ABSTRACT
Participation in social networking sites has dramatically increased in recent years. Services such as Friendster, Tribe, or the Facebook allow millions of individuals to create online profiles and share personal information with vast networks of friends - and, often, unknown numbers of strangers. In this paper we study patterns of information revelation in online social networks and their privacy implications. We analyze the online behavior of more than 4,000 Carnegie Mellon University students who have joined a popular social networking site catered to colleges. We evaluate the amount of information they disclose and study their usage of the site's privacy settings. We highlight potential attacks on various aspects of their privacy, and we show that only a minimal percentage of users changes the highly permeable privacy preferences.
- A. Acquisti. Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the ACM Conference on Electronic Commerce (EC '04), pages 21--29, 2004. Google ScholarDigital Library
- B. Anderson. Imagined Communities: Reflections on the Origin and Spread of Nationalism. Verso, London and New York, revised edition, 1991.Google Scholar
- S. Arrison. Is Friendster the new TIA? TechCentralStation, January 7, 2004.Google Scholar
- J. Black. The perils and promise of online schmoozing. BusinessWeek Online, February 20, 2004.Google Scholar
- J. Brown. Six degrees to nowhere. Salon.com, September 21, 1998.Google Scholar
- D. Cave. 16 to 25? Pentagon has your number, and more. The New York Times, June 24, 2005.Google Scholar
- d. boyd. Reflections on friendster, trust and intimacy. In Intimate (Ubiquitous) Computing Workshop - Ubicomp 2003, October 12-15, Seattle, Washington, USA, 2003.Google Scholar
- d. boyd. Friendster and publicly articulated social networking. In Conference on Human Factors and Computing Systems (CHI 2004), April 24-29, Vienna, Austria, 2004. Google ScholarDigital Library
- J. Donath and d. boyd. Public displays of connection. BT Technology Journal, 22:71--82, 2004. Google ScholarDigital Library
- S. Gerstein. Intimacy and privacy. In F. D. Schoeman, editor, Philosophical Dimensions of Privacy: An Anthology. Cambridge University Press, Cambridge, UK, 1984.Google ScholarCross Ref
- M. Granovetter. The strength of weak ties. American Journal of Sociology, 78:1360--1380, 1973.Google ScholarCross Ref
- M. Granovetter. The strength of weak ties: A network theory revisited. Sociological Theory, 1:201--233, 1983.Google ScholarCross Ref
- R. Gross. Re-identifying facial images. Technical report, Carnegie Mellon University, Institute for Software Research International, 2005. In preparation.Google Scholar
- R. Gross, J. Shi, and J. Cohn. Quo vadis face recognition? In Third Workshop on Empirical Evaluation Methods in Computer Vision, 2001.Google Scholar
- K. Jump. A new kind of fame. The Columbian Missourian, September 1, 2005.Google Scholar
- A. Leonard. You are who you know. Salon.com, June 15, 2004.Google Scholar
- S. Li and A. Jain, editors. Handbook of Face Recognition. Springer Verlag, 2005. Google ScholarDigital Library
- H. Liu and P. Maes. Interestmap: Harvesting social network profiles for recommendations. In Beyond Personalization - IUI 2005, January 9, San Diego, California, USA, 2005.Google Scholar
- W. Mackay. Triggers and barriers to customizing software. In Proceedings of CHI'91, pages 153--160. ACM Press, 1991. Google ScholarDigital Library
- S. Milgram. The small world problem. Psychology Today, 6:62--67, 1967.Google Scholar
- S. Milgram. The familiar stranger: An aspect of urban anonymity. In S. Milgram, J. Sabini, and M. Silver, editors, The Individual in a Social World: Essays and Experiments. Addison-Wesley, Reading, MA, 1977.Google Scholar
- K. Mitnick, W. Simon, and S. Wozniak. The art of deception: controlling the human element of security. John Wiley & Sons, 2002. Google ScholarDigital Library
- A. Newitz. Defenses lacking at social network sites. SecurityFocus, December 31, 2003.Google Scholar
- P. Phillips, P. Flynn, T. Scruggs, K. Bowyer, J. Chang, K. Hoffman, J. Marques, J. Min, and J. Worek. Overview of the face recognition grand challenge. In IEEE Conference on Computer Vision and Pattern Recognition, June 20-25, San Diego, California, USA, 2005. Google ScholarDigital Library
- P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and cell suppression. Technical report, SRI International, 1998.Google Scholar
- I. Sege. Where everybody knows your name. Boston.com, April 27, 2005.Google Scholar
- L. J. Strahilevitz. A social networks theory of privacy. The Law School, University of Chicago, John M. Olin Law & Economics Working Paper No. 230 (2D Series), December 2004.Google Scholar
- L. Sweeney. k-Anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10(5):557--570, 2002. Google ScholarDigital Library
- L. Sweeney. Uniqueness of simple demographics in the U.S. population. Technical report, Carnegie Mellon University, Laboratory for International Data Privacy, 2004.Google Scholar
- The Facebook. Privacy policy. http://facebook.com/policy.php, August 2005.Google Scholar
- University Planning. Carnegie Mellon Factbook 2005. Carnegie Mellon University, February 2005.Google Scholar
- D. Watts. Six Degrees: The Science of a Connected Age. W.W.Norton & Company, 2003.Google Scholar
Index Terms
- Information revelation and privacy in online social networks
Recommendations
Information revelation and internet privacy concerns on social network sites: a case study of facebook
C&T '09: Proceedings of the fourth international conference on Communities and technologiesDespite concerns raised about the disclosure of personal information on social network sites, research has demonstrated that users continue to disclose personal information. The present study employs surveys and interviews to examine the factors that ...
Analysis of privacy in online social networks of runet
SIN '10: Proceedings of the 3rd international conference on Security of information and networksIn recent years, social networking sites (SNSs) gained high popularity among Internet users as they combine the best of both worlds: befriending people outside real life situations and staying in touch with people already known. An important aspect of ...
Uses and gratifications of social networking sites for bridging and bonding social capital
Applying uses and gratifications theory (UGT) and social capital theory, our study examined users of four social networking sites (SNSs) (Facebook, Twitter, Instagram, and Snapchat), and their influence on online bridging and bonding social capital. ...
Comments