Skip to main content

Interdisciplinary Impact Analysis of Privacy in Social Networks

  • Chapter
  • First Online:
Book cover Security and Privacy in Social Networks

Abstract

The rise of the social web has traditionally been accompanied by privacy concerns. Research on social web privacy has been conducted from various viewpoints including legal, social, and the computer sciences. In this chapter, we propose an interdisciplinary approach to capture the multidimensional concept of privacy. For this purpose, we developed a three-layered framework to systematically analyze the privacy impact of various research directions. In addition, we conducted an interdisciplinary literature analysis, highlighting areas for improvement as well dependencies between different research directions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www.padgets.eu/

  2. 2.

    http://www.primelife.eu/

  3. 3.

    http://www.prescient-project.eu/

  4. 4.

    http://www.facebook.com

  5. 5.

    https://plus.google.com

  6. 6.

    http://clique.primelife.eu/

References

  1. Tufekci Z (2008) Can you see me now? Audience and disclosure regulation in online social network sites. Bull Sci Technol Soc 11:544–564

    Google Scholar 

  2. Post RC (2001) Three concepts of privacy. Georget Law J 1:2087–2098

    Google Scholar 

  3. Spiekermann S, Cranor LF (2009) Engineering privacy. IEEE Trans Softw Eng 35(1):67–82

    Article  Google Scholar 

  4. PrimeLife: D1.2.1 – Privacy Enabled Communities (2010)

    Google Scholar 

  5. Gutwirth S, Gellert R, Bellanova R, Friedewald M, Schiitz P, Wright D, Mordini E, Venier S (2011) Deliverable D1: legal, social, economic and ethical conceptualisations of privacy and data protection, Karlsruhe

    Google Scholar 

  6. Warren SD, Brandeis LD (1890) The right to privacy. Harv Law Rev 4:193–220

    Article  Google Scholar 

  7. Solove DJ (2006) A taxonomy of privacy. Univ Pa Law Rev 154(3):477560

    Article  Google Scholar 

  8. Patil S, Kobsa A (2009) Privacy considerations in awareness systems: designing with privacy in mind. In: Markopoulos P, Mackay W, Ruyter B (eds) Awareness systems, human-computer interaction series. Springer, Heidelberg

    Google Scholar 

  9. European Parliament (1995) EU-Directive 95/46/EC. Official Journal of the European Communities

    Google Scholar 

  10. Cranor L, Dobbs B, Egelman S, Hogben G, Humphrey J, Langheinrich M, Marchiori M, Presler-Marshall M, Reagle JM, Schunter M, Stampley DA, Wenning R (2006) The platform for privacy preferences 1.1 (P3P1.1) specification. NOTE-P3P11-20061113

    Google Scholar 

  11. Nissenbaum H (2010) Privacy in context: technology, policy, and the integrity of social life. Stanford Law Books, Palo Alto

    Google Scholar 

  12. Ziegele M, Quiring O (2011) Privacy in social network sites. In: Trepte S, Reinecke L (eds) Privacy online. Perspectives on privacy and self-disclosure in the social web. Springer, Heidelberg/New York

    Google Scholar 

  13. Beye M, Jeckmans AJP, Erkin Z, Hartel PH, Lagendijk RI, Tang Q (2010) Literature overview – privacy in online social networks. Technical report TR-CTIT-10-36, centre for telematics and information technology, University of Twente, Enschede

    Google Scholar 

  14. Guha S, Tang K, Francis P (2008) NOYB: privacy in online social networks. In: Proceedings of the 1st workshop on online social networks, Seattle

    Google Scholar 

  15. van den Berg B, Leenes R (2011) Keeping up appearances: audience segregation in social network sites, Chap. 10. Springer, Dordrecht/Heidelberg, pp 211–231

    Google Scholar 

  16. Aimeur E, Gambs S, Ho A (2010) Towards a privacy-enhanced social networking site. In: Proceedings of the 5th international conference on availability, reliability and security, Corvallis

    Google Scholar 

  17. Boyd D (2008) Taken out of context: American teen sociality in networked publics. Ph.D. thesis, University of California, Berkeley

    Google Scholar 

  18. Mayer-Schonberger V (2009) Delete: the virtue of forgetting in the digital age. Princeton University Press, Princeton

    Google Scholar 

  19. Solove DJ (2008) The future of reputation: gossip, rumor, and privacy on the internet. Yale University Press, New Haven

    Google Scholar 

  20. Gross R, Acquisti A (2005) Information revelation and privacy in online social networks. In: Proceedings of the ACM workshop on privacy in the electronic society, New York

    Google Scholar 

  21. Hogben G (2007) Security issues and recommendations for online social networks. Technical report, ENISA

    Google Scholar 

  22. Altshuler Y, Aharony N, Pentland A, Elovici Y, Cebrian M (2011) Stealing reality: when criminals become data scientists (or vice versa). IEEE Intell Syst 26:22–30

    Article  Google Scholar 

  23. Goffman E (1959) The presentation of self in everyday life. Anchor, New York

    Google Scholar 

  24. van den Berg B, Leenes R (2010) Audience segregation in social network sites. In: Proceedings of the 2nd international conference on social computing, Delft

    Google Scholar 

  25. Pötzsch S (2009) Privacy awareness: a means to solve the privacy paradox? In: Maty V, Fischer-Hübner S, Cvrcek D, Lvenda P (eds) The future of identity in the information society, IFIP advances in information and communication technology, vol 298. Springer, Heidelberg

    Google Scholar 

  26. Burghardt T, Buchmann E, Bohm K (2008) Why do privacy-enhancement mechanisms fail, after all? A survey of both the user and the provider perspective. In: Proceedings of the international workshop on web 2.0 trust, Trondheim

    Google Scholar 

  27. Carminati B, Ferrari E (2008) Access control and privacy in web-based social networks. Int J Web Inf Syst 4(4):395–415

    Google Scholar 

  28. Carminati B, Ferrari E, Perego A (2009) Enforcing access control in web-based social networks. ACM Trans Inf Syst Secur 13(1):1–38

    Article  Google Scholar 

  29. Donath J, Boyd D (2004) Public displays of connection. BT Technol J 22(4):71–82

    Article  Google Scholar 

  30. Boyd D (2004) Friendster and publicly articulated social networking. In: Proceedings of the SIGCHI conference on human factors and computing systems, Vienna

    Google Scholar 

  31. Federrath H, Fuchs KP, Herrmann D, Maier D, Scheuer F, Wagner K (2011) Grenzen des digitalen Radiergummis. Datenschutz und Datensicherheit – DuD 35(6):403–407

    Article  Google Scholar 

  32. Netter M, Riesner M, Pernul G (2011) Assisted social identity management – enhancing privacy in the social web. In: Proceedings of the 10th international conference on Wirtschaftsinformatik, Zürich

    Google Scholar 

  33. Lampinen A, Tamminen S, Oulasvirta A (2009) All my people right here, right now: management of group co-presence on a social networking site. In: Proceedings of the ACM international conference on supporting group work, Sanibel

    Google Scholar 

  34. DiMicco JM, Millen DR (2007) Identity management: multiple presentations of self in Facebook. In: Proceedings of the international ACM conference on supporting group work, Sanibel Island

    Google Scholar 

  35. Grimmelmann J (2009) Saving Facebook. Iowa Law Rev 94(4):1137–1206

    Google Scholar 

  36. Acquisti A, Gross R (2006) Imagined communities: awareness, information sharing, and privacy on the Facebook. In: Proceedings of the 6th workshop on privacy enhancing technologies, Cambridge

    Google Scholar 

  37. Acquisti A (2004) Privacy in electronic commerce and the economics of immediate gratification. In: Proceedings of the 5th ACM conference on electronic commerce, New York

    Google Scholar 

  38. Kolter J, Netter M, Pernul G (2010) Visualizing past personal data disclosures. In: Proceedings of the fifth international conference on availability, reliability and security, Krakow

    Google Scholar 

  39. Tscherteu G, Langreiter C (2009) Explorative Netzwerkanalyse im living web. In: Social semantic web. Springer, Berlin/Heidelberg

    Google Scholar 

  40. Dix A (2010) Daten- und Personlichkeitsschutz im Web 2.0. In: Klumpp D, Kubicek H, Rob Nagel A, Schulz W (eds) Netzwelt-Wege, Werte, Wandel. Springer, Berlin/Heidelberg, pp 195–210

    Chapter  Google Scholar 

  41. Bonneau J, Preibusch S (2009) The privacy jungle: on the market for data protection in social networks. In: Proceedings of the 8th workshop on the economics of information security, London

    Google Scholar 

  42. Feldman DC (1984) The development and enforcement of group norms. Acad Manag Rev 9(1):47–53

    Google Scholar 

  43. Peterson C (2010) Losing face: an environmental analysis of privacy on Facebook. SSRN eLibrary

    Google Scholar 

  44. Strahilevitz L (2005) A social networks theory of privacy. Univ Chic Law Rev 72(3):919–988

    Google Scholar 

  45. Baden R, Bender A, Spring N, Bhattacharjee B, Starin D (2009) Persona: an online social network with user-defined privacy. In: Proceedings of the ACM SIGCOMM conference on data communication, Barcelona

    Google Scholar 

  46. Organisation for Economic Co-operation and Development (1981) Guidelines on the protection of privacy and transborder flows of personal data, vol 11. Organisation for Economic Cooperation and Development, Paris

    Google Scholar 

  47. Maliki TE, Seigneur JM (2009) Identity management. In: Vacca JR (ed) Computer and information security handbook, Chap. 17. Burlington, Morgan Kaufmann

    Google Scholar 

  48. Debatin B, Lovejoy JP, Horn AK, Hughes BN (2009) Facebook and online privacy: attitudes, behaviors, and unintended consequences. J Comput-Mediat Commun 15(1):83–108

    Article  Google Scholar 

  49. Hoadley CM, Xu H, Lee JJ, Rosson MB (2010) Privacy as information access and illusory control: the case of the Facebook news feed privacy outcry. Electron Commer Res Appl 9(1):50–60

    Article  Google Scholar 

  50. Agrawal R (2002) Why is P3P not a PET? In: Proceedings of the W3C future of P3P workshop, Dulles

    Google Scholar 

Download references

Acknowledgement

The authors would like to thank Ludwig Fuchs (Department of Information Systems, University of Regensburg) for his helpful remarks and valuable suggestions to improve this work. This research was partly funded by the European Union under the FP7 PADGETS project (grant agreement no. 248920). The authors gratefully acknowledge this support. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the European Union.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Netter .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Netter, M., Herbst, S., Pernul, G. (2013). Interdisciplinary Impact Analysis of Privacy in Social Networks. In: Altshuler, Y., Elovici, Y., Cremers, A., Aharony, N., Pentland, A. (eds) Security and Privacy in Social Networks. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-4139-7_2

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-4139-7_2

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-4138-0

  • Online ISBN: 978-1-4614-4139-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics