Skip to main content

A Classification of Factors Influencing Low Adoption of PETs Among SNS Users

  • Conference paper
Trust, Privacy, and Security in Digital Business (TrustBus 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8058))

Abstract

Privacy concerns among Social Networking Services (SNS) users are increasing. However, Privacy-Enhancing Technologies (PETs) are not, yet, widely deployed and their deployment rate is marginally growing. This is surprising given the fact that PETs are widely recognized as effective at reducing privacy risks. This paper explores this paradox, by presenting a classification of the key factors influencing the adoption of PETs. The conclusions of our analysis suggest that, certain factors are overemphasized, while the importance of others has been overlooked. Our classification is based on relevant literature and experimental analysis of PETs, and can inform both practitioners for designing and enhancing PETs, as well as researchers, as we identify several open issues.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Acquisti, A., Gross, R.: Imagined communities: awareness, information sharing, and privacy on Facebook. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 36–58. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  2. Boyd, D., Hargittai, E.: Facebook privacy settings: Who cares? First Monday 15(8) (2010)

    Google Scholar 

  3. ENISA: Privacy considerations of online behavioural tracking, report (2012)

    Google Scholar 

  4. London Economics: Study on the economic benefits of privacy-enhancing technologies (PETs). Final Report to The European Commission DG Justice, Freedom and Security (2010)

    Google Scholar 

  5. Compañó, R., Lusoli, W.: The Policy Maker’s Anguish: Regulating Personal Data Behavior Between Paradoxes and Dilemmas. In: Moore, T., et al. (eds.) Economics of Information Security and Privacy, pp. 169–185. Springer Science+Business Media, LLC (2010)

    Chapter  Google Scholar 

  6. Pötzsch, S.: Privacy Awareness: A Means to Solve the Privacy Paradox? In: Matyáš, V., Fischer-Hübner, S., Cvrček, D., Švenda, P. (eds.) The Future of Identity. IFIP AICT, vol. 298, pp. 226–236. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  7. Van den Berg, B., Leenes, R.E.: Audience Segregation in Social Network Sites. In: Proceedings for SocialCom 2010/PASSAT 2010 (Second IEEE International Conference on Social Computing/Second IEEE International Conference on Privacy, Security, Risk and Trust), pp. 1111–1117. IEEE (2010)

    Google Scholar 

  8. Tootoonchian, Y.G.A., Saroiu, S., Wolman, A.: Lockr: Better privacy for social networks. In: Proceedings of the 5th ACM International Conference on emerging Networking EXperiments and Technologies (CoNEXT), pp. 169–180. ACM, New York (2009)

    Chapter  Google Scholar 

  9. Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: An online social network with user-defined privacy. In: Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication, pp. 135–146. ACM, New York (2009)

    Chapter  Google Scholar 

  10. Jahid, S., Mittal, P., Borisov, N.: EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation. In: Proceedings of 6th ACM Symposium on Information, Computer and Communications Security, pp. 411–415. ACM, New York (2011)

    Google Scholar 

  11. Paulik, T., Földes, Á.M., Gulyás, G.: BlogCrypt: Private content publishing on the Web. In: Proceedings of the Fourth International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2010, pp. 123–128. IEEE (2010)

    Google Scholar 

  12. Lucas, M.M., Borisov, N.: Flybynight: mitigating the privacy risks of social networking. In: Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society, pp. 1–8. ACM, New York (2008)

    Chapter  Google Scholar 

  13. Luo, W., Xie, Q., Hengartner: Facecloak: An architecture for user privacy on social networking sites. In: 2009 International Conference on Computational Science and Engineering, pp. 26–33. IEEE (2009)

    Google Scholar 

  14. Conti, M., Hasani, A., Crispo, B.: Virtual private social networks. In: Proceedings of the First ACM Conference on Data and Application Security and Privacy, pp. 39–50. ACM, New York (2011)

    Google Scholar 

  15. Guha, S., Tang, K., Francis, P.: NOYB: privacy in online social networks. In: Proceedings of the First Workshop on Online Social Networks, pp. 49–54. ACM, New York (2011)

    Google Scholar 

  16. Diaspora*, https://joindiaspora.com/

  17. Shakimov, A., Lim, H., Caceres, R., Cox, L.P., Li, K., Liu, D., Varshavsky A.: Vis-à-Vis: Privacy-preserving online social networking via Virtual Individual Servers. In: Third International Conference on Communication Systems and Networks, COMSNETS 2011, pp. 1–10. IEEE (2011)

    Google Scholar 

  18. Frenzy – The Dropbox powered social network, http://frenzyapp.com/

  19. Cutillo, L.A., Molva, R., Strufe, T.: Safebook: a privacy preserving online social network leveraging on real-life trust. IEEE Communications Magazine 47(12), 94–101 (2009)

    Article  Google Scholar 

  20. Buchegger, S., Schiöberg, D., Vu, L.H., Datta, A.: PeerSoN: P2P social networking: early experiences and insights. In: Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, pp. 46–52. ACM, New York (2009)

    Chapter  Google Scholar 

  21. Kang, T., Kagal, L.: Enabling Privacy-awareness in Social Networks. In: Intelligent Information Privacy Management Symposium at the AAAI Spring Symposium 2010 (2010)

    Google Scholar 

  22. Cranor, L.: P3P: Making privacy policies more useful. IEEE Security and Privacy 1(6), 50–55 (2003)

    Article  Google Scholar 

  23. Toch, E., Sadeh, N.M., Hong, J.: Generating default privacy policies for online social networks. In: Proceedings of the 28th of the International Conference Extended Abstracts on Human Factors in Computing Systems, pp. 4243–4248. ACM, New York (2009)

    Google Scholar 

  24. Squicciarini, A., Paci, F., Sundareswaran, S.: PriMa: an effective privacy protection mechanism for social networks. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 320–323. ACM, New York (2010)

    Google Scholar 

  25. My permissions.org – Scan your permissions. Find out who gained access to your personal info, http://mypermissions.org/

  26. Privacyfix – Lock down your privacy, https://privacyfix.com/start

  27. Priveazy – The ‘eazy’ way to protect your privacy and stay safe online, https://www.priveazy.com/

  28. Data use Policy | Facebook, Interactive Tools, https://www.facebook.com/about/privacy/tools

  29. Privacy Mirror on Facebook, http://apps.facebook.com/privacy_mirror/

  30. Privacy Check, http://www.rabidgremlin.com/fbprivacy/

  31. Becker, J., Chen, H.: Measuring Privacy Risk in Online Social Networks (2009), https://www.cs.pitt.edu/~chang/265/proj10/zim/measureprivacyrisk.pdf

  32. Make myself clear, protecting you from you since (2012), http://makemyselfclear.com/

  33. Heer, J., Boyd, D.: Vizster: Visualizing Online Social Networks. In: Proc. IEEE Symp. Information Visualization, pp. 32–39 (2005)

    Google Scholar 

  34. Friend Wheel, https://friend-wheel.com/

  35. Monjas, M.A., Del Alamo, J.M., Yelmo, J.C., Hogberg, J.: Privacy Delegate: a browser-based tool for privacy self-management in social networks, Ericsson Position paper: W3C Workshop on identity in the browser (2010)

    Google Scholar 

  36. Wishart, R., Corapi, D., Madhavapeddy, A., Sloman, M.: Privacy Butler: A Personal Privacy Rights Manager for Online Presence. In: Proceedings of the 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 672–677. IEEE (2010)

    Google Scholar 

  37. In private browsing & search | Stop online tracking & malware | Disconnect, https://disconnect.me

  38. Strater, K., Lipford, H.: Strategies and struggles with privacy in an online social networking community. In: Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction, vol. 1, pp. 111–119. British Computer Society, Swinton (2008)

    Google Scholar 

  39. Madejskiy, M., Johnson, M., Bellovin, S.M.: The Failure of Online Social Network Privacy Settings. In: CUCS-010-11 (2011), http://academiccommons.columbia.edu/catalog/ac:135406

  40. Hallinana, D., Friedewalda, M., McCarthyb, P.: Citizens’ perceptions of data protection and privacy in Europe. Computer Law & Security Review 28, 263–272 (2012)

    Article  Google Scholar 

  41. Acquisti, A.: The Economics of Personal Data and the Economics of Privacy, DRAFT (November 24, 2010), http://www.heinz.cmu.edu/~acquisti/papers/acquisti-privacy-oecd-22-11-10.pdf

  42. Acquisti, A., Grossklags, J.: Privacy Attitudes and Privacy Behavior: Losses, Gains, and Hyperbolic Discounting (2004), Preliminary draft http://www.heinz.cmu.edu/~acquisti/papers/acquisti_grossklags_eis_refs.pdf ; Final version in Camp, J., Lewis, R. (eds.): The Economics of Information Security. Kluwer (2004)

  43. Ajami, R., Ramadan, N., Mohamed, N., Al-Jaroodi, J.: Security Challenges and Approaches in Online Social Networks: A Survey. IJCSNS International Journal of Computer Science and Network Security 11(8) (August 2011)

    Google Scholar 

  44. Wang, N., Grossklags, J., Xu, H.: An Online Experiment of Privacy Authorization Dialogues for Social Applications. In: Proceedings of the 2013 Conference on Computer Supported Cooperative Work, CSCW 2013, pp. 261–272. ACM, New York (2013)

    Chapter  Google Scholar 

  45. Lewis, K., Kaufman, J., Christakis, N.: The Taste for Privacy: An Analysis of College Student Privacy Settings in an Online Social Network. Journal of Computer-Mediated Communication 14, 79–100 (2008)

    Article  Google Scholar 

  46. Flash Eurobarometer 225: Data Protection in EU: Citizens’ Perception. European Commission (2008)

    Google Scholar 

  47. Oomen, I., Leenes, R.: Privacy Risk Perceptions and Privacy Protection Strategies. In: de Leeuw, E., Fischer-Hübner, S., Tseng, J., Borking, J. (eds.) IFIP International Federation for Information Processing, Policies and Research in Identity Management, vol. 261, pp. 121–138. Springer, Boston (2008)

    Google Scholar 

  48. Xu, H., Gupta, S., Rosson, M.B., Carroll, J.M.: Effectiveness of Privacy Assurance Approaches in Location-Based Services: A Study of India and the United States. In: Proceedings of the Eighth International Conference on Mobile Business, pp. 278–283. IEEE (2009)

    Google Scholar 

  49. Yao, M.Z.: Self-Protection of Online Privacy: A Behavioral Approach. In: Trepte, S., Reinecke, L. (eds.) Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web. Springer, Heidelberg (2011)

    Google Scholar 

  50. Youn, S.: Determinants of Online Privacy Concern and Its Influence on Privacy Protection Behaviors Among Young Adolescents. Journal of Consumer Affairs 43, 389–418 (2009)

    Article  Google Scholar 

  51. Besenyei, T., Földes, A.M., Gulyás, G.G., Imre, S.: StegoWeb: Towards the Ideal Private Web Content Publishing Tool. In: Proceedings of SECURWARE 2011, The Fifth International Conference on Emerging Security Information, Systems and Technologies, pp. 109–114. IARIA (2011)

    Google Scholar 

  52. Leon, P.G., Ur, B., Balebako, R., Cranor, L.F., Shay, R., Wang, Y.: Why Johnny Can’t Opt Out: A Usability Evaluation of Tools to Limit Online Behavioral Advertising. In: Proceedings of SIGCHI Conference on Human Factors in Computing Systems, pp. 589–598. ACM, New York (2012)

    Google Scholar 

  53. Edlin, S.A., Harris, R.G.: The Role of Switching Costs in Antitrust Analysis: A Comparison of Microsoft and Google. Forthcoming in Yale Journal of Law and Technology 15 (February 7, 2013)

    Google Scholar 

  54. Facebook Statistics | Statistic Brain, http://www.statisticbrain.com/facebook-statistics/

  55. Scrambls, https://scrambls.com

  56. Hallinana, D., Friedewalda, M., McCarthyb, P.: Citizens’ perceptions of data protection and privacy in Europe. Computer Law & Security Review 28, 263–272 (2012)

    Article  Google Scholar 

  57. Shin, D.H.: The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers 22, 428–438 (2010)

    Article  Google Scholar 

  58. Kobsa, A., Teltzrow, M.: Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users’ Data Sharing and Purchase Behavior. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 329–343. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  59. Solove, D.J.: A taxonomy of privacy. University of Pennsylvania Law Review 154(3) (January 2006)

    Google Scholar 

  60. Schwaig, K.S., Kane, G.C., Storey, V.C.: Compliance to the fair information practices: How are the Fortune 500 handling online privacy disclosures? Information and Management 43(7), 805–820 (2006)

    Article  Google Scholar 

  61. Fairchild, A., Ribbers, P.: Privacy-Enhancing Identity Management in Business. In: Camenisch, J., Leenes, R., Sommer, D. (eds.) Digital Privacy. LNCS, vol. 6545, pp. 107–129. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  62. Feigenbaum, J., Freedman, M.J., Sander, T., Shostack, A.: Economic barriers to the deployment of existing privacy technologies (position paper). In: Proceedings of the Workshop on Economics of Information Security (2002)

    Google Scholar 

  63. McNulty, S.: The Google+ Guide: Circles, Photos, and Hangouts. Peachpit Press (2012)

    Google Scholar 

  64. Beato, F., Kohlweiss, M., Wouters, K.: Enforcing Access Control in Social Network Sites. In: Procedings of Hot Topics in Privacy Enhancing Technologies, HotPETS (2009)

    Google Scholar 

  65. Lwin, M., Wirtz, J., Williams, J.D.: Consumer online privacy concerns and responses: a power–responsibility equilibrium perspective. Journal of the Academy of Marketing Science 35, 572–585 (2007)

    Article  Google Scholar 

  66. Bonneau, J., Preibusch, S.: The Privacy Jungle: On the Market for Data Protection in Social Networks. In: Economics of Information Security and Privacy, pp. 121–167. Springer, US (2010)

    Chapter  Google Scholar 

  67. Zhao, H., He, M.: Study on Social Culturology of the ‘Internet Sharer’. In: Proceedings of the 1st IEEE Symposium on Web Society, pp. 219–224. IEEE (2009)

    Google Scholar 

  68. Cho, H., Rivera-Sánchez, M., Lim, S.S.: A multinational study on online privacy: global concerns and local responses. New Media & Society 11(3), 395–416 (2009)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Vemou, K., Karyda, M. (2013). A Classification of Factors Influencing Low Adoption of PETs Among SNS Users. In: Furnell, S., Lambrinoudakis, C., Lopez, J. (eds) Trust, Privacy, and Security in Digital Business. TrustBus 2013. Lecture Notes in Computer Science, vol 8058. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40343-9_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40343-9_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40342-2

  • Online ISBN: 978-3-642-40343-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics