Abstract
Privacy concerns among Social Networking Services (SNS) users are increasing. However, Privacy-Enhancing Technologies (PETs) are not, yet, widely deployed and their deployment rate is marginally growing. This is surprising given the fact that PETs are widely recognized as effective at reducing privacy risks. This paper explores this paradox, by presenting a classification of the key factors influencing the adoption of PETs. The conclusions of our analysis suggest that, certain factors are overemphasized, while the importance of others has been overlooked. Our classification is based on relevant literature and experimental analysis of PETs, and can inform both practitioners for designing and enhancing PETs, as well as researchers, as we identify several open issues.
Keywords
- Social Network Services
- Privacy-Enhancing Technologies
- adoption
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Acquisti, A., Gross, R.: Imagined communities: awareness, information sharing, and privacy on Facebook. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 36–58. Springer, Heidelberg (2006)
Boyd, D., Hargittai, E.: Facebook privacy settings: Who cares? First Monday 15(8) (2010)
ENISA: Privacy considerations of online behavioural tracking, report (2012)
London Economics: Study on the economic benefits of privacy-enhancing technologies (PETs). Final Report to The European Commission DG Justice, Freedom and Security (2010)
Compañó, R., Lusoli, W.: The Policy Maker’s Anguish: Regulating Personal Data Behavior Between Paradoxes and Dilemmas. In: Moore, T., et al. (eds.) Economics of Information Security and Privacy, pp. 169–185. Springer Science+Business Media, LLC (2010)
Pötzsch, S.: Privacy Awareness: A Means to Solve the Privacy Paradox? In: Matyáš, V., Fischer-Hübner, S., Cvrček, D., Švenda, P. (eds.) The Future of Identity. IFIP AICT, vol. 298, pp. 226–236. Springer, Heidelberg (2009)
Van den Berg, B., Leenes, R.E.: Audience Segregation in Social Network Sites. In: Proceedings for SocialCom 2010/PASSAT 2010 (Second IEEE International Conference on Social Computing/Second IEEE International Conference on Privacy, Security, Risk and Trust), pp. 1111–1117. IEEE (2010)
Tootoonchian, Y.G.A., Saroiu, S., Wolman, A.: Lockr: Better privacy for social networks. In: Proceedings of the 5th ACM International Conference on emerging Networking EXperiments and Technologies (CoNEXT), pp. 169–180. ACM, New York (2009)
Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: An online social network with user-defined privacy. In: Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication, pp. 135–146. ACM, New York (2009)
Jahid, S., Mittal, P., Borisov, N.: EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation. In: Proceedings of 6th ACM Symposium on Information, Computer and Communications Security, pp. 411–415. ACM, New York (2011)
Paulik, T., Földes, Á.M., Gulyás, G.: BlogCrypt: Private content publishing on the Web. In: Proceedings of the Fourth International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2010, pp. 123–128. IEEE (2010)
Lucas, M.M., Borisov, N.: Flybynight: mitigating the privacy risks of social networking. In: Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society, pp. 1–8. ACM, New York (2008)
Luo, W., Xie, Q., Hengartner: Facecloak: An architecture for user privacy on social networking sites. In: 2009 International Conference on Computational Science and Engineering, pp. 26–33. IEEE (2009)
Conti, M., Hasani, A., Crispo, B.: Virtual private social networks. In: Proceedings of the First ACM Conference on Data and Application Security and Privacy, pp. 39–50. ACM, New York (2011)
Guha, S., Tang, K., Francis, P.: NOYB: privacy in online social networks. In: Proceedings of the First Workshop on Online Social Networks, pp. 49–54. ACM, New York (2011)
Diaspora*, https://joindiaspora.com/
Shakimov, A., Lim, H., Caceres, R., Cox, L.P., Li, K., Liu, D., Varshavsky A.: Vis-à-Vis: Privacy-preserving online social networking via Virtual Individual Servers. In: Third International Conference on Communication Systems and Networks, COMSNETS 2011, pp. 1–10. IEEE (2011)
Frenzy – The Dropbox powered social network, http://frenzyapp.com/
Cutillo, L.A., Molva, R., Strufe, T.: Safebook: a privacy preserving online social network leveraging on real-life trust. IEEE Communications Magazine 47(12), 94–101 (2009)
Buchegger, S., Schiöberg, D., Vu, L.H., Datta, A.: PeerSoN: P2P social networking: early experiences and insights. In: Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, pp. 46–52. ACM, New York (2009)
Kang, T., Kagal, L.: Enabling Privacy-awareness in Social Networks. In: Intelligent Information Privacy Management Symposium at the AAAI Spring Symposium 2010 (2010)
Cranor, L.: P3P: Making privacy policies more useful. IEEE Security and Privacy 1(6), 50–55 (2003)
Toch, E., Sadeh, N.M., Hong, J.: Generating default privacy policies for online social networks. In: Proceedings of the 28th of the International Conference Extended Abstracts on Human Factors in Computing Systems, pp. 4243–4248. ACM, New York (2009)
Squicciarini, A., Paci, F., Sundareswaran, S.: PriMa: an effective privacy protection mechanism for social networks. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 320–323. ACM, New York (2010)
My permissions.org – Scan your permissions. Find out who gained access to your personal info, http://mypermissions.org/
Privacyfix – Lock down your privacy, https://privacyfix.com/start
Priveazy – The ‘eazy’ way to protect your privacy and stay safe online, https://www.priveazy.com/
Data use Policy | Facebook, Interactive Tools, https://www.facebook.com/about/privacy/tools
Privacy Mirror on Facebook, http://apps.facebook.com/privacy_mirror/
Privacy Check, http://www.rabidgremlin.com/fbprivacy/
Becker, J., Chen, H.: Measuring Privacy Risk in Online Social Networks (2009), https://www.cs.pitt.edu/~chang/265/proj10/zim/measureprivacyrisk.pdf
Make myself clear, protecting you from you since (2012), http://makemyselfclear.com/
Heer, J., Boyd, D.: Vizster: Visualizing Online Social Networks. In: Proc. IEEE Symp. Information Visualization, pp. 32–39 (2005)
Friend Wheel, https://friend-wheel.com/
Monjas, M.A., Del Alamo, J.M., Yelmo, J.C., Hogberg, J.: Privacy Delegate: a browser-based tool for privacy self-management in social networks, Ericsson Position paper: W3C Workshop on identity in the browser (2010)
Wishart, R., Corapi, D., Madhavapeddy, A., Sloman, M.: Privacy Butler: A Personal Privacy Rights Manager for Online Presence. In: Proceedings of the 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 672–677. IEEE (2010)
In private browsing & search | Stop online tracking & malware | Disconnect, https://disconnect.me
Strater, K., Lipford, H.: Strategies and struggles with privacy in an online social networking community. In: Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction, vol. 1, pp. 111–119. British Computer Society, Swinton (2008)
Madejskiy, M., Johnson, M., Bellovin, S.M.: The Failure of Online Social Network Privacy Settings. In: CUCS-010-11 (2011), http://academiccommons.columbia.edu/catalog/ac:135406
Hallinana, D., Friedewalda, M., McCarthyb, P.: Citizens’ perceptions of data protection and privacy in Europe. Computer Law & Security Review 28, 263–272 (2012)
Acquisti, A.: The Economics of Personal Data and the Economics of Privacy, DRAFT (November 24, 2010), http://www.heinz.cmu.edu/~acquisti/papers/acquisti-privacy-oecd-22-11-10.pdf
Acquisti, A., Grossklags, J.: Privacy Attitudes and Privacy Behavior: Losses, Gains, and Hyperbolic Discounting (2004), Preliminary draft http://www.heinz.cmu.edu/~acquisti/papers/acquisti_grossklags_eis_refs.pdf ; Final version in Camp, J., Lewis, R. (eds.): The Economics of Information Security. Kluwer (2004)
Ajami, R., Ramadan, N., Mohamed, N., Al-Jaroodi, J.: Security Challenges and Approaches in Online Social Networks: A Survey. IJCSNS International Journal of Computer Science and Network Security 11(8) (August 2011)
Wang, N., Grossklags, J., Xu, H.: An Online Experiment of Privacy Authorization Dialogues for Social Applications. In: Proceedings of the 2013 Conference on Computer Supported Cooperative Work, CSCW 2013, pp. 261–272. ACM, New York (2013)
Lewis, K., Kaufman, J., Christakis, N.: The Taste for Privacy: An Analysis of College Student Privacy Settings in an Online Social Network. Journal of Computer-Mediated Communication 14, 79–100 (2008)
Flash Eurobarometer 225: Data Protection in EU: Citizens’ Perception. European Commission (2008)
Oomen, I., Leenes, R.: Privacy Risk Perceptions and Privacy Protection Strategies. In: de Leeuw, E., Fischer-Hübner, S., Tseng, J., Borking, J. (eds.) IFIP International Federation for Information Processing, Policies and Research in Identity Management, vol. 261, pp. 121–138. Springer, Boston (2008)
Xu, H., Gupta, S., Rosson, M.B., Carroll, J.M.: Effectiveness of Privacy Assurance Approaches in Location-Based Services: A Study of India and the United States. In: Proceedings of the Eighth International Conference on Mobile Business, pp. 278–283. IEEE (2009)
Yao, M.Z.: Self-Protection of Online Privacy: A Behavioral Approach. In: Trepte, S., Reinecke, L. (eds.) Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web. Springer, Heidelberg (2011)
Youn, S.: Determinants of Online Privacy Concern and Its Influence on Privacy Protection Behaviors Among Young Adolescents. Journal of Consumer Affairs 43, 389–418 (2009)
Besenyei, T., Földes, A.M., Gulyás, G.G., Imre, S.: StegoWeb: Towards the Ideal Private Web Content Publishing Tool. In: Proceedings of SECURWARE 2011, The Fifth International Conference on Emerging Security Information, Systems and Technologies, pp. 109–114. IARIA (2011)
Leon, P.G., Ur, B., Balebako, R., Cranor, L.F., Shay, R., Wang, Y.: Why Johnny Can’t Opt Out: A Usability Evaluation of Tools to Limit Online Behavioral Advertising. In: Proceedings of SIGCHI Conference on Human Factors in Computing Systems, pp. 589–598. ACM, New York (2012)
Edlin, S.A., Harris, R.G.: The Role of Switching Costs in Antitrust Analysis: A Comparison of Microsoft and Google. Forthcoming in Yale Journal of Law and Technology 15 (February 7, 2013)
Facebook Statistics | Statistic Brain, http://www.statisticbrain.com/facebook-statistics/
Scrambls, https://scrambls.com
Hallinana, D., Friedewalda, M., McCarthyb, P.: Citizens’ perceptions of data protection and privacy in Europe. Computer Law & Security Review 28, 263–272 (2012)
Shin, D.H.: The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers 22, 428–438 (2010)
Kobsa, A., Teltzrow, M.: Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users’ Data Sharing and Purchase Behavior. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 329–343. Springer, Heidelberg (2005)
Solove, D.J.: A taxonomy of privacy. University of Pennsylvania Law Review 154(3) (January 2006)
Schwaig, K.S., Kane, G.C., Storey, V.C.: Compliance to the fair information practices: How are the Fortune 500 handling online privacy disclosures? Information and Management 43(7), 805–820 (2006)
Fairchild, A., Ribbers, P.: Privacy-Enhancing Identity Management in Business. In: Camenisch, J., Leenes, R., Sommer, D. (eds.) Digital Privacy. LNCS, vol. 6545, pp. 107–129. Springer, Heidelberg (2011)
Feigenbaum, J., Freedman, M.J., Sander, T., Shostack, A.: Economic barriers to the deployment of existing privacy technologies (position paper). In: Proceedings of the Workshop on Economics of Information Security (2002)
McNulty, S.: The Google+ Guide: Circles, Photos, and Hangouts. Peachpit Press (2012)
Beato, F., Kohlweiss, M., Wouters, K.: Enforcing Access Control in Social Network Sites. In: Procedings of Hot Topics in Privacy Enhancing Technologies, HotPETS (2009)
Lwin, M., Wirtz, J., Williams, J.D.: Consumer online privacy concerns and responses: a power–responsibility equilibrium perspective. Journal of the Academy of Marketing Science 35, 572–585 (2007)
Bonneau, J., Preibusch, S.: The Privacy Jungle: On the Market for Data Protection in Social Networks. In: Economics of Information Security and Privacy, pp. 121–167. Springer, US (2010)
Zhao, H., He, M.: Study on Social Culturology of the ‘Internet Sharer’. In: Proceedings of the 1st IEEE Symposium on Web Society, pp. 219–224. IEEE (2009)
Cho, H., Rivera-Sánchez, M., Lim, S.S.: A multinational study on online privacy: global concerns and local responses. New Media & Society 11(3), 395–416 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Vemou, K., Karyda, M. (2013). A Classification of Factors Influencing Low Adoption of PETs Among SNS Users. In: Furnell, S., Lambrinoudakis, C., Lopez, J. (eds) Trust, Privacy, and Security in Digital Business. TrustBus 2013. Lecture Notes in Computer Science, vol 8058. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40343-9_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-40343-9_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40342-2
Online ISBN: 978-3-642-40343-9
eBook Packages: Computer ScienceComputer Science (R0)