skip to main content
10.1145/2335356.2335374acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
research-article

The PViz comprehension tool for social network privacy settings

Published:11 July 2012Publication History

ABSTRACT

Users' mental models of privacy and visibility in social networks often involve subgroups within their local networks of friends. Many social networking sites have begun building interfaces to support grouping, like Facebook's lists and "Smart Lists," and Google+'s "Circles." However, existing policy comprehension tools, such as Facebook's Audience View, are not aligned with this mental model. In this paper, we introduce PViz, an interface and system that corresponds more directly with how users model groups and privacy policies applied to their networks. PViz allows the user to understand the visibility of her profile according to automatically-constructed, natural sub-groupings of friends, and at different levels of granularity. Because the user must be able to identify and distinguish automatically-constructed groups, we also address the important sub-problem of producing effective group labels. We conducted an extensive user study comparing PViz to current policy comprehension tools (Facebook's Audience View and Custom Settings page). Our study revealed that PViz was comparable to Audience View for simple tasks, and provided a significant improvement for complex, group-based tasks, despite requiring users to adapt to a new tool. Utilizing feedback from the user study, we further iterated on our design, constructing PViz 2.0, and conducted a follow-up study to evaluate our refinements.

References

  1. A. Acquisti and R. Gross. Imagined communities: Awareness, information sharing, and privacy on the facebook. In Privacy Enhancing Technologies Workshop, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. F. Adu-Oppong, C. Gardiner, A. Kapadia, and P. Tsang. Socialcircles: Tackling privacy in social networks. In SOUPS, 2008.Google ScholarGoogle Scholar
  3. S. Amershi, J. Fogarty, and D. S. Weld. Regroup: Interactive machine learning for on-demand group creation in social networks. In ACM Conference on Human Factors in Computing Systems (CHI): to appear, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Anwar, P. Fong, X.-D. Yang, and H. Hamilton. Visualizing privacy implications of access control policies in social networks. In Workshop on Data Privacy Management, 2009.Google ScholarGoogle Scholar
  5. A. Besmer, J. Watson, and H. Lipford. The impact of social navigation on privacy policy configuration. In SOUPS, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. W. Cohen. Fast effective rule induction. In ICML, 1995.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. G. Danezis. Inferring privacy policies for social networking services. In AISec, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Egelman, A. Oates, and S. Krishnamurthi. Oops, i did it again: Mitigating repeated access control errors on Facebook. In CHI, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. L. Fang and K. LeFevre. Privacy wizards for social networking sites. In WWW, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Fortunato. Community detection in graphs. Physics Reports, 486, 2010.Google ScholarGoogle Scholar
  11. R. Gross and A. Acquisti. Information revelation and privacy in online social networks. In Workshop on Privacy in the Electronic Society, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Heer and d. boyd. Vizster: Visualizing online social networks. InfoVis, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. S. Jones and E. O'Neill. Feasibility of structural network clustering for group-based privacy control in social networks. In SOUPS, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. S. Kairam, M. J. Brzozowski, D. Huffaker, and E. H. Chi. Talking in circles: Selective sharing in google+. In ACM Conference on Human Factors in Computing Systems (CHI): to appear, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. Lampinen, S. Tamminen, and A. Oulasvirta. All my people right here, right now: Management of group co-presence on a social networking site. In GROUP, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. H. Lipford, A. Besmer, and J. Watson. Understanding privacy settings in facebook with an audience view. In Conference on Usability, Psychology, and Security, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. H. Lipford, J. Watson, M. Whitney, K. Froiland, and R. Reeder. Visual vs. compact: A comparison of privacy policy interfaces. In CHI, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. K. Liu and E. Terzi. A framework for computing the privacy scores of users in online social networks. In ICDM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. Newman and M. Girvan. Finding and evaluating community structure in networks. Physical Review, 69(2), 2004.Google ScholarGoogle Scholar
  20. D. Nguyen and E. Mynatt. Privacy mirrors: understanding and shaping socio-technical ubiquitous computing systems. Technical report, 2002.Google ScholarGoogle Scholar
  21. A. Noack. Modularity clustering is force-directed layout. Physical Review, 79(2), 2009.Google ScholarGoogle Scholar
  22. L. Palen and P. Dourish. Unpacking "privacy" for a networked world. In CHI, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S. Patil and J. Lai. Who gets to know what when: configuring privacy permissions in an awareness application. In CHI, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. A. Perer and B. Shneiderman. Balancing systematic and flexible exploration of social networks. IEEE Transactions on Visualization and Computer Graphics, 12:693--700, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. R. Reeder, L. Bauer, L. Cranor, M. Reiter, K. Bacon, K. How, and H. Strong. Expandable grids for visualizing and authoring computer security policies. In CHI, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The PViz comprehension tool for social network privacy settings

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      SOUPS '12: Proceedings of the Eighth Symposium on Usable Privacy and Security
      July 2012
      216 pages
      ISBN:9781450315326
      DOI:10.1145/2335356

      Copyright © 2012 Authors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 11 July 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate15of49submissions,31%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader