Skip to main content
Top

2013 | OriginalPaper | Chapter

Interdisciplinary Impact Analysis of Privacy in Social Networks

Authors : Michael Netter, Sebastian Herbst, Günther Pernul

Published in: Security and Privacy in Social Networks

Publisher: Springer New York

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The rise of the social web has traditionally been accompanied by privacy concerns. Research on social web privacy has been conducted from various viewpoints including legal, social, and the computer sciences. In this chapter, we propose an interdisciplinary approach to capture the multidimensional concept of privacy. For this purpose, we developed a three-layered framework to systematically analyze the privacy impact of various research directions. In addition, we conducted an interdisciplinary literature analysis, highlighting areas for improvement as well dependencies between different research directions.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Tufekci Z (2008) Can you see me now? Audience and disclosure regulation in online social network sites. Bull Sci Technol Soc 11:544–564 Tufekci Z (2008) Can you see me now? Audience and disclosure regulation in online social network sites. Bull Sci Technol Soc 11:544–564
2.
go back to reference Post RC (2001) Three concepts of privacy. Georget Law J 1:2087–2098 Post RC (2001) Three concepts of privacy. Georget Law J 1:2087–2098
3.
go back to reference Spiekermann S, Cranor LF (2009) Engineering privacy. IEEE Trans Softw Eng 35(1):67–82CrossRef Spiekermann S, Cranor LF (2009) Engineering privacy. IEEE Trans Softw Eng 35(1):67–82CrossRef
4.
go back to reference PrimeLife: D1.2.1 – Privacy Enabled Communities (2010) PrimeLife: D1.2.1 – Privacy Enabled Communities (2010)
5.
go back to reference Gutwirth S, Gellert R, Bellanova R, Friedewald M, Schiitz P, Wright D, Mordini E, Venier S (2011) Deliverable D1: legal, social, economic and ethical conceptualisations of privacy and data protection, Karlsruhe Gutwirth S, Gellert R, Bellanova R, Friedewald M, Schiitz P, Wright D, Mordini E, Venier S (2011) Deliverable D1: legal, social, economic and ethical conceptualisations of privacy and data protection, Karlsruhe
6.
go back to reference Warren SD, Brandeis LD (1890) The right to privacy. Harv Law Rev 4:193–220CrossRef Warren SD, Brandeis LD (1890) The right to privacy. Harv Law Rev 4:193–220CrossRef
7.
8.
go back to reference Patil S, Kobsa A (2009) Privacy considerations in awareness systems: designing with privacy in mind. In: Markopoulos P, Mackay W, Ruyter B (eds) Awareness systems, human-computer interaction series. Springer, Heidelberg Patil S, Kobsa A (2009) Privacy considerations in awareness systems: designing with privacy in mind. In: Markopoulos P, Mackay W, Ruyter B (eds) Awareness systems, human-computer interaction series. Springer, Heidelberg
9.
go back to reference European Parliament (1995) EU-Directive 95/46/EC. Official Journal of the European Communities European Parliament (1995) EU-Directive 95/46/EC. Official Journal of the European Communities
10.
go back to reference Cranor L, Dobbs B, Egelman S, Hogben G, Humphrey J, Langheinrich M, Marchiori M, Presler-Marshall M, Reagle JM, Schunter M, Stampley DA, Wenning R (2006) The platform for privacy preferences 1.1 (P3P1.1) specification. NOTE-P3P11-20061113 Cranor L, Dobbs B, Egelman S, Hogben G, Humphrey J, Langheinrich M, Marchiori M, Presler-Marshall M, Reagle JM, Schunter M, Stampley DA, Wenning R (2006) The platform for privacy preferences 1.1 (P3P1.1) specification. NOTE-P3P11-20061113
11.
go back to reference Nissenbaum H (2010) Privacy in context: technology, policy, and the integrity of social life. Stanford Law Books, Palo Alto Nissenbaum H (2010) Privacy in context: technology, policy, and the integrity of social life. Stanford Law Books, Palo Alto
12.
go back to reference Ziegele M, Quiring O (2011) Privacy in social network sites. In: Trepte S, Reinecke L (eds) Privacy online. Perspectives on privacy and self-disclosure in the social web. Springer, Heidelberg/New York Ziegele M, Quiring O (2011) Privacy in social network sites. In: Trepte S, Reinecke L (eds) Privacy online. Perspectives on privacy and self-disclosure in the social web. Springer, Heidelberg/New York
13.
go back to reference Beye M, Jeckmans AJP, Erkin Z, Hartel PH, Lagendijk RI, Tang Q (2010) Literature overview – privacy in online social networks. Technical report TR-CTIT-10-36, centre for telematics and information technology, University of Twente, Enschede Beye M, Jeckmans AJP, Erkin Z, Hartel PH, Lagendijk RI, Tang Q (2010) Literature overview – privacy in online social networks. Technical report TR-CTIT-10-36, centre for telematics and information technology, University of Twente, Enschede
14.
go back to reference Guha S, Tang K, Francis P (2008) NOYB: privacy in online social networks. In: Proceedings of the 1st workshop on online social networks, Seattle Guha S, Tang K, Francis P (2008) NOYB: privacy in online social networks. In: Proceedings of the 1st workshop on online social networks, Seattle
15.
go back to reference van den Berg B, Leenes R (2011) Keeping up appearances: audience segregation in social network sites, Chap. 10. Springer, Dordrecht/Heidelberg, pp 211–231 van den Berg B, Leenes R (2011) Keeping up appearances: audience segregation in social network sites, Chap. 10. Springer, Dordrecht/Heidelberg, pp 211–231
16.
go back to reference Aimeur E, Gambs S, Ho A (2010) Towards a privacy-enhanced social networking site. In: Proceedings of the 5th international conference on availability, reliability and security, Corvallis Aimeur E, Gambs S, Ho A (2010) Towards a privacy-enhanced social networking site. In: Proceedings of the 5th international conference on availability, reliability and security, Corvallis
17.
go back to reference Boyd D (2008) Taken out of context: American teen sociality in networked publics. Ph.D. thesis, University of California, Berkeley Boyd D (2008) Taken out of context: American teen sociality in networked publics. Ph.D. thesis, University of California, Berkeley
18.
go back to reference Mayer-Schonberger V (2009) Delete: the virtue of forgetting in the digital age. Princeton University Press, Princeton Mayer-Schonberger V (2009) Delete: the virtue of forgetting in the digital age. Princeton University Press, Princeton
19.
go back to reference Solove DJ (2008) The future of reputation: gossip, rumor, and privacy on the internet. Yale University Press, New Haven Solove DJ (2008) The future of reputation: gossip, rumor, and privacy on the internet. Yale University Press, New Haven
20.
go back to reference Gross R, Acquisti A (2005) Information revelation and privacy in online social networks. In: Proceedings of the ACM workshop on privacy in the electronic society, New York Gross R, Acquisti A (2005) Information revelation and privacy in online social networks. In: Proceedings of the ACM workshop on privacy in the electronic society, New York
21.
go back to reference Hogben G (2007) Security issues and recommendations for online social networks. Technical report, ENISA Hogben G (2007) Security issues and recommendations for online social networks. Technical report, ENISA
22.
go back to reference Altshuler Y, Aharony N, Pentland A, Elovici Y, Cebrian M (2011) Stealing reality: when criminals become data scientists (or vice versa). IEEE Intell Syst 26:22–30CrossRef Altshuler Y, Aharony N, Pentland A, Elovici Y, Cebrian M (2011) Stealing reality: when criminals become data scientists (or vice versa). IEEE Intell Syst 26:22–30CrossRef
23.
go back to reference Goffman E (1959) The presentation of self in everyday life. Anchor, New York Goffman E (1959) The presentation of self in everyday life. Anchor, New York
24.
go back to reference van den Berg B, Leenes R (2010) Audience segregation in social network sites. In: Proceedings of the 2nd international conference on social computing, Delft van den Berg B, Leenes R (2010) Audience segregation in social network sites. In: Proceedings of the 2nd international conference on social computing, Delft
25.
go back to reference Pötzsch S (2009) Privacy awareness: a means to solve the privacy paradox? In: Maty V, Fischer-Hübner S, Cvrcek D, Lvenda P (eds) The future of identity in the information society, IFIP advances in information and communication technology, vol 298. Springer, Heidelberg Pötzsch S (2009) Privacy awareness: a means to solve the privacy paradox? In: Maty V, Fischer-Hübner S, Cvrcek D, Lvenda P (eds) The future of identity in the information society, IFIP advances in information and communication technology, vol 298. Springer, Heidelberg
26.
