skip to main content
10.1145/1102199.1102214acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Information revelation and privacy in online social networks

Published:07 November 2005Publication History

ABSTRACT

Participation in social networking sites has dramatically increased in recent years. Services such as Friendster, Tribe, or the Facebook allow millions of individuals to create online profiles and share personal information with vast networks of friends - and, often, unknown numbers of strangers. In this paper we study patterns of information revelation in online social networks and their privacy implications. We analyze the online behavior of more than 4,000 Carnegie Mellon University students who have joined a popular social networking site catered to colleges. We evaluate the amount of information they disclose and study their usage of the site's privacy settings. We highlight potential attacks on various aspects of their privacy, and we show that only a minimal percentage of users changes the highly permeable privacy preferences.

References

  1. A. Acquisti. Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the ACM Conference on Electronic Commerce (EC '04), pages 21--29, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. B. Anderson. Imagined Communities: Reflections on the Origin and Spread of Nationalism. Verso, London and New York, revised edition, 1991.Google ScholarGoogle Scholar
  3. S. Arrison. Is Friendster the new TIA? TechCentralStation, January 7, 2004.Google ScholarGoogle Scholar
  4. J. Black. The perils and promise of online schmoozing. BusinessWeek Online, February 20, 2004.Google ScholarGoogle Scholar
  5. J. Brown. Six degrees to nowhere. Salon.com, September 21, 1998.Google ScholarGoogle Scholar
  6. D. Cave. 16 to 25? Pentagon has your number, and more. The New York Times, June 24, 2005.Google ScholarGoogle Scholar
  7. d. boyd. Reflections on friendster, trust and intimacy. In Intimate (Ubiquitous) Computing Workshop - Ubicomp 2003, October 12-15, Seattle, Washington, USA, 2003.Google ScholarGoogle Scholar
  8. d. boyd. Friendster and publicly articulated social networking. In Conference on Human Factors and Computing Systems (CHI 2004), April 24-29, Vienna, Austria, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Donath and d. boyd. Public displays of connection. BT Technology Journal, 22:71--82, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Gerstein. Intimacy and privacy. In F. D. Schoeman, editor, Philosophical Dimensions of Privacy: An Anthology. Cambridge University Press, Cambridge, UK, 1984.Google ScholarGoogle ScholarCross RefCross Ref
  11. M. Granovetter. The strength of weak ties. American Journal of Sociology, 78:1360--1380, 1973.Google ScholarGoogle ScholarCross RefCross Ref
  12. M. Granovetter. The strength of weak ties: A network theory revisited. Sociological Theory, 1:201--233, 1983.Google ScholarGoogle ScholarCross RefCross Ref
  13. R. Gross. Re-identifying facial images. Technical report, Carnegie Mellon University, Institute for Software Research International, 2005. In preparation.Google ScholarGoogle Scholar
  14. R. Gross, J. Shi, and J. Cohn. Quo vadis face recognition? In Third Workshop on Empirical Evaluation Methods in Computer Vision, 2001.Google ScholarGoogle Scholar
  15. K. Jump. A new kind of fame. The Columbian Missourian, September 1, 2005.Google ScholarGoogle Scholar
  16. A. Leonard. You are who you know. Salon.com, June 15, 2004.Google ScholarGoogle Scholar
  17. S. Li and A. Jain, editors. Handbook of Face Recognition. Springer Verlag, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. H. Liu and P. Maes. Interestmap: Harvesting social network profiles for recommendations. In Beyond Personalization - IUI 2005, January 9, San Diego, California, USA, 2005.Google ScholarGoogle Scholar
  19. W. Mackay. Triggers and barriers to customizing software. In Proceedings of CHI'91, pages 153--160. ACM Press, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Milgram. The small world problem. Psychology Today, 6:62--67, 1967.Google ScholarGoogle Scholar
  21. S. Milgram. The familiar stranger: An aspect of urban anonymity. In S. Milgram, J. Sabini, and M. Silver, editors, The Individual in a Social World: Essays and Experiments. Addison-Wesley, Reading, MA, 1977.Google ScholarGoogle Scholar
  22. K. Mitnick, W. Simon, and S. Wozniak. The art of deception: controlling the human element of security. John Wiley & Sons, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. A. Newitz. Defenses lacking at social network sites. SecurityFocus, December 31, 2003.Google ScholarGoogle Scholar
  24. P. Phillips, P. Flynn, T. Scruggs, K. Bowyer, J. Chang, K. Hoffman, J. Marques, J. Min, and J. Worek. Overview of the face recognition grand challenge. In IEEE Conference on Computer Vision and Pattern Recognition, June 20-25, San Diego, California, USA, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and cell suppression. Technical report, SRI International, 1998.Google ScholarGoogle Scholar
  26. I. Sege. Where everybody knows your name. Boston.com, April 27, 2005.Google ScholarGoogle Scholar
  27. L. J. Strahilevitz. A social networks theory of privacy. The Law School, University of Chicago, John M. Olin Law & Economics Working Paper No. 230 (2D Series), December 2004.Google ScholarGoogle Scholar
  28. L. Sweeney. k-Anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10(5):557--570, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. L. Sweeney. Uniqueness of simple demographics in the U.S. population. Technical report, Carnegie Mellon University, Laboratory for International Data Privacy, 2004.Google ScholarGoogle Scholar
  30. The Facebook. Privacy policy. http://facebook.com/policy.php, August 2005.Google ScholarGoogle Scholar
  31. University Planning. Carnegie Mellon Factbook 2005. Carnegie Mellon University, February 2005.Google ScholarGoogle Scholar
  32. D. Watts. Six Degrees: The Science of a Connected Age. W.W.Norton & Company, 2003.Google ScholarGoogle Scholar

Index Terms

  1. Information revelation and privacy in online social networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WPES '05: Proceedings of the 2005 ACM workshop on Privacy in the electronic society
        November 2005
        116 pages
        ISBN:1595932283
        DOI:10.1145/1102199

        Copyright © 2005 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 7 November 2005

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate106of355submissions,30%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader