Advertisement

Social Information Leakage: Effects of Awareness and Peer Pressure on User Behavior

  • Mariam Nouh
  • Abdullah Almaatouq
  • Ahmad Alabdulkareem
  • Vivek K. Singh
  • Erez Shmueli
  • Mansour Alsaleh
  • Abdulrahman Alarifi
  • Anas Alfaris
  • Alex ‘Sandy’ Pentland
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8533)

Abstract

Today, users share large amounts of information about themselves on their online social networks. Besides the intended information, this sharing process often also “leaks” sensitive information about the users - and by proxy - about their peers. This study investigates the effect of awareness about such leakage of information on user behavior. In particular, taking inspiration from “second-hand smoke” campaigns, this study creates “social awareness” campaign where users are reminded of the information they are leaking about themselves and their friends. The results indicate that the number of users disallowing the access permissions doubles with the social awareness campaign as compared to a baseline method. The findings are useful for system designers considering privacy as a holistic social challenge rather than a purely technical issue.

Keywords

Social information leakage Online social networks Privacy Peer pressure 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Chaabane, A., Kaafar, M.A., Boreli, R.: Big friend is watching you: Analyzing online social networks tracking capabilities. In: Proceedings of the 2012 ACM Workshop on Workshop on Online Social Networks, WOSN 2012, pp. 7–12. ACM, New York (2012)CrossRefGoogle Scholar
  2. 2.
    Lampe, C.A., Ellison, N., Steinfield, C.: A familiar face(book): Profile elements as signals in an online social network. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2007, pp. 435–444. ACM, New York (2007)Google Scholar
  3. 3.
    Strater, K., Lipford, H.R.: Strategies and struggles with privacy in an online social networking community. In: Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction, BCS-HCI 2008, vol. 1, pp. 111–119. British Computer Society, Swinton (2008)Google Scholar
  4. 4.
    Becker, J., Chen, H.: Measuring Privacy Risk in Online Social Networks. In: Proceedings of W2SP 2009: Web 2.0 Security and Privacy (May 2009)Google Scholar
  5. 5.
    Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: Preventing Private Information Inference Attacks on Social Networks. IEEE Transactions on Knowledge and Data Engineering 25(8), 1849–1862 (2013), doi:10.1109/TKDE.2012.120CrossRefGoogle Scholar
  6. 6.
    Blenn, N., Doerr, C., Shadravan, N., Van Mieghem, P.: How much do your friends know about you?: reconstructing private information from the friendship graph. In: Proceedings of the Fifth Workshop on Social Network Systems (SNS 2012), Article 2, 6 p. ACM, New York (2012), http://doi.acm.org/10.1145/2181176.2181178, doi:10.1145/2181176.2181178
  7. 7.
    Singla, P., Richardson, M.: Yes, there is a correlation: - from social networks to personal behavior on the web. In: WWW 2008: Proceeding of the 17th International Conference on World Wide Web, pp. 655–664. ACM, New York (2008)CrossRefGoogle Scholar
  8. 8.
    Irani, D., Webb, S., Pu, C., Li, K.: Modeling unintended personal-information leakage from multiple online social networks. IEEE Internet Computing 15(3), 13–19 (2011)CrossRefGoogle Scholar
  9. 9.
    Hardin, G.: The Tragedy of the Commons. Science 162(3859), 1243–1248 (1968)CrossRefGoogle Scholar
  10. 10.
    Singh, V.K., Jain, R., Kankanhalli, M.S.: Motivating contributors in social media networks. In: Proceedings of the First SIGMM Workshop on Social Media, WSM 2009, pp. 11–18. ACM, New York (2009)Google Scholar
  11. 11.
    Mani, A., Rahwan, I., Pentland, A.: Inducing Peer Pressure to Promote Cooperation. Sci. Rep. 3, 1735 (2013)Google Scholar
  12. 12.
    Bond, R.M., Fariss, C.J., Jones, J.J., Kramer, A.D., Marlow, C., Settle, J.E., Fowler, J.H.: A 61-million-person experiment in social influence and political mobilization. Nature 489(7415) (September 2012)Google Scholar
  13. 13.
    Lipford, H.R., Besmer, A., Watson, J.: Understanding privacy settings in facebook with an audience view. In: UPSEC. USENIX Association (2008)Google Scholar
  14. 14.
    Aharony, N., Pan, W., Ip, C., Khayal, I., Pentland, A.: Social fmri: Investigating and shaping social mechanisms in the real world. Pervasive Mob. Comput. 7(6), 643–659 (2011)CrossRefGoogle Scholar
  15. 15.
    John Helliwell, R.L., Sachs, J.: World Happiness Report (2013), http://unsdsn.org/files/2013/09/WorldHappinessReport2013_online.pdf

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Mariam Nouh
    • 1
  • Abdullah Almaatouq
    • 1
  • Ahmad Alabdulkareem
    • 1
  • Vivek K. Singh
    • 2
  • Erez Shmueli
    • 2
  • Mansour Alsaleh
    • 1
  • Abdulrahman Alarifi
    • 1
  • Anas Alfaris
    • 1
    • 2
  • Alex ‘Sandy’ Pentland
    • 2
  1. 1.Center for Complex Engineering Systems (CCES)King Abdulaziz City for Science and Technology (KACST)RiyadhSaudi Arabia
  2. 2.Massachusetts Institute of Technology (MIT)CambridgeUSA

Personalised recommendations