Skip to main content

PPM: A Privacy Prediction Model for Online Social Networks

  • Conference paper
  • First Online:
Social Informatics (SocInfo 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10047))

Included in the following conference series:

Abstract

Online Social Networks (OSNs) have come to play an increasingly important role in our social lives, and their inherent privacy problems have become a major concern for users. Can we assist consumers in their privacy decision-making practices, for example by predicting their preferences and giving them personalized advice? To this end, we introduce PPM: a Privacy Prediction Model, rooted in psychological principles, which can be used to give users personalized advice regarding their privacy decision-making practices. Using this model, we study psychological variables that are known to affect users’ disclosure behavior: the trustworthiness of the requester/information audience, the sharing tendency of the receiver/information holder, the sensitivity of the requested/shared information, the appropriateness of the request/sharing activities, as well as several more traditional contextual factors.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.mturk.com/mturk/.

  2. 2.

    https://developers.google.com/places/.

  3. 3.

    As contextual factors are not studied in the friend requests scenario, we have no results for removing such factors from \(D_{Twitter}\) and \(D_{Google+}\). Similarly, although trustworthiness of the audience is an important factor in the location sharing study, our privacy decision making model is built for audience separately (as these measures are repeated per scenario). Thus, trustworthiness is not a feature in \(D_{Family}\), \(D_{Friend}\) and \(D_{Colleague}\). Finally, the features belonging to appropriateness are difficult to split off from contextual factors in the location study, so those results are combined.

References

  1. Acquisti, A., Gross, R.: Imagined communities: awareness, information sharing, and privacy on the facebook. In: 6th Workshop on Privacy Enhancing Technologies, pp. 36–58 (2006)

    Google Scholar 

  2. Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Secur. Priv. 2, 24–30 (2005)

    Google Scholar 

  3. Adams, A.: Multimedia information changes the whole privacy ballgame. In: Proceedings of the Tenth Conference on Computers, Freedom and Privacy: Challenging the Assumptions, CFP 2000, pp. 25–32. ACM (2000)

    Google Scholar 

  4. Al Hasib, A.: Threats of online social networks. IJCSNS. Int. J. Comput. Sci. Netw. Secur. 9(11), 288–293 (2009)

    Google Scholar 

  5. Baker, D., Buoni, N., Fee, M., Vitale, C.: Social networking and its effects on companies and their employees. Retrieved November 15 (2011)

    Google Scholar 

  6. Balebako, R., Leon, P.G., Mugan, J., Acquisti, A., Cranor, L.F., Sadeh, N.: Nudging users towards privacy on mobile devices. In: CHI 2011 Workshop on Persuasion, Influence, Nudge and Coercion Through Mobile Devices, Vancouver, Canada, pp. 23–26 (2011). http://www.andrew.cmu.edu/user/jmugan/Publications/chiworkshop.pdf

  7. Bansal, G., Zahedi, F., Gefen, D.: The moderating influence of privacy concern on the efficacy of privacy assurance mechanisms for building trust: a multiple-context investigation. In: Proceedings of the ICIS 2008, Paris, France (2008). http://aisel.aisnet.org/icis2008/7

  8. Barocas, S., Nissenbaum, H.: On notice: the trouble with notice and consent. In: Proceedings of the Engaging Data Forum: The First International Forum on the Application and Management of Personal Electronic Information (2009). http://www.nyu.edu/pages/projects/nissenbaum/papers/ED_SII_On_Notice.pdf

  9. Becker, L., Pousttchi, K.: Social networks: The role of users’ privacy concerns. In: Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services, IIWAS 2012, pp. 187–195. ACM (2012). http://doi.acm.org/10.1145/2428736.2428767

  10. Benisch, M., Kelley, P.G., Sadeh, N., Cranor, L.F.: Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs. Pers. Ubiquit. Comput. 15(7), 679–694 (2011). http://dx.doi.org/10.1007/s00779-010-0346-0

    Article  Google Scholar 

  11. Borcea-Pfitzmann, K., Pfitzmann, A., Berg, M.: Privacy 3.0 := data minimization + user control + contextual integrity. Inf. Technol. 53(1), 34–40 (2011). http://www.oldenbourg-link.com/doi/abs/10.1524/itit.2011.0622

  12. Brenner, J., Smith, A.: 72% of online adults are social networking site users. PewResearch Internet Project (2013)

    Google Scholar 

  13. Compañó, R., Lusoli, W.: The policy maker’s anguish: regulating personal data behavior between paradoxes and dilemmas. In: Moore, T., Pym, D., Ioannidis, C. (eds.) Economics of Information Security and Privacy, pp. 169–185. Springer, US (2010). doi:10.1007/978-1-4419-6967-5_9

    Google Scholar 

  14. Consolvo, S., Smith, I.E., Matthews, T., LaMarca, A., Tabert, J., Powledge, P.: Location disclosure to social relations: Why, when, & what people want to share. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2005, pp. 81–90. ACM (2005)

    Google Scholar 

  15. Culnan, M.J.: “how did they get my name?”: An exploratory investigation of consumer attitudes toward secondary information use. MIS Q. 17(3), 341–363 (1993). http://www.jstor.org/stable/249775

    Google Scholar 

  16. DiMicco, J., Millen, D.R., Geyer, W., Dugan, C., Brownholtz, B., Muller, M.: Motivations for social networking at work. In: Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, CSCW 2008, pp. 711–720. ACM (2008). http://doi.acm.org/10.1145/1460563.1460674

  17. Dong, C., Jin, H., Knijnenburg, B.P.: Predicting privacy behavior on online social networks. In: Proceedings of the Ninth International Conference on Web and Social Media, ICWSM 2015, University of Oxford, Oxford, UK, 26–29 May 2015, pp. 91–100 (2015). http://www.aaai.org/ocs/index.php/ICWSM/ICWSM15/paper/view/10554

  18. Ellison, N., Steinfield, C., Lampe, C.: The benefits of facebook “friends:” social capital and college students’ use of online social network sites. J. Comput. Mediated Commun. 12, 1143–1168 (2007)

    Article  Google Scholar 

  19. Fang, L., LeFevre, K.: Privacy wizards for social networking sites. In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, pp. 351–360. ACM (2010)

    Google Scholar 

  20. Gong, N.Z., Xu, W., Huang, L., Mittal, P., Stefanov, E., Sekar, V., Song, D.: Evolution of social-attribute networks: measurements, modeling, and implications using google+. In: Proceedings of the 2012 ACM Conference on Internet Measurement Conference, IMC 2011, pp. 131–144 (2011)

    Google Scholar 

  21. Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, pp. 71–80. ACM (2005). http://doi.acm.org/10.1145/1102199.1102214

  22. Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The weka data mining software: An update. SIGKDD Explor. 11(1), 10–18 (2009)

    Article  Google Scholar 

  23. Harris, L., Westin, A., Associates: Personalized marketing and privacy on the net: What consumers want. Privacy and American Business Newsletter (1998)

    Google Scholar 

  24. Ho, A., Maiga, A., Aïmeur, E.: Privacy protection issues in social networking sites. In: AICCSA, pp. 271–278. IEEE (2009)

    Google Scholar 

  25. Hsu, C.W.: Privacy concerns, privacy practices and web site categories: toward a situational paradigm. Online Inf. Rev. 30(5), 569–586 (2006). http://www.emeraldinsight.com/journals.htm?articleid=1576312&show=abstract

  26. Johnson, M., Egelman, S., Bellovin, S.M.: Facebook and privacy: it’s complicated. In: Proceedings of the 8th Symposium on Usable Privacy and Security. ACM, Pittsburgh (2012). http://doi.acm.org/10.1145/2335356.2335369

  27. Joinson, A.N.: Looking at, looking up or keeping up with people?: motives and use of facebook. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2008, pp. 1027–1036. ACM (2008). http://doi.acm.org/10.1145/1357054.1357213

  28. Kairam, S., Brzozowski, M., Huffaker, D., Chi, E.: Talking in circles: selective sharing in google+. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1065–1074. ACM Press, Austin (2012). http://dl.acm.org/citation.cfm?id=2208552

  29. Knijnenburg, B.P., Kobsa, A.: Increasing sharing tendency without reducing satisfaction: finding the best privacy-settings user interface for social networks. In: ICIS 2014 Proceedings. Auckland, New Zealand (2014)

    Google Scholar 

  30. Knijnenburg, B.P.: Simplifying privacy decisions: towards interactive and adaptive solutions. In: Proceedings of the Recsys 2013 Workshop on Human Decision Making in Recommender Systems (Decisions@ RecSys 2013), Hong Kong, China, pp. 40–41 (2013)

    Google Scholar 

  31. Knijnenburg, B.P., Jin, H.: The persuasive effect of privacy recommendations. In: Twelfth Annual Workshop on HCI Research in MIS. Milan, Italy (2013). http://aisel.aisnet.org/sighci2013/16

  32. Knijnenburg, B.P., Kobsa, A.: Making decisions about privacy: information disclosure in context-aware recommender systems. ACM Trans. Interact. Intell. Syst. 3(3), 20:1–20:23. http://doi.acm.org/10.1145/2499670

    Google Scholar 

  33. Knijnenburg, B.P., Kobsa, A., Jin, H.: Dimensionality of information disclosure behavior. Int. J. Hum. Comput. Stud. 71(12), 1144–1162 (2013)

    Article  Google Scholar 

  34. Knijnenburg, B.P., Kobsa, A., Jin, H.: Preference-based location sharing: are more privacy options really better? In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2013, pp. 2667–2676. ACM (2013)

    Google Scholar 

  35. Knijnenburg, B.P.: A user-tailored approach to privacy decision support. Ph.D., University of California, Irvine, United States - California (2015). http://search.proquest.com/docview/1725139739/abstract

  36. Kyumin Lee, B.D.E., Caverlee, J.: Seven months with the devils: a long-term study of content polluters on twitter. In: International AAAI Conference on Weblogs and Social Media (ICWSM) (2011)

    Google Scholar 

  37. Lampe, C., Ellison, N.B., Steinfield, C.: Changes in use and perception of facebook. In: Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, CSCW 2008, pp. 721–730. ACM (2008)

    Google Scholar 

  38. Lampe, C., Gray, R., Fiore, A.T., Ellison, N.: Help is on the way: patterns of responses to resource requests on facebook. In: Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing, CSCW 2014, pp. 3–15. ACM (2014). http://doi.acm.org/10.1145/2531602.2531720

  39. Laufer, R.S., Wolfe, M.: Privacy as a concept and a social issue: a multidimensional developmental theory. J. Soc. Issues 33(3), 22–42 (1977)

    Article  Google Scholar 

  40. Lederer, S., Hong, J.I., Dey, A.K., Landay, J.A.: Personal privacy through understanding and action: five pitfalls for designers. Pers. Ubiquit. Comput. 8(6), 440–454 (2004). http://www.springerlink.com/index/10.1007/s00779-004-0304-9

    Google Scholar 

  41. Lederer, S., Mankoff, J., Dey, A.K.: Who wants to know what when? privacy preference determinants in ubiquitous computing. In: CHI ’03 Extended Abstracts on Human Factors in Computing Systems, CHI EA 2003, pp. 724–725. ACM (2003). http://doi.acm.org/10.1145/765891.765952

  42. Lewis, K., Kaufman, J., Christakis, N.: The taste for privacy: an analysis of college student privacy settings in an online social network. J. Comput. Mediated Commun. 14(1), 79–100 (2008)

    Article  Google Scholar 

  43. Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove., A.: Analyzing facebook privacy settings: user expectations vs. reality. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, pp. 61–70. ACM (2011)

    Google Scholar 

  44. Madden, M.: Privacy management on social media sites. Technical report, Pew Internet & American Life Project, Pew Research Center, Washington, DC, February 2012. http://www.pewinternet.org/2012/02/24/privacy-management-on-social-media-sites/

  45. Madejski, M., Johnson, M., Bellovin, S.: A study of privacy settings errors in an online social network. In: 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), Lugano, Switzerland, pp. 340–345 (2012)

    Google Scholar 

  46. Nissenbaum, H.: Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press, Stanford (2009)

    Google Scholar 

  47. Nissenbaum, H.: A contextual approach to privacy online. Daedalus 140(4), 32–48 (2011). http://dx.doi.org/10.1162/DAED_a_00113

    Google Scholar 

  48. Norberg, P.A., Horne, D.R., Horne, D.A.: The privacy paradox: personal information disclosure intentions versus behaviors. J. Consum. Aff. 41(1), 100–126 (2007)

    Article  Google Scholar 

  49. Olson, J.S., Grudin, J., Horvitz, E.: A study of preferences for sharing and privacy. In: CHI ’05 Extended Abstracts on Human Factors in Computing Systems, CHI EA 2005, pp. 1985–1988. ACM (2005)

    Google Scholar 

  50. Page, X., Kobsa, A., Knijnenburg, B.P.: Don’t disturb my circles! boundary preservation is at the center of location-sharing concerns. In: Proceedings of the Sixth International AAAI Conference on Weblogs and Social Media, pp. 266–273. Dublin, Ireland, May 2012. http://www.aaai.org/ocs/index.php/ICWSM/ICWSM12/paper/view/4679

  51. Pallapa, G., Das, S.K., Di Francesco, M., Aura, T.: Adaptive and context-aware privacy preservation exploiting user interactions in smart environments. Pervasive Mobile Comput. 12, 232–243 (2014). http://www.sciencedirect.com/science/article/pii/S1574119213001557

    Google Scholar 

  52. Ravichandran, R., Benisch, M., Kelley, P.G., Sadeh, N.M.: Capturing social networking privacy preferences: In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 1–18. Springer, Heidelberg (2009). doi:10.1007/978-3-642-03168-7_1

    Chapter  Google Scholar 

  53. Reports, C.: Facebook & your privacy: Who sees the data you share on the biggest social network? (2012). http://www.consumerreports.org/cro/magazine/2012/06/facebook-your-privacy

  54. Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M., Rao, J.: Understanding and capturing people’s privacy policies in a mobile social networking application. Pers. Ubiquit. Comput. 13(6), 401–412 (2009)

    Article  Google Scholar 

  55. Sheehan, K.B.: Toward a typology of internet users and online privacy concerns. Inf. Soc. 18(1), 21–32 (2002)

    Article  Google Scholar 

  56. Smith, N.C., Goldstein, D.G., Johnson, E.J.: Choice without awareness: ethical and policy implications of defaults. J. Public Policy Mark. 32(2), 159–172 (2013). http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=91886736&site=ehost-live

  57. Solove, D.J.: Privacy self-management and the consent dilemma. Harvard Law Rev. 126, 1880–1903 (2013). http://papers.ssrn.com/abstract=2171018

  58. Swets, J.A.: Measuring the accuracy of diagnostic systems. Science (New York, N.Y.) 240(4857), 1285–1293 (1988)

    Article  MathSciNet  MATH  Google Scholar 

  59. Tang, K., Hong, J., Siewiorek, D.: The implications of offering more disclosure choices for social location sharing. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2012, pp. 391–394. ACM (2012)

    Google Scholar 

  60. Tang, K., Lin, J., Hong, J., Siewiorek, D., Sadeh, N.: Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing. In: Proceedings of the UbiComp. 2010, Copenhagen, Denmark, pp. 85–04 (2010). http://portal.acm.org/citation.cfm?doid=1864349.1864363

  61. Taylor, H.: Most people are “privacy pragmatists” who, while concerned about privacy, will sometimes trade it off for other benefits. Harris Poll 17(19) (2003)

    Google Scholar 

  62. Toch, E., Cranshaw, J., Drielsma, P.H., Tsai, J.Y., Kelley, P.G., Springfield, J., Cranor, L., Hong, J., Sadeh, N.: Empirical models of privacy in location sharing. In: Proceedings of the 12th ACM International Conference on Ubiquitous Computing, Copenhagen, Denmark, pp. 129–138. ACM Press (2010). http://doi.acm.org/10.1145/1864349.1864364

  63. Watson, J., Besmer, A., Lipford, H.R.: +your circles: sharing behavior on google+. In: Proceedings of the 8th Symposium on Usable Privacy and Security. ACM, Pittsburgh (2012). http://doi.acm.org/10.1145/2335356.2335373

  64. Woodruff, A., Pihur, V., Consolvo, S., Schmidt, L., Brandimarte, L., Acquisti, A.: Would a privacy fundamentalist sell their DNA for $1000.. if nothing bad happened as a result? The Westin categories, behavioral intentions, and consequences. In: Symposium on Usable Privacy and Security (SOUPS) (2014). https://www.usenix.org/system/files/conference/soups2014/soups14-paper-woodruff.pdf

  65. Xu, H., Dinev, T., Smith, H.J., Hart, P.: Examining the formation of individual’s privacy concerns: toward an integrative view. In: ICIS 2008 Proceedings, Paris, France (2008)

    Google Scholar 

  66. Zickuhr, K.: Three-quarters of smartphone owners use location-based services. Technical report, D Pew Research Center (2012). http://pewinternet.org/~/media//Files/Reports/2012/PIP_Location_based_services_2012_Report.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cailing Dong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Dong, C., Jin, H., Knijnenburg, B.P. (2016). PPM: A Privacy Prediction Model for Online Social Networks. In: Spiro, E., Ahn, YY. (eds) Social Informatics. SocInfo 2016. Lecture Notes in Computer Science(), vol 10047. Springer, Cham. https://doi.org/10.1007/978-3-319-47874-6_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47874-6_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47873-9

  • Online ISBN: 978-3-319-47874-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics