skip to main content
10.1145/1958824.1958885acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
research-article

With a little help from my friends: can social navigation inform interpersonal privacy preferences?

Authors Info & Claims
Published:19 March 2011Publication History

ABSTRACT

Recent privacy controversies surrounding social networking sites demonstrate that the mere availability of settings is not enough for effective privacy management. We investigated whether the aggregated privacy choices of one's social circle might guide users in making informed privacy decisions. We conducted an experiment in which users specified preferences for six privacy-relevant settings in Instant Messaging. In one condition, users were provided with information indicating the privacy preferences of the majority of their ``buddies." Our results suggest that while this information did influence user choices, the effect was secondary to that of the ``privacy-sensitivity" of the system feature controlled by the particular setting. Frequency of IM usage was also associated with privacy choices. The experiment data coupled with user comments suggest several usability improvements in interfaces for specifying privacy preferences.

References

  1. C. Albanesius. Schumer Asks FTC to Investigate Privacy of Facebook, Other Sites. PC Magazine, April 2010.Google ScholarGoogle Scholar
  2. A. Besmer, J. Watson, and H. R. Lipford. The Impact of Social Navigation on Privacy Policy Configuration. In SOUPS '10, pages 7:1--7:10, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Consolvo, I. E. Smith, T. Matthews, A. LaMarca, J. Tabert, and P. Powledge. Location Disclosure to Social Relations: Why, When, & What People Want To Share. In CHI '05, pages 81--90, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. J. Crawley. The R Book. John Wiley and Sons, illustrated, reprint edition, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. J. Culnan and P. K. Armstrong. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation. Organizational Science, 10(1):104--115, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. P. DiGioia and P. Dourish. Social Navigation as a Model for Usable Security. In SOUPS '05, pages 101--108, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. P. Dourish and M. Chalmers. Running Out of Space: Models of Information Navigation. In Short paper presented at HCI '94, 1994.Google ScholarGoogle Scholar
  8. J. Goecks, W. K. Edwards, and E. D. Mynatt. Challenges in Supporting End-user Privacy and Security Management with Social Navigation. In SOUPS '09, pages 1--12, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Helft. Critics Say Google Invades Privacy With New Service. The New York Times, February 2010.Google ScholarGoogle Scholar
  10. R. D. Lennox and R. N. Wolfe. Revision of the Self-Monitoring Scale. Journal of Personality and Social Psychology, 46(6):1349--1364, 1984.Google ScholarGoogle ScholarCross RefCross Ref
  11. N. K. Malhotra, S. S. Kim, and J. Agarwal. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research, 15(4):336--355, December 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. S. Olson, J. Grudin, and E. Horvitz. A Study of Preferences for Sharing and Privacy. In CHI '05, pages 1985--1988, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. S. Patil and J. Lai. Who Gets to Know What When: Configuring Privacy Permissions in an Awareness Application. In CHI '05, pages 101--110, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. J. W. Thibaut and H. H. Kelley. The Social Psychology of Groups. Transaction Publishers, 1986.Google ScholarGoogle Scholar

Index Terms

  1. With a little help from my friends: can social navigation inform interpersonal privacy preferences?

    Recommendations

    Reviews

    You Chen

    In social media, users have many opportunities to specify their privacy setting preferences, such as whether to show their personal information to all of their contacts or only specific contacts. In many cases, users do not understand these settings, much less know how to specify them. Thus, several social media platforms provide the selections of a user's social circle or friends to guide him or her in choosing preferences. The authors of this paper conducted a series of experiments to verify whether the privacy attitudes of one's social circle can serve as a useful guide when specifying one's privacy preferences. They find that the feature's privacy sensitivity is the most important factor influencing a user's selection of privacy preferences. This does not indicate that one's social circle has no influence. In fact, the paper demonstrates that the privacy attitudes and practices of one's social circle can serve as additional guidance when specifying one's privacy preferences; however, this influence is secondary. To verify how one's social circle influences the selection of privacy preferences, the authors asked 68 people to participate in the experiments. Each participant followed two steps. First, each participant installed instant messaging (IM) software and selected six privacy preferences during the installation. The authors divided the participants into four groups, and then reconciled the percentage of high-privacy and low-privacy recommendations provided by their contacts for each group. All of the participants were supposed to believe that the IM software had information on their contacts, although, in fact, it had none. Groups 1, 2, 3, and 4 had, respectively, 15, 20, 15, and 18 participants. In group 1, four out of six settings had high-privacy recommendations from one's social circle, and two out of six settings had low-privacy recommendations. In group 2, three out of six settings had high-privacy recommendations, and three out of six settings had low-privacy recommendations. In group 3, two out of six settings had high-privacy recommendations, and four out of six settings had low-privacy recommendations. In group 4, nobody had recommendations of high privacy and low privacy. Second, after installing IM software, each participant was invited to conduct a post-study of the installation to verify whether or not the participant had been deceived. The results show that only three people did not believe the assumption. Based on the above experiments, the authors analyze the experimental data from two views: the group aspect and the privacy setting aspect. For each group, the authors use the chi-square test to verify how the ratio of high-privacy and low-privacy recommendations influences a user's privacy preference. The results indicate that participants' choices are not influenced by the ratio of high- and low-privacy recommendations. For each setting, the authors analyze whether it was influenced by the recommendations of users' social circles. The results show that the recommendations of one's social circle have no influence on one's privacy preference in settings 1, 5, and 6. It depends on the features of the setting itself. The recommendations of one's social circle have little influence on one's privacy preference in settings 3 and 4, but the magnitude of the effect is very small. The design and analysis of the experiment are very important. The authors develop several types of experiments and analyze the experimental data; however, the description of these experiments is not direct, which makes it hard for readers to understand. Furthermore, the results of the analysis are not clearly provided. Many privacy settings exist in social media. However, this study only looks at six. Future studies will need to verify the authors' findings. Online Computing Reviews Service

    Access critical reviews of Computing literature here

    Become a reviewer for Computing Reviews.

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CSCW '11: Proceedings of the ACM 2011 conference on Computer supported cooperative work
      March 2011
      764 pages
      ISBN:9781450305563
      DOI:10.1145/1958824

      Copyright © 2011 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 19 March 2011

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate2,235of8,521submissions,26%

      Upcoming Conference

      CSCW '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader