Encyclopedia of Social Network Analysis and Mining

2014 Edition
| Editors: Reda Alhajj, Jon Rokne

Graphical User Interfaces for Privacy Settings

  • Cuneyt Gurcan Akcora
  • Elena Ferrari
Reference work entry
DOI: https://doi.org/10.1007/978-1-4614-6170-8_360

Synonyms

Glossary

CHI

Computer human interaction

ML

Machine learning

CD

Community detection

Definition

Continuing research in privacy on social networks has resulted in well-defined concepts and applications, but improvements in personal data privacy are still limited by how graphical user interfaces are used on social networks. In this work, we will outline the evolution of privacy research on graphical user interfaces from different aspects. Starting with visual aspects, we will point out to the contributions from machine learning and community detection communities and show how their impact has changed graphical user interfaces. Through a survey conducted on 127 real-life social networks, we will also present the state of art in privacy interfaces and show the adoption rate of different concepts from privacy research.

Introduction

With the increasing popularity of social networks during the last decade, protection...

This is a preview of subscription content, log in to check access.

References

  1. (49)Anwar M, Fong PWL (2012) A visualization tool for evaluating access control policies in facebook-style social network systems. In: Proceedings of the 27th annual ACM symposium on applied computing. SAC '12, Riva del Garda. ACM, New York, pp 1443–1450 (Online). Available: http://doi.acm.org/10.1145/2245276.2232007
  2. Bonneau J, Anderson J, Church L (2009) Privacy suites: shared privacy for social networks. In: Symposium on usable privacy and security (SOUPS), Mountain ViewGoogle Scholar
  3. Bonneau J, Preibusch S (2010) The privacy jungle: on the market for data protection in social networks. In: Economics of information security and privacy, Springer, US, vol 1, pp 121–167Google Scholar
  4. Coscia M, Giannotti F, Pedreschi D (2011) A classification for community discovery methods in complex networks. In: Statistical Analysis and Data Mining, Wiley Online Library, 4(5):512–546MathSciNetGoogle Scholar
  5. Danezis G (2009) Inferring privacy policies for social networking services. In: Proceedings of the 2nd ACM workshop on security and artificial intelligence, Chicago. ACM, pp 5–10Google Scholar
  6. Ellison N, Steinfield C, Lampe C (2007) The benefits of facebook “friends:” social capital and college students' use of online social network sites. J Comput Mediat Commun 12(4):1143–1168Google Scholar
  7. Fang L, LeFevre K (2010) Privacy wizards for social networking sites. In: Proceedings of the 19th international conference on world wide web, Raleigh. ACM, pp 351–360Google Scholar
  8. Fruchterman T, Reingold E (1991) Graph drawing by force-directed placement. Softw Pract Exp 21(11):1129–1164Google Scholar
  9. Gross R, Acquisti A (2005) Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM workshop on privacy in the electronic society, Alexandria. ACM, pp 71–80Google Scholar
  10. Gürses S (2010) D2. 1-state of the art. Technology 19(1):44Google Scholar
  11. Joinson A (2008) Looking at, looking up or keeping up with people?: motives and use of facebook. In: Proceedings of the twenty-sixth annual SIGCHI conference on human factors in computing systems, Florence. ACM, pp 1027–1036Google Scholar
  12. Lampinen A, Lehtinen V, Lehmuskallio A, Tamminen S (2011) We're in it together: interpersonal management of disclosure in social network services. In: Proceedings of the 2011 annual conference on human factors in computing systems, Vancouver. ACM, pp 3217–3226Google Scholar
  13. Lipford H, Besmer A, Watson J (2008) Understanding privacy settings in facebook with an audience view. In: Proceedings of the 1st conference on usability, psychology, and security. USENIX Association, Berkeley, CA, USA, pp 1–8Google Scholar
  14. Lipford H, Watson J, Whitney M, Froiland K, Reeder R (2010) Visual vs. compact: a comparison of privacy policy interfaces. In: Proceedings of the 28th international conference on human factors in computing systems, Atlanta. ACM, pp 1111–1114Google Scholar
  15. Madejski M, Johnson M, Bellovin S (2011) The failure of online social network privacy settings. Techical Report CUCS-010-11, Department of Computer Science, Columbia UniversityGoogle Scholar
  16. Mazzia A, LeFevre K, Adar E (2011) The pviz comprehension tool for social network privacy settings. CSE technical report CSE-TR-570-11, University of MichiganGoogle Scholar
  17. Netter M, Riesner M, Pernul G (2011) Assisted social identity management-enhancing privacy in the social web. In: Proceeding of the 10th international conference on Wirtschaftsinformatik, ZürichGoogle Scholar
  18. Nissenbaum H (2009) Privacy in context: technology, policy, and the integrity of social life. Stanford Law Books, Stanford, California, USAGoogle Scholar
  19. Nguyen D, Mynatt E (2002) Privacy mirrors: understanding and shaping socio-technical ubiquitous computing systems. Technical report GIT-GVU-02-16, Georgia Institute of Technology, AtlantaGoogle Scholar
  20. Onwuasoanya A, Skornyakov M, Post J (2008) Enhancing privacy on social networks by segregating different social spheres. Rutgers Gov Sch Eng Technol Res J, vol 3, pp 1–10Google Scholar
  21. Patil S, Page X, Kobsa A (2011) With a little help from my friends: can social navigation inform interpersonal privacy preferences? In: Proceedings of the ACM 2011 conference on computer supported cooperative work. ACM, pp 391–394Google Scholar
  22. Paul T, Puscher D, Strufe T (2011) Improving the usability of privacy settings in facebook. 1:1 arxiv:1109.6046 (preprint)Google Scholar
  23. Reeder R, Bauer L, Cranor L, Reiter M, Bacon K, How K, Strong H (2008) Expandable grids for visualizing and authoring computer security policies. In: Proceedings of the twenty-sixth annual SIGCHI conference on human factors in computing systems, Florence. ACM, pp 1473–1482Google Scholar
  24. Richards R (2010) Slapp in the facebook: assessing the impact of strategic lawsuits against public participation on social networks, blogs and consumer gripe sites, a. DePaul J Art Technol Intellect Prop Law 21:221Google Scholar
  25. Schneier B (2010) A taxonomy of social networking data. Secur Priv IEEE 8(4):88–88Google Scholar
  26. Schwartz B (2005) The paradox of choice: why more is less. Harper Perennial, 10East 53rd Street, New York, NY, USAGoogle Scholar
  27. Shneiderman B (1996) The eyes have it: a task by data type taxonomy for information visualizations. In: Proceedings 1996 IEEE symposium on visual languages, Boulder. IEEE, pp 336–343Google Scholar
  28. Stutzman F, Kramer-Duffield J (2010) Friends only: examining a privacy-enhancing behavior in facebook. In: Proceedings of the 28th international conference on human factors in computing systems, Atlanta. ACM, pp 1553–1562Google Scholar
  29. Talukder N, Ouzzani M, Elmagarmid A, Elmeleegy H, Yakout M (2010) Privometer: privacy protection in social networks. In: 26th IEEE international conference on data engineering workshops (ICDEW) 2010, Long Beach. IEEE, pp 266–269Google Scholar
  30. Tufekci Z (2008) Can you see me now? audience and disclosure regulation in online social network sites. Bull Sci Technol Soc 28(1):20–36Google Scholar
  31. van den Berg B, Leenes R (2010) Audience segregation in social network sites. In: Proceedings of the 2010 IEEE second international conference on social computing, ser. SOCIALCOM '10, Minneapolis. IEEE Computer Society, Washington, DC, pp 1111–1116 (Online). Available: http://dx.doi.org/10.1109/SocialCom.2010.165
  32. Vaniea K, Bauer L, Cranor L, Reiter M (2012) Out of sight, out of mind: effects of displaying access-control information near the item it controls. In: Proceedings of PST, ParisGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  • Cuneyt Gurcan Akcora
    • 1
  • Elena Ferrari
    • 1
  1. 1.DISTA, Università degli Studi dell'InsubriaVareseItaly