Privacy in Social Collaboration

  • Elena FerrariEmail author
  • Marco Viviani


With the expression social collaboration we refer to the processes of helping multiple people to interact and share information in order to achieve common goals. Nowadays, collaboration and social dissemination of information are facilitated by the Internet and Social Network Services (SNS). The reliance of social collaboration on SNS might seem surprising given the differences between their group-centric and individual-centric views. In particular, social collaboration services focus on group activities, identifying groups and collaboration spaces in which messages are explicitly directed at the group and the group activity feed is seen the same way by everyone. In contrast, social networking services generally focus on single personalized activities, sharing messages in a more-or-less undirected way and receiving messages from many sources into a single personalized activity feed.


Social Capital Online Community Privacy Concern Virtual Community Link Prediction 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. AA.VV. SPION – D2.1 – State of the Art. In: Gürses S, Leuven KU (eds.) Technical report WP2 – D2.1, SBO Security and Privacy for Online Social Networks, Sept 2011Google Scholar
  2. Acquisti A, Gross R (2006) Imagined communities: awareness, information sharing, and privacy on the facebook. Volume 4258 of Lecture notes in computer science. Springer, Berlin/HeidelbergGoogle Scholar
  3. Baum F, Ziersch AM (2003) Social capital. J Epidemial Commun Health 57(5):320–323CrossRefGoogle Scholar
  4. Bauman Z (2001) Identity in the globalizing world. Soc Anthropol 9(2):121–129MathSciNetCrossRefGoogle Scholar
  5. Berlingerio M, Coscia M, Giannotti F, Monreale A, Pedreschi D (2011) Foundations of Multidimensional Network Analysis, Advances in Social Networks Analysis and Mining (ASONAM), International Conference, pp. 485–489. doi: 10.1109/ASONAM.2011.103
  6. Bhagat S, Cormode G, Krishnamurthy B, Srivastava D (2010) Prediction promotes privacy in dynamic social networks. In: Proceedings of the 3rd conference on online social networks, WOSN’10, Berkeley. USENIX AssociationGoogle Scholar
  7. boyd d (2008) Taken out of context: American teen sociality in networked publics. Master’s thesis, University of CaliforniaGoogle Scholar
  8. boyd d, Ellison NB (2007) Social network sites: definition, history, and scholarship. Journal of Computer-Mediated Communication 13(1):210–230Google Scholar
  9. boyd d, Hargittai E (2010) Facebook privacy settings: who cares? First Monday 15(8)Google Scholar
  10. Boyd D, Heer J (2006) Profiles as Conversation: Networked Identity Performance on Friendster, System Sciences, 2006. HICSS ‘06. Proceedings of the 39th Annual Hawaii International Conference, 3:59c. doi: 10.1109/HICSS.2006.394
  11. boyd D, Marwick AE (2011) Social privacy in networked publics: teens attitudes, practices, and strategies. In: Proceedings of the A DECADE IN INTERNET TIME: OII SYMPOSIUM ON THE DYNAMICS OF THE INTERNET AND SOCIETY, 21–24 September 2011, University of Oxford.Google Scholar
  12. Bumgarner B (2007) You have been poked: exploring the uses and gratifications of facebook among emerging adults. First Monday 12(11)Google Scholar
  13. Calhoun G (1998) Community without propinquity revisited: communications technology and the transformation of the urban public sphere. Sociol Inq 68(3):373-397CrossRefGoogle Scholar
  14. Carminati B, Ferrari E, Viviani M (2012) A multi-dimensional and event-based model for trust computation in the social web. In: Proceedings of the 4th international conference on social informatics – socInfo 2012, Lausanne, 5–7 Dec 2012. Volume 7710 of Lecture notes in computer science. Springer, pp 323–336Google Scholar
  15. Carroll JM (2011) The neighborhood and the internet: design research projects in community informaics. Routledge, LondonGoogle Scholar
  16. Castells M (1996) The rise of the network society. Oxford, BlackwellGoogle Scholar
  17. Castells M (2009) Communication power. Oxford University Press, New YorkGoogle Scholar
  18. Cha M, Mislove A, Gummadi KP (2009) A measurement-driven analysis of information propagation in the flickr social network. In: Proceedings of the 18th international conference on world wide web, WWW’09, Madrid. ACM, New York, pp 721–730Google Scholar
  19. Choi JP, Fershtman C, Gandal N (2010) Network security: vulnerabilities and disclosure policy. J Ind Econ 58(4):868–894CrossRefGoogle Scholar
  20. Delanty G (2003) Community. Routledge, New YorkGoogle Scholar
  21. Díaz ID, Ralescu A (2012) Privacy issues in social networks: a brief survey. In: Greco S, Bouchon-Meunier B, Coletti G, Fedrizzi M, Matarazzo B, Yager R (eds) Advances in computational intelligence, Brisbane. Volume 300 of Communications in computer and information science. Springer, Berlin/Heidelberg, pp 509–518Google Scholar
  22. Donath J, Boyd D (2004) Public displays of connection. BT Technol J 22(4):71–82CrossRefGoogle Scholar
  23. Dwyer CA, Hiltz SR (2008) Designing privacy into online communities. Social science research network working paper series, NovGoogle Scholar
  24. Dwyer C, Hiltz S, Passerini K (2007) Trust and privacy concern within social networking sites: a comparison of facebook and mySpace. In: Proceedings of the 13th Americas conference on information systems (AMCIS), Keystone, Aug 9–12, 2007Google Scholar
  25. Ellison NB, Steinfield C, Lampe C (2011) Connection strategies: social capital implications of facebook-enabled communication practices. New Med Soc 13(6):873–892CrossRefGoogle Scholar
  26. Fang L, Kim H, LeFevre K, Tami A (2010) A privacy recommendation wizard for users of social networking sites. In: Proceedings of the 17th ACM conference on computer and communications security, CCS’10, Chicago. ACM, New York, pp 630–632Google Scholar
  27. Fogel J, Nehmad E (2009) Internet social network communities: risk taking, trust, and privacy concerns. Comput Hum Behav 25(1):153–160CrossRefGoogle Scholar
  28. Fong PW (2011) Relationship-based access control: protection model and policy language. In: Proceedings of the 1st ACM conference on data and application security and privacy, CODASPY’11, San Antonio. ACM, New York, pp 191–202Google Scholar
  29. Frye NE, Dornisch MM (2010) When is trust not enough? The role of perceived privacy of communication tools in comfort with self-disclosure. Comput Hum Behav 26(5):1120–1127CrossRefGoogle Scholar
  30. Giddens A (1990) The consequences of modernity. Polity, CambridgeGoogle Scholar
  31. Goffman E (1959) The presentation of self in everyday life. Anchor Books, New YorkGoogle Scholar
  32. Granovetter M (1983) The strength of weak ties: a network theory revisited. Sociol Theory 1:201–233Google Scholar
  33. Gross R, Acquisti A (2005) Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM workshop on privacy in the electronic society, WPES’05, Alexandria. ACM, New York, pp 71–80Google Scholar
  34. Hampton K, Goulet LS, Rainie L, Purcell K Social networking sites and our lives. Technical report, June 2011. Available from
  35. Hauben M, Hauben R (1997) Netizens: on the history and impact of Usenet and the Internet. IEEE Computer Society Press, Los AlamitosGoogle Scholar
  36. Hewitt JP, Shulman D (2010) Self and society: a symbolic interactionist social psychology. PearsonGoogle Scholar
  37. Hoadley CM, Xu H, Lee JJ, Rosson MB (2010) Privacy as information access and illusory control: the case of the Facebook News Feed privacy outcry. Electron Commer Res Appl 9(1):50–60. (Special issue: Social Networks and Web 2.0)Google Scholar
  38. Hu H, Ahn GJ, Jorgensen J (2011) Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. In: Proceedings of the 27th annual computer security applications conference, ACSAC’11, Orlando. ACM, New York, pp 103–112Google Scholar
  39. James, Webb S (2008) A large-scale study of mySpace: observations and implications for online social networks. In: ICWSM’08, Seattle, vol 8Google Scholar
  40. Joinson AN (2008) Looking at, looking up or keeping up with people? Motives and use of Facebook. In: Proceedings of the SIGCHI conference on human factors in computing systems, CHI’08, Florence. ACM, New York, pp 1027–1036Google Scholar
  41. Joinson AN, Houghton DJ, Vasalou A, Marder BL (2011) Digital crowding: privacy, self-disclosure, and technology. In: Trepte S, Reinecke L, (eds) Privacy online. Springer, Berlin/Heidelberg, pp 33–45Google Scholar
  42. Kairam S, Brzozowski M, Huffaker D, Chi E (2012) Talking in circles: selective sharing in Google+. In: Proceedings of the 2012 ACM annual conference on human factors in computing systems, CHI’12, Austin. ACM, New York, pp 1065–1074Google Scholar
  43. Kivisto P (2003) Key ideas in sociocology. Pine Forest Press, New DelhiGoogle Scholar
  44. Krasnova H, Kolesnikova E, Günther OG (2009) “It won’t happen to me!”: self-disclosure in online social networks. In: Proceedings of the 15th Americas conference on information systems, AMCIS 2009, San Francisco, Aug 6–9, 2009. Association for Information Systems, pp 343Google Scholar
  45. Lampe C, Ellison N, Steinfield C (2006) A face(book) in the crowd: social searching vs. social browsing. In: Proceedings of the 2006 20th anniversary conference on computer supported cooperative work, CSCW’06, Banff(Alberta). ACM, New York, pp 167–170Google Scholar
  46. Lampe C, Ellison NB, Steinfield C (2008) Changes in use and perception of Facebook. In: Proceedings of the 2008 ACM conference on computer supported cooperative work, CSCW’08, San Diego. ACM, New York, pp 721–730Google Scholar
  47. Lampinen A, Tamminen S, Oulasvirta A (2009) All my people right here, right now: management of group co-presence on a social networking site. In: Proceedings of the ACM 2009 international conference on supporting group work, GROUP’09, Sanibel Island. ACM, New York, pp 281–290Google Scholar
  48. Lampinen A, Lehtinen V, Lehmuskallio A, Tamminen S (2011) We’re in it together: interpersonal management of disclosure in social network services. In: Proceedings of the SIGCHI conference on human factors in computing systems, CHI’11, Vancouver. ACM, New York, pp 3217–3226Google Scholar
  49. Lenhart A, Madden M (2007) Teens, privacy & online social networks. How teens manage their online identities and personal information in the age of MySpace. Available from
  50. Li N, Li T, Venkatasubramanian S (2007) t-closeness: privacy beyond k-anonymity and l-diversity. In: Proceedings of the ICDE’07: IEEE 23rd international conference on data engineering, Istanbul, pp 106–115Google Scholar
  51. Liben-Nowell D, Kleinberg J (2003) The link prediction problem for social networks. In: Proceedings of the 12th international conference on information and knowledge management, CIKM’03, New Orleans. ACM, New York, pp 556–559Google Scholar
  52. Liu Y, Gummadi KP, Krishnamurthy B, Mislove A (2011) Analyzing Facebook privacy settings: user expectations vs. reality. In: Proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference, IMC’11, Berlin. ACM, New York, pp 61–70Google Scholar
  53. Livermore CR, Setzekorn K (2009) Social networking communities and E-Dating services: concepts and implications. IGI Global, HersheyGoogle Scholar
  54. Lü L, Zhou L (2011) Link prediction in complex networks: a survey. Physica A Stat Mech Appl 390(6):1150–1170CrossRefGoogle Scholar
  55. Lyon L (1986) The community in urban society. Waveland Press, DawleyGoogle Scholar
  56. Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M (2007) L-diversity: privacy beyond k-anonymity. ACM Trans Knowl Discov Data 1(1):24Google Scholar
  57. Madden M (2012) Privacy management on social media sites. Technical report, Pew Research Center, Feb 2012. Available from:
  58. Marwick AE, Boyd D (2011) I tweet honestly, I tweet passionately: twitter users, context collapse, and the imagined audience. New Med Soc 13(1):114–133CrossRefGoogle Scholar
  59. Miconi A The big G and the never-ending story of knowledge monopolies. Mediascapes J (1):158–160Google Scholar
  60. Nguyen M, Bin YS, Campbell A (2012) Comparing online and offline self-disclosure: a systematic review. Cyberpsychol Behav Soc Networking 15(2):103–111CrossRefGoogle Scholar
  61. Nisbet R (1976) The quest for community. Free Press, New YorkGoogle Scholar
  62. Pariser E (2011) The filter bubble: what the internet is hiding from you. The Penguin Press, New YorkGoogle Scholar
  63. Parks MR (2011) Social network sites as virtual communities. In: A networked self: identity, community, and culture on social network sites, Routledge, New York/LondonGoogle Scholar
  64. Pierson J, Heyman R (2011) Social media and cookies: challenges for online privacy. Emerald J 13(6):30–42Google Scholar
  65. Preibusch S, Hoser B, ürses SG, Berendt B (2007) Ubiquitous social networks – opportunities and challenges for privacy-aware user modelling. In: Proceedings of the workshop on data mining for user modelling at UM 2007, 2007. Available from:
  66. Raynes-Goldie K (2010) Aliases, creeping, and wall cleaning: Understanding privacy in the age of Facebook. First Monday, 15(1)Google Scholar
  67. Rheingold H (2000) The virtual community: homesteading on the electric frontier. MIT, CambridgeGoogle Scholar
  68. Rosen J (2001) Out of context: the purposes of privacy. Soc Res 68(1):209222Google Scholar
  69. Samarati P (2001) Protecting respondents’ identities in microdata release. IEEE Trans Knowl Data Eng 13(6):1010–1027CrossRefGoogle Scholar
  70. Scott JP (2012) Social network analysis. Sage, BorgattiGoogle Scholar
  71. Solove DJ (2001) Privacy and power: computer databases and metaphors for information privacy. Stanf Law Rev 53(6):1393–1462CrossRefGoogle Scholar
  72. Special WP, Li-Barber KT (2012) Self-disclosure and student satisfaction with Facebook. Comput Hum Behav 28(2):624–630CrossRefGoogle Scholar
  73. Sprecher S, Treger S, Wondra JD, Hilaire N, & Wallpe K (2013) Taking turns: Reciprocal self-disclosure promotes liking in initial interactions. Journal of Experimental Social Psychology, 49, 860–866Google Scholar
  74. Stutzman F (2006) An evaluation of identity-sharing behavior in social network communities. iDMAa J 3(1)Google Scholar
  75. Stutzman F, Kramer-Duffield J (2010) Friends only: examining a privacy-enhancing behavior in facebook. In: Proceedings of the SIGCHI conference on human factors in computing systems, CHI’10, Atlanta. ACM, New York, pp 1553–1562Google Scholar
  76. Thelwall M (2008) Social networks, gender, and friending: an analysis of myspace member profiles. J Am Soc Inf Sci Technol 59(8):1321–1330CrossRefGoogle Scholar
  77. Tönnies F, Loomis CP (1957) Community & society (gemeinschaft und gesellschaft). Michigan State University Press, East LansingGoogle Scholar
  78. Vitak J (2013) Measuring privacy in online spaces: considerations for users attitudes, disclosures, and network composition. In: Measuring networked social privacy workshop, CSCW13, Feb 23–27, 2013, San Antonio (to appear)Google Scholar
  79. Wellman B, Haase AQ, Witte J, Hampton K (2001) Does the internet increase, decrease, or supplement social capital? Social networks, participation, and community commitment. Am Behav Sci 45(3):436–455CrossRefGoogle Scholar
  80. Xue M, Karras P, Chedy R, Kalnis P, Pung HK (2012) Delineating social network data anonymization via random edge perturbation. In: Proceedings of the 21st ACM international conference on information and knowledge management, CIKM’12, Maui. ACM, New York, pp 475–484Google Scholar
  81. Zhang G, Jacob EK (2012) Community: issues, definitions, and operationalization on the web. In: Proceedings of the 21st international conference companion on world wide web, WWW’12 companion, Lyon. ACM, New York, pp 1121–1130Google Scholar
  82. Zhang S, Jiang H, Carroll J (2011) Integrating online and offline community through Facebook. In: International conference on collaboration technologies and systems (CTS), 2011, Philadelphia, pp 569–578Google Scholar
  83. Zheleva E, Getoor L (2008) Preserving the privacy of sensitive relationships in graph data. In: Proceedings of the 1st ACM SIGKDD international conference on privacy, security, and trust in KDD, PinKDD’07, San Jose. Springer, Berlin/Heidelberg, pp 153–171Google Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  1. 1.Dipartimento di Scienze Teoriche e Applicate (Department of Theoretical and Applied Sciences)Università degli Studi dell’Insubria (University of Insubria)VareseItalia

Personalised recommendations