Abstract
Social networks are becoming increasingly popular nowadays. Users share personal information about themselves and other users in order to build and maintain their social network. However, the large amount of personal information available on social networks poses risks of data misuse. Although social networks offer users the possibility to specify privacy settings to regulate access to their information, these settings are often complicated and unintuitive, especially when dealing with new modalities of social communication like tagging. In this paper we investigate the privacy consequences of information sharing in social networks. In particular, we formally analyze the impact of the privacy settings and the use of tagging in Facebook on the visibility of information. To increase users’ awareness of the risks of information sharing and empower users to control their information, we present a tool for determining the visibility of users’ information based on their privacy settings and tagging.
This work is funded by the Dutch national program COMMIT through the THeCS project.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Although Facebook also allows users to include tags in comments, we do not consider such tags in the paper as they do not change the visibility of objects.
- 2.
Bob’s friend and Alice have to be friends as this is a requirement for tagging in Facebook.
- 3.
The rules for images and albums are similar to the ones for posts.
- 4.
A tag can be inserted in a post only when the post is created. Accordingly, the tag issuer and data provider coincide for posts.
References
Apt, K.R.: Introduction to logic programming. In: van Leeuwen, J. (ed.) The Handbook of Theoretical Computer Science, pp. 495–574. North Holland, Amsterdam (1990)
Atwan, G., Lushing, E.: The Facebook Book. Abrams Image, New York (2008)
Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. SIGCOMM Comp. Commun. Rev. 39(4), 135–146 (2009)
Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings of WWW, pp. 551–560. ACM (2009)
Clarke, E.H.: Multipart pricing of public goods. Public Choice 11, 17–33 (1971)
Cutillo, L.A., Molva, R., Önen, M.: Safebook: a privacy preserving online social network leveraging on real-life trust. IEEE Commun. Mag. 47, 94–101 (2009)
Faliagka, E., Tsakalidis, A., Vaikousi, D.: Teenagers’ use of social network websites and privacy concerns: a survey. In: Proceedings of PCI, pp. 207–211. IEEE (2011)
Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of Workshop on Privacy in the Electronic Society, pp. 71–80. ACM (2005)
Guarda, P., Zannone, N.: Towards the development of privacy-aware systems. Inf. Softw. Technol. 51(2), 337–350 (2009)
Gürses, S.F., Rizk, R., Gunther, O.: Privacy design in online social networks: learning from privacy breaches and community feedback. In: Proceedings of International Conference on Information Systems, Association for Information Systems, pp. 90 (2008)
Haron, H., Yusof, F.: Cyber stalking: the social impact of social networking technology. In: Proceedings of International Conference on Education and Management Technology, pp. 237–241. IEEE (2010)
Johnson, C.Y.: Project ‘Gaydar’ At MIT, an experiment identifies which students are gay, raising new questions about online privacy. Boston Globe (2009)
Larcom, G., Elbirt, A.: Gone phishing. IEEE Technol. Soc. Mag. 25(3), 52–55 (2006)
Li, Q., Li, J., Wang, H., Ginjala, A.: Semantics-enhanced privacy recommendation for social networking sites. In: Proceedings of TrustCom, pp. 226–233. IEEE (2011)
Luo, W., Xie, Q., Hengartner, U.: FaceCloak: an architecture for user privacy on social networking sites. In: Proceedings of CSE, pp. 26–33. IEEE (2009)
Mack, E.: Facebook’s ‘Like’ button illegal in German state. CNET news (2011)
Marlow, C., Naaman, M., Boyd, D., Davis, M.: HT06, tagging paper, taxonomy, Flickr, academic article, to read. In: Proceedings of the Seventeenth Conference on Hypertext and Hypermedia, pp. 31–40. ACM (2006)
Maximilien, E.M., Grandison, T., Liu, K., Sun, T., Richardson, D., Guo, S.: Enabling privacy as a fundamental construct for social networks. In: Proceedings of International Conference on Computational Science and Engineering, pp. 1015–1020. IEEE (2009)
Nagle, F., Singh, L.: Can friends be trusted? exploring privacy in online social networks. In: Proceedings of International Conference on Advances in Social Network Analysis and Mining, pp. 312–315. IEEE (2009)
Qing-jiang, K., Xiao-hao, W., Jun, Z.: The (P, \(\alpha \), K) anonymity model for privacy protection of personal information in the social networks. In: Proceedings of International Conference on Information Technology and Artificial Intelligence, pp. 420–423. IEEE (2011)
Shen, H., Dewan, P.: Access control for collaborative environments. In: Proceedings of Conference on Computer-Supported Cooperative Work, pp. 51–58. ACM (1992)
Spiekermann, S., Cranor, L.: Engineering privacy. TSE 35(1), 67–82 (2009)
Squicciarini, A.C., Shehab, M., Wede, J.: Privacy policies for shared content in social network sites. VLDB J. 19(6), 777–796 (2010)
Stone, Z., Zickler, T., Darrell, T.: Autotagging facebook: social network context improves photo annotation. In: Proceedings of Computer Vision and Pattern Recognition Workshops, pp. 1–8. IEEE (2008)
Thomas, K., Grier, C., Nicol, D.M.: unFriendly: multi-party privacy risks in social networks. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 236–252. Springer, Heidelberg (2010)
Thomas, R.K.: TeaM-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. In: Proceedings of Workshop on Role-Based Access Control, pp. 13–19. ACM (1997)
Thompson, H.H.: How I Stole Someone’s Identity (Anatomy of a Social hack). Scientific American (2010)
Tolone, W., Ahn, G.J., Pai, T., Hong, S.P.: Access control in collaborative systems. ACM Comput. Surv. 37(1), 29–41 (2005)
Tootoonchian, A., Saroiu, S., Wolman, A., Ganjali, Y.: Lockr: better privacy for social networks. In: Proceedings of International Conference on Emerging Networking EXperiments and Technologies, pp. 169–180. ACM (2009)
Young, A.L., Quan-Haase, A.: Information revelation and internet privacy concerns on social network sites: a case study of facebook. In: Proceedings of International Conference on Communities and Technologies, pp. 265–274. ACM (2009)
Yuksel, A.S., Yuksel, M.E., Zaim, A.H.: An approach for protecting privacy on social networks. In: Proceedings of International Conference on Systems and Networks Communications, pp. 154–159. IEEE (2010)
Zheleva, E., Getoor, L.: To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In: Proceedings of WWW, pp. 531–540. ACM (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Damen, S., Zannone, N. (2014). Privacy Implications of Privacy Settings and Tagging in Facebook. In: Jonker, W., Petković, M. (eds) Secure Data Management. SDM 2013. Lecture Notes in Computer Science(), vol 8425. Springer, Cham. https://doi.org/10.1007/978-3-319-06811-4_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-06811-4_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-06810-7
Online ISBN: 978-3-319-06811-4
eBook Packages: Computer ScienceComputer Science (R0)