Abstract
Online Social Networks (OSNs) have come to play an increasingly important role in our social lives, and their inherent privacy problems have become a major concern for users. Can we assist consumers in their privacy decision-making practices, for example by predicting their preferences and giving them personalized advice? To this end, we introduce PPM: a Privacy Prediction Model, rooted in psychological principles, which can be used to give users personalized advice regarding their privacy decision-making practices. Using this model, we study psychological variables that are known to affect users’ disclosure behavior: the trustworthiness of the requester/information audience, the sharing tendency of the receiver/information holder, the sensitivity of the requested/shared information, the appropriateness of the request/sharing activities, as well as several more traditional contextual factors.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
As contextual factors are not studied in the friend requests scenario, we have no results for removing such factors from \(D_{Twitter}\) and \(D_{Google+}\). Similarly, although trustworthiness of the audience is an important factor in the location sharing study, our privacy decision making model is built for audience separately (as these measures are repeated per scenario). Thus, trustworthiness is not a feature in \(D_{Family}\), \(D_{Friend}\) and \(D_{Colleague}\). Finally, the features belonging to appropriateness are difficult to split off from contextual factors in the location study, so those results are combined.
References
Acquisti, A., Gross, R.: Imagined communities: awareness, information sharing, and privacy on the facebook. In: 6th Workshop on Privacy Enhancing Technologies, pp. 36–58 (2006)
Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Secur. Priv. 2, 24–30 (2005)
Adams, A.: Multimedia information changes the whole privacy ballgame. In: Proceedings of the Tenth Conference on Computers, Freedom and Privacy: Challenging the Assumptions, CFP 2000, pp. 25–32. ACM (2000)
Al Hasib, A.: Threats of online social networks. IJCSNS. Int. J. Comput. Sci. Netw. Secur. 9(11), 288–293 (2009)
Baker, D., Buoni, N., Fee, M., Vitale, C.: Social networking and its effects on companies and their employees. Retrieved November 15 (2011)
Balebako, R., Leon, P.G., Mugan, J., Acquisti, A., Cranor, L.F., Sadeh, N.: Nudging users towards privacy on mobile devices. In: CHI 2011 Workshop on Persuasion, Influence, Nudge and Coercion Through Mobile Devices, Vancouver, Canada, pp. 23–26 (2011). http://www.andrew.cmu.edu/user/jmugan/Publications/chiworkshop.pdf
Bansal, G., Zahedi, F., Gefen, D.: The moderating influence of privacy concern on the efficacy of privacy assurance mechanisms for building trust: a multiple-context investigation. In: Proceedings of the ICIS 2008, Paris, France (2008). http://aisel.aisnet.org/icis2008/7
Barocas, S., Nissenbaum, H.: On notice: the trouble with notice and consent. In: Proceedings of the Engaging Data Forum: The First International Forum on the Application and Management of Personal Electronic Information (2009). http://www.nyu.edu/pages/projects/nissenbaum/papers/ED_SII_On_Notice.pdf
Becker, L., Pousttchi, K.: Social networks: The role of users’ privacy concerns. In: Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services, IIWAS 2012, pp. 187–195. ACM (2012). http://doi.acm.org/10.1145/2428736.2428767
Benisch, M., Kelley, P.G., Sadeh, N., Cranor, L.F.: Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs. Pers. Ubiquit. Comput. 15(7), 679–694 (2011). http://dx.doi.org/10.1007/s00779-010-0346-0
Borcea-Pfitzmann, K., Pfitzmann, A., Berg, M.: Privacy 3.0 := data minimization + user control + contextual integrity. Inf. Technol. 53(1), 34–40 (2011). http://www.oldenbourg-link.com/doi/abs/10.1524/itit.2011.0622
Brenner, J., Smith, A.: 72% of online adults are social networking site users. PewResearch Internet Project (2013)
Compañó, R., Lusoli, W.: The policy maker’s anguish: regulating personal data behavior between paradoxes and dilemmas. In: Moore, T., Pym, D., Ioannidis, C. (eds.) Economics of Information Security and Privacy, pp. 169–185. Springer, US (2010). doi:10.1007/978-1-4419-6967-5_9
Consolvo, S., Smith, I.E., Matthews, T., LaMarca, A., Tabert, J., Powledge, P.: Location disclosure to social relations: Why, when, & what people want to share. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2005, pp. 81–90. ACM (2005)
Culnan, M.J.: “how did they get my name?”: An exploratory investigation of consumer attitudes toward secondary information use. MIS Q. 17(3), 341–363 (1993). http://www.jstor.org/stable/249775
DiMicco, J., Millen, D.R., Geyer, W., Dugan, C., Brownholtz, B., Muller, M.: Motivations for social networking at work. In: Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, CSCW 2008, pp. 711–720. ACM (2008). http://doi.acm.org/10.1145/1460563.1460674
Dong, C., Jin, H., Knijnenburg, B.P.: Predicting privacy behavior on online social networks. In: Proceedings of the Ninth International Conference on Web and Social Media, ICWSM 2015, University of Oxford, Oxford, UK, 26–29 May 2015, pp. 91–100 (2015). http://www.aaai.org/ocs/index.php/ICWSM/ICWSM15/paper/view/10554
Ellison, N., Steinfield, C., Lampe, C.: The benefits of facebook “friends:” social capital and college students’ use of online social network sites. J. Comput. Mediated Commun. 12, 1143–1168 (2007)
Fang, L., LeFevre, K.: Privacy wizards for social networking sites. In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, pp. 351–360. ACM (2010)
Gong, N.Z., Xu, W., Huang, L., Mittal, P., Stefanov, E., Sekar, V., Song, D.: Evolution of social-attribute networks: measurements, modeling, and implications using google+. In: Proceedings of the 2012 ACM Conference on Internet Measurement Conference, IMC 2011, pp. 131–144 (2011)
Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, pp. 71–80. ACM (2005). http://doi.acm.org/10.1145/1102199.1102214
Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The weka data mining software: An update. SIGKDD Explor. 11(1), 10–18 (2009)
Harris, L., Westin, A., Associates: Personalized marketing and privacy on the net: What consumers want. Privacy and American Business Newsletter (1998)
Ho, A., Maiga, A., Aïmeur, E.: Privacy protection issues in social networking sites. In: AICCSA, pp. 271–278. IEEE (2009)
Hsu, C.W.: Privacy concerns, privacy practices and web site categories: toward a situational paradigm. Online Inf. Rev. 30(5), 569–586 (2006). http://www.emeraldinsight.com/journals.htm?articleid=1576312&show=abstract
Johnson, M., Egelman, S., Bellovin, S.M.: Facebook and privacy: it’s complicated. In: Proceedings of the 8th Symposium on Usable Privacy and Security. ACM, Pittsburgh (2012). http://doi.acm.org/10.1145/2335356.2335369
Joinson, A.N.: Looking at, looking up or keeping up with people?: motives and use of facebook. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2008, pp. 1027–1036. ACM (2008). http://doi.acm.org/10.1145/1357054.1357213
Kairam, S., Brzozowski, M., Huffaker, D., Chi, E.: Talking in circles: selective sharing in google+. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1065–1074. ACM Press, Austin (2012). http://dl.acm.org/citation.cfm?id=2208552
Knijnenburg, B.P., Kobsa, A.: Increasing sharing tendency without reducing satisfaction: finding the best privacy-settings user interface for social networks. In: ICIS 2014 Proceedings. Auckland, New Zealand (2014)
Knijnenburg, B.P.: Simplifying privacy decisions: towards interactive and adaptive solutions. In: Proceedings of the Recsys 2013 Workshop on Human Decision Making in Recommender Systems (Decisions@ RecSys 2013), Hong Kong, China, pp. 40–41 (2013)
Knijnenburg, B.P., Jin, H.: The persuasive effect of privacy recommendations. In: Twelfth Annual Workshop on HCI Research in MIS. Milan, Italy (2013). http://aisel.aisnet.org/sighci2013/16
Knijnenburg, B.P., Kobsa, A.: Making decisions about privacy: information disclosure in context-aware recommender systems. ACM Trans. Interact. Intell. Syst. 3(3), 20:1–20:23. http://doi.acm.org/10.1145/2499670
Knijnenburg, B.P., Kobsa, A., Jin, H.: Dimensionality of information disclosure behavior. Int. J. Hum. Comput. Stud. 71(12), 1144–1162 (2013)
Knijnenburg, B.P., Kobsa, A., Jin, H.: Preference-based location sharing: are more privacy options really better? In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2013, pp. 2667–2676. ACM (2013)
Knijnenburg, B.P.: A user-tailored approach to privacy decision support. Ph.D., University of California, Irvine, United States - California (2015). http://search.proquest.com/docview/1725139739/abstract
Kyumin Lee, B.D.E., Caverlee, J.: Seven months with the devils: a long-term study of content polluters on twitter. In: International AAAI Conference on Weblogs and Social Media (ICWSM) (2011)
Lampe, C., Ellison, N.B., Steinfield, C.: Changes in use and perception of facebook. In: Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, CSCW 2008, pp. 721–730. ACM (2008)
Lampe, C., Gray, R., Fiore, A.T., Ellison, N.: Help is on the way: patterns of responses to resource requests on facebook. In: Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing, CSCW 2014, pp. 3–15. ACM (2014). http://doi.acm.org/10.1145/2531602.2531720
Laufer, R.S., Wolfe, M.: Privacy as a concept and a social issue: a multidimensional developmental theory. J. Soc. Issues 33(3), 22–42 (1977)
Lederer, S., Hong, J.I., Dey, A.K., Landay, J.A.: Personal privacy through understanding and action: five pitfalls for designers. Pers. Ubiquit. Comput. 8(6), 440–454 (2004). http://www.springerlink.com/index/10.1007/s00779-004-0304-9
Lederer, S., Mankoff, J., Dey, A.K.: Who wants to know what when? privacy preference determinants in ubiquitous computing. In: CHI ’03 Extended Abstracts on Human Factors in Computing Systems, CHI EA 2003, pp. 724–725. ACM (2003). http://doi.acm.org/10.1145/765891.765952
Lewis, K., Kaufman, J., Christakis, N.: The taste for privacy: an analysis of college student privacy settings in an online social network. J. Comput. Mediated Commun. 14(1), 79–100 (2008)
Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove., A.: Analyzing facebook privacy settings: user expectations vs. reality. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, pp. 61–70. ACM (2011)
Madden, M.: Privacy management on social media sites. Technical report, Pew Internet & American Life Project, Pew Research Center, Washington, DC, February 2012. http://www.pewinternet.org/2012/02/24/privacy-management-on-social-media-sites/
Madejski, M., Johnson, M., Bellovin, S.: A study of privacy settings errors in an online social network. In: 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), Lugano, Switzerland, pp. 340–345 (2012)
Nissenbaum, H.: Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press, Stanford (2009)
Nissenbaum, H.: A contextual approach to privacy online. Daedalus 140(4), 32–48 (2011). http://dx.doi.org/10.1162/DAED_a_00113
Norberg, P.A., Horne, D.R., Horne, D.A.: The privacy paradox: personal information disclosure intentions versus behaviors. J. Consum. Aff. 41(1), 100–126 (2007)
Olson, J.S., Grudin, J., Horvitz, E.: A study of preferences for sharing and privacy. In: CHI ’05 Extended Abstracts on Human Factors in Computing Systems, CHI EA 2005, pp. 1985–1988. ACM (2005)
Page, X., Kobsa, A., Knijnenburg, B.P.: Don’t disturb my circles! boundary preservation is at the center of location-sharing concerns. In: Proceedings of the Sixth International AAAI Conference on Weblogs and Social Media, pp. 266–273. Dublin, Ireland, May 2012. http://www.aaai.org/ocs/index.php/ICWSM/ICWSM12/paper/view/4679
Pallapa, G., Das, S.K., Di Francesco, M., Aura, T.: Adaptive and context-aware privacy preservation exploiting user interactions in smart environments. Pervasive Mobile Comput. 12, 232–243 (2014). http://www.sciencedirect.com/science/article/pii/S1574119213001557
Ravichandran, R., Benisch, M., Kelley, P.G., Sadeh, N.M.: Capturing social networking privacy preferences: In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 1–18. Springer, Heidelberg (2009). doi:10.1007/978-3-642-03168-7_1
Reports, C.: Facebook & your privacy: Who sees the data you share on the biggest social network? (2012). http://www.consumerreports.org/cro/magazine/2012/06/facebook-your-privacy
Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M., Rao, J.: Understanding and capturing people’s privacy policies in a mobile social networking application. Pers. Ubiquit. Comput. 13(6), 401–412 (2009)
Sheehan, K.B.: Toward a typology of internet users and online privacy concerns. Inf. Soc. 18(1), 21–32 (2002)
Smith, N.C., Goldstein, D.G., Johnson, E.J.: Choice without awareness: ethical and policy implications of defaults. J. Public Policy Mark. 32(2), 159–172 (2013). http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=91886736&site=ehost-live
Solove, D.J.: Privacy self-management and the consent dilemma. Harvard Law Rev. 126, 1880–1903 (2013). http://papers.ssrn.com/abstract=2171018
Swets, J.A.: Measuring the accuracy of diagnostic systems. Science (New York, N.Y.) 240(4857), 1285–1293 (1988)
Tang, K., Hong, J., Siewiorek, D.: The implications of offering more disclosure choices for social location sharing. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2012, pp. 391–394. ACM (2012)
Tang, K., Lin, J., Hong, J., Siewiorek, D., Sadeh, N.: Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing. In: Proceedings of the UbiComp. 2010, Copenhagen, Denmark, pp. 85–04 (2010). http://portal.acm.org/citation.cfm?doid=1864349.1864363
Taylor, H.: Most people are “privacy pragmatists” who, while concerned about privacy, will sometimes trade it off for other benefits. Harris Poll 17(19) (2003)
Toch, E., Cranshaw, J., Drielsma, P.H., Tsai, J.Y., Kelley, P.G., Springfield, J., Cranor, L., Hong, J., Sadeh, N.: Empirical models of privacy in location sharing. In: Proceedings of the 12th ACM International Conference on Ubiquitous Computing, Copenhagen, Denmark, pp. 129–138. ACM Press (2010). http://doi.acm.org/10.1145/1864349.1864364
Watson, J., Besmer, A., Lipford, H.R.: +your circles: sharing behavior on google+. In: Proceedings of the 8th Symposium on Usable Privacy and Security. ACM, Pittsburgh (2012). http://doi.acm.org/10.1145/2335356.2335373
Woodruff, A., Pihur, V., Consolvo, S., Schmidt, L., Brandimarte, L., Acquisti, A.: Would a privacy fundamentalist sell their DNA for $1000.. if nothing bad happened as a result? The Westin categories, behavioral intentions, and consequences. In: Symposium on Usable Privacy and Security (SOUPS) (2014). https://www.usenix.org/system/files/conference/soups2014/soups14-paper-woodruff.pdf
Xu, H., Dinev, T., Smith, H.J., Hart, P.: Examining the formation of individual’s privacy concerns: toward an integrative view. In: ICIS 2008 Proceedings, Paris, France (2008)
Zickuhr, K.: Three-quarters of smartphone owners use location-based services. Technical report, D Pew Research Center (2012). http://pewinternet.org/~/media//Files/Reports/2012/PIP_Location_based_services_2012_Report.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Dong, C., Jin, H., Knijnenburg, B.P. (2016). PPM: A Privacy Prediction Model for Online Social Networks. In: Spiro, E., Ahn, YY. (eds) Social Informatics. SocInfo 2016. Lecture Notes in Computer Science(), vol 10047. Springer, Cham. https://doi.org/10.1007/978-3-319-47874-6_28
Download citation
DOI: https://doi.org/10.1007/978-3-319-47874-6_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47873-9
Online ISBN: 978-3-319-47874-6
eBook Packages: Computer ScienceComputer Science (R0)