Advertisement

Analyzing and Predicting Privacy Settings in the Social Web

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9146)

Abstract

Social networks provide a platform for people to connect and share information and moments of their lives. With the increasing engagement of users in such platforms, the volume of personal information that is exposed online grows accordingly. Due to carelessness, unawareness or difficulties in defining adequate privacy settings, private or sensitive information may be exposed to a wider audience than intended or advisable, potentially with serious problems in the private and professional life of a user. Although these causes usually receive public attention when it involves companies’ higher managing staff, athletes, politicians or artists, the general public is also subject to these issues. To address this problem, we envision a mechanism that can suggest users the appropriate privacy setting for their posts taking into account their profiles. In this paper, we present a thorough analysis of privacy settings in Facebook posts and evaluate prediction models that can anticipate the desired privacy settings with high accuracy, making use of the users’ previous posts and preferences.

Keywords

Facebook Privacy Social networks 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Breiman, L.: Bagging predictors. Machine Learning 24(2), 123–140 (1996)zbMATHMathSciNetGoogle Scholar
  2. 2.
    Chelaru, S., Orellana-Rodriguez, C., Altingovde, I.S.: How useful is social feedback for learning to rank youtube videos? World Wide Web 17(5), 997–1025 (2014)CrossRefGoogle Scholar
  3. 3.
    Djafari Naini, K., Kawase, R., Kanhabua, N., Niederée, C.: Characterizing high-impact features for content retention in social web applications. In: Proc. of WWW 2014, pp. 559–560 (2014)Google Scholar
  4. 4.
    Ellison, N.B., Gray, R., Vitak, J., Lampe, C., Fiore, A.T.: Calling all facebook friends: exploring requests for help on facebook. In: Proc. of ICWSM 2013 (2013)Google Scholar
  5. 5.
    Ellison, N.B., Steinfield, C., Lampe, C.: Connection strategies: Social capital implications of facebook-enabled communication practices. New Media & Society 13(6), 873–892 (2011)CrossRefGoogle Scholar
  6. 6.
    A. Esuli and F. Sebastiani. Sentiwordnet: a publicly available lexical resource for opinion mining. In: Proc. of LREC 2006, pp. 417–422 (2006)Google Scholar
  7. 7.
    Fang, L., Kim, H., LeFevre, K., Tami, A.: A privacy recommendation wizard for users of social networking sites. In: Proc. of the 17th ACM Conference on Computer and Communications Security, CCS 2010, pp. 630–632 (2010)Google Scholar
  8. 8.
    Fang, L., LeFevre, K.: Privacy wizards for social networking sites. In: Proc. of WWW 2010, pp. 351–360 (2010)Google Scholar
  9. 9.
    Felt, A., Evans, D.: Privacy protection for social networking platforms. In: Proc. of Web 2.0 Security and Privacy (2008)Google Scholar
  10. 10.
    Ghazinour, K., Matwin, S., Sokolova, M.: Monitoring and recommending privacy settings in social networks. In: Proc. of the Joint EDBT/ICDT Workshops, pp. 164–168 (2013)Google Scholar
  11. 11.
    R. Gross and A. Acquisti. Information revelation and privacy in online social networks. In: Proc. of the ACM Workshop on Privacy in the Electronic Society, pp. 71–80 (2005)Google Scholar
  12. 12.
    John, G.H., Langley, P.: Estimating continuous distributions in bayesian classifiers. In: Proc. of the 11th Annual Conference on Uncertainty in Artificial Intelligence (UAI), pp. 338–345. Morgan Kaufmann (1995)Google Scholar
  13. 13.
    Johnson, B.: Privacy no longer a social norm, says facebook founder (2010). http://www.theguardian.com/technology/2010/jan/11/facebook-privacy/
  14. 14.
    Joinson, A.N.: Looking at, looking up or keeping up with people?: motives and use of facebook. In: Proc. of CHI 2008 (2008)Google Scholar
  15. 15.
    Kawase, R., Nunes, B.P., Herder, E., Nejdl, W., Casanova, M.A.: Who wants to get fired? In: Proc. of WebSci 2013, pp. 191–194 (2013)Google Scholar
  16. 16.
    Lampe, C., Ellison, N.B., Steinfield, C.: Changes in use and perception of facebook. In: Proc. of CSCW 2008 (2008)Google Scholar
  17. 17.
    Lange, P.G.: Publicly private and privately public: Social networking on youtube. Journal of Computer-Mediated Communication 13(1), 361–380 (2007)CrossRefGoogle Scholar
  18. 18.
    Lin, J., Liu, B., Sadeh, N.M., Hong, J.I.: Modeling users’ mobile app privacy preferences: restoring usability in a sea of permission settings. In: Proc. of the 10th Symposium on Usable Privacy and Security (SOUPS 2014), pp. 199–212 (2014)Google Scholar
  19. 19.
    B. Liu, J. Lin, and N. M. Sadeh. Reconciling mobile app privacy and usability on smartphones: could user privacy profiles help? In: Proc. of WWW 2014, pp. 201–212 (2014)Google Scholar
  20. 20.
    Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove, A.: Analyzing facebook privacy settings: user expectations vs. reality. In: Proc. of the 11th ACM SIGCOMM Conference on Internet Measurement (IMC 2011), pp. 61–70 (2011)Google Scholar
  21. 21.
    Madden, M.: Privacy management on social media sites. Technical report, Pew Internet and American Life Project (2012)Google Scholar
  22. 22.
    Madejski, M., Johnson, M., Bellovin, S.M.: A study of privacy settings errors in an online social network. In: Proc. of PerCom 2012 Workshops, pp. 340–345 (2012)Google Scholar
  23. 23.
    Mantelero, A.: The eu proposal for a general data protection regulation and the roots of the ’right to be forgotten’. Computer Law & Security Review 29, 229–235 (2013)CrossRefGoogle Scholar
  24. 24.
    Mayer-Schönberger, V.: Delete - The Virtue of Forgetting in the Digital Age. Morgan Kaufmann Publishers (2009)Google Scholar
  25. 25.
    Rose, C.: The security implications of ubiquitous social media. International Journal of Management and Information Systems 15(1) (2011)Google Scholar
  26. 26.
    Shuyo, N.: Language detection library for java (2010)Google Scholar
  27. 27.
    Snoek, C., Worring, M., Smeulders, A.W.M.: Early versus late fusion in semantic video analysis. In Proc. of the 13th ACM Int’l Conference on Multimedia, pp. 399–402 (2005)Google Scholar
  28. 28.
    Toch, E., Sadeh, N.M., Hong, J.I.: Generating default privacy policies for online social networks. In: Proc. of CHI 2010 (Extended Abstracts Volume), pp. 4243–4248 (2010)Google Scholar
  29. 29.
    Toch, E., Wang, Y., Cranor, L.: Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems. User Modeling and User-Adapted Interaction 22, 203–220 (2012)CrossRefGoogle Scholar
  30. 30.
    Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco (2005)Google Scholar
  31. 31.
    Xie, J., Knijnenburg, B.P., Jin, H.: Location sharing privacy preference: analysis and personalized recommendation. In: Proc. of the 19th Int’l Conference on Intelligent User Interfaces, pp. 189–198 (2014)Google Scholar
  32. 32.
    Zerr, S., Siersdorfer, S., Hare, J., Demidova, E.: Privacy-aware image classification and search. In: Proc. of SIGIR 2012, pp. 35–44 (2012)Google Scholar
  33. 33.
    Zhao, X., Salehi, N., Naranjit, S., Alwaalan, S., Voida, S., Cosley, D.: The many faces of facebook: experiencing social media as performance, exhibition, and personal archive. In: Proc. of CHI 2013 (2013)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.L3S Research CenterHannoverGermany
  2. 2.Middle East Technical UniversityAnkaraTurkey

Personalised recommendations