Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data

On most online social media sites today, user-generated data remains accessible to allowed viewers unless and until the data owner changes her privacy preferences. In this paper, we present a large-scale measurement study focussed on understanding how users control the longitudinal exposure of their publicly shared data on social media sites. Our study, using data from Twitter, finds that a significant fraction of users withdraw a surprisingly large percentage of old publicly shared data—more than 28% of six-year old public posts (tweets) on Twitter are not accessible today. The inaccessible tweets are either selectively deleted by users or withdrawn by users when they delete or make their accounts private. We also found a significant problem with the current exposure control mechanisms – even when a user deletes her tweets or her account, the current mechanisms leave traces of residual activity, i.e., tweets from other users sent as replies to those deleted tweets or accounts still remain accessible. We show that using this residual information one can recover significant information about the deleted tweets or even characteristics of the deleted accounts. To the best of our knowledge, we are the first to study th information leakage resulting from residual activities of deleted tweets and accounts. Finally, we propose an exposure