Information revelation and privacy in online social networks

@inproceedings{Gross2005InformationRA,
  title={Information revelation and privacy in online social networks},
  author={Ralph Gross and Alessandro Acquisti},
  booktitle={WPES '05},
  year={2005}
}
Participation in social networking sites has dramatically increased in recent years. [...] Key Result We highlight potential attacks on various aspects of their privacy, and we show that only a minimal percentage of users changes the highly permeable privacy preferences.Expand
Privacy Implications of Privacy Settings and Tagging in Facebook
TLDR
A tool for determining the visibility of users’ information based on their privacy settings and tagging and the use of tagging in Facebook is presented to increase users' awareness of the risks of information sharing and empower users to control their information.
Users' Awareness of Privacy on Online Social Networking Sites - Case Facebook
TLDR
In an attempt to understand the factors, especially privacy awareness, that influence users to disclose or protect information in online environment, privacy behavior is viewed from the perspectives of privacy protection and information disclosing.
Literature Overview - Privacy in Online Social Networks
TLDR
This paper looks at OSNs, their associated privacy risks, and existing research into solutions, and helps identify the research directions for the Kindred Spirits project.
A Privacy Protection Model for Online Social Networks
  • J. Ahmed
  • Computer Science
    SW4LAW+DC@JURIX
  • 2014
TLDR
This model uses type, frequency, and initiation factor of social interactions to calculate relationship strength and mimics real life interaction patterns and makes online social networks more privacy friendly.
Privacy landscape in online social networks
TLDR
An elaborative privacy landscape is presented where previous literature is compared and contrast, existing definitions covering taxonomy and privacy concerns in OSNs are reviewed, different perceptions of privacy amongst users are discussed, and some privacy preserving approaches are discussed to guarantee maximum privacy.
Privacy in Online Social Networks
  • Elie Raad, R. Chbeir
  • Computer Science
    Security and Privacy Preserving in Social Networks
  • 2013
TLDR
This chapter describes the fundamental of social networks, their common representations, and the main motivations associated with their use, and shows how privacy attacks can build on social network analysis and link mining techniques to reveal user-sensitive information.
Measuring Users’ Privacy Concerns in Social Networking Sites
Social networking sites (SNSs) have become increasingly popular in recent years. These websites allow millions of individuals to create online profiles and disclose information with others. The
Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook
TLDR
It is found that an individual's privacy concerns are only a weak predictor of his membership to the Facebook, and also privacy concerned individuals join the network and reveal great amounts of personal information.
Self-disclosure and Social network sites users' awareness
Since the rise of the Social network sites (SNSs), the people's private personal details have hugely and publicly disclosed. People are sharing, chatting, commenting, tagging and self-disclosing
Privacy, Social Network Sites, and Social Relations
With the growth of the Internet comes a growth in a ubiquitous networked society. Common Web 2.0 applications include a rapidly growing trend for social network sites. Social network sites typically
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 42 REFERENCES
Public Displays of Connection
TLDR
The social implications of the public display of one's social network are explored and several design recommendations for future networking sites are included.
A Social Networks Theory of Privacy
TLDR
It is argued that insights from the literature on social networks and information dissemination can help provide courts with satisfying answers to these central questions in privacy law, and that such an approach, which treats the privacy question as an empirical one, is more attractive than any other method of establishing whether the plaintiff had a reasonable expectation of privacy in the information at issue.
Friendster and publicly articulated social networking
  • D. Boyd
  • Computer Science, Sociology
    CHI EA '04
  • 2004
TLDR
How Friendster applies social theory, how users react to the site, and the tensions that emerge between creator and users are discussed, suggesting how the HCI community should consider the co-evolution of the social community and the underlying technology.
Privacy in electronic commerce and the economics of immediate gratification
TLDR
It is shown why individuals who may genuinely want to protect their privacy might not do so because of psychological distortions well documented in the behavioral literature and that this may occur also when individuals perceive the risks from not protecting their privacy as significant.
Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression
TLDR
The concept of minimal generalization is introduced, which captures the property of the release process not to distort the data more than needed to achieve k-anonymity, and possible preference policies to choose among diierent minimal generalizations are illustrated.
Reflections on Friendster, Trust and Intimacy
By asking users to articulate and negotiate intimate information about themselves and their relationships, Friendster.com positions itself as a site for identity-driven intimate computing. Yet, trust
k-Anonymity: A Model for Protecting Privacy
  • L. Sweeney
  • Computer Science
    Int. J. Uncertain. Fuzziness Knowl. Based Syst.
  • 2002
TLDR
The solution provided in this paper includes a formal protection model named k-anonymity and a set of accompanying policies for deployment and examines re-identification attacks that can be realized on releases that adhere to k- anonymity unless accompanying policies are respected.
Intimacy and Privacy
Intimacy and privacy seem to go together. The vast majority of us seek isolation from outsiders for our experiences of intimacy and regard it as indecent for others to intrude upon them. Why should
The Strength of Weak Ties
Analysis of social networks is suggested as a tool for linking micro and macro levels of sociological theory. The procedure is illustrated by elaboration of the macro implications of one aspect of
Philosophical Dimensions of Privacy: An Anthology
List of contributors Preface 1. Privacy: philosophical dimensions of the literature Ferdinand Schoeman 2. Social distance and the veil Robert F. Murphy 3. The origins of modern claims to privacy Alan
...
1
2
3
4
5
...