Encyclopedia of Social Network Analysis and Mining

Living Edition
| Editors: Reda Alhajj, Jon Rokne

Graphical User Interfaces for Privacy Settings

  • Cuneyt Gurcan Akcora
  • Elena Ferrari
Living reference work entry
DOI: https://doi.org/10.1007/978-1-4614-7163-9_360-1

Synonyms

Glossary

CD

Community detection

CHI

Computer human interaction

ML

Machine learning

Definition

Continuing research in privacy on social networks has resulted in well-defined concepts and applications, but improvements in personal data privacy are still limited by how graphical user interfaces are used. In this work, we will outline the evolution of privacy research on graphical user interfaces. Starting with visual aspects, we will point out the contributions from machine learning and community detection communities and show how their impact has changed graphical user interfaces. Through a survey conducted on 127 real-life social networks, we will also present the state of art in privacy interfaces and show the adoption rate of different concepts from privacy research.

Introduction

With the increasing popularity of social networks during the last decade, protection of personal information have gained attention...

This is a preview of subscription content, log in to check access.

References

  1. Anwar M, Fong PWL (2012) A visualization tool for evaluating access control policies in Facebook-style social network systems. In: Proceedings of the 27th annual ACM symposium on applied computing, ser. SAC ’12. ACM, New York, pp 1443–1450 [Online]. http://doi.acm.org/10.1145/2245276.2232007
  2. Ayalon O, Toch E, (2013) Retrospective privacy: managing longitudinal privacy in online social networks. In: Proceedings of the ninth symposium on usable privacy and security, ACM, p 4Google Scholar
  3. Bonneau J, Preibusch S (2010) The privacy jungle: on the market for data protection in social networks. Econ Inf Secur Priv 1:121–167CrossRefGoogle Scholar
  4. Bonneau J, Anderson J, Church L (2009) Privacy suites: shared privacy for social networks. In: Symposium on usable privacy and security (SOUPS)Google Scholar
  5. Coscia M, Giannotti F, Pedreschi D (2012) A classification for community discovery methods in complex networks. CoRR vol. abs/1206.3552:1–32Google Scholar
  6. Danezis G (2009) Inferring privacy policies for social networking services. In: Proceedings of the 2nd ACM workshop on security and artificial intelligence. ACM, New York, pp 5–10Google Scholar
  7. Ellison N, Steinfield C, Lampe C (2007) The benefits of Facebook friends: social capital and college students use of online social network sites. J Comput-Mediat Commun 12(4):1143–1168CrossRefGoogle Scholar
  8. Fang L, LeFevre K (2010) Privacy wizards for social networking sites. In: Proceedings of the 19th international conference on World wide web. ACM, New York, pp 351–360Google Scholar
  9. Fruchterman T, Reingold E (1991) Graph drawing by force-directed placement. Softw: Prac Exp 21(11):1129–1164Google Scholar
  10. Gross R, Acquisti A (2005) Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM workshop on privacy in the electronic society. ACM, New York, pp 71–80Google Scholar
  11. Gürses S (2010) D2. 1-state of the art. Technology 19(1):44Google Scholar
  12. Joinson A (2008) Looking at, looking up or keeping up with people?: motives and use of Facebook. In: Proceedings of the twenty-sixth annual SIGCHI conference on human factors in computing systems. ACM, New York, pp 1027–1036Google Scholar
  13. Jones S, O’Neill E (2010) Feasibility of structural network clustering for group-based privacy control in social networks. In: Proceedings of the sixth symposium on usable privacy and security, ACM, New York, p 9Google Scholar
  14. Kauer M, Franz B, Pfeiffer T, Heine M, Christin D (2013) Improving privacy settings for Facebook by using interpersonal distance as criterion. In: CHI’13 extended abstracts on human factors in computing systems. ACM, New York, pp 793–798Google Scholar
  15. Lampinen A, Lehtinen V, Lehmuskallio A, Tamminen S (2011) We’re in it together: interpersonal management of disclosure in social network services. In: Proceedings of the 2011 annual conference on human factors in computing systems. ACM, New York, pp 3217–3226Google Scholar
  16. Lipford H, Besmer A, Watson J (2008) Understanding privacy settings in Facebook with an audience view. In: Proceedings of the 1st conference on usability, psychology, and security. USENIX Association, Berkeley, pp 1–8Google Scholar
  17. Lipford H, Watson J, Whitney M, Froiland K, Reeder R (2010) Visual vs. compact: A comparison of privacy policy interfaces. In: Proceedings of the 28th international conference on Human factors in computing systems. ACM, New York, pp 1111–1114Google Scholar
  18. Madejski M, Johnson M, Bellovin S (2011) The failure of online social network privacy settings. Dept. of Computer Science, Columbia University, Technical report CUCS-010-11Google Scholar
  19. Mazzia A, LeFevre K, Adar E (2011) The pviz comprehension tool for social network privacy settings. University of Michigan CSE, Technical report CSE-TR-570-11Google Scholar
  20. Netter M, Riesner M, Pernul G (2011) Assisted social identity management-enhancing privacy in the social web. In: 10th international conference on WirtschaftsinformatikGoogle Scholar
  21. Nguyen D, Mynatt E 2002 Privacy mirrors: understanding and shaping socio-technical ubiquitous computing systems. Georgia institute of technology, Atlanta, Technical report GIT-GVU-02-16Google Scholar
  22. Nissenbaum H (2009) Privacy in context: technology, policy, and the integrity of social life. Stanford Law Books, StanfordGoogle Scholar
  23. Onwuasoanya A, Skornyakov M, Post J (2008) Enhancing privacy on social networks by segregating different social spheres. Rutgers Gov Sch Eng Technol Res J 3:1–10Google Scholar
  24. Patil S, Page X, Kobsa A (2011) With a little help from my friends: can social navigation inform interpersonal privacy preferences? In: Proceedings of the ACM 2011 conference on computer supported cooperative work. ACM, New York, pp 391–394Google Scholar
  25. Paul T, Puscher D, Strufe T (2011) Improving the usability of privacy settings in Facebook. Arxiv preprint arXiv:1109.6046 1:1Google Scholar
  26. Raber F, De Luca A, Graus M (2016) Privacy wedges: area-based audience selection for social network posts. In: Twelfth symposium on usable privacy and security (SOUPS 2016). USENIX AssociationGoogle Scholar
  27. Reeder R, Bauer L, Cranor L, Reiter M, Bacon K, How K, Strong H (2008) Expandable grids for visualizing and authoring computer security policies. In: Proceedings of the twenty-sixth annual SIGCHI conference on Human factors in computing systems. ACM, New York, pp 1473–1482Google Scholar
  28. Richards R (2010) Slapp in the Facebook: assessing the impact of strategic lawsuits against public participation on social networks, blogs and consumer gripe sites. DePaul J Art Tech Intell Prop Law 21:221Google Scholar
  29. Schneier B (2010) A taxonomy of social networking data. IEEE Secur Priv 8(4):88–88CrossRefGoogle Scholar
  30. Schwartz B (2005) The paradox of choice: why more is less. Harper Collins New York, NY, USAGoogle Scholar
  31. Shneiderman B (1996) The eyes have it: a task by data type taxonomy for information visualizations. In: Visual languages, 1996. Proceedings of the IEEE symposium on IEEE, pp 336–343Google Scholar
  32. Stutzman F, Kramer-Duffield J (2010) Friends only: examining a privacy enhancing behavior in Facebook. In: Proceedings of the 28th international conference on human factors in computing systems. ACM, New York, pp 1553–1562Google Scholar
  33. Talukder N, Ouzzani M, Elmagarmid A, Elmeleegy H, Yakout M (2010) Privometer: privacy protection in social networks. In: Data engineering workshops (ICDEW), 2010 I.E. 26th international conference on IEEE, pp 266–269Google Scholar
  34. Tufekci Z (2008) Can you see me now? Audience and disclosure regulation in online social network sites. Bull Sci Technol Soc 28(1):20–36CrossRefGoogle Scholar
  35. van den Berg B, Leenes R (2010) Audience segregation in social network sites. In: Proceedings of the 2010 I.E. second international conference on social computing, ser. SOCIALCOM ’10.IEEE Computer Society, Washington, DC, pp 1111–1116 [Online]. http://dx.doi.org/10.1109/SocialCom.2010.165
  36. Vaniea K, Bauer L, Cranor L, Reiter M (2012) Out of sight, out of mind: effects of displaying access-control information near the item it controls. In: Proceedings of the privacy, security and trust (PST)Google Scholar
  37. Wang Y, Leon PG, Acquisti A, Cranor LF, Forget A, Sadeh N (2014) A field trial of privacy nudges for Facebook. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM, New York, pp 2367–2376Google Scholar

Copyright information

© Springer Science+Business Media LLC 2017

Authors and Affiliations

  1. 1.DISTAUniversità degli Studi dell’InsubriaVareseItaly

Section editors and affiliations

  • Felix Wu
    • 1
  • Henric Johnson
    • 2
  1. 1.UC-DavisDavisUSA
  2. 2.Blekinge Institute of TechnologyKarlskronaSweden