• Corpus ID: 9228860

IWantPrivacy : Widespread Violation of Privacy Settings in the Twitter Social Network

@inproceedings{Meeder2010IWantPrivacyW,
  title={IWantPrivacy : Widespread Violation of Privacy Settings in the Twitter Social Network},
  author={Brendan Meeder and Jennifer Tam and Patrick Gage Kelley and Lorrie Faith Cranor},
  year={2010}
}
Twitter is a social network that focuses on creating and sharing short 140 character messages know as tweets. Twitter’s sole privacy policy is a binary option that either allows every message a user creates to be publicly available, or allows only a user’s followers to see posted messages. As the Twitter community grew, conventions organically formed that allowfor rich expressiveness with only 140 characters. Repeating wh at someone else says is called retweeting; this behavior facilitates the… 
Loose tweets: an analysis of privacy leaks on twitter
TLDR
The nature of privacy leaks on Twitter is characterized to gain an understanding of what types of private information people are revealing on it and automatic classifiers are built to detect incriminating tweets for these three topics in real time in order to demonstrate the real threat posed to users by, e.g., burglars and law enforcement.
Usage and Consequences of Privacy Settings in Microblogs
  • Elena Daehnhardt, N. Taylor, Yanguo Jing
  • Computer Science
    2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing
  • 2015
TLDR
The findings revealed that protecting user accounts is not always detrimental to exploiting the main microblogging features and that users across geographic regions have different privacy preferences.
Hummingbird: Privacy at the Time of Twitter
TLDR
This paper assesses privacy in today's Twitter-like OSNs and describes an architecture and a trial implementation of a privacy-preserving service called Hummingbird, essentially a variant of Twitter that protects tweet contents, hash tags and follower interests from the (potentially) prying eyes of the centralized server.
WhACKY! - What anyone could know about you from Twitter
Twitter is a popular micro-blogging website which allows users to post 140-character limit messages called tweets. We demonstrate a cheap and elegant solution - WhACKY! - to harness the multi-source
Analysis of Privacy Leak on Twitter
TLDR
This work categorizes the tweets into private and non-private, based on whether they reveal any private information or not, and tries to gain more insights into categorized private tweets by identifying the type of private data being revealed.
Understanding & controlling user privacy in social media via exposure
TLDR
This thesis proposes a new model, which is a significant improvement over access control to capture users’ privacy requirements, and investigates the effectiveness of the model to protect users' privacy in three real world scenarios.
Security and Privacy in Online Social Networks-A Survey
TLDR
The challenges that providers face in maintaining the proper operation of an online social network including minimizing spam messages, and reducing the number of sybil accounts are covered.
A Survey of Security and Privacy Research in Online Social Networks
This survey highlights the major issues concerning privacy and security in online social networks (OSNs). Firstly, we discuss research that aims to protect user data from the various attack vantage
The Tweets They Are a-Changin: Evolution of Twitter Users and Behavior
TLDR
Using a set of over 37 billion tweets spanning over seven years, a number of trends are observed including the spread of Twitter across the globe, the rise of spam and malicious behavior, the rapid adoption of tweeting conventions, and the shift from desktop to mobile usage are observed.
A Survey of Security and Privacy in Online Social Networks
TLDR
The challenges that providers face in maintaining the proper operation of an online social network including minimizing spam messages, and reducing the number of sybil accounts are covered.
...
...

References

SHOWING 1-10 OF 24 REFERENCES
What is Twitter, a social network or a news media?
TLDR
This work is the first quantitative study on the entire Twittersphere and information diffusion on it and finds a non-power-law follower distribution, a short effective diameter, and low reciprocity, which all mark a deviation from known characteristics of human social networks.
Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook
TLDR
It is found that an individual's privacy concerns are only a weak predictor of his membership to the Facebook, and also privacy concerned individuals join the network and reveal great amounts of personal information.
Information revelation and privacy in online social networks
TLDR
This paper analyzes the online behavior of more than 4,000 Carnegie Mellon University students who have joined a popular social networking site catered to colleges and evaluates the amount of information they disclose and study their usage of the site's privacy settings.
Why we twitter: understanding microblogging usage and communities
TLDR
It is found that people use microblogging to talk about their daily activities and to seek or share information and the user intentions associated at a community level are analyzed to show how users with similar intentions connect with each other.
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing
TLDR
In a first-of-its-kind study, context-aware camerephone devices are used to examine privacy decisions in mobile and online photo sharing and identify relationships between location of photo capture and photo privacy settings.
A few chirps about twitter
TLDR
A detailed characterization of Twitter, an application that allows users to send short messages, is presented, which identifies distinct classes of Twitter users and their behaviors, geographic growth patterns and current size of the network.
Twitter and status updating
TLDR
Overall, Twitter users engage with news and own technology at the same rates as other internet users, but the ways in which they use the technology reveals their affinity for mobile, untethered and social opportunities for interaction.
Tweet, Tweet, Retweet: Conversational Aspects of Retweeting on Twitter
TLDR
This paper examines the practice of retweeting as a way by which participants can be "in a conversation" and highlights how authorship, attribution, and communicative fidelity are negotiated in diverse ways.
Beyond Microblogging: Conversation and Collaboration via Twitter
TLDR
A corpus of naturally-occurring public Twitter messages reveals a surprising degree of conversationality, facilitated especially by the use of @ as a marker of addressivity, and shed light on the limitations of Twitter's current design for collaborative use.
Who gets to know what when: configuring privacy permissions in an awareness application
TLDR
Although location was the most sensitive aspect of awareness, participants were comfortable disclosing room-level location information to their team members at work and suggest utilizing grouping mechanisms to balance privacy control with configuration burden, and argue for increased system transparency to build trust.
...
...