Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4258)


Online social networks such as Friendster, MySpace, or the Facebook have experienced exponential growth in membership in recent years. These networks offer attractive means for interaction and communication, but also raise privacy and security concerns. In this study we survey a representative sample of the members of the Facebook (a social network for colleges and high schools) at a US academic institution, and compare the survey data to information retrieved from the network itself. We look for underlying demographic or behavioral differences between the communities of the network’s members and non-members; we analyze the impact of privacy concerns on members’ behavior; we compare members’ stated attitudes with actual behavior; and we document the changes in behavior subsequent to privacy-related information exposure. We find that an individual’s privacy concerns are only a weak predictor of his membership to the network. Also privacy concerned individuals join the network and reveal great amounts of personal information. Some manage their privacy concerns by trusting their ability to control the information they provide and the external access to it. However, we also find evidence of members’ misconceptions about the online community’s actual size and composition, and about the visibility of members’ profiles.


Online Social Network Privacy Concern Cell Phone Number Privacy Attitude Personal Address 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Parker, R.: Alcohol policy violated. (February 28, 2006)Google Scholar
  2. 2.
    Youngwood, S.: Networking by the ‘book’. The Times Argus (February 26, 2006)Google Scholar
  3. 3.
    Kharif, O.: Big brother is reading your blog. BusinessWeek online (February 28, 2006)Google Scholar
  4. 4.
    Gross, R., Acquisti, A.: Privacy and information revelation in online social networks. In: Proceedings of the ACM CCS Workshop on Privacy in the Electronic Society (WPES 2005) (2005)Google Scholar
  5. 5.
    Boyd, D.: Reflections on friendster, trust and intimacy. In: Intimate (Ubiquitous) Computing Workshop - Ubicomp 2003, Seattle, Washington, USA, October 12-15 (2003)Google Scholar
  6. 6.
    Boyd, D.: Friendster and publicly articulated social networking. In: Conference on Human Factors and Computing Systems (CHI 2004), Vienna, Austria, April 24-29 (2004)Google Scholar
  7. 7.
    Donath, J., Boyd, D.: Public displays of connection. BT Technology Journal 22, 71–82 (2004)CrossRefGoogle Scholar
  8. 8.
    Liu, H., Maes, P.: Interestmap: Harvesting social network profiles for recommendations. In: Beyond Personalization - IUI 2005, San Diego, California, USA (January 9, 2005)Google Scholar
  9. 9.
    Jagatic, T., Johnson, N., Jakobsson, M., Menczer, F.: Social phishing. Communications of the ACM (2006) (forthcoming)Google Scholar
  10. 10.
    Stutzman, F.: An evaluation of identity-sharing behavior in social network communities. In: Proceedings of the 2006 iDMAa and IMS Code Conference, Oxford, Ohio (2006)Google Scholar
  11. 11.
    Sege, I.: Where everybody knows your name. (April 27, 2005)Google Scholar
  12. 12.
    Anderson, B.: Imagined Communities: Reflections on the Origin and Spread of Nationalism, Verso, Revised edn., London and New York (1991)Google Scholar
  13. 13.
    Wall, L., Christiansen, T., Orwant, J.: Programming Perl, 3rd edn. O’Reilly, Sebastopol (2000)zbMATHGoogle Scholar
  14. 14.
    Burke, S.: Perl & LWP. O’Reilly, Sebastopol (2002)Google Scholar
  15. 15.
    Westin, A.F.: Harris-equifax consumer privacy survey (1991). Technical report, Equifax, Inc., Atlanta, GA (1991)Google Scholar
  16. 16.
    Acquisti, A., Grossklags, J.: Privacy and rationality in decision making. IEEE Security & Privacy, 24–30 (January-February, 2005)Google Scholar
  17. 17.
    Berry, M., Linoff, G.: Data Mining Techniques for Marketing, Sales and Customer Support. Wiley, New York (1997)Google Scholar
  18. 18.
    Acquisti, A.: Privacy in electronic commerce and the economics of immediate gratification. In: Proceedings of the ACM Conference on Electronic Commerce (EC 2004), pp. 21–29 (2004)Google Scholar
  19. 19.
    Kornblum, J., Marklein, M.B.: What you say online could haunt you. USA Today (March 8, 2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  1. 1.H. John Heinz III School of Public Policy and Management 
  2. 2.Data Privacy Laboratory, School of Computer ScienceCarnegie Mellon UniversityPittsburghUSA

Personalised recommendations