Abstract
Online social networks (OSNs) have become part of daily life for millions of users. Users building explicit networks that represent their social relationships and often share a wealth of personal information to their own benefit. The potential privacy risks of such behavior are often underestimated or ignored. The problem is exacerbated by lacking experience and awareness in users, as well as poorly designed tools for privacy management on the part of the OSN. Furthermore, the centralized nature of OSNs makes users dependent and puts the service provider in a position of power. Because service providers are not by definition trusted or trustworthy, their practices need to be taken into account when considering privacy risks. This chapter aims to provide insight into privacy in OSNs. First, a classification of different types of OSNs based on their nature and purpose is made. Next, different types of data contained in OSNs are distinguished. The associated privacy risks in relation to both users and service providers are identified, and finally, relevant research areas for privacy-protecting techniques are discussed. Clear mappings are made to reflect typical relations that exist between OSN type, data type, particular privacy risks, and privacy-preserving solutions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Anderson, J., Daz, C., Bonneau, J., Stajano, F.: Privacy-enabling social networking over untrusted networks. In: Crowcroft, J., Krishnamurthy, B. (eds.) Proceedings of the WOSN, Barcelona, pp. 1–6. ACM, New York (2009)
Anonymous contributor on Wikipedia.org. Cake financial. online, 4 (2010). http://en.wikipedia.org/wiki/Cake_Financial
Anonymous contributor on Wikipedia.org. Sixdegrees.com. online, 4 (2010). http://en.wikipedia.org/wiki/SixDegrees.com/
Anonymous contributor on Wikipedia.org. Social network service. online, 4 (2010). http://en.wikipedia.org/wiki/Social_network_service
Baatarjav, E.-A., Dantu, R., Phithakkitnukoon, S.: Privacy management for facebook. In: Sekar, R., Pujari, A.K. (eds.) International Conference on Information Systems Security, Hyderabad. Lecture Notes in Computer Science, vol. 5352, pp. 273–286. Springer, Berlin (2008)
Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In: WWW ’07: Proceedings of the 16th International Conference on World Wide Web, Banff, pp. 181–190. ACM, New York (2007)
Banks, L., Wu, S.F.: All friends are not created equal: an interaction intensity based approach to privacy in online social networks. In: IEEE International Conference on Computational Science and Engineering, Vancouver, pp. 970–974 (2009)
Benevenuto, F., Rodrigues, T., Cha, M., Almeida, V.A.F.: Characterizing user behavior in online social networks. In: Feldmann, A., Mathy, L. (eds.) Internet Measurement Conference, Chicago, pp. 49–62. ACM, New York (2009)
Bonneau, J.: Attack of the zombie photos. online (2009). http://www.lightbluetouchpaper.org/2009/05/20/attack-of-the-zombie-photos/
Boyd, D., Ellison, N.B.: Social network sites: definition, history, and scholarship. J. Comput. Mediat. Commun. 13(1), 210–230 (2007)
Buchegger, S., Datta, A.: A case for p2p infrastructure for social networks – opportunities and challenges. In: WONS 2009, 6th International Conference on Wireless On-demand Network Systems and Services, Snowbird, pp. 161–168 (2009)
Buchegger, S., Schiöberg, D., Vu, Le H., Datta, A.: Peerson: P2p social networking: early experiences and insights. In: SNS ’09: Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, pp. 46–52. ACM, New York (2009)
Burns, E.: Marketing to social networking sites, targeted. online, 4 (2007). http://www.clickz.com/3625536
Cardon, D.: Le design de la visibilit : un essai de typologie du web 2.0. online, 2 (2008). http://www.internetactu.net/2008/02/01/le-design-de-la-visibilite-un-essai-de-typologie-du-web-20/
Carminati, B., Ferrari, E., Perego, A.: Private relationships in social networks. In: ICDE Workshops, Istanbul, pp. 163–171 (2007)
Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall, M., Reagle, J.: The platform for privacy preferences 1.0 (p3p1.0) specification. online (2002). http://www.w3.org/TR/P3P/
Dube, R., Adomaitis, M.B.P.: What types of social networks exist. online, 3 (2009). http://socialnetworking.lovetoknow.com/What_Types_of_Social_Networks_Exist
Dwork, C.: Differential privacy. In: Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, 10–14 July 2006, Proceedings, Part II, pp. 1–12 (2006)
Emmett, D.: Taxonomy of social networks. online, 6 (2009). http://davemmett.wordpress.com/2009/06/15/taxonomy-of-social-networks/
Facebook.com. Statement of rights and responsibilities. online (2011). http://www.facebook.com/terms.php
Freedman, M.J., Nicolosi, A.: Efficient private techniques for verifying social proximity. In: Proceedings of the 6th International Workshop on Peer-to-Peer Systems (IPTPS07), Bellevue, pp. 1–7 (2007)
Gannes, L.: A taxonomy of social networks? online, 2 (2007). http://gigaom.com/2007/02/09/social-network-taxonomy/
Goecks, J., Edwards, W.K., Mynatt, E.D.: Challenges in supporting end-user privacy and security management with social navigation. In: Cranor, L.F. (ed.) Symposium on Usable Privacy and Security, Mountain View. ACM International Conference Proceeding Series, pages 1–12. ACM, New York (2009)
Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: WPES ’05: Proceedings of the 2005 ACM workshop on Privacy in the electronic society, Alexandria, pp. 71–80. ACM, New York (2005)
Guha, S., Tang, K., Francis, P.: Noyb: privacy in online social networks. In: Proceedings of the First Workshop on Online Social Networks (WOSN), Seattle, pp. 49–54. ACM, New York (2008)
Hernandez, N.: President apologizes for questionable photos, 10 (2007). http://www.washingtonpost.com/wp-dyn/content/article/2007/10/17/AR2007101702244.html
Hudsonhorizons.com. Types of social networking websites. online, (2010). http://www.hudsonhorizons.com/Custom-Website-Solutions/Social-Networking/Types-of-Social-Networks.htm
Jacob, A.: How to hack myspace private profile picture and video. online, 4 (2007). http://www.clazh.com/how-to-hack-myspace-private-profile-picture-and-video/
Kang, J.: Information privacy in cyberspace transactions. Stanf. Law Rev. 50(4), 1193–1294 (1998)
Leenes, R.: Context Is Everything – Sociality and Privacy in Online Social Network Sites, vol. 320/2010, chapter 4, pp. 48–65. Springer, Boston (2010)
Lipford, H.R., Besmer, A., Watson, J.: Understanding privacy settings in facebook with an audience view. In: UPSEC’08: Proceedings of the 1st Conference on Usability, Psychology, and Security, San Francisco, pp. 1–8. USENIX Association, Berkeley (2008)
Lucas, M.M., Borisov, N.: Flybynight: mitigating the privacy risks of social networking. In: Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society (WPES), Alexandria, pp. 1–8. ACM, New York (2008)
Lunn, B.: Social network types, motivations, and the future. online, 9 (2007). http://www.readwriteweb.com/archives/social_network_types_motivations.php
MacNamara, P.: Facebook blocks ’web 2.0 suicide machine’. online, 1 (2010). http://www.networkworld.com/news/2010/010410-buzzblog-facebook-blocks-suicide-machine.html
Maximilien, E.M., Grandison, T., Liu, K., Sun, T., Richardson, D., Guo, S.: Enabling privacy as a fundamental construct for social networks. In: Proceedings of the International Conference on Computational Science and Engineering CSE ’09, Vancouver, vol. 4, pp. 1015–1020, 29–31 Aug 2009
Mezzour, G., Perrig, A., Gligor, V.D., Papadimitratos, P.: Privacy-preserving relationship path discovery in social networks. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) Cryptology and Network Security. Lecture Notes in Computer Science, vol. 5888, pp. 189–208. Springer, Berlin/New York (2009)
Olsen, S.: At rapleaf, your personals are public. online, 8 (2007). http://news.cnet.com/At-Rapleaf,-your-personals-are-public/2100-1038_3-6205716.html
O’Neill, N.: “anonymous” facebook employee interview: fact vs fiction, 1 (2010). http://www.allfacebook.com/2010/01/anonymous-facebook-employee-interview-fact-vs-fiction/
Onlinebrandmanager.com. Types of online social networks. online (2011). http://onlinebrandmanager.org/social-media/social-network-types/
Onwuasoanya, A., Skornyakov, M., Post, J.: Enhancing privacy on social networks by segregating different social spheres. Rutgers Gov. Sch. Eng. Technol. Res. J. 3, 1–10 (2008)
Palen, L., Dourish, P.: Unpacking “privacy” for a networked world. In: CHI ’03: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 129–136. ACM, New York (2003)
Pingdom.com. Social network popularity around the world. online (2008). http://royal.pingdom.com/2008/08/12/social-network-popularity-around-the-world/
Riddle, W.: Cyberbullied teen sues ex-classmates, their parents, and facebook, 3 (2009). http://www.switched.com/2009/03/04/cyberbullied-teen-sues-ex-classmates-their-parents-and-faceboo/
Rosenblum, D.: What anyone can know: the privacy risks of social networking sites. IEEE Secur. Priv. 5(3), 40–49 (2007)
Shakimov, A., Varshavsky, A., Cox, L.P., Cceres, R.: Privacy, cost, and availability tradeoffs in decentralized osns. In: Crowcroft, J., Krishnamurthy, B. (eds.) Proceedings of the WOSN, Barcelona, pp. 13–18. ACM, New York (2009)
Tootoonchian, A., Saroiu, S., Ganjali, Y., Wolman, A.: Lockr: better privacy for social networks. In: CoNEXT ’09: Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, Rome, pp. 169–180. ACM, New York (2009)
Tufekci, Z.: Can you see me now? audience and disclosure regulation in online social network sites. Bull. Sci. Technol. Soc. 28(1), 20–36 (2008)
Turk, A.: Opinion 5/2009 on online social networking. Technical report 01189/09/EN WP 163, article 29 data protection working party, 6 (2009). http://ec.europa.eu/justice_home/fsj/privacy/docs/wpdocs/2009/wp163_en.pdf
UK Parliament. Data protection act 1998, (1998). http://www.legislation.gov.uk/ukpga/1998/29/contents
Viswanath, B., Mislove, A., Cha, M., Gummadi, P.K.: On the evolution of user interaction in facebook. In: Crowcroft, J., Krishnamurthy, B. (eds.) Workshop on Online Social Networks, Barcelona, pp. 37–42. ACM, New York (2009)
Walters, C.: Facebook’s new terms of service: “we can do anything we want with your content. forever.” 2 (2009). http://consumerist.com/2009/02/facebooks-new-terms-of-service-we-can-do-anything-we-want-with-your- content-forever.html
Weiss, S.: The need for a paradigm shift in addressing privacy risks in social networking applications. In: The Future of Identity in the Information Society. IFIP International Federation for Information Processing, vol. 262, pp. 161–171. Springer, New York (2008)
Williams, D.M.: Online identity expert loses control of nsfw r-rated online pics, 3 (2009). http://www.itwire.com/your-it-news/home-it/23975-online-identity-expert-loses-control-of-nsfw-r-rated-online-pics.html
Ying, X., Wu, X.: Randomizing social networks: a spectrum preserving approach. In: Proceedings of the SIAM International Conference on Data Mining, Atlanta , pp. 739–750. Society for Industrial and Applied Mathematics, Philadelphia (2008)
Zhou, B., Pei, J., Luk, W.: A brief survey on anonymization techniques for privacy preserving publishing of social network data. Spec. Interest Group Knowl. Discov. Data Min. Explor. 10(2), 12–22 (2008)
Acknowledgements
The research for this work was carried out within the Kindred Spirits project, part of the STW Sentinels research program.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag London
About this chapter
Cite this chapter
Beye, M., Jeckmans, A.J.P., Erkin, Z., Hartel, P., Lagendijk, R.L., Tang, Q. (2012). Privacy in Online Social Networks. In: Abraham, A. (eds) Computational Social Networks. Springer, London. https://doi.org/10.1007/978-1-4471-4051-1_4
Download citation
DOI: https://doi.org/10.1007/978-1-4471-4051-1_4
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-4050-4
Online ISBN: 978-1-4471-4051-1
eBook Packages: Computer ScienceComputer Science (R0)