Skip to main content

2013 | OriginalPaper | Buchkapitel

Interdisciplinary Impact Analysis of Privacy in Social Networks

verfasst von : Michael Netter, Sebastian Herbst, Günther Pernul

Erschienen in: Security and Privacy in Social Networks

Verlag: Springer New York

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The rise of the social web has traditionally been accompanied by privacy concerns. Research on social web privacy has been conducted from various viewpoints including legal, social, and the computer sciences. In this chapter, we propose an interdisciplinary approach to capture the multidimensional concept of privacy. For this purpose, we developed a three-layered framework to systematically analyze the privacy impact of various research directions. In addition, we conducted an interdisciplinary literature analysis, highlighting areas for improvement as well dependencies between different research directions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Tufekci Z (2008) Can you see me now? Audience and disclosure regulation in online social network sites. Bull Sci Technol Soc 11:544–564 Tufekci Z (2008) Can you see me now? Audience and disclosure regulation in online social network sites. Bull Sci Technol Soc 11:544–564
2.
Zurück zum Zitat Post RC (2001) Three concepts of privacy. Georget Law J 1:2087–2098 Post RC (2001) Three concepts of privacy. Georget Law J 1:2087–2098
3.
Zurück zum Zitat Spiekermann S, Cranor LF (2009) Engineering privacy. IEEE Trans Softw Eng 35(1):67–82CrossRef Spiekermann S, Cranor LF (2009) Engineering privacy. IEEE Trans Softw Eng 35(1):67–82CrossRef
4.
Zurück zum Zitat PrimeLife: D1.2.1 – Privacy Enabled Communities (2010) PrimeLife: D1.2.1 – Privacy Enabled Communities (2010)
5.
Zurück zum Zitat Gutwirth S, Gellert R, Bellanova R, Friedewald M, Schiitz P, Wright D, Mordini E, Venier S (2011) Deliverable D1: legal, social, economic and ethical conceptualisations of privacy and data protection, Karlsruhe Gutwirth S, Gellert R, Bellanova R, Friedewald M, Schiitz P, Wright D, Mordini E, Venier S (2011) Deliverable D1: legal, social, economic and ethical conceptualisations of privacy and data protection, Karlsruhe
6.
Zurück zum Zitat Warren SD, Brandeis LD (1890) The right to privacy. Harv Law Rev 4:193–220CrossRef Warren SD, Brandeis LD (1890) The right to privacy. Harv Law Rev 4:193–220CrossRef
7.
Zurück zum Zitat Solove DJ (2006) A taxonomy of privacy. Univ Pa Law Rev 154(3):477560CrossRef Solove DJ (2006) A taxonomy of privacy. Univ Pa Law Rev 154(3):477560CrossRef
8.
Zurück zum Zitat Patil S, Kobsa A (2009) Privacy considerations in awareness systems: designing with privacy in mind. In: Markopoulos P, Mackay W, Ruyter B (eds) Awareness systems, human-computer interaction series. Springer, Heidelberg Patil S, Kobsa A (2009) Privacy considerations in awareness systems: designing with privacy in mind. In: Markopoulos P, Mackay W, Ruyter B (eds) Awareness systems, human-computer interaction series. Springer, Heidelberg
9.
Zurück zum Zitat European Parliament (1995) EU-Directive 95/46/EC. Official Journal of the European Communities European Parliament (1995) EU-Directive 95/46/EC. Official Journal of the European Communities
10.
Zurück zum Zitat Cranor L, Dobbs B, Egelman S, Hogben G, Humphrey J, Langheinrich M, Marchiori M, Presler-Marshall M, Reagle JM, Schunter M, Stampley DA, Wenning R (2006) The platform for privacy preferences 1.1 (P3P1.1) specification. NOTE-P3P11-20061113 Cranor L, Dobbs B, Egelman S, Hogben G, Humphrey J, Langheinrich M, Marchiori M, Presler-Marshall M, Reagle JM, Schunter M, Stampley DA, Wenning R (2006) The platform for privacy preferences 1.1 (P3P1.1) specification. NOTE-P3P11-20061113
11.
Zurück zum Zitat Nissenbaum H (2010) Privacy in context: technology, policy, and the integrity of social life. Stanford Law Books, Palo Alto Nissenbaum H (2010) Privacy in context: technology, policy, and the integrity of social life. Stanford Law Books, Palo Alto
12.
Zurück zum Zitat Ziegele M, Quiring O (2011) Privacy in social network sites. In: Trepte S, Reinecke L (eds) Privacy online. Perspectives on privacy and self-disclosure in the social web. Springer, Heidelberg/New York Ziegele M, Quiring O (2011) Privacy in social network sites. In: Trepte S, Reinecke L (eds) Privacy online. Perspectives on privacy and self-disclosure in the social web. Springer, Heidelberg/New York
13.
Zurück zum Zitat Beye M, Jeckmans AJP, Erkin Z, Hartel PH, Lagendijk RI, Tang Q (2010) Literature overview – privacy in online social networks. Technical report TR-CTIT-10-36, centre for telematics and information technology, University of Twente, Enschede Beye M, Jeckmans AJP, Erkin Z, Hartel PH, Lagendijk RI, Tang Q (2010) Literature overview – privacy in online social networks. Technical report TR-CTIT-10-36, centre for telematics and information technology, University of Twente, Enschede
14.
Zurück zum Zitat Guha S, Tang K, Francis P (2008) NOYB: privacy in online social networks. In: Proceedings of the 1st workshop on online social networks, Seattle Guha S, Tang K, Francis P (2008) NOYB: privacy in online social networks. In: Proceedings of the 1st workshop on online social networks, Seattle
15.
Zurück zum Zitat van den Berg B, Leenes R (2011) Keeping up appearances: audience segregation in social network sites, Chap. 10. Springer, Dordrecht/Heidelberg, pp 211–231 van den Berg B, Leenes R (2011) Keeping up appearances: audience segregation in social network sites, Chap. 10. Springer, Dordrecht/Heidelberg, pp 211–231
16.
Zurück zum Zitat Aimeur E, Gambs S, Ho A (2010) Towards a privacy-enhanced social networking site. In: Proceedings of the 5th international conference on availability, reliability and security, Corvallis Aimeur E, Gambs S, Ho A (2010) Towards a privacy-enhanced social networking site. In: Proceedings of the 5th international conference on availability, reliability and security, Corvallis
17.
Zurück zum Zitat Boyd D (2008) Taken out of context: American teen sociality in networked publics. Ph.D. thesis, University of California, Berkeley Boyd D (2008) Taken out of context: American teen sociality in networked publics. Ph.D. thesis, University of California, Berkeley
18.
Zurück zum Zitat Mayer-Schonberger V (2009) Delete: the virtue of forgetting in the digital age. Princeton University Press, Princeton Mayer-Schonberger V (2009) Delete: the virtue of forgetting in the digital age. Princeton University Press, Princeton
19.
Zurück zum Zitat Solove DJ (2008) The future of reputation: gossip, rumor, and privacy on the internet. Yale University Press, New Haven Solove DJ (2008) The future of reputation: gossip, rumor, and privacy on the internet. Yale University Press, New Haven
20.
Zurück zum Zitat Gross R, Acquisti A (2005) Information revelation and privacy in online social networks. In: Proceedings of the ACM workshop on privacy in the electronic society, New York Gross R, Acquisti A (2005) Information revelation and privacy in online social networks. In: Proceedings of the ACM workshop on privacy in the electronic society, New York
21.
Zurück zum Zitat Hogben G (2007) Security issues and recommendations for online social networks. Technical report, ENISA Hogben G (2007) Security issues and recommendations for online social networks. Technical report, ENISA
22.
Zurück zum Zitat Altshuler Y, Aharony N, Pentland A, Elovici Y, Cebrian M (2011) Stealing reality: when criminals become data scientists (or vice versa). IEEE Intell Syst 26:22–30CrossRef Altshuler Y, Aharony N, Pentland A, Elovici Y, Cebrian M (2011) Stealing reality: when criminals become data scientists (or vice versa). IEEE Intell Syst 26:22–30CrossRef
23.
Zurück zum Zitat Goffman E (1959) The presentation of self in everyday life. Anchor, New York Goffman E (1959) The presentation of self in everyday life. Anchor, New York
24.
Zurück zum Zitat van den Berg B, Leenes R (2010) Audience segregation in social network sites. In: Proceedings of the 2nd international conference on social computing, Delft van den Berg B, Leenes R (2010) Audience segregation in social network sites. In: Proceedings of the 2nd international conference on social computing, Delft
25.
Zurück zum Zitat Pötzsch S (2009) Privacy awareness: a means to solve the privacy paradox? In: Maty V, Fischer-Hübner S, Cvrcek D, Lvenda P (eds) The future of identity in the information society, IFIP advances in information and communication technology, vol 298. Springer, Heidelberg Pötzsch S (2009) Privacy awareness: a means to solve the privacy paradox? In: Maty V, Fischer-Hübner S, Cvrcek D, Lvenda P (eds) The future of identity in the information society, IFIP advances in information and communication technology, vol 298. Springer, Heidelberg
26.
Zurück zum Zitat Burghardt T, Buchmann E, Bohm K (2008) Why do privacy-enhancement mechanisms fail, after all? A survey of both the user and the provider perspective. In: Proceedings of the international workshop on web 2.0 trust, Trondheim Burghardt T, Buchmann E, Bohm K (2008) Why do privacy-enhancement mechanisms fail, after all? A survey of both the user and the provider perspective. In: Proceedings of the international workshop on web 2.0 trust, Trondheim
27.
Zurück zum Zitat Carminati B, Ferrari E (2008) Access control and privacy in web-based social networks. Int J Web Inf Syst 4(4):395–415 Carminati B, Ferrari E (2008) Access control and privacy in web-based social networks. Int J Web Inf Syst 4(4):395–415
28.
Zurück zum Zitat Carminati B, Ferrari E, Perego A (2009) Enforcing access control in web-based social networks. ACM Trans Inf Syst Secur 13(1):1–38CrossRef Carminati B, Ferrari E, Perego A (2009) Enforcing access control in web-based social networks. ACM Trans Inf Syst Secur 13(1):1–38CrossRef
29.
Zurück zum Zitat Donath J, Boyd D (2004) Public displays of connection. BT Technol J 22(4):71–82CrossRef Donath J, Boyd D (2004) Public displays of connection. BT Technol J 22(4):71–82CrossRef
30.
Zurück zum Zitat Boyd D (2004) Friendster and publicly articulated social networking. In: Proceedings of the SIGCHI conference on human factors and computing systems, Vienna Boyd D (2004) Friendster and publicly articulated social networking. In: Proceedings of the SIGCHI conference on human factors and computing systems, Vienna
31.
Zurück zum Zitat Federrath H, Fuchs KP, Herrmann D, Maier D, Scheuer F, Wagner K (2011) Grenzen des digitalen Radiergummis. Datenschutz und Datensicherheit – DuD 35(6):403–407CrossRef Federrath H, Fuchs KP, Herrmann D, Maier D, Scheuer F, Wagner K (2011) Grenzen des digitalen Radiergummis. Datenschutz und Datensicherheit – DuD 35(6):403–407CrossRef
32.
Zurück zum Zitat Netter M, Riesner M, Pernul G (2011) Assisted social identity management – enhancing privacy in the social web. In: Proceedings of the 10th international conference on Wirtschaftsinformatik, Zürich Netter M, Riesner M, Pernul G (2011) Assisted social identity management – enhancing privacy in the social web. In: Proceedings of the 10th international conference on Wirtschaftsinformatik, Zürich
33.
Zurück zum Zitat Lampinen A, Tamminen S, Oulasvirta A (2009) All my people right here, right now: management of group co-presence on a social networking site. In: Proceedings of the ACM international conference on supporting group work, Sanibel Lampinen A, Tamminen S, Oulasvirta A (2009) All my people right here, right now: management of group co-presence on a social networking site. In: Proceedings of the ACM international conference on supporting group work, Sanibel
34.
Zurück zum Zitat DiMicco JM, Millen DR (2007) Identity management: multiple presentations of self in Facebook. In: Proceedings of the international ACM conference on supporting group work, Sanibel Island DiMicco JM, Millen DR (2007) Identity management: multiple presentations of self in Facebook. In: Proceedings of the international ACM conference on supporting group work, Sanibel Island
35.
Zurück zum Zitat Grimmelmann J (2009) Saving Facebook. Iowa Law Rev 94(4):1137–1206 Grimmelmann J (2009) Saving Facebook. Iowa Law Rev 94(4):1137–1206
36.
Zurück zum Zitat Acquisti A, Gross R (2006) Imagined communities: awareness, information sharing, and privacy on the Facebook. In: Proceedings of the 6th workshop on privacy enhancing technologies, Cambridge Acquisti A, Gross R (2006) Imagined communities: awareness, information sharing, and privacy on the Facebook. In: Proceedings of the 6th workshop on privacy enhancing technologies, Cambridge
37.
Zurück zum Zitat Acquisti A (2004) Privacy in electronic commerce and the economics of immediate gratification. In: Proceedings of the 5th ACM conference on electronic commerce, New York Acquisti A (2004) Privacy in electronic commerce and the economics of immediate gratification. In: Proceedings of the 5th ACM conference on electronic commerce, New York
38.
Zurück zum Zitat Kolter J, Netter M, Pernul G (2010) Visualizing past personal data disclosures. In: Proceedings of the fifth international conference on availability, reliability and security, Krakow Kolter J, Netter M, Pernul G (2010) Visualizing past personal data disclosures. In: Proceedings of the fifth international conference on availability, reliability and security, Krakow
39.
Zurück zum Zitat Tscherteu G, Langreiter C (2009) Explorative Netzwerkanalyse im living web. In: Social semantic web. Springer, Berlin/Heidelberg Tscherteu G, Langreiter C (2009) Explorative Netzwerkanalyse im living web. In: Social semantic web. Springer, Berlin/Heidelberg
40.
Zurück zum Zitat Dix A (2010) Daten- und Personlichkeitsschutz im Web 2.0. In: Klumpp D, Kubicek H, Rob Nagel A, Schulz W (eds) Netzwelt-Wege, Werte, Wandel. Springer, Berlin/Heidelberg, pp 195–210CrossRef Dix A (2010) Daten- und Personlichkeitsschutz im Web 2.0. In: Klumpp D, Kubicek H, Rob Nagel A, Schulz W (eds) Netzwelt-Wege, Werte, Wandel. Springer, Berlin/Heidelberg, pp 195–210CrossRef
41.
Zurück zum Zitat Bonneau J, Preibusch S (2009) The privacy jungle: on the market for data protection in social networks. In: Proceedings of the 8th workshop on the economics of information security, London Bonneau J, Preibusch S (2009) The privacy jungle: on the market for data protection in social networks. In: Proceedings of the 8th workshop on the economics of information security, London
42.
Zurück zum Zitat Feldman DC (1984) The development and enforcement of group norms. Acad Manag Rev 9(1):47–53 Feldman DC (1984) The development and enforcement of group norms. Acad Manag Rev 9(1):47–53
43.
Zurück zum Zitat Peterson C (2010) Losing face: an environmental analysis of privacy on Facebook. SSRN eLibrary Peterson C (2010) Losing face: an environmental analysis of privacy on Facebook. SSRN eLibrary
44.
Zurück zum Zitat Strahilevitz L (2005) A social networks theory of privacy. Univ Chic Law Rev 72(3):919–988 Strahilevitz L (2005) A social networks theory of privacy. Univ Chic Law Rev 72(3):919–988
45.
Zurück zum Zitat Baden R, Bender A, Spring N, Bhattacharjee B, Starin D (2009) Persona: an online social network with user-defined privacy. In: Proceedings of the ACM SIGCOMM conference on data communication, Barcelona Baden R, Bender A, Spring N, Bhattacharjee B, Starin D (2009) Persona: an online social network with user-defined privacy. In: Proceedings of the ACM SIGCOMM conference on data communication, Barcelona
46.
Zurück zum Zitat Organisation for Economic Co-operation and Development (1981) Guidelines on the protection of privacy and transborder flows of personal data, vol 11. Organisation for Economic Cooperation and Development, Paris Organisation for Economic Co-operation and Development (1981) Guidelines on the protection of privacy and transborder flows of personal data, vol 11. Organisation for Economic Cooperation and Development, Paris
47.
Zurück zum Zitat Maliki TE, Seigneur JM (2009) Identity management. In: Vacca JR (ed) Computer and information security handbook, Chap. 17. Burlington, Morgan Kaufmann Maliki TE, Seigneur JM (2009) Identity management. In: Vacca JR (ed) Computer and information security handbook, Chap. 17. Burlington, Morgan Kaufmann
48.
Zurück zum Zitat Debatin B, Lovejoy JP, Horn AK, Hughes BN (2009) Facebook and online privacy: attitudes, behaviors, and unintended consequences. J Comput-Mediat Commun 15(1):83–108CrossRef Debatin B, Lovejoy JP, Horn AK, Hughes BN (2009) Facebook and online privacy: attitudes, behaviors, and unintended consequences. J Comput-Mediat Commun 15(1):83–108CrossRef
49.
Zurück zum Zitat Hoadley CM, Xu H, Lee JJ, Rosson MB (2010) Privacy as information access and illusory control: the case of the Facebook news feed privacy outcry. Electron Commer Res Appl 9(1):50–60CrossRef Hoadley CM, Xu H, Lee JJ, Rosson MB (2010) Privacy as information access and illusory control: the case of the Facebook news feed privacy outcry. Electron Commer Res Appl 9(1):50–60CrossRef
50.
Zurück zum Zitat Agrawal R (2002) Why is P3P not a PET? In: Proceedings of the W3C future of P3P workshop, Dulles Agrawal R (2002) Why is P3P not a PET? In: Proceedings of the W3C future of P3P workshop, Dulles
Metadaten
Titel
Interdisciplinary Impact Analysis of Privacy in Social Networks
verfasst von
Michael Netter
Sebastian Herbst
Günther Pernul
Copyright-Jahr
2013
Verlag
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-4139-7_2