Skip to main content

2014 | OriginalPaper | Buchkapitel

Privacy Implications of Privacy Settings and Tagging in Facebook

verfasst von : Stan Damen, Nicola Zannone

Erschienen in: Secure Data Management

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Social networks are becoming increasingly popular nowadays. Users share personal information about themselves and other users in order to build and maintain their social network. However, the large amount of personal information available on social networks poses risks of data misuse. Although social networks offer users the possibility to specify privacy settings to regulate access to their information, these settings are often complicated and unintuitive, especially when dealing with new modalities of social communication like tagging. In this paper we investigate the privacy consequences of information sharing in social networks. In particular, we formally analyze the impact of the privacy settings and the use of tagging in Facebook on the visibility of information. To increase users’ awareness of the risks of information sharing and empower users to control their information, we present a tool for determining the visibility of users’ information based on their privacy settings and tagging.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Although Facebook also allows users to include tags in comments, we do not consider such tags in the paper as they do not change the visibility of objects.
 
2
Bob’s friend and Alice have to be friends as this is a requirement for tagging in Facebook.
 
3
The rules for images and albums are similar to the ones for posts.
 
4
A tag can be inserted in a post only when the post is created. Accordingly, the tag issuer and data provider coincide for posts.
 
Literatur
1.
Zurück zum Zitat Apt, K.R.: Introduction to logic programming. In: van Leeuwen, J. (ed.) The Handbook of Theoretical Computer Science, pp. 495–574. North Holland, Amsterdam (1990) Apt, K.R.: Introduction to logic programming. In: van Leeuwen, J. (ed.) The Handbook of Theoretical Computer Science, pp. 495–574. North Holland, Amsterdam (1990)
2.
Zurück zum Zitat Atwan, G., Lushing, E.: The Facebook Book. Abrams Image, New York (2008) Atwan, G., Lushing, E.: The Facebook Book. Abrams Image, New York (2008)
3.
Zurück zum Zitat Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. SIGCOMM Comp. Commun. Rev. 39(4), 135–146 (2009)CrossRef Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. SIGCOMM Comp. Commun. Rev. 39(4), 135–146 (2009)CrossRef
4.
Zurück zum Zitat Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings of WWW, pp. 551–560. ACM (2009) Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings of WWW, pp. 551–560. ACM (2009)
5.
Zurück zum Zitat Clarke, E.H.: Multipart pricing of public goods. Public Choice 11, 17–33 (1971)CrossRef Clarke, E.H.: Multipart pricing of public goods. Public Choice 11, 17–33 (1971)CrossRef
6.
Zurück zum Zitat Cutillo, L.A., Molva, R., Önen, M.: Safebook: a privacy preserving online social network leveraging on real-life trust. IEEE Commun. Mag. 47, 94–101 (2009)CrossRef Cutillo, L.A., Molva, R., Önen, M.: Safebook: a privacy preserving online social network leveraging on real-life trust. IEEE Commun. Mag. 47, 94–101 (2009)CrossRef
7.
Zurück zum Zitat Faliagka, E., Tsakalidis, A., Vaikousi, D.: Teenagers’ use of social network websites and privacy concerns: a survey. In: Proceedings of PCI, pp. 207–211. IEEE (2011) Faliagka, E., Tsakalidis, A., Vaikousi, D.: Teenagers’ use of social network websites and privacy concerns: a survey. In: Proceedings of PCI, pp. 207–211. IEEE (2011)
8.
Zurück zum Zitat Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of Workshop on Privacy in the Electronic Society, pp. 71–80. ACM (2005) Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of Workshop on Privacy in the Electronic Society, pp. 71–80. ACM (2005)
9.
Zurück zum Zitat Guarda, P., Zannone, N.: Towards the development of privacy-aware systems. Inf. Softw. Technol. 51(2), 337–350 (2009)CrossRef Guarda, P., Zannone, N.: Towards the development of privacy-aware systems. Inf. Softw. Technol. 51(2), 337–350 (2009)CrossRef
10.
Zurück zum Zitat Gürses, S.F., Rizk, R., Gunther, O.: Privacy design in online social networks: learning from privacy breaches and community feedback. In: Proceedings of International Conference on Information Systems, Association for Information Systems, pp. 90 (2008) Gürses, S.F., Rizk, R., Gunther, O.: Privacy design in online social networks: learning from privacy breaches and community feedback. In: Proceedings of International Conference on Information Systems, Association for Information Systems, pp. 90 (2008)
11.
Zurück zum Zitat Haron, H., Yusof, F.: Cyber stalking: the social impact of social networking technology. In: Proceedings of International Conference on Education and Management Technology, pp. 237–241. IEEE (2010) Haron, H., Yusof, F.: Cyber stalking: the social impact of social networking technology. In: Proceedings of International Conference on Education and Management Technology, pp. 237–241. IEEE (2010)
12.
Zurück zum Zitat Johnson, C.Y.: Project ‘Gaydar’ At MIT, an experiment identifies which students are gay, raising new questions about online privacy. Boston Globe (2009) Johnson, C.Y.: Project ‘Gaydar’ At MIT, an experiment identifies which students are gay, raising new questions about online privacy. Boston Globe (2009)
13.
Zurück zum Zitat Larcom, G., Elbirt, A.: Gone phishing. IEEE Technol. Soc. Mag. 25(3), 52–55 (2006)CrossRef Larcom, G., Elbirt, A.: Gone phishing. IEEE Technol. Soc. Mag. 25(3), 52–55 (2006)CrossRef
14.
Zurück zum Zitat Li, Q., Li, J., Wang, H., Ginjala, A.: Semantics-enhanced privacy recommendation for social networking sites. In: Proceedings of TrustCom, pp. 226–233. IEEE (2011) Li, Q., Li, J., Wang, H., Ginjala, A.: Semantics-enhanced privacy recommendation for social networking sites. In: Proceedings of TrustCom, pp. 226–233. IEEE (2011)
15.
Zurück zum Zitat Luo, W., Xie, Q., Hengartner, U.: FaceCloak: an architecture for user privacy on social networking sites. In: Proceedings of CSE, pp. 26–33. IEEE (2009) Luo, W., Xie, Q., Hengartner, U.: FaceCloak: an architecture for user privacy on social networking sites. In: Proceedings of CSE, pp. 26–33. IEEE (2009)
16.
Zurück zum Zitat Mack, E.: Facebook’s ‘Like’ button illegal in German state. CNET news (2011) Mack, E.: Facebook’s ‘Like’ button illegal in German state. CNET news (2011)
17.
Zurück zum Zitat Marlow, C., Naaman, M., Boyd, D., Davis, M.: HT06, tagging paper, taxonomy, Flickr, academic article, to read. In: Proceedings of the Seventeenth Conference on Hypertext and Hypermedia, pp. 31–40. ACM (2006) Marlow, C., Naaman, M., Boyd, D., Davis, M.: HT06, tagging paper, taxonomy, Flickr, academic article, to read. In: Proceedings of the Seventeenth Conference on Hypertext and Hypermedia, pp. 31–40. ACM (2006)
18.
Zurück zum Zitat Maximilien, E.M., Grandison, T., Liu, K., Sun, T., Richardson, D., Guo, S.: Enabling privacy as a fundamental construct for social networks. In: Proceedings of International Conference on Computational Science and Engineering, pp. 1015–1020. IEEE (2009) Maximilien, E.M., Grandison, T., Liu, K., Sun, T., Richardson, D., Guo, S.: Enabling privacy as a fundamental construct for social networks. In: Proceedings of International Conference on Computational Science and Engineering, pp. 1015–1020. IEEE (2009)
19.
Zurück zum Zitat Nagle, F., Singh, L.: Can friends be trusted? exploring privacy in online social networks. In: Proceedings of International Conference on Advances in Social Network Analysis and Mining, pp. 312–315. IEEE (2009) Nagle, F., Singh, L.: Can friends be trusted? exploring privacy in online social networks. In: Proceedings of International Conference on Advances in Social Network Analysis and Mining, pp. 312–315. IEEE (2009)
20.
Zurück zum Zitat Qing-jiang, K., Xiao-hao, W., Jun, Z.: The (P, \(\alpha \), K) anonymity model for privacy protection of personal information in the social networks. In: Proceedings of International Conference on Information Technology and Artificial Intelligence, pp. 420–423. IEEE (2011) Qing-jiang, K., Xiao-hao, W., Jun, Z.: The (P, \(\alpha \), K) anonymity model for privacy protection of personal information in the social networks. In: Proceedings of International Conference on Information Technology and Artificial Intelligence, pp. 420–423. IEEE (2011)
21.
Zurück zum Zitat Shen, H., Dewan, P.: Access control for collaborative environments. In: Proceedings of Conference on Computer-Supported Cooperative Work, pp. 51–58. ACM (1992) Shen, H., Dewan, P.: Access control for collaborative environments. In: Proceedings of Conference on Computer-Supported Cooperative Work, pp. 51–58. ACM (1992)
22.
Zurück zum Zitat Spiekermann, S., Cranor, L.: Engineering privacy. TSE 35(1), 67–82 (2009) Spiekermann, S., Cranor, L.: Engineering privacy. TSE 35(1), 67–82 (2009)
23.
Zurück zum Zitat Squicciarini, A.C., Shehab, M., Wede, J.: Privacy policies for shared content in social network sites. VLDB J. 19(6), 777–796 (2010)CrossRef Squicciarini, A.C., Shehab, M., Wede, J.: Privacy policies for shared content in social network sites. VLDB J. 19(6), 777–796 (2010)CrossRef
24.
Zurück zum Zitat Stone, Z., Zickler, T., Darrell, T.: Autotagging facebook: social network context improves photo annotation. In: Proceedings of Computer Vision and Pattern Recognition Workshops, pp. 1–8. IEEE (2008) Stone, Z., Zickler, T., Darrell, T.: Autotagging facebook: social network context improves photo annotation. In: Proceedings of Computer Vision and Pattern Recognition Workshops, pp. 1–8. IEEE (2008)
25.
Zurück zum Zitat Thomas, K., Grier, C., Nicol, D.M.: unFriendly: multi-party privacy risks in social networks. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 236–252. Springer, Heidelberg (2010) Thomas, K., Grier, C., Nicol, D.M.: unFriendly: multi-party privacy risks in social networks. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 236–252. Springer, Heidelberg (2010)
26.
Zurück zum Zitat Thomas, R.K.: TeaM-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. In: Proceedings of Workshop on Role-Based Access Control, pp. 13–19. ACM (1997) Thomas, R.K.: TeaM-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. In: Proceedings of Workshop on Role-Based Access Control, pp. 13–19. ACM (1997)
27.
Zurück zum Zitat Thompson, H.H.: How I Stole Someone’s Identity (Anatomy of a Social hack). Scientific American (2010) Thompson, H.H.: How I Stole Someone’s Identity (Anatomy of a Social hack). Scientific American (2010)
28.
Zurück zum Zitat Tolone, W., Ahn, G.J., Pai, T., Hong, S.P.: Access control in collaborative systems. ACM Comput. Surv. 37(1), 29–41 (2005)CrossRef Tolone, W., Ahn, G.J., Pai, T., Hong, S.P.: Access control in collaborative systems. ACM Comput. Surv. 37(1), 29–41 (2005)CrossRef
29.
Zurück zum Zitat Tootoonchian, A., Saroiu, S., Wolman, A., Ganjali, Y.: Lockr: better privacy for social networks. In: Proceedings of International Conference on Emerging Networking EXperiments and Technologies, pp. 169–180. ACM (2009) Tootoonchian, A., Saroiu, S., Wolman, A., Ganjali, Y.: Lockr: better privacy for social networks. In: Proceedings of International Conference on Emerging Networking EXperiments and Technologies, pp. 169–180. ACM (2009)
30.
Zurück zum Zitat Young, A.L., Quan-Haase, A.: Information revelation and internet privacy concerns on social network sites: a case study of facebook. In: Proceedings of International Conference on Communities and Technologies, pp. 265–274. ACM (2009) Young, A.L., Quan-Haase, A.: Information revelation and internet privacy concerns on social network sites: a case study of facebook. In: Proceedings of International Conference on Communities and Technologies, pp. 265–274. ACM (2009)
31.
Zurück zum Zitat Yuksel, A.S., Yuksel, M.E., Zaim, A.H.: An approach for protecting privacy on social networks. In: Proceedings of International Conference on Systems and Networks Communications, pp. 154–159. IEEE (2010) Yuksel, A.S., Yuksel, M.E., Zaim, A.H.: An approach for protecting privacy on social networks. In: Proceedings of International Conference on Systems and Networks Communications, pp. 154–159. IEEE (2010)
32.
Zurück zum Zitat Zheleva, E., Getoor, L.: To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In: Proceedings of WWW, pp. 531–540. ACM (2009) Zheleva, E., Getoor, L.: To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In: Proceedings of WWW, pp. 531–540. ACM (2009)
Metadaten
Titel
Privacy Implications of Privacy Settings and Tagging in Facebook
verfasst von
Stan Damen
Nicola Zannone
Copyright-Jahr
2014
DOI
https://doi.org/10.1007/978-3-319-06811-4_16

Premium Partner