Characterizing privacy in online social networks

@inproceedings{Krishnamurthy2008CharacterizingPI,
  title={Characterizing privacy in online social networks},
  author={Balachander Krishnamurthy and Craig E. Wills},
  booktitle={WOSN '08},
  year={2008}
}
Online social networks (OSNs) with half a billion users have dramatically raised concerns on privacy leakage. Users, often willingly, share personal identifying information about themselves, but do not have a clear idea of who accesses their private information or what portion of it really needs to be accessed. In this study we examine popular OSNs from a viewpoint of characterizing potential privacy leakage. Our study identifies what bits of information are currently being shared, how widely… 

Figures and Tables from this paper

Privacy Albeit Late

TLDR
The main findings are: only a low percentage of users change the default privacy settings; women are more concerned about disclosing personal information online; many users share their photo albums and links to everyone; users exercise more control over content that is more potentially dangerous to their reputation.

You are what you type: Privacy in Online Social Networks

TLDR
This paper will provide an analysis of the privacy issues related to OSNs and using a hypothetical scenario it will argue for the SNS users’ right to privacy.

Inferring Private Attributes in Online Social Networks

TLDR
Based on friendship links, it is able to infer and predict some of the attributes of a user with good accuracy and show that public friendship links of a person can expose different attributes about him.

Privacy in Online Social Networks

  • Elie RaadR. Chbeir
  • Computer Science
    Security and Privacy Preserving in Social Networks
  • 2013
TLDR
This chapter describes the fundamental of social networks, their common representations, and the main motivations associated with their use, and shows how privacy attacks can build on social network analysis and link mining techniques to reveal user-sensitive information.

Privacy and security in online social networks: A survey

To Add or Not to Add: Privacy and Social Honeypots

  • H. HaddadiPan Hui
  • Computer Science
    2010 IEEE International Conference on Communications Workshops
  • 2010
TLDR
It is found that usually users do not accept random friendship requests, but some aggressively search for celebrities, making a perfect case for spammers to form honeypots using such fake profiles.

Will you be my friend? privacy implications of accepting friendships in online social networks

  • S. GhorbaniY. Ganjali
  • Computer Science
    International Conference on Information Society (i-Society 2012)
  • 2012
TLDR
By sending out friend requests to unknown users in one of the largest OSNs, this work provides evidence that a considerable portion of OSN users are willing to let a stranger, possibly an adversary, into their social network, thus granting her access to the users' personal information and to some extent to those of their friends.

Privacy Threats Related to User Profiling in Online Social Networks

TLDR
This paper structure different privacy threats related to OSNs and describe six different types of privacy threats and proposes a range of different protection techniques.

A Privacy Protection Model for Online Social Networks

  • J. Ahmed
  • Computer Science
    SW4LAW+DC@JURIX
  • 2014
TLDR
This model uses type, frequency, and initiation factor of social interactions to calculate relationship strength and mimics real life interaction patterns and makes online social networks more privacy friendly.

Privacy suites: shared privacy for social networks

TLDR
A new paradigm is proposed which allows users to easily choose "suites" of privacy settings which have been specified by friends or trusted experts, only modifying them if they wish, which could dramatically increase the privacy protection that most users experience with minimal time investment.
...

References

SHOWING 1-10 OF 14 REFERENCES

Information revelation and privacy in online social networks

TLDR
This paper analyzes the online behavior of more than 4,000 Carnegie Mellon University students who have joined a popular social networking site catered to colleges and evaluates the amount of information they disclose and study their usage of the site's privacy settings.

Preserving Privacy in Social Networks Against Neighborhood Attacks

  • Bin ZhouJ. Pei
  • Computer Science
    2008 IEEE 24th International Conference on Data Engineering
  • 2008
TLDR
The empirical study indicates that anonymized social networks generated by the method can still be used to answer aggregate network queries with high accuracy and present a practical solution to battle neighborhood attacks.

Link Privacy in Social Networks

TLDR
Any social network that wishes to protect the link privacy of its users should take great care in choosing the lookahead of its interface, limiting it to 1 or 2, whenever possible.

Measuring privacy loss and the impact of privacy protection in web browsing

TLDR
Using objective measures for privacy protection and page quality, this work examines the effectiveness of specific techniques to limit the diffusion of private information to third parties and the impact of these privacy protection techniques on the usability and quality of the Web pages returned.

k-Anonymity: A Model for Protecting Privacy

  • L. Sweeney
  • Computer Science
    Int. J. Uncertain. Fuzziness Knowl. Based Syst.
  • 2002
TLDR
The solution provided in this paper includes a formal protection model named k-anonymity and a set of accompanying policies for deployment and examines re-identification attacks that can be realized on releases that adhere to k- anonymity unless accompanying policies are respected.

A few chirps about twitter

TLDR
A detailed characterization of Twitter, an application that allows users to send short messages, is presented, which identifies distinct classes of Twitter users and their behaviors, geographic growth patterns and current size of the network.

Betrayed By My Shadow: Learning Data Identity via Trail Matching

TLDR
This work provides a foundation for several new research directions, including the development of methods for learning identity and additional information across disparate datasets, as well as a foundations for methods that enable data holders to share information with guarantees of anonymity.

Key differences between Web 1.0 and Web 2.0

TLDR
Novel challenges due to the different structures of Web 2.0 sites, richer methods of user interaction, new technologies, and fundamentally different philosophy are identified.

Internet Measurement - Infrastructure, Traffic, and Applications

TLDR
This book focuses on the role of Internet Measurement in Security, and the challenges and prospects for future work in this area.

Generating a privacy footprint on the internet

TLDR
The results show that the size of the privacy footprint is a legitimate cause for concern across the sets of sites that the study and the effectiveness of existing and new techniques to reduce this diffusion are examined.