A Classification of Factors Influencing Low Adoption of PETs Among SNS Users

  • Konstantina Vemou
  • Maria Karyda
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8058)


Privacy concerns among Social Networking Services (SNS) users are increasing. However, Privacy-Enhancing Technologies (PETs) are not, yet, widely deployed and their deployment rate is marginally growing. This is surprising given the fact that PETs are widely recognized as effective at reducing privacy risks. This paper explores this paradox, by presenting a classification of the key factors influencing the adoption of PETs. The conclusions of our analysis suggest that, certain factors are overemphasized, while the importance of others has been overlooked. Our classification is based on relevant literature and experimental analysis of PETs, and can inform both practitioners for designing and enhancing PETs, as well as researchers, as we identify several open issues.


Social Network Services Privacy-Enhancing Technologies adoption 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Acquisti, A., Gross, R.: Imagined communities: awareness, information sharing, and privacy on Facebook. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 36–58. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  2. 2.
    Boyd, D., Hargittai, E.: Facebook privacy settings: Who cares? First Monday 15(8) (2010)Google Scholar
  3. 3.
    ENISA: Privacy considerations of online behavioural tracking, report (2012)Google Scholar
  4. 4.
    London Economics: Study on the economic benefits of privacy-enhancing technologies (PETs). Final Report to The European Commission DG Justice, Freedom and Security (2010)Google Scholar
  5. 5.
    Compañó, R., Lusoli, W.: The Policy Maker’s Anguish: Regulating Personal Data Behavior Between Paradoxes and Dilemmas. In: Moore, T., et al. (eds.) Economics of Information Security and Privacy, pp. 169–185. Springer Science+Business Media, LLC (2010)CrossRefGoogle Scholar
  6. 6.
    Pötzsch, S.: Privacy Awareness: A Means to Solve the Privacy Paradox? In: Matyáš, V., Fischer-Hübner, S., Cvrček, D., Švenda, P. (eds.) The Future of Identity. IFIP AICT, vol. 298, pp. 226–236. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  7. 7.
    Van den Berg, B., Leenes, R.E.: Audience Segregation in Social Network Sites. In: Proceedings for SocialCom 2010/PASSAT 2010 (Second IEEE International Conference on Social Computing/Second IEEE International Conference on Privacy, Security, Risk and Trust), pp. 1111–1117. IEEE (2010)Google Scholar
  8. 8.
    Tootoonchian, Y.G.A., Saroiu, S., Wolman, A.: Lockr: Better privacy for social networks. In: Proceedings of the 5th ACM International Conference on emerging Networking EXperiments and Technologies (CoNEXT), pp. 169–180. ACM, New York (2009)CrossRefGoogle Scholar
  9. 9.
    Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: An online social network with user-defined privacy. In: Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication, pp. 135–146. ACM, New York (2009)CrossRefGoogle Scholar
  10. 10.
    Jahid, S., Mittal, P., Borisov, N.: EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation. In: Proceedings of 6th ACM Symposium on Information, Computer and Communications Security, pp. 411–415. ACM, New York (2011)Google Scholar
  11. 11.
    Paulik, T., Földes, Á.M., Gulyás, G.: BlogCrypt: Private content publishing on the Web. In: Proceedings of the Fourth International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2010, pp. 123–128. IEEE (2010)Google Scholar
  12. 12.
    Lucas, M.M., Borisov, N.: Flybynight: mitigating the privacy risks of social networking. In: Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society, pp. 1–8. ACM, New York (2008)CrossRefGoogle Scholar
  13. 13.
    Luo, W., Xie, Q., Hengartner: Facecloak: An architecture for user privacy on social networking sites. In: 2009 International Conference on Computational Science and Engineering, pp. 26–33. IEEE (2009)Google Scholar
  14. 14.
    Conti, M., Hasani, A., Crispo, B.: Virtual private social networks. In: Proceedings of the First ACM Conference on Data and Application Security and Privacy, pp. 39–50. ACM, New York (2011)Google Scholar
  15. 15.
    Guha, S., Tang, K., Francis, P.: NOYB: privacy in online social networks. In: Proceedings of the First Workshop on Online Social Networks, pp. 49–54. ACM, New York (2011)Google Scholar
  16. 16.
  17. 17.
    Shakimov, A., Lim, H., Caceres, R., Cox, L.P., Li, K., Liu, D., Varshavsky A.: Vis-à-Vis: Privacy-preserving online social networking via Virtual Individual Servers. In: Third International Conference on Communication Systems and Networks, COMSNETS 2011, pp. 1–10. IEEE (2011)Google Scholar
  18. 18.
    Frenzy – The Dropbox powered social network,
  19. 19.
    Cutillo, L.A., Molva, R., Strufe, T.: Safebook: a privacy preserving online social network leveraging on real-life trust. IEEE Communications Magazine 47(12), 94–101 (2009)CrossRefGoogle Scholar
  20. 20.
    Buchegger, S., Schiöberg, D., Vu, L.H., Datta, A.: PeerSoN: P2P social networking: early experiences and insights. In: Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, pp. 46–52. ACM, New York (2009)CrossRefGoogle Scholar
  21. 21.
    Kang, T., Kagal, L.: Enabling Privacy-awareness in Social Networks. In: Intelligent Information Privacy Management Symposium at the AAAI Spring Symposium 2010 (2010)Google Scholar
  22. 22.
    Cranor, L.: P3P: Making privacy policies more useful. IEEE Security and Privacy 1(6), 50–55 (2003)CrossRefGoogle Scholar
  23. 23.
    Toch, E., Sadeh, N.M., Hong, J.: Generating default privacy policies for online social networks. In: Proceedings of the 28th of the International Conference Extended Abstracts on Human Factors in Computing Systems, pp. 4243–4248. ACM, New York (2009)Google Scholar
  24. 24.
    Squicciarini, A., Paci, F., Sundareswaran, S.: PriMa: an effective privacy protection mechanism for social networks. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 320–323. ACM, New York (2010)Google Scholar
  25. 25.
    My – Scan your permissions. Find out who gained access to your personal info,
  26. 26.
    Privacyfix – Lock down your privacy,
  27. 27.
    Priveazy – The ‘eazy’ way to protect your privacy and stay safe online,
  28. 28.
    Data use Policy | Facebook, Interactive Tools,
  29. 29.
    Privacy Mirror on Facebook,
  30. 30.
  31. 31.
    Becker, J., Chen, H.: Measuring Privacy Risk in Online Social Networks (2009),
  32. 32.
    Make myself clear, protecting you from you since (2012),
  33. 33.
    Heer, J., Boyd, D.: Vizster: Visualizing Online Social Networks. In: Proc. IEEE Symp. Information Visualization, pp. 32–39 (2005)Google Scholar
  34. 34.
  35. 35.
    Monjas, M.A., Del Alamo, J.M., Yelmo, J.C., Hogberg, J.: Privacy Delegate: a browser-based tool for privacy self-management in social networks, Ericsson Position paper: W3C Workshop on identity in the browser (2010)Google Scholar
  36. 36.
    Wishart, R., Corapi, D., Madhavapeddy, A., Sloman, M.: Privacy Butler: A Personal Privacy Rights Manager for Online Presence. In: Proceedings of the 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 672–677. IEEE (2010)Google Scholar
  37. 37.
    In private browsing & search | Stop online tracking & malware | Disconnect,
  38. 38.
    Strater, K., Lipford, H.: Strategies and struggles with privacy in an online social networking community. In: Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction, vol. 1, pp. 111–119. British Computer Society, Swinton (2008)Google Scholar
  39. 39.
    Madejskiy, M., Johnson, M., Bellovin, S.M.: The Failure of Online Social Network Privacy Settings. In: CUCS-010-11 (2011),
  40. 40.
    Hallinana, D., Friedewalda, M., McCarthyb, P.: Citizens’ perceptions of data protection and privacy in Europe. Computer Law & Security Review 28, 263–272 (2012)CrossRefGoogle Scholar
  41. 41.
    Acquisti, A.: The Economics of Personal Data and the Economics of Privacy, DRAFT (November 24, 2010),
  42. 42.
    Acquisti, A., Grossklags, J.: Privacy Attitudes and Privacy Behavior: Losses, Gains, and Hyperbolic Discounting (2004), Preliminary draft; Final version in Camp, J., Lewis, R. (eds.): The Economics of Information Security. Kluwer (2004)
  43. 43.
    Ajami, R., Ramadan, N., Mohamed, N., Al-Jaroodi, J.: Security Challenges and Approaches in Online Social Networks: A Survey. IJCSNS International Journal of Computer Science and Network Security 11(8) (August 2011)Google Scholar
  44. 44.
    Wang, N., Grossklags, J., Xu, H.: An Online Experiment of Privacy Authorization Dialogues for Social Applications. In: Proceedings of the 2013 Conference on Computer Supported Cooperative Work, CSCW 2013, pp. 261–272. ACM, New York (2013)CrossRefGoogle Scholar
  45. 45.
    Lewis, K., Kaufman, J., Christakis, N.: The Taste for Privacy: An Analysis of College Student Privacy Settings in an Online Social Network. Journal of Computer-Mediated Communication 14, 79–100 (2008)CrossRefGoogle Scholar
  46. 46.
    Flash Eurobarometer 225: Data Protection in EU: Citizens’ Perception. European Commission (2008)Google Scholar
  47. 47.
    Oomen, I., Leenes, R.: Privacy Risk Perceptions and Privacy Protection Strategies. In: de Leeuw, E., Fischer-Hübner, S., Tseng, J., Borking, J. (eds.) IFIP International Federation for Information Processing, Policies and Research in Identity Management, vol. 261, pp. 121–138. Springer, Boston (2008)Google Scholar
  48. 48.
    Xu, H., Gupta, S., Rosson, M.B., Carroll, J.M.: Effectiveness of Privacy Assurance Approaches in Location-Based Services: A Study of India and the United States. In: Proceedings of the Eighth International Conference on Mobile Business, pp. 278–283. IEEE (2009)Google Scholar
  49. 49.
    Yao, M.Z.: Self-Protection of Online Privacy: A Behavioral Approach. In: Trepte, S., Reinecke, L. (eds.) Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web. Springer, Heidelberg (2011)Google Scholar
  50. 50.
    Youn, S.: Determinants of Online Privacy Concern and Its Influence on Privacy Protection Behaviors Among Young Adolescents. Journal of Consumer Affairs 43, 389–418 (2009)CrossRefGoogle Scholar
  51. 51.
    Besenyei, T., Földes, A.M., Gulyás, G.G., Imre, S.: StegoWeb: Towards the Ideal Private Web Content Publishing Tool. In: Proceedings of SECURWARE 2011, The Fifth International Conference on Emerging Security Information, Systems and Technologies, pp. 109–114. IARIA (2011)Google Scholar
  52. 52.
    Leon, P.G., Ur, B., Balebako, R., Cranor, L.F., Shay, R., Wang, Y.: Why Johnny Can’t Opt Out: A Usability Evaluation of Tools to Limit Online Behavioral Advertising. In: Proceedings of SIGCHI Conference on Human Factors in Computing Systems, pp. 589–598. ACM, New York (2012)Google Scholar
  53. 53.
    Edlin, S.A., Harris, R.G.: The Role of Switching Costs in Antitrust Analysis: A Comparison of Microsoft and Google. Forthcoming in Yale Journal of Law and Technology 15 (February 7, 2013)Google Scholar
  54. 54.
    Facebook Statistics | Statistic Brain,
  55. 55.
  56. 56.
    Hallinana, D., Friedewalda, M., McCarthyb, P.: Citizens’ perceptions of data protection and privacy in Europe. Computer Law & Security Review 28, 263–272 (2012)CrossRefGoogle Scholar
  57. 57.
    Shin, D.H.: The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers 22, 428–438 (2010)CrossRefGoogle Scholar
  58. 58.
    Kobsa, A., Teltzrow, M.: Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users’ Data Sharing and Purchase Behavior. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 329–343. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  59. 59.
    Solove, D.J.: A taxonomy of privacy. University of Pennsylvania Law Review 154(3) (January 2006)Google Scholar
  60. 60.
    Schwaig, K.S., Kane, G.C., Storey, V.C.: Compliance to the fair information practices: How are the Fortune 500 handling online privacy disclosures? Information and Management 43(7), 805–820 (2006)CrossRefGoogle Scholar
  61. 61.
    Fairchild, A., Ribbers, P.: Privacy-Enhancing Identity Management in Business. In: Camenisch, J., Leenes, R., Sommer, D. (eds.) Digital Privacy. LNCS, vol. 6545, pp. 107–129. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  62. 62.
    Feigenbaum, J., Freedman, M.J., Sander, T., Shostack, A.: Economic barriers to the deployment of existing privacy technologies (position paper). In: Proceedings of the Workshop on Economics of Information Security (2002)Google Scholar
  63. 63.
    McNulty, S.: The Google+ Guide: Circles, Photos, and Hangouts. Peachpit Press (2012)Google Scholar
  64. 64.
    Beato, F., Kohlweiss, M., Wouters, K.: Enforcing Access Control in Social Network Sites. In: Procedings of Hot Topics in Privacy Enhancing Technologies, HotPETS (2009)Google Scholar
  65. 65.
    Lwin, M., Wirtz, J., Williams, J.D.: Consumer online privacy concerns and responses: a power–responsibility equilibrium perspective. Journal of the Academy of Marketing Science 35, 572–585 (2007)CrossRefGoogle Scholar
  66. 66.
    Bonneau, J., Preibusch, S.: The Privacy Jungle: On the Market for Data Protection in Social Networks. In: Economics of Information Security and Privacy, pp. 121–167. Springer, US (2010)CrossRefGoogle Scholar
  67. 67.
    Zhao, H., He, M.: Study on Social Culturology of the ‘Internet Sharer’. In: Proceedings of the 1st IEEE Symposium on Web Society, pp. 219–224. IEEE (2009)Google Scholar
  68. 68.
    Cho, H., Rivera-Sánchez, M., Lim, S.S.: A multinational study on online privacy: global concerns and local responses. New Media & Society 11(3), 395–416 (2009)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Konstantina Vemou
    • 1
  • Maria Karyda
    • 1
  1. 1.Department of Information and Communication Systems EngineeringUniversity of the AegeanSamosGreece

Personalised recommendations