go back to reference Burghardt T, Buchmann E, Bohm K (2008) Why do privacy-enhancement mechanisms fail, after all? A survey of both the user and the provider perspective. In: Proceedings of the international workshop on web 2.0 trust, Trondheim Burghardt T, Buchmann E, Bohm K (2008) Why do privacy-enhancement mechanisms fail, after all? A survey of both the user and the provider perspective. In: Proceedings of the international workshop on web 2.0 trust, Trondheim
27.
go back to reference Carminati B, Ferrari E (2008) Access control and privacy in web-based social networks. Int J Web Inf Syst 4(4):395–415 Carminati B, Ferrari E (2008) Access control and privacy in web-based social networks. Int J Web Inf Syst 4(4):395–415
28.
go back to reference Carminati B, Ferrari E, Perego A (2009) Enforcing access control in web-based social networks. ACM Trans Inf Syst Secur 13(1):1–38CrossRef Carminati B, Ferrari E, Perego A (2009) Enforcing access control in web-based social networks. ACM Trans Inf Syst Secur 13(1):1–38CrossRef
29.
go back to reference Donath J, Boyd D (2004) Public displays of connection. BT Technol J 22(4):71–82CrossRef Donath J, Boyd D (2004) Public displays of connection. BT Technol J 22(4):71–82CrossRef
30.
go back to reference Boyd D (2004) Friendster and publicly articulated social networking. In: Proceedings of the SIGCHI conference on human factors and computing systems, Vienna Boyd D (2004) Friendster and publicly articulated social networking. In: Proceedings of the SIGCHI conference on human factors and computing systems, Vienna
31.
go back to reference Federrath H, Fuchs KP, Herrmann D, Maier D, Scheuer F, Wagner K (2011) Grenzen des digitalen Radiergummis. Datenschutz und Datensicherheit – DuD 35(6):403–407CrossRef Federrath H, Fuchs KP, Herrmann D, Maier D, Scheuer F, Wagner K (2011) Grenzen des digitalen Radiergummis. Datenschutz und Datensicherheit – DuD 35(6):403–407CrossRef
32.
go back to reference Netter M, Riesner M, Pernul G (2011) Assisted social identity management – enhancing privacy in the social web. In: Proceedings of the 10th international conference on Wirtschaftsinformatik, Zürich Netter M, Riesner M, Pernul G (2011) Assisted social identity management – enhancing privacy in the social web. In: Proceedings of the 10th international conference on Wirtschaftsinformatik, Zürich
33.
go back to reference Lampinen A, Tamminen S, Oulasvirta A (2009) All my people right here, right now: management of group co-presence on a social networking site. In: Proceedings of the ACM international conference on supporting group work, Sanibel Lampinen A, Tamminen S, Oulasvirta A (2009) All my people right here, right now: management of group co-presence on a social networking site. In: Proceedings of the ACM international conference on supporting group work, Sanibel
34.
go back to reference DiMicco JM, Millen DR (2007) Identity management: multiple presentations of self in Facebook. In: Proceedings of the international ACM conference on supporting group work, Sanibel Island DiMicco JM, Millen DR (2007) Identity management: multiple presentations of self in Facebook. In: Proceedings of the international ACM conference on supporting group work, Sanibel Island
35.
go back to reference Grimmelmann J (2009) Saving Facebook. Iowa Law Rev 94(4):1137–1206 Grimmelmann J (2009) Saving Facebook. Iowa Law Rev 94(4):1137–1206
36.
go back to reference Acquisti A, Gross R (2006) Imagined communities: awareness, information sharing, and privacy on the Facebook. In: Proceedings of the 6th workshop on privacy enhancing technologies, Cambridge Acquisti A, Gross R (2006) Imagined communities: awareness, information sharing, and privacy on the Facebook. In: Proceedings of the 6th workshop on privacy enhancing technologies, Cambridge
37.
go back to reference Acquisti A (2004) Privacy in electronic commerce and the economics of immediate gratification. In: Proceedings of the 5th ACM conference on electronic commerce, New York Acquisti A (2004) Privacy in electronic commerce and the economics of immediate gratification. In: Proceedings of the 5th ACM conference on electronic commerce, New York
38.
go back to reference Kolter J, Netter M, Pernul G (2010) Visualizing past personal data disclosures. In: Proceedings of the fifth international conference on availability, reliability and security, Krakow Kolter J, Netter M, Pernul G (2010) Visualizing past personal data disclosures. In: Proceedings of the fifth international conference on availability, reliability and security, Krakow
39.
go back to reference Tscherteu G, Langreiter C (2009) Explorative Netzwerkanalyse im living web. In: Social semantic web. Springer, Berlin/Heidelberg Tscherteu G, Langreiter C (2009) Explorative Netzwerkanalyse im living web. In: Social semantic web. Springer, Berlin/Heidelberg
40.
go back to reference Dix A (2010) Daten- und Personlichkeitsschutz im Web 2.0. In: Klumpp D, Kubicek H, Rob Nagel A, Schulz W (eds) Netzwelt-Wege, Werte, Wandel. Springer, Berlin/Heidelberg, pp 195–210CrossRef Dix A (2010) Daten- und Personlichkeitsschutz im Web 2.0. In: Klumpp D, Kubicek H, Rob Nagel A, Schulz W (eds) Netzwelt-Wege, Werte, Wandel. Springer, Berlin/Heidelberg, pp 195–210CrossRef
41.
go back to reference Bonneau J, Preibusch S (2009) The privacy jungle: on the market for data protection in social networks. In: Proceedings of the 8th workshop on the economics of information security, London Bonneau J, Preibusch S (2009) The privacy jungle: on the market for data protection in social networks. In: Proceedings of the 8th workshop on the economics of information security, London
42.
go back to reference Feldman DC (1984) The development and enforcement of group norms. Acad Manag Rev 9(1):47–53 Feldman DC (1984) The development and enforcement of group norms. Acad Manag Rev 9(1):47–53
43.
go back to reference Peterson C (2010) Losing face: an environmental analysis of privacy on Facebook. SSRN eLibrary Peterson C (2010) Losing face: an environmental analysis of privacy on Facebook. SSRN eLibrary
44.
go back to reference Strahilevitz L (2005) A social networks theory of privacy. Univ Chic Law Rev 72(3):919–988 Strahilevitz L (2005) A social networks theory of privacy. Univ Chic Law Rev 72(3):919–988
45.
go back to reference Baden R, Bender A, Spring N, Bhattacharjee B, Starin D (2009) Persona: an online social network with user-defined privacy. In: Proceedings of the ACM SIGCOMM conference on data communication, Barcelona Baden R, Bender A, Spring N, Bhattacharjee B, Starin D (2009) Persona: an online social network with user-defined privacy. In: Proceedings of the ACM SIGCOMM conference on data communication, Barcelona
46.
go back to reference Organisation for Economic Co-operation and Development (1981) Guidelines on the protection of privacy and transborder flows of personal data, vol 11. Organisation for Economic Cooperation and Development, Paris Organisation for Economic Co-operation and Development (1981) Guidelines on the protection of privacy and transborder flows of personal data, vol 11. Organisation for Economic Cooperation and Development, Paris
47.
go back to reference Maliki TE, Seigneur JM (2009) Identity management. In: Vacca JR (ed) Computer and information security handbook, Chap. 17. Burlington, Morgan Kaufmann Maliki TE, Seigneur JM (2009) Identity management. In: Vacca JR (ed) Computer and information security handbook, Chap. 17. Burlington, Morgan Kaufmann
48.
go back to reference Debatin B, Lovejoy JP, Horn AK, Hughes BN (2009) Facebook and online privacy: attitudes, behaviors, and unintended consequences. J Comput-Mediat Commun 15(1):83–108CrossRef Debatin B, Lovejoy JP, Horn AK, Hughes BN (2009) Facebook and online privacy: attitudes, behaviors, and unintended consequences. J Comput-Mediat Commun 15(1):83–108CrossRef
49.
go back to reference Hoadley CM, Xu H, Lee JJ, Rosson MB (2010) Privacy as information access and illusory control: the case of the Facebook news feed privacy outcry. Electron Commer Res Appl 9(1):50–60CrossRef Hoadley CM, Xu H, Lee JJ, Rosson MB (2010) Privacy as information access and illusory control: the case of the Facebook news feed privacy outcry. Electron Commer Res Appl 9(1):50–60CrossRef
50.
go back to reference Agrawal R (2002) Why is P3P not a PET? In: Proceedings of the W3C future of P3P workshop, Dulles Agrawal R (2002) Why is P3P not a PET? In: Proceedings of the W3C future of P3P workshop, Dulles
Metadata
Title
Interdisciplinary Impact Analysis of Privacy in Social Networks
Authors
Michael Netter
Sebastian Herbst
Günther Pernul
Copyright Year
2013
Publisher
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-4139-7_2

Premium Partner