A Prediction Model of Privacy Control for Online Social Networking Users

  • Rohit Valecha
  • Rajarshi Chakraborty
  • H. Raghav Rao
  • Shambhu Upadhyaya
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10844)

Abstract

With the growing popularity of social network sites (SNS), organizations have started to leverage them for encouraging both personal and professional data sharing. However, inherent privacy problems in social networks have become a concern for organizations deploying them. So companies have started investing in systems for evaluating employees’ behaviors on SNSs. In evaluating employees’ behaviors on SNSs, this study aims at developing a mechanism for learning users’ behaviors on SNS and predicting their control of privacy on SNS. Privacy prediction is based on the revelation of actual privacy characteristics of users through the analysis of their SNS usage patterns. Using the Design Science research methodology, this study presents the design and instantiation of a prediction model that is trained using survey data and SNS data of graduate students from a prominent Northeastern University in the United States, which is used to generate class labels associated with their privacy control. The prediction model provides a data analytics component for reliable predictions of users’ privacy control using Machine Learning algorithm SVM and a randomized ensemble of decision trees. The results suggest that the prediction model represents a reliable method for predicting privacy control based on user actions on SNS.

Keywords

Privacy control Social networks Prediction model Machine learning Design science 

Notes

Acknowledgements

This research has been funded in part by NSF under grants 1651475, 0916612 and 1227353. Usual disclaimer applies. The authors would also like to thank the reviewers whose comments have greatly improved the paper.

References

  1. Abeel, T., Helleputte, T., Van de Peer, Y., Dupont, P., Saeys, Y.: Robust biomarker identification for cancer diagnosis with ensemble feature selection methods. Bioinformatics 26(3), 392–398 (2009)CrossRefGoogle Scholar
  2. Acquisti, A., Grossklags, J.: Privacy attitudes and privacy behavior. In: Camp, L.J., Lewis, S. (eds.) Economics of Information Security. ADIS, vol. 12, pp. 165–178. Springer, Boston (2004).  https://doi.org/10.1007/1-4020-8090-5_13CrossRefGoogle Scholar
  3. Altman, I.: The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding, No. 156 A4 (1975)Google Scholar
  4. An, S., Liu, W., Venkatesh, S.: Fast cross-validation algorithms for least squares support vector machine and kernel ridge regression. Pattern Recognit. 40, 2154–2162 (2007)CrossRefGoogle Scholar
  5. Arlot, S., Celisse, A.: A survey of cross-validation procedures for model selection. Stat. Surv. 4, 40–79 (2010)MathSciNetCrossRefGoogle Scholar
  6. Auria, L., Moro, R.A.: Support vector machines (SVM) as a technique for solvency analysis. DIW Discussion Papers, No. 811 (2008)Google Scholar
  7. Basnet, R.: Automated Quality Assessment of Printed Objects Using Subjective and Objective Methods Based on Imaging and Machine Learning Techniques. Rochester Institute of Technology, Rochester (2017)Google Scholar
  8. Bradley, A.P.: The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern Recognit. 30(7), 1145–1159 (1997)CrossRefGoogle Scholar
  9. Brandimarte, L., Acquisti, A., Loewenstein, G.: Misplaced confidences privacy and the control paradox. Soc. Psychol. Pers. Sci. 4(3), 340–347 (2013)CrossRefGoogle Scholar
  10. Burges, C.J.: A tutorial on support vector machines for pattern recognition. Data Min. Knowl. Discov. 2(2), 121–167 (1998)CrossRefGoogle Scholar
  11. Chong, A.Y.L.: Predicting m-commerce adoption determinants: a neural network approach. Expert Syst. Appl. 40(2), 523–530 (2013)CrossRefGoogle Scholar
  12. Compano, R., Lusoli, W.: The policy maker’s anguish: regulating personal data behavior between paradoxes and dilemmas. In: Moore, T., Pym, D. (eds.) Economics of Information Security and Privacy, pp. 169–185. Springer, Boston (2010).  https://doi.org/10.1007/978-1-4419-6967-5_9CrossRefGoogle Scholar
  13. Culnan, M.J.: How did they get my name?: An exploratory investigation of consumer attitudes toward secondary information use. MIS Q. 17, 341–363 (1993)CrossRefGoogle Scholar
  14. DiMicco, J.M., Geyer, W., Millen, D.R., Dugan, C., Brownholtz, B.: People sensemaking and relationship building on an enterprise social network site. In: 42nd Hawaii International Conference on System Sciences, pp. 1–10. IEEE (2009)Google Scholar
  15. Dinev, T., Hart, P.: Internet privacy concerns and their antecedents-measurement validity and a regression model. Behav. Inf. Technol. 23(6), 413–422 (2004)CrossRefGoogle Scholar
  16. Dong, C., Jin, H., Knijnenburg, B.P.: Predicting privacy behavior on online social networks. In: Ninth International AAAI Conference on Web and Social Media (2015)Google Scholar
  17. Geurts, P., Ernst, D., Wehenkel, L.: Extremely randomized trees. Mach. Learn. 63(1), 3–42 (2006)CrossRefGoogle Scholar
  18. Geyer, W., Dugan, C., DiMicco, J., Millen, D.R., Brownholtz, B., Muller, M.: Use and reuse of shared lists as a social content type. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1545–1554 (2008)Google Scholar
  19. Gregor, S., Hevner, A.R.: Positioning and presenting design science research for maximum impact. MIS Q. 37(2), 337–355 (2013)CrossRefGoogle Scholar
  20. Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 71–80. ACM (2005)Google Scholar
  21. Hastie, T., Rosset, S., Tibshirani, R., Zhu, J.: The entire regularization path for the support vector machine. J. Mach. Learn. Res. 5, 1391–1415 (2004)MathSciNetMATHGoogle Scholar
  22. Heumann, B.W.: An object-based classification of mangroves using a hybrid decision tree—Support vector machine approach. Remote Sens. 3(11), 2440–2460 (2011)CrossRefGoogle Scholar
  23. Hevner, A., March, S.T., Park, J., Ram, S.: Design science in information systems research. MIS Q. 28(1), 75–105 (2004)CrossRefGoogle Scholar
  24. Hoadley, C.M., Xu, H., Lee, J.J., Rosson, M.B.: Privacy as information access and illusory control: the case of the Facebook News Feed privacy outcry. Electron. Commer. Res. Appl. 9(1), 50–60 (2010)CrossRefGoogle Scholar
  25. Joachims, T.: Text categorization with support vector machines: learning with many relevant features. In: Nédellec, C., Rouveirol, C. (eds.) ECML 1998. LNCS, vol. 1398, pp. 137–142. Springer, Heidelberg (1998).  https://doi.org/10.1007/BFb0026683CrossRefGoogle Scholar
  26. Johnson, C.A.: Privacy as personal control. Man-Environ. Interact.: Eval. Appl.: Part 2, 83–100 (1974)Google Scholar
  27. Kairam, S., Brzozowski, M., Huffaker, D., Chi, E.: Talking in circles: selective sharing in Google+. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1065–1074. ACM (2012)Google Scholar
  28. Kisekka, V., Bagchi-Sen, S., Rao, H.R.: Extent of private information disclosure on online social networks: an exploration of Facebook mobile phone users. Comput. Hum. Behav. 29(6), 2722–2729 (2013)CrossRefGoogle Scholar
  29. Koch, M., Schwabe, G., Briggs, R.O.: CSCW and social computing. Bus. Inf. Syst. Eng. 57(3), 149–153 (2015)CrossRefGoogle Scholar
  30. Kohavi, R.: A study of cross-validation and bootstrap for accuracy estimation and model selection. In: IJCAI, vol. 14, no. 2, pp. 1137–1145 (1995)Google Scholar
  31. Kostakos, V., Venkatanathan, J., Reynolds, B., Sadeh, N., Toch, E., Shaikh, S.A., Jones, S.: Who’s your best friend?: Targeted privacy attacks in location-sharing social networks. In: Proceedings of the 13th International Conference on Ubiquitous Computing, pp. 177–186. ACM (2011)Google Scholar
  32. Laufer, R.S., Wolfe, M.: Privacy as a concept and a social issue: a multidimensional developmental theory. J. Soc. Issues 33(3), 22–42 (1977)CrossRefGoogle Scholar
  33. Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inf. Syst. Res. 15(4), 336–355 (2004)CrossRefGoogle Scholar
  34. Margulis, S.T.: Conceptions of privacy: current status and next steps. J. Soc. Issues 33(3), 5–21 (1977)CrossRefGoogle Scholar
  35. Margulis, S.T.: On the status and contribution of Westin’s and Altman’s theories of privacy. J. Soc. Issues 59(2), 411–429 (2003a)CrossRefGoogle Scholar
  36. Margulis, S.T.: Privacy as a social issue and behavioral concept. J. Soc. Issues 59(2), 243–261 (2003b)CrossRefGoogle Scholar
  37. McLaren, T.S., Head, M.M., Yuan, Y., Chan, Y.E.: A multilevel model for measuring fit between a firm’s competitive strategies and information systems capabilities. MIS Q. 35(4), 909–929 (2011)CrossRefGoogle Scholar
  38. Mingers, J.: An empirical comparison of selection measures for decision-tree induction. Mach. Learn. 3(4), 319–342 (1989)Google Scholar
  39. Mohammadi, P., Ebrahimi-Moghadam, A., Shirani, S.: Subjective and objective quality assessment of image: a survey, pp. 1–50. arXiv Preprint https://arxiv.org/abs/1406.7799 (2014)
  40. Morris, C.W., Autret, A., Boddy, L.: Support vector machines for identifying organisms—A comparison with strongly partitioned radial basis function networks. Ecol. Model. 146(1), 57–67 (2001)CrossRefGoogle Scholar
  41. Mountrakis, G., Im, J., Ogole, C.: Support vector machines in remote sensing: a review. ISPRS J. Photogramm. Remote Sens. 66(3), 247–259 (2011)CrossRefGoogle Scholar
  42. Mullen, C., Hamilton, N.F.: Adolescents’ response to parental Facebook friend requests: the comparative influence of privacy management, parent-child relational quality, attitude and peer influence. Comput. Hum. Behav. 60, 165–172 (2016)CrossRefGoogle Scholar
  43. Nachev, A., Stoyanov, B.: Product quality analysis using support vector machines. Inf. Models Anal. 1, 179–192 (2012)Google Scholar
  44. Pal, M., Foody, G.M.: Evaluation of SVM, RVM and SMLR for accurate image classification with limited ground data. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 5, 1344–1355 (2012)CrossRefGoogle Scholar
  45. Peffers, K., Tuunanen, T., Rothenberger, M.A., Chatterjee, S.: A design science research methodology for information systems research. J. Manag. Inf. Syst. 24(3), 45–77 (2007)CrossRefGoogle Scholar
  46. Petronio, S.S.: Boundaries of Privacy: Dialectics of Disclosure. State University of New York Press, Albany (2002). xix, p. 268Google Scholar
  47. Powers, D.M.W.: Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation. J. Mach. Learn. Technol. 2(1), 37–63 (2011)MathSciNetGoogle Scholar
  48. Puniskis, D., Laurutis, R., Dirmeikis, R.: An artificial neural nets for spam e-mail recognition. Electron. Electr. Eng. (2006). ISSN 1392-1215Google Scholar
  49. Schwegmann, B., Matzner, M., Janiesch, C.: A method and tool for predictive event-driven process analytics. In: Wirtschaftsinformatik, p. 46 (2013)Google Scholar
  50. Sheehan, K.B., Hoy, M.G.: Dimensions of privacy concern among online consumers. J. Public Policy Mark. 19(1), 62–73 (2000)CrossRefGoogle Scholar
  51. Shmueli, G., Koppius, O.: Predictive analytics in information systems research. MIS Q. 35(3), 553–572 (2010)CrossRefGoogle Scholar
  52. Skeels, M.M., Grudin, J.: When social networks cross boundaries. In: Proceedings of the ACM 2009 International Conference on Supporting Group Work, GROUP 2009. ACM, New York (2009)Google Scholar
  53. Smith, H.J., Milberg, S.J., Burke, S.J.: Information privacy: measuring individuals’ concerns about organizational practices. MIS Q. 20(2), 167–196 (1996)CrossRefGoogle Scholar
  54. Staddon, J., Huffaker, D., Brown, L., Sedley, A.: Are privacy concerns a turn-off?: Engagement and privacy in social networks. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, Washington, DC (2012)Google Scholar
  55. Stehman, S.V.: Selecting and interpreting measures of thematic classification accuracy. Remote Sens. Environ. 62(1), 77–89 (1997)CrossRefGoogle Scholar
  56. Tan, W.K., Nguyen, T.T.D., Tha, K.K.O., Yu, X.: Designing groupware that fosters social capital creation: can Facebook support global virtual team?. In: AMCIS 2009 Proceedings, p. 525 (2009)Google Scholar
  57. Tuv, E., Borisov, A., Runger, G., Torkkola, K.: Feature selection with ensembles, artificial variables, and redundancy elimination. J. Mach. Learn. Res. 10, 1341–1366 (2009)MathSciNetMATHGoogle Scholar
  58. Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P.G., Cranor, L.F.: I regretted the minute I pressed share: a qualitative study of regrets on Facebook. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, p. 10. ACM, July 2011Google Scholar
  59. Wehner, B., Ritter, C., Leist, S.: Enterprise social networks: a literature review and research agenda. Comput. Netw. 114, 125–142 (2017)CrossRefGoogle Scholar
  60. Wellman, B., Wortley, S.: Different strokes from different folks: community ties and social support. Am. J. Sociol. 96(3), 558–588 (1990)CrossRefGoogle Scholar
  61. Westin, A.F.: Privacy and Freedom. Atheneum, New York (1967)Google Scholar
  62. Westin, A.F.: Social and political dimensions of privacy. J. Soc. Issues 59(2), 431–453 (2003)CrossRefGoogle Scholar
  63. Wu, X., Kumar, V., Quinlan, J.R., Ghosh, J., Yang, Q., Motoda, H., McLachlan, G.J., Ng, A., Liu, B., Yu, P.S., Zhou, Z.-H., Steinbach, M., Hand, D.J., Steinberg, D.: Top 10 algorithms in data mining. Knowl. Inf. Syst. 14(1), 1–37 (2008)CrossRefGoogle Scholar
  64. Xu, H.: The effects of self-construal and perceived control on privacy concerns. In: ICIS 2007 Proceedings, p. 125 (2007)Google Scholar
  65. Xu, H., Dinev, T., Smith, J., Hart, P.: Information privacy concerns: linking individual perceptions with institutional privacy assurances. J. Assoc. Inf. Syst. 12(12), 798 (2011)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Rohit Valecha
    • 1
  • Rajarshi Chakraborty
    • 2
  • H. Raghav Rao
    • 1
  • Shambhu Upadhyaya
    • 2
  1. 1.University of Texas at San AntonioSan AntonioUSA
  2. 2.State University of New York at BuffaloBuffaloUSA

Personalised recommendations