Skip to main content

Privacy Implications of Privacy Settings and Tagging in Facebook

  • Conference paper
  • First Online:
Secure Data Management (SDM 2013)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8425))

Included in the following conference series:

Abstract

Social networks are becoming increasingly popular nowadays. Users share personal information about themselves and other users in order to build and maintain their social network. However, the large amount of personal information available on social networks poses risks of data misuse. Although social networks offer users the possibility to specify privacy settings to regulate access to their information, these settings are often complicated and unintuitive, especially when dealing with new modalities of social communication like tagging. In this paper we investigate the privacy consequences of information sharing in social networks. In particular, we formally analyze the impact of the privacy settings and the use of tagging in Facebook on the visibility of information. To increase users’ awareness of the risks of information sharing and empower users to control their information, we present a tool for determining the visibility of users’ information based on their privacy settings and tagging.

This work is funded by the Dutch national program COMMIT through the THeCS project.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Although Facebook also allows users to include tags in comments, we do not consider such tags in the paper as they do not change the visibility of objects.

  2. 2.

    Bob’s friend and Alice have to be friends as this is a requirement for tagging in Facebook.

  3. 3.

    The rules for images and albums are similar to the ones for posts.

  4. 4.

    A tag can be inserted in a post only when the post is created. Accordingly, the tag issuer and data provider coincide for posts.

References

  1. Apt, K.R.: Introduction to logic programming. In: van Leeuwen, J. (ed.) The Handbook of Theoretical Computer Science, pp. 495–574. North Holland, Amsterdam (1990)

    Google Scholar 

  2. Atwan, G., Lushing, E.: The Facebook Book. Abrams Image, New York (2008)

    Google Scholar 

  3. Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. SIGCOMM Comp. Commun. Rev. 39(4), 135–146 (2009)

    Article  Google Scholar 

  4. Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings of WWW, pp. 551–560. ACM (2009)

    Google Scholar 

  5. Clarke, E.H.: Multipart pricing of public goods. Public Choice 11, 17–33 (1971)

    Article  Google Scholar 

  6. Cutillo, L.A., Molva, R., Önen, M.: Safebook: a privacy preserving online social network leveraging on real-life trust. IEEE Commun. Mag. 47, 94–101 (2009)

    Article  Google Scholar 

  7. Faliagka, E., Tsakalidis, A., Vaikousi, D.: Teenagers’ use of social network websites and privacy concerns: a survey. In: Proceedings of PCI, pp. 207–211. IEEE (2011)

    Google Scholar 

  8. Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of Workshop on Privacy in the Electronic Society, pp. 71–80. ACM (2005)

    Google Scholar 

  9. Guarda, P., Zannone, N.: Towards the development of privacy-aware systems. Inf. Softw. Technol. 51(2), 337–350 (2009)

    Article  Google Scholar 

  10. Gürses, S.F., Rizk, R., Gunther, O.: Privacy design in online social networks: learning from privacy breaches and community feedback. In: Proceedings of International Conference on Information Systems, Association for Information Systems, pp. 90 (2008)

    Google Scholar 

  11. Haron, H., Yusof, F.: Cyber stalking: the social impact of social networking technology. In: Proceedings of International Conference on Education and Management Technology, pp. 237–241. IEEE (2010)

    Google Scholar 

  12. Johnson, C.Y.: Project ‘Gaydar’ At MIT, an experiment identifies which students are gay, raising new questions about online privacy. Boston Globe (2009)

    Google Scholar 

  13. Larcom, G., Elbirt, A.: Gone phishing. IEEE Technol. Soc. Mag. 25(3), 52–55 (2006)

    Article  Google Scholar 

  14. Li, Q., Li, J., Wang, H., Ginjala, A.: Semantics-enhanced privacy recommendation for social networking sites. In: Proceedings of TrustCom, pp. 226–233. IEEE (2011)

    Google Scholar 

  15. Luo, W., Xie, Q., Hengartner, U.: FaceCloak: an architecture for user privacy on social networking sites. In: Proceedings of CSE, pp. 26–33. IEEE (2009)

    Google Scholar 

  16. Mack, E.: Facebook’s ‘Like’ button illegal in German state. CNET news (2011)

    Google Scholar 

  17. Marlow, C., Naaman, M., Boyd, D., Davis, M.: HT06, tagging paper, taxonomy, Flickr, academic article, to read. In: Proceedings of the Seventeenth Conference on Hypertext and Hypermedia, pp. 31–40. ACM (2006)

    Google Scholar 

  18. Maximilien, E.M., Grandison, T., Liu, K., Sun, T., Richardson, D., Guo, S.: Enabling privacy as a fundamental construct for social networks. In: Proceedings of International Conference on Computational Science and Engineering, pp. 1015–1020. IEEE (2009)

    Google Scholar 

  19. Nagle, F., Singh, L.: Can friends be trusted? exploring privacy in online social networks. In: Proceedings of International Conference on Advances in Social Network Analysis and Mining, pp. 312–315. IEEE (2009)

    Google Scholar 

  20. Qing-jiang, K., Xiao-hao, W., Jun, Z.: The (P, \(\alpha \), K) anonymity model for privacy protection of personal information in the social networks. In: Proceedings of International Conference on Information Technology and Artificial Intelligence, pp. 420–423. IEEE (2011)

    Google Scholar 

  21. Shen, H., Dewan, P.: Access control for collaborative environments. In: Proceedings of Conference on Computer-Supported Cooperative Work, pp. 51–58. ACM (1992)

    Google Scholar 

  22. Spiekermann, S., Cranor, L.: Engineering privacy. TSE 35(1), 67–82 (2009)

    Google Scholar 

  23. Squicciarini, A.C., Shehab, M., Wede, J.: Privacy policies for shared content in social network sites. VLDB J. 19(6), 777–796 (2010)

    Article  Google Scholar 

  24. Stone, Z., Zickler, T., Darrell, T.: Autotagging facebook: social network context improves photo annotation. In: Proceedings of Computer Vision and Pattern Recognition Workshops, pp. 1–8. IEEE (2008)

    Google Scholar 

  25. Thomas, K., Grier, C., Nicol, D.M.: unFriendly: multi-party privacy risks in social networks. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 236–252. Springer, Heidelberg (2010)

    Google Scholar 

  26. Thomas, R.K.: TeaM-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. In: Proceedings of Workshop on Role-Based Access Control, pp. 13–19. ACM (1997)

    Google Scholar 

  27. Thompson, H.H.: How I Stole Someone’s Identity (Anatomy of a Social hack). Scientific American (2010)

    Google Scholar 

  28. Tolone, W., Ahn, G.J., Pai, T., Hong, S.P.: Access control in collaborative systems. ACM Comput. Surv. 37(1), 29–41 (2005)

    Article  Google Scholar 

  29. Tootoonchian, A., Saroiu, S., Wolman, A., Ganjali, Y.: Lockr: better privacy for social networks. In: Proceedings of International Conference on Emerging Networking EXperiments and Technologies, pp. 169–180. ACM (2009)

    Google Scholar 

  30. Young, A.L., Quan-Haase, A.: Information revelation and internet privacy concerns on social network sites: a case study of facebook. In: Proceedings of International Conference on Communities and Technologies, pp. 265–274. ACM (2009)

    Google Scholar 

  31. Yuksel, A.S., Yuksel, M.E., Zaim, A.H.: An approach for protecting privacy on social networks. In: Proceedings of International Conference on Systems and Networks Communications, pp. 154–159. IEEE (2010)

    Google Scholar 

  32. Zheleva, E., Getoor, L.: To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In: Proceedings of WWW, pp. 531–540. ACM (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nicola Zannone .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Damen, S., Zannone, N. (2014). Privacy Implications of Privacy Settings and Tagging in Facebook. In: Jonker, W., Petković, M. (eds) Secure Data Management. SDM 2013. Lecture Notes in Computer Science(), vol 8425. Springer, Cham. https://doi.org/10.1007/978-3-319-06811-4_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-06811-4_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-06810-7

  • Online ISBN: 978-3-319-06811-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics