Skip to main content

Privacy in Social Networks: Existing Challenges and Proposals for Solutions

  • Conference paper
  • First Online:
Information Systems Security and Privacy (ICISSP 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 576))

Included in the following conference series:

  • 511 Accesses

Abstract

The significant change in our social lives and communication habits caused by the rise of Social Network Sites (SNSs) has not only brought along benefits but is also accompanied by privacy threats. In this paper we present our research efforts on SNS privacy and social identity management. First, we outline the results of an empirical study showing significant discrepancies between Facebook users’ actual privacy settings and their perception as well as their preferences. Based on this evident need for improving privacy, we present a novel conceptualization of privacy that serves as the basis for tackling the challenges. Finally, the paper provides an overview of solutions we developed as part of our research efforts on privacy in SNSs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The default settings used in the study were those of December 2011 and may have changed since then.

References

  1. Beato, F., Kohlweiss, M., Wouters, K.: Scramble! your social network data. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 211–225. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  2. Bortoli, S., Palpanas, T., Bouquet, P.: Decentralised social network management. Int. J. Web Based Communities 7(3), 276–297 (2011)

    Article  Google Scholar 

  3. Buchegger, S., Schiöberg, D., Vu, L.H., Datta, A.: PeerSoN: P2P social networking - early experiences and insights. In: Proceedings of the 2nd ACM Workshop on Social Network Systems (SocialNets), pp. 46–52 (2009)

    Google Scholar 

  4. Cetto, A., Netter, M., Pernul, G., Richthammer, C., Riesner, M., Roth, C., Sänger, J.: Friend inspector: a serious game to enhance privacy awareness in social networks. In: Proceedings of the 2nd International Workshop on Intelligent Games for Empowerment and Inclusion (IDGEI) (2014)

    Google Scholar 

  5. Chen, C.H., Härdle, W.K., Unwin, A.: Handbook of Data Visualization. Springer, Heidelberg (2008)

    MATH  Google Scholar 

  6. Colantonio, A., Di Pietro, R., Ocello, A., Verde, N.V.: Visual role mining: a picture is worth a thousand roles. IEEE Trans. Knowl. Data Eng. 24(6), 1120–1133 (2012)

    Article  Google Scholar 

  7. Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3), 224–274 (2001)

    Article  Google Scholar 

  8. Grimmelmann, J.: Saving Facebook. Iowa Law Rev. 94(8), 1137–1206 (2009)

    Google Scholar 

  9. Kelley, P.G., Brewer, R., Mayer, Y., Cranor, L.F., Sadeh, N.: An investigation into Facebook friend grouping. In: Campos, P., Graham, N., Jorge, J., Nunes, N., Palanque, P., Winckler, M. (eds.) INTERACT 2011, Part III. LNCS, vol. 6948, pp. 216–233. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  10. Kiili, K.: Digital game-based learning: towards an experiential gaming model. Internet High. Educ. 8(1), 13–24 (2005)

    Article  Google Scholar 

  11. Netter, M.: Privacy-preserving Infrastructure for Social Identity Management. Ph.D. thesis, University of Regensburg (2013)

    Google Scholar 

  12. Netter, M., Hassan, S., Pernul, G.: An autonomous social web privacy infrastructure with context-aware access control. In: Fischer-Hübner, S., Katsikas, S., Quirchmayr, G. (eds.) TrustBus 2012. LNCS, vol. 7449, pp. 65–78. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  13. Netter, M., Riesner, M., Pernul, G.: Assisted social identity management - enhancing privacy in the social web. In: Proceedings of the 10th International Conference on Wirtschaftsinformatik (WI) (2011)

    Google Scholar 

  14. Netter, M., Riesner, M., Weber, M., Pernul, G.: Privacy settings in online social networks - preferences, perception, and reality. In: Proceedings of the 46th Hawaii International Conference on System Sciences (HICSS), pp. 3219–3228 (2013)

    Google Scholar 

  15. Netter, M., Weber, M., Diener, M., Pernul, G.: Visualizing social roles - design and evaluation of a bird’s-eye view of social network privacy settings. In: Proceedings of the 22nd European Conference on Information Systems (ECIS), pp. 1–16 (2014)

    Google Scholar 

  16. Peterson, C.: Losing face: an environmental analysis of privacy on Facebook. SSRN eLibrary (2010)

    Google Scholar 

  17. Reeder, R.W., Bauer, L., Cranor, L.F., Reiter, M.K., Bacon, K., How, K., Strong, H.: Expandable grids for visualizing and authoring computer security policies. In: Proceedings of the 26th SIGCHI Conference on Human Factors in Computing Systems (CHI), pp. 1473–1482 (2008)

    Google Scholar 

  18. Richthammer, C., Netter, M., Riesner, M., Pernul, G.: Taxonomy for social network data types from the viewpoint of privacy and user control. In: Proceedings of the 8th International Conference on Availability, Reliability and Security (ARES 2013). IEEE (2013, accepted)

    Google Scholar 

  19. Richthammer, C., Netter, M., Riesner, M., Sänger, J., Pernul, G.: Taxonomy of social network data types. EURASIP J. Inf. Sec. 2014(11), 1–17 (2014)

    Google Scholar 

  20. Riesner, M.: Provider-Independent Social Identity Management for Personal and Professional Applications. Ph.D. thesis, University of Regensburg (2013)

    Google Scholar 

  21. Riesner, M., Netter, M., Pernul, G.: An analysis of implemented and desirable settings for identity management on social networking sites. In: Proceedings of the 7th International Conference on Availability, Reliability and Security (ARES), pp. 103–112 (2012)

    Google Scholar 

  22. Riesner, M., Netter, M., Pernul, G.: Analyzing settings for social identity management on social networking sites: classification, current state, and proposed developments. Inf. Sec. Tech. Rep. 17(4), 185–198 (2013)

    Article  Google Scholar 

  23. Riesner, M., Pernul, G.: Maintaining a consistent representation of self across multiple social networking sites - a data-centric perspective. In: Proceedings of the Workshop on Security and Privacy in Social Networks (SPSN), pp. 860–867. IEEE (2012)

    Google Scholar 

  24. Riesner, M., Pernul, G.: Provider-independent online social identity management - enhancing privacy consistently across multiple social networking sites. In: Proceedings of the 45th Hawaii International Conference on System Sciences (HICSS), pp. 800–809 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Günther Pernul .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Netter, M., Pernul, G., Richthammer, C., Riesner, M. (2015). Privacy in Social Networks: Existing Challenges and Proposals for Solutions. In: Camp, O., Weippl, E., Bidan, C., Aïmeur, E. (eds) Information Systems Security and Privacy. ICISSP 2015. Communications in Computer and Information Science, vol 576. Springer, Cham. https://doi.org/10.1007/978-3-319-27668-7_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27668-7_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27667-0

  • Online ISBN: 978-3-319-27668-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics