Skip to main content

Social Network Privacy: Issues and Measurement

  • Conference paper
  • First Online:
Web Information Systems Engineering – WISE 2015 (WISE 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9419))

Included in the following conference series:

Abstract

Social networks are becoming pervasive in todays world. Millions of people worldwide are involved in different form of online networking, with Facebook being one of the most popular sites. Online networks allow individuals to connect with friends and family, and share their private information. One of the reasons for the popularity of virtual communities is the perception of benefits received from the community. However, problems with privacy and security of the users information may also occur, especially when members are not aware of the risks of posting sensitive information on a social network. Members of social networking sites could become victims of identity theft, physical or online stalking and embarrassment as a consequence of malicious manipulation of their profiles data. Although networking sites often provide features for privacy settings, a high percentage of users neither know nor change their privacy preferences. This situation brings to consideration about many important aspects of social network privacy, such as what are the privacy issues in social networks? what are common privacy threats or risks in social networks? how privacy can be measured in a meaningful way? and how to empower users with knowledge to make correct decisions when selecting privacy settings? The goal of this paper is twofold. First, we discuss potential risks and attacks of social network site users privacy. Second, we present the measurement and quantification of the social privacy, along with solutions for privacy protection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Bilge, M., Strufe, T., Balzarotti, D., Kirda, E.: All your contacts are belong to us: automated identity theft attacks on social netorking. In: Proceedings of the 18th International World Wide Web Conference, Madrid, Spain. ACM (2009)

    Google Scholar 

  2. Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of ACM Workshop on Privacy in the Electronic Society, pp. 71–80, November 2005

    Google Scholar 

  3. Kumar, R.N., Wang, Y.: SONET: a SOcial NETwork model for privacy monitoring and ranking. In: Proceedings of the 2nd International Workshop on Network Forensics, Security and Privacy (2013)

    Google Scholar 

  4. Wang, Y., Nepali, R.K.: Privacy measurement for social network actor model. In: Proceedings of the International Conference on Social Computing, pp. 659–664 (2013)

    Google Scholar 

  5. Wang, Y., Nepali, R.K., Nikolai, J.: Social network privacy measurement and simulation. In: Proceedings of the International Conference on Computing, Networking and Communications (ICNC) pp. 802–806 (2014). doi:10.1109/ICCNC.2014.6785440

  6. Ghazinour, K., Matwin, S., Sokolova, M.: Monitoring and recommending privacy settings in social networks. In: Proceedings of the Joint EDBT/ICDT 2013 Workshops, pp. 164–168. ACM (2013)

    Google Scholar 

  7. Mackay, W.: Triggers and barriers to customizing software. In: Proceedings of CHI 1991, pp. 153–160. ACM Press (1991)

    Google Scholar 

  8. Duffany, J., Galban, O.: Hacking Facebook Privacy and Security. Polytechnic Univ. of Puerto Rico San Juan (2012)

    Google Scholar 

  9. Shimel, A.: Reclaim your privacy from facebook. PCWorld. Network World, 19 May 2010

    Google Scholar 

  10. Perez, S.: New App Helps Keep Facebook’s Hands Off Your Data. Readwrite. N.p., 10 May 2010

    Google Scholar 

  11. Becker, J.L.: Measuring privacy risk in online social networks. ProQuest, UMI Dissertations Publishing (2009)

    Google Scholar 

  12. Talukder, N., Ouzzani, M., Elmagarmid, A., Elmeleegy, H., Yakout, M.: Privometer: privacy protection in social networks. In: 2010 IEEE 26th International Conference on Data Engineering Workshops (ICDEW), Long Beach, CA (2010)

    Google Scholar 

  13. Kumaraguru, P., Cranor, L.F.: Privacy indexes: a survey of westins studies. Technical report CMU-ISRI-5-138, Carnegie Mellon University, CMU, Pittsburgh, PA, USA, December 2005

    Google Scholar 

  14. Staddon, J., Golle, P., Zimny, B.: Web-based inference detection. In: SS 2007: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, pp. 1–16. USENIX Association, Berkeley (2007)

    Google Scholar 

  15. Macskassy, S.A., Provost, F.: Classification in networked data: a toolkit and a univariate case study. J. Mach. Learn. Res. 8, 935–983 (2007)

    Google Scholar 

  16. Neville, J., Jensen, D.: Leveraging relational autocorrelation with latent group models. In: Proceedings of International Workshop on Multirelational Mining, pp. 49–55 (2005)

    Google Scholar 

  17. Maximilien, E.M., Grandison, T., Sun, T., Richardson, D., Guo, S., Liu, K.: Privacy-as-a-Service?: models, algorithms, and results on the facebook platform. In: Web 2.0 Security and Privacy Workshop (2009)

    Google Scholar 

  18. Liu, K.U.N.: A framework for computing the privacy scores of users in online social networks. ACM Trans. Knowl. Disc. 5(1), 1–30 (2010)

    Article  MATH  Google Scholar 

  19. Sweeney, L.: Uniqueness of simple demographics in the U. S. population. Data privacy Lab white paper series LIDAP-WP4 (2000)

    Google Scholar 

  20. Golle, P.: Revisiting the uniqueness of simple demographics in the US population. In: Proceedings of the 5th ACM Workshop on Privacy in Electronic Society. ACM (2006)

    Google Scholar 

  21. Boyd, D., Ellison, N.: Social network sites: definition, history, and scholarship. J. Comput. Med. Commun. 13(1), 210–230 (2008)

    Article  Google Scholar 

  22. Warren, S., Brandeis, L.: The right to privacy. Harvard Law Rev. 4(5), 193–220 (1890)

    Article  Google Scholar 

  23. Westin, A.: Privacy and Freedom. Athenaeum, New York (1967)

    Google Scholar 

  24. Yang, Y., Lutes, J., Li, F., Luo, B., Liu, P.: 26 Stalking online: On user privacy in social networks. Paper presented at the 37-48 (2012). doi:10.1145/2133601.2133607

  25. Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In: Proceedings of ACM International Conference on World Wide Web, pp. 181–190 (2007)

    Google Scholar 

  26. Hay, M., Miklau, G., Jensen, D., Towsley, D., Weis, P.: Resisting structural re-identification in anonymized social networks. Proc. of VLDB Endow. 1(1), 102–114 (2008)

    Article  Google Scholar 

  27. He, J., Chu, W.W.: Protecting private information in online social networks. In: Chen, H., Yang, C.C. (eds.) Intelligence and Security Informatics, vol. 135, pp. 249–273. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  28. He, J., Chu, W.W., Liu, Z.V.: Inferring privacy information from social networks. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol. 3975, pp. 154–165. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  29. Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: Proceedings of the 2008 ACM SIGMOD, pp. 93–106 (2008)

    Google Scholar 

  30. Chen, X., Michael, K.: Privacy issues and solutions in social network sites. IEEE Technol. Soc. Mag. 31(4), 43–53 (2012). doi:10.1109/MTS.2012.2225674

    Article  Google Scholar 

  31. Austin, L.: Privacy and the question of technology. Law Philos. 22, 119–166 (2003)

    Google Scholar 

  32. Tierney, M., Subramanian, L.: Realizing privacy by definition in social networks. In: Proceedings of 5th Asia-Pacific Workshop on Systems (APSys 2014) (2014)

    Google Scholar 

  33. Chen, X., Shi, S.: A literature review of privacy research on social network sites. In: Proceedings of International Conference on Multimedia Information Networking and Security (MINES), vol. 1, pp. 93–97, November 2009

    Google Scholar 

  34. Joshi, P., Kuo, C.-C.: Security and privacy in online social networks: a survey. In: 2011 IEEE International Conference on Multimedia and Expo (ICME), pp. 1–6, July 2011

    Google Scholar 

  35. Zhang, C., Sun, J., Zhu, X., Fang, Y.: Privacy and security for online social networks: challenges and opportunities. IEEE Netw. 24(4), 13–18 (2010)

    Article  Google Scholar 

  36. Bilge, L., et al.: All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings of the 18th International Conference World Wide Web (WWW 2009), pp. 551–560. ACM Press (2009)

    Google Scholar 

  37. Mansfield-Devine, S.: Anti-social networking: exploiting the trusting environment of Web 2.0. Netw. Secur. 11, 4–7 (2008)

    Article  Google Scholar 

  38. King, R.: Facebook dials back on third-party app shares, 27 May 2014. http://www.zdnet.com (retrieved)

  39. Gao, H., Hu, J., Huang, T., Wang, J., Chen, Y.: Security issues in online social networks. IEEE Internet Comput. 15(4), 56–63 (2011). doi:10.1109/MIC.2011.50

    Article  Google Scholar 

  40. Jagatic, T.N., et al.: Social phishing. Commun. ACM 50(10), 94–100 (2007)

    Article  Google Scholar 

  41. Duell, M.: Mark Zuckerbergs private Facebook photos revealed: Security glitch allows web expert to access billionaires personal pictures. The Daily Mail (MailOnline), December 2011. http://www.dailymail.co.uk/news/article-2070749/Facebook-security-glitch-reveals-Mark-Zuckerbergs-private-photos.html

  42. Valdes, M., McFarland, S.: Employers Ask Job Seekers for Facebook Passwords. Associated Press, 20 March, 2012

    Google Scholar 

  43. Vijayan, J.: New laws keep employers out of worker social media accounts. Computer World, 4 January 2013. http://www.computerworld.com/article/2505609/data-privacy/ill-bans-firms-from-asking-workers-job-seekers-for-social-media-info.html

  44. Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore Art Thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In: Proceedings of the 16th International Conference on World Wide Web (WWW 2007), pp. 181–190. ACM Press (2007)

    Google Scholar 

  45. Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: Proceedings of the 20th IEEE Symposium on Security and Privacy (SP 2009), pp. 173–187. IEEE CS Press (2009)

    Google Scholar 

  46. Wondracek, G., et al.: A practical attack to de-anonymize social network users. In: Proceedings of IEEE Symposium on Security and Privacy (SP 2010), pp. 223–238. IEEE CS Press (2010)

    Google Scholar 

  47. Vijayan, J.: Ill. Bans firms from asking workers, job seekers for social media info. PCWorld. ComputerWorld, 7 August 2012

    Google Scholar 

  48. Barnes, S.B.: A privacy paradox: social networking in the United States. First Monday, 4 September 2006. http://firstmonday.org

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jose Hurtado .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Casas, I., Hurtado, J., Zhu, X. (2015). Social Network Privacy: Issues and Measurement. In: Wang, J., et al. Web Information Systems Engineering – WISE 2015. WISE 2015. Lecture Notes in Computer Science(), vol 9419. Springer, Cham. https://doi.org/10.1007/978-3-319-26187-4_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-26187-4_44

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-26186-7

  • Online ISBN: 978-3-319-26187-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics