: proceeding of ACM Conference on Special Interest Group On Data Communications (ACM SIGCOMM), pp 135–146 Baden R, Bender A, Spring N, Bhattacharjee B, Starin D (2009) Persona: an online social network with user defined privacy, and scholarship. In: proceeding of ACM Conference on Special Interest Group On Data Communications (ACM SIGCOMM), pp 135–146
Zurück zum Zitat Barnes J (1954) Class and Committees in a Norwegian Island Parish. Human Relations Barnes J (1954) Class and Committees in a Norwegian Island Parish. Human Relations
Zurück zum Zitat Beach A, Gartrell M, Han R (2009) Solutions to security and privacy issues in mobile social networking. In: Proc. Int. Conf. CSE, pp 1036–1042 Beach A, Gartrell M, Han R (2009) Solutions to security and privacy issues in mobile social networking. In: Proc. Int. Conf. CSE, pp 1036–1042
Zurück zum Zitat Besmer A, Lipford H (2009) Tagged photos: concerns, perceptions, and protections. In: Proceedings of CHI2009 extended abstract, pp 4585–4590 Besmer A, Lipford H (2009) Tagged photos: concerns, perceptions, and protections. In: Proceedings of CHI2009 extended abstract, pp 4585–4590
Zurück zum Zitat Blum M (1983) How to exchange (secret) keys. ACM Trans Comput Syst 1(2):175–193CrossRef Blum M (1983) How to exchange (secret) keys. ACM Trans Comput Syst 1(2):175–193CrossRef
Zurück zum Zitat Boyd D, Ellison N (2007) Social network sites: definition, history, and scholarship. J Comput Mediat Commun 13(1): 210–230CrossRef Boyd D, Ellison N (2007) Social network sites: definition, history, and scholarship. J Comput Mediat Commun 13(1): 210–230CrossRef
Zurück zum Zitat Boyd D, Hargittai E (2010) Facebook privacy settings: who cares? First Mond 15(8):479–500 Boyd D, Hargittai E (2010) Facebook privacy settings: who cares? First Mond 15(8):479–500
Zurück zum Zitat Buchegger S, Datta A (2009) A case for P2P infrastructure for social networks- opportunities & challengers. In: Proceeding of the 6th International Conference on Wireless On-Demand Network Systems and Services (WONS), pp 161–168 Buchegger S, Datta A (2009) A case for P2P infrastructure for social networks- opportunities & challengers. In: Proceeding of the 6th International Conference on Wireless On-Demand Network Systems and Services (WONS), pp 161–168
Zurück zum Zitat Buchegger S, Vu Lh, Datta A (2009) PeerSoN: P2P Social Networking Early Experiences and Insights. In: Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, pp 46–52 Buchegger S, Vu Lh, Datta A (2009) PeerSoN: P2P Social Networking Early Experiences and Insights. In: Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, pp 46–52
Zurück zum Zitat Challal Y (2005) Group key management protocols: a novel taxonomy. Int J Inf Theory 2(2):105–118MathSciNet Challal Y (2005) Group key management protocols: a novel taxonomy. Int J Inf Theory 2(2):105–118MathSciNet
Zurück zum Zitat Chang W, Wu J, Tan C (2011) Friendship-based location privacy in mobile social networks. Int J Secur Netw 6(4):226–236CrossRef Chang W, Wu J, Tan C (2011) Friendship-based location privacy in mobile social networks. Int J Secur Netw 6(4):226–236CrossRef
Zurück zum Zitat Chellappa RK, Sin R (2005) Personalization versus privacy: an empirical examination of the online consumer’s dilemma. Inf Technol Manag 6(2):181–202CrossRef Chellappa RK, Sin R (2005) Personalization versus privacy: an empirical examination of the online consumer’s dilemma. Inf Technol Manag 6(2):181–202CrossRef
Zurück zum Zitat Cheng W, Aritsugi M (2014) A user sensitive privacy-preserving location sharing system in mobile social networks. Proc Proc Comput Sci 35:1692–1701CrossRef Cheng W, Aritsugi M (2014) A user sensitive privacy-preserving location sharing system in mobile social networks. Proc Proc Comput Sci 35:1692–1701CrossRef
Zurück zum Zitat Chin A, Zhang D (eds) (2013) Mobile social networking an innovative approach. In: computational social sciences. Springer, New York, pp 112–113 Chin A, Zhang D (eds) (2013) Mobile social networking an innovative approach. In: computational social sciences. Springer, New York, pp 112–113
Zurück zum Zitat Culnan MJ, Armstrong PK (1999) Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organ Sci 10(1):104–115CrossRef Culnan MJ, Armstrong PK (1999) Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organ Sci 10(1):104–115CrossRef
Zurück zum Zitat Cutillo LA, Molva R, Strufe T (2009) Safebook: feasibility of transitive cooperation for privacy on a decentralized social network. In: Proc. IEEE Int. Symp. a World of Wireless, Mobile and Multimedia Networks and Workshops (WoWMoM), Kos, Greece, pp 94–101 Cutillo LA, Molva R, Strufe T (2009) Safebook: feasibility of transitive cooperation for privacy on a decentralized social network. In: Proc. IEEE Int. Symp. a World of Wireless, Mobile and Multimedia Networks and Workshops (WoWMoM), Kos, Greece, pp 94–101
Zurück zum Zitat De Cristofaro E, Soriente C, Tsudik G, Williams A (2012) Hummingbird: privacy at the time of twitter. In: proceeding of IEEE Symposium on Security and Privacy, pp 285–299 De Cristofaro E, Soriente C, Tsudik G, Williams A (2012) Hummingbird: privacy at the time of twitter. In: proceeding of IEEE Symposium on Security and Privacy, pp 285–299
Zurück zum Zitat De Capitani di vimercati S, Foresti S, Livraga G, Samarati P (2012) Data privacy: definitions and techniques. Int J Uncertain Fuzziness Knowl Based Syst 20(06): 793–817MATHCrossRef De Capitani di vimercati S, Foresti S, Livraga G, Samarati P (2012) Data privacy: definitions and techniques. Int J Uncertain Fuzziness Knowl Based Syst 20(06): 793–817MATHCrossRef
Zurück zum Zitat DefrawyKEl,SolisJ, Tsudik G,“Leveraging social contacts for message confidentiality in delay tolerant networks. In: Proc. IEEECOMPSAC, 2009, pp. 271–279 DefrawyKEl,SolisJ, Tsudik G,“Leveraging social contacts for message confidentiality in delay tolerant networks. In: Proc. IEEECOMPSAC, 2009, pp. 271–279
Zurück zum Zitat Dinev T, Hart P (2004) Privacy concerns and Internet use—a model of trade-off factors. In: Paper read at Working Paper, Department of Information Technology and Operations Management at Florida Atlantic University Dinev T, Hart P (2004) Privacy concerns and Internet use—a model of trade-off factors. In: Paper read at Working Paper, Department of Information Technology and Operations Management at Florida Atlantic University
Zurück zum Zitat Ding X, Zhang L, Wan Zh, Gu M (2010) A brief survey on deanonmyzation attacks in online social networks: proceeding of International Conference on Computational Aspects Of Social Networks (CASoN), China 611–615 Ding X, Zhang L, Wan Zh, Gu M (2010) A brief survey on deanonmyzation attacks in online social networks: proceeding of International Conference on Computational Aspects Of Social Networks (CASoN), China 611–615
Zurück zum Zitat Dóra L, Holczer T (2010) Hide-and-Lie: Enhancing application-level privacy in opportunistic networks. In: Proc. MobiOpp, pp 135–142 Dóra L, Holczer T (2010) Hide-and-Lie: Enhancing application-level privacy in opportunistic networks. In: Proc. MobiOpp, pp 135–142
Zurück zum Zitat Dramitinos M, Vannier R, Lassous IG 2009 A performance evaluation framework for fair solutions in ad hoc networks. In: Proc. ACM MSWiM, 2009, pp 46–53 Dramitinos M, Vannier R, Lassous IG 2009 A performance evaluation framework for fair solutions in ad hoc networks. In: Proc. ACM MSWiM, 2009, pp 46–53
Zurück zum Zitat Duckham M, Kulik L (2005) A formal model of obfuscation and negotiation for location privacy. In: Proc. Pervasive, pp 152–170 Duckham M, Kulik L (2005) A formal model of obfuscation and negotiation for location privacy. In: Proc. Pervasive, pp 152–170
Zurück zum Zitat Dwyer C, Hiltz SR, Passerini K (2007).Trust and privacy concern within social networking sites: a comparison of Facebook and MySpace. In: Paper read at the Thirteenth Americas Conference on Information Systems, at Keystone, Colorado Dwyer C, Hiltz SR, Passerini K (2007).Trust and privacy concern within social networking sites: a comparison of Facebook and MySpace. In: Paper read at the Thirteenth Americas Conference on Information Systems, at Keystone, Colorado
Zurück zum Zitat Ellison N, Steinfield C, Lampe C (2007) The benefits of facebook “Friends”: social capital and college students’ use of online social network sites. J Comput Mediat Commun 12(4):1143–1168CrossRef Ellison N, Steinfield C, Lampe C (2007) The benefits of facebook “Friends”: social capital and college students’ use of online social network sites. J Comput Mediat Commun 12(4):1143–1168CrossRef
Zurück zum Zitat Feng B, Deng RH, Wenbo M (1998) Efficient and practical fair exchange protocols with off-line TTP. In: Proc. IEEE Symp. Security Privacy, pp 77–85 Feng B, Deng RH, Wenbo M (1998) Efficient and practical fair exchange protocols with off-line TTP. In: Proc. IEEE Symp. Security Privacy, pp 77–85
Zurück zum Zitat Fogel J, Nehmad E (2009) Internet social network communities: Risk taking, trust, and privacy concerns. Comput Hum Behav 25(1):160–153CrossRef Fogel J, Nehmad E (2009) Internet social network communities: Risk taking, trust, and privacy concerns. Comput Hum Behav 25(1):160–153CrossRef
Zurück zum Zitat Gedik B, Ling L (2008) Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans Mobile Comput 7(1):1–18CrossRef Gedik B, Ling L (2008) Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans Mobile Comput 7(1):1–18CrossRef
Zurück zum Zitat Gilbert E, Karahalios K, Sandvig C (2008) The network in the garden: an empirical analysis of social media in rural life. In: Proceeding of CHI2008, pp 1603–1612 Gilbert E, Karahalios K, Sandvig C (2008) The network in the garden: an empirical analysis of social media in rural life. In: Proceeding of CHI2008, pp 1603–1612
Zurück zum Zitat Goldie KR (2010) Aliases, creeping, and wall cleaning: understanding privacy in the age of Facebook. First Mond 15(1):1–4 Goldie KR (2010) Aliases, creeping, and wall cleaning: understanding privacy in the age of Facebook. First Mond 15(1):1–4
Zurück zum Zitat Gongjun Y, Olariu S, Weigle MC (2009) Providing location security in vehicular ad hoc networks. IEEE Wireless Commun 16(6):48–55CrossRef Gongjun Y, Olariu S, Weigle MC (2009) Providing location security in vehicular ad hoc networks. IEEE Wireless Commun 16(6):48–55CrossRef
Zurück zum Zitat Graf K, Gross Ch, Stingl D, Hartung D, Kovacevic A, Steinmetz R (2011) Life Social. KOM: a Secure and P2P-based solution for online social networks. In: Proceeding of the IEEE Consumer Communications and Networking Conference (CCNC), pp 554–558 Graf K, Gross Ch, Stingl D, Hartung D, Kovacevic A, Steinmetz R (2011) Life Social. KOM: a Secure and P2P-based solution for online social networks. In: Proceeding of the IEEE Consumer Communications and Networking Conference (CCNC), pp 554–558
Zurück zum Zitat Gross R, Acquisti A (2005) Information revelation and privacy in online social networks. In: Paper read at the 2005 ACM Workshop on Privacy in the Electronic Society Gross R, Acquisti A (2005) Information revelation and privacy in online social networks. In: Paper read at the 2005 ACM Workshop on Privacy in the Electronic Society
Zurück zum Zitat Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. International Conference on Mobile Systems, Applications, and Services. 31–42 Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. International Conference on Mobile Systems, Applications, and Services. 31–42
Zurück zum Zitat Guha S, Tang K, Francis PP (2008) NOYB: privacy in online social networks. In: First Workshop on Online Social Networks (WOSP’08), pp 210–230 Guha S, Tang K, Francis PP (2008) NOYB: privacy in online social networks. In: First Workshop on Online Social Networks (WOSP’08), pp 210–230
Zurück zum Zitat Ho E, Lasch S, podolsky A, The Next Digital Divide: online Social Network Privacy. Center for study commercial Activities Research Report, 2008 Ho E, Lasch S, podolsky A, The Next Digital Divide: online Social Network Privacy. Center for study commercial Activities Research Report, 2008
Zurück zum Zitat Hui K-L, Teo HH, Lee S-YT (2007) The value of privacy assurance: an exploratory field experiment. Manag Inf Syst Q 31(1):19–33CrossRef Hui K-L, Teo HH, Lee S-YT (2007) The value of privacy assurance: an exploratory field experiment. Manag Inf Syst Q 31(1):19–33CrossRef
Zurück zum Zitat Jahid S, Mittal P, Borisov N (2011) EASiER: encryption-based access control in social networks with efficient revocation. In: Proceeding of the 6th ACM Symposium on Information, Computer and Communications Security, China, 411–415 Jahid S, Mittal P, Borisov N (2011) EASiER: encryption-based access control in social networks with efficient revocation. In: Proceeding of the 6th ACM Symposium on Information, Computer and Communications Security, China, 411–415
Zurück zum Zitat Jahid S, Nilizadeh Sh, Mittal P, Borisov N, Kapadia A (2012) DECENT: a decentralized architecture for enforcing privacy in online social networks. In: Proceeding of the 4th IEEE International Workshop on Security and Social Networking, (SESOC’12),326–332 Jahid S, Nilizadeh Sh, Mittal P, Borisov N, Kapadia A (2012) DECENT: a decentralized architecture for enforcing privacy in online social networks. In: Proceeding of the 4th IEEE International Workshop on Security and Social Networking, (SESOC’12),326–332
Zurück zum Zitat Joinson AN (2008)Looking at, looking up or keeping up with people?: motives and use of Facebook. In: Proceeding of CHI 2008, pp 1027–1036 Joinson AN (2008)Looking at, looking up or keeping up with people?: motives and use of Facebook. In: Proceeding of CHI 2008, pp 1027–1036
Zurück zum Zitat Kaufman J, Christakis N, Lewis K (2008) The taste for privacy: An analysis of college student privacy settings in an online social network. J Comput Mediat Commun 14(1):79–100CrossRef Kaufman J, Christakis N, Lewis K (2008) The taste for privacy: An analysis of college student privacy settings in an online social network. J Comput Mediat Commun 14(1):79–100CrossRef
Zurück zum Zitat Kayastha N, Niyato D, Wang P, Hossain E (2011) Applications, architectures, and protocol design issues for mobile social networks: a survey. In: Proc. IEEE, 99(12) 2130–2158 Kayastha N, Niyato D, Wang P, Hossain E (2011) Applications, architectures, and protocol design issues for mobile social networks: a survey. In: Proc. IEEE, 99(12) 2130–2158
Zurück zum Zitat Krishnamurithy B, Wills EC (2008) Characterectizing Privacy in Social Networks. In: Proceedings of the First Workshop on Online Social Networks, pp 37–42 Krishnamurithy B, Wills EC (2008) Characterectizing Privacy in Social Networks. In: Proceedings of the First Workshop on Online Social Networks, pp 37–42
Zurück zum Zitat Lampe C, Ellison NB, Steinfield C (2008) Changes in use and perception of Facebook. In: Proceedings of SCW2008, 721–730 Lampe C, Ellison NB, Steinfield C (2008) Changes in use and perception of Facebook. In: Proceedings of SCW2008, 721–730
Zurück zum Zitat Lehikoinen JT, Olsson T, Toivola H (2008). Privacy regulation in online social interaction. In: Paper read at ICT, Society and Human Beings 2008 Lehikoinen JT, Olsson T, Toivola H (2008). Privacy regulation in online social interaction. In: Paper read at ICT, Society and Human Beings 2008
Zurück zum Zitat Li M, Ning C, Shucheng Y, Wenjing L (2011) FindU: privacy-preserving personal profile matching in mobile social networks. In: Proc. IEEE INFOCOM, pp 2435–2443 Li M, Ning C, Shucheng Y, Wenjing L (2011) FindU: privacy-preserving personal profile matching in mobile social networks. In: Proc. IEEE INFOCOM, pp 2435–2443
Zurück zum Zitat Liang X, Li X, Luan TH, Lu R, Lin X, Shen X (2012) Morality-driven data forwarding with privacy preservation in mobile social networks. IEEE Trans Veh Technol 61(7):3209–3222CrossRef Liang X, Li X, Luan TH, Lu R, Lin X, Shen X (2012) Morality-driven data forwarding with privacy preservation in mobile social networks. IEEE Trans Veh Technol 61(7):3209–3222CrossRef
Zurück zum Zitat Lucas MM, Borisov N (2008) Flybynight: mitigating the privacy risks of social networking. In: WPES 2008: Proceedings of the 7th ACM workshop on Privacy in the electronic society, ACM, New York, pp 1–8 Lucas MM, Borisov N (2008) Flybynight: mitigating the privacy risks of social networking. In: WPES 2008: Proceedings of the 7th ACM workshop on Privacy in the electronic society, ACM, New York, pp 1–8
Zurück zum Zitat Luo B, Lee D (2009) On protecting private information in social networks: a proposal. In: Proceeding of IEEE International-Conference on Data Engineering, pp 1603–1606 Luo B, Lee D (2009) On protecting private information in social networks: a proposal. In: Proceeding of IEEE International-Conference on Data Engineering, pp 1603–1606
Zurück zum Zitat Luo W, Xie Q, Hengartner U (2009) FaceCloak: architecture for user privacy on social networking sites. In: Proceeding of IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09), Canada, pp 26–33 Luo W, Xie Q, Hengartner U (2009) FaceCloak: architecture for user privacy on social networking sites. In: Proceeding of IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09), Canada, pp 26–33
Zurück zum Zitat Madden M, Smith A (2009) Reputation management and social media. Technical report, Pew Internet & American Life Project Madden M, Smith A (2009) Reputation management and social media. Technical report, Pew Internet & American Life Project
Zurück zum Zitat Magkos E, Kotzanikolaou P, Sioutas S, Oikonomou K (2010) A distributed privacy-preserving scheme for location-based queries. In: Proc. IEEE WoWMoM 1–6 Magkos E, Kotzanikolaou P, Sioutas S, Oikonomou K (2010) A distributed privacy-preserving scheme for location-based queries. In: Proc. IEEE WoWMoM 1–6
Zurück zum Zitat Malhotra NK, Kim SS, Agarwal J (2004). Internet users’ information privacy concerns (IUIPC): the construct, thescale, and a causal model. Inf Syst Res 15(4): 336–355CrossRef Malhotra NK, Kim SS, Agarwal J (2004). Internet users’ information privacy concerns (IUIPC): the construct, thescale, and a causal model. Inf Syst Res 15(4): 336–355CrossRef
Zurück zum Zitat Mani M, Ngyuen AM, Crespi N (2009) What’s up: P2P spontaneous social networking. In: IEEE International Conference on Pervasive Computing and Communications (pp 1–2). Galveston: TX, USA Mani M, Ngyuen AM, Crespi N (2009) What’s up: P2P spontaneous social networking. In: IEEE International Conference on Pervasive Computing and Communications (pp 1–2). Galveston: TX, USA
Zurück zum Zitat Milne GR, Culnan MJ (2004) Strategies for reducing online privacy risks: why consumers read (or don’t read) online privacy notices. J Interact Mark 18(3):15–29CrossRef Milne GR, Culnan MJ (2004) Strategies for reducing online privacy risks: why consumers read (or don’t read) online privacy notices. J Interact Mark 18(3):15–29CrossRef
Zurück zum Zitat Mtibaa A, Harras KA, (2011) FOG: fairness in mobile opportunistic networking. In: Proc. IEEE SECON, 2011, pp 260–268 Mtibaa A, Harras KA, (2011) FOG: fairness in mobile opportunistic networking. In: Proc. IEEE SECON, 2011, pp 260–268
Zurück zum Zitat Narendula R (2010)The case of decentralized online social networks. School of Computer and Communication Sciences, EPFL, Switzerland. https://infoscience.epfl.ch/record/174927/files/report.pdf Narendula R (2010)The case of decentralized online social networks. School of Computer and Communication Sciences, EPFL, Switzerland. https://​infoscience.​epfl.​ch/​record/​174927/​files/​report.​pdf
Zurück zum Zitat Narendula R, Papaioannou TG, Aberer K (2010a) Privacyaware and highly-available OSN profiles. In: Proc. WETICE Narendula R, Papaioannou TG, Aberer K (2010a) Privacyaware and highly-available OSN profiles. In: Proc. WETICE
Zurück zum Zitat Narendula R, Papaioannou TG, Aberer K (2010b) Privacy-Aware and Highly-Available OSN Profiles. In: Proceedings of the 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, pp 211–216 Narendula R, Papaioannou TG, Aberer K (2010b) Privacy-Aware and Highly-Available OSN Profiles. In: Proceedings of the 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, pp 211–216
Zurück zum Zitat Narendula R, Papaioannou G, Aberer K (2011) My3: a highly-available P2P-based online social network. In: Proceeding of the IEEE International Conference on Peer-to-Peer Computing (IEEE P2P’11), (2011), pp. 166–167 Narendula R, Papaioannou G, Aberer K (2011) My3: a highly-available P2P-based online social network. In: Proceeding of the IEEE International Conference on Peer-to-Peer Computing (IEEE P2P’11), (2011), pp. 166–167
Zurück zum Zitat Nov O, Wattal S (2009) Social computing privacy concerns: antecedents and effects. In: Proceedings of CHI2009, pp 333–336 Nov O, Wattal S (2009) Social computing privacy concerns: antecedents and effects. In: Proceedings of CHI2009, pp 333–336
Zurück zum Zitat Paine C, Reips U-D, Stieger S, Joinson A, Buchanan T (2007) Internet users’ perceptions of ‘privacy concerns’ and ‘privacy actions’. Int J Hum Comput Stud 65:526–536CrossRef Paine C, Reips U-D, Stieger S, Joinson A, Buchanan T (2007) Internet users’ perceptions of ‘privacy concerns’ and ‘privacy actions’. Int J Hum Comput Stud 65:526–536CrossRef
Zurück zum Zitat Phelps J, Nowak G, Ferrell E (2000) Privacy concerns and consumer willingness to provide personal information. J Public Policy Mark 19(1):27–41CrossRef Phelps J, Nowak G, Ferrell E (2000) Privacy concerns and consumer willingness to provide personal information. J Public Policy Mark 19(1):27–41CrossRef
Zurück zum Zitat Phelps JE, D’Souza G, Nowak GJ (2001) Antecedents and consequences of consumer privacy concerns: an empirical investigation. Journal of Interactive Marketing 15(4):2–17CrossRef Phelps JE, D’Souza G, Nowak GJ (2001) Antecedents and consequences of consumer privacy concerns: an empirical investigation. Journal of Interactive Marketing 15(4):2–17CrossRef
Zurück zum Zitat Qi X, Hengartner U (2011) Privacy-preserving matchmaking for mobile social networking secure against malicious users. In: Proc. PST, pp 252–259 Qi X, Hengartner U (2011) Privacy-preserving matchmaking for mobile social networking secure against malicious users. In: Proc. PST, pp 252–259
Zurück zum Zitat Schiberg D (2008) A peer-to-peer infrastructure for social networks. Disploma Thesis, Technical University Berlin, Germany Schiberg D (2008) A peer-to-peer infrastructure for social networks. Disploma Thesis, Technical University Berlin, Germany
Zurück zum Zitat Schneier B (1996) Applied cryptography, 2nd edn. Wiley, New YorkMATH Schneier B (1996) Applied cryptography, 2nd edn. Wiley, New YorkMATH
Zurück zum Zitat Shakimov A, Lim H, Caceress R, Cox P, Li K, Liu D, Varshavsky A (2011) Vis-vis: privacy-preserving online social networking via virtual individual servers. In: Proceeding of the 6th International Conference on Communication System and Networks (COMSNETS), pp 1–10 Shakimov A, Lim H, Caceress R, Cox P, Li K, Liu D, Varshavsky A (2011) Vis-vis: privacy-preserving online social networking via virtual individual servers. In: Proceeding of the 6th International Conference on Communication System and Networks (COMSNETS), pp 1–10
Zurück zum Zitat Sheehan KB, Hoy MG (1999) Flaming, complaining, abstaining: how online users respond to privacy concerns. J Advert 28(3):37–51CrossRef Sheehan KB, Hoy MG (1999) Flaming, complaining, abstaining: how online users respond to privacy concerns. J Advert 28(3):37–51CrossRef
Zurück zum Zitat Skeels MM, Grudin J (2009) When social networks cross boundaries: a case study of workplace use of Facebook and LinkedIn. In: Proceedings of Group 2009, pp 95–104 Skeels MM, Grudin J (2009) When social networks cross boundaries: a case study of workplace use of Facebook and LinkedIn. In: Proceedings of Group 2009, pp 95–104
Zurück zum Zitat Stutzman F, Kramer Duffield J (2010) Friends only: examining a privacy-enhancing behavior in facebook. In: Proceedings of CHI2010, pp 1553–1562 Stutzman F, Kramer Duffield J (2010) Friends only: examining a privacy-enhancing behavior in facebook. In: Proceedings of CHI2010, pp 1553–1562
Zurück zum Zitat Sun J, Zhu X, Fang Y (2010) a privacy-preserving scheme for online social networks with efficient revocation. In: Procceding of the 29th of Information Communication (IEEE INFOCOM), pp 1–9 Sun J, Zhu X, Fang Y (2010) a privacy-preserving scheme for online social networks with efficient revocation. In: Procceding of the 29th of Information Communication (IEEE INFOCOM), pp 1–9
Zurück zum Zitat Tootoonchian A, Gollu K, Kiran S, Saroiu Y, Ganjali Y, Wolman A (2008) Lockr: Social Access Control for Web 2.0. In: Proceedings of the First ACM SIGCOMM Workshop on Online Social Networks (WOSN) Tootoonchian A, Gollu K, Kiran S, Saroiu Y, Ganjali Y, Wolman A (2008) Lockr: Social Access Control for Web 2.0. In: Proceedings of the First ACM SIGCOMM Workshop on Online Social Networks (WOSN)
Zurück zum Zitat Tootoonchian A, Saroiu S, Ganjali Y, Wolman A (2009) Lockr: better privacy for social networks. In: Proceedings of the 5th international conference on Emerging networking experiments and technologies, Italy, pp 169–180 Tootoonchian A, Saroiu S, Ganjali Y, Wolman A (2009) Lockr: better privacy for social networks. In: Proceedings of the 5th international conference on Emerging networking experiments and technologies, Italy, pp 169–180
Zurück zum Zitat Tufekci Z (2008) Can you see me now? Audience and disclosure regulation in online social network sites. Bull Sci Technol Soc 28(1):20–36CrossRef Tufekci Z (2008) Can you see me now? Audience and disclosure regulation in online social network sites. Bull Sci Technol Soc 28(1):20–36CrossRef
Zurück zum Zitat UN Global Pulse (2015) Mapping the risk-utility landscape: mobile data for sustainable development & humanitarian action. Global Pulse Project Series no. 18, 2015 UN Global Pulse (2015) Mapping the risk-utility landscape: mobile data for sustainable development & humanitarian action. Global Pulse Project Series no. 18, 2015
Zurück zum Zitat Vastardis N, Yang K (2013) Mobile social networks: Architectures, social properties and key research challenges. IEEE Commun Surveys Tuts 15(3):1355–1371CrossRef Vastardis N, Yang K (2013) Mobile social networks: Architectures, social properties and key research challenges. IEEE Commun Surveys Tuts 15(3):1355–1371CrossRef
Zurück zum Zitat Wang Y, Komanduri S, Giovanni Leon P (2011) I regretted the minute I pressed share: a Qualitative Study of Regrets on Facebook. In: Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA, USA Wang Y, Komanduri S, Giovanni Leon P (2011) I regretted the minute I pressed share: a Qualitative Study of Regrets on Facebook. In: Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA, USA
Zurück zum Zitat Wei C, Jie W, Tan CC (2011) Enhancing mobile social network privacy. In: IEEE GLOBECOM, pp 1–5 Wei C, Jie W, Tan CC (2011) Enhancing mobile social network privacy. In: IEEE GLOBECOM, pp 1–5
Zurück zum Zitat Wei W, Xu F, Li Q (2012) Mobishare: flexible privacy-preserving location sharing in mobile online social networks. In: IEEE INFOCOM, pp 2616–2620 Wei W, Xu F, Li Q (2012) Mobishare: flexible privacy-preserving location sharing in mobile online social networks. In: IEEE INFOCOM, pp 2616–2620
Zurück zum Zitat Wu Y, Hui P, Xiaoying Z, Hong C, Cuiping L (2015) Publish me and protect me: personalized and flexible location privacy protection in mobile social networks. In: IEEE International Symposium on Quality of Service, IWQoS 2015, Portland, OR, USA, pp 147–152 Wu Y, Hui P, Xiaoying Z, Hong C, Cuiping L (2015) Publish me and protect me: personalized and flexible location privacy protection in mobile social networks. In: IEEE International Symposium on Quality of Service, IWQoS 2015, Portland, OR, USA, pp 147–152
Zurück zum Zitat Xiaohui L, Xu L, Rongxing L, Xiaodong L, Xuemin S (2011) Finegrained identification with real-time fairness in mobile social networks. In: Proc. IEEE ICC, 2011, pp. 1–5 Xiaohui L, Xu L, Rongxing L, Xiaodong L, Xuemin S (2011) Finegrained identification with real-time fairness in mobile social networks. In: Proc. IEEE ICC, 2011, pp. 1–5
Zurück zum Zitat Xu H (2009) Consumer responses to the introduction of privacy protection measures: an exploratory research framework. Int J E-Bus Res 5(2):21–47 (Special issue on the Protection of Privacy in E-Business)MathSciNetCrossRef Xu H (2009) Consumer responses to the introduction of privacy protection measures: an exploratory research framework. Int J E-Bus Res 5(2):21–47 (Special issue on the Protection of Privacy in E-Business)MathSciNetCrossRef
Zurück zum Zitat Xu H, Dinev T, Smith HJ, Hart P (2008) Examining the formation of individual’s information privacy concerns: toward an Integrative view. In: Paper read at 29th Annual International Conference on Information Systems (ICIS), at Paris, France Xu H, Dinev T, Smith HJ, Hart P (2008) Examining the formation of individual’s information privacy concerns: toward an Integrative view. In: Paper read at 29th Annual International Conference on Information Systems (ICIS), at Paris, France
Zurück zum Zitat Yang S, Wang K (2009) The influence of information sensitivity compensation on privacy concern and behavioral intention. Data Base Adv Inf Syst 40(1):38–51CrossRef Yang S, Wang K (2009) The influence of information sensitivity compensation on privacy concern and behavioral intention. Data Base Adv Inf Syst 40(1):38–51CrossRef
Zurück zum Zitat Zhu Y, Hu Z, Wang H, Hu H, Ahn GJ (2010) A Collaborative framework for privacy protection in online social networks. In: Proceedings of the 6th International Conference on Collaborative Computing, USA, pp 40–45 Zhu Y, Hu Z, Wang H, Hu H, Ahn GJ (2010) A Collaborative framework for privacy protection in online social networks. In: Proceedings of the 6th International Conference on Collaborative Computing, USA, pp 40–45
Metadaten
Titel
An investigation into the requirements of privacy in social networks and factors contributing to users’ concerns about violation of their privacy
verfasst von
Razieh Malekhosseini
Mehdi Hosseinzadeh
Keyvan Navi
Publikationsdatum
01.12.2018
Verlag
Springer Vienna
Erschienen in
Social Network Analysis and Mining / Ausgabe 1/2018
Print ISSN: 1869-5450
Elektronische ISSN: 1869-5469
DOI
https://doi.org/10.1007/s13278-018-0518-x

Weitere Artikel der Ausgabe 1/2018

Social Network Analysis and Mining 1/2018 Zur Ausgabe