skip to main content
research-article

How do we decide how much to reveal?

Published:19 February 2015Publication History
Skip Abstract Section

Abstract

How do we decide how much to share online given that information can spread to millions in large social networks? Is it always our own decision or are we influenced by our friends? Let's isolate this problem to one variable, private information. How much private information are we sharing in our posts and are we the only authority controlling how much private information to divulge in our text messages? Understanding how privacy behavior is formed could give us key insights for choosing our privacy settings, friends circles, and how much privacy to sacrifice in social networks. Before analyzing end users' privacy behavior, we had the intuition that privacy behavior might be under the effect of network phenomena. Christakis and Fowler's network analytics studies [2] showing that obesity spreads through social ties and smoking cessation is a collective behavior [3], influenced us to further investigate network properties of privacy behavior.

References

  1. A. Caliskan Islam, J. Walsh, and R. Greenstadt. Privacy detective: Detecting private information and collective privacy behavior in a large social network. In Proceedings of the 13th Workshop on Privacy in the Electronic Society, pages 35--46. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. N. A. Christakis and J. H. Fowler. The spread of obesity in a large social network over 32 years. New England journal of medicine, 357(4): 370--379, 2007.Google ScholarGoogle Scholar
  3. N. A. Christakis and J. H. Fowler. The collective dynamics of smoking in a large social network. New England journal of medicine, 358(21): 2249--2258, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  4. V. Garg, S. Patil, A. Kapadia, and L. J. Camp. Peer-produced privacy protection. In International Symposium on Technology and Society (ISTAS), pages 147--154. IEEE, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  5. M. Sleeper, J. Cranshaw, P. G. Kelley, B. Ur, A. Acquisti, L. F. Cranor, and N. Sadeh. i read my twitter the next morning and was astonished: a conversational perspective on twitter regrets. In Proceedings of the 2013 ACM annual conference on Human factors in computing systems, pages 3277--3286. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Y. Wang, P. G. Leon, K. Scott, X. Chen, A. Acquisti, and L. F. Cranor. Privacy nudges for social media: An exploratory facebook study. In Proceedings of the 22Nd International Conference on World Wide Web Companion, WWW '13 Companion, pages 763--770, Republic and Canton of Geneva, Switzerland, 2013. International World Wide Web Conferences Steering Committee. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Y. Wang, G. Norcie, S. Komanduri, A. Acquisti, P. G. Leon, and L. F. Cranor. "i regretted the minute i pressed share": A qualitative study of regrets on facebook. In Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS '11, pages 10:1--10:16, New York, NY, USA, 2011. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image ACM SIGCAS Computers and Society
    ACM SIGCAS Computers and Society  Volume 45, Issue 1
    February 2015
    39 pages
    ISSN:0095-2737
    DOI:10.1145/2738210
    Issue’s Table of Contents

    Copyright © 2015 Author

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 19 February 2015

    Check for updates

    Qualifiers

    • research-article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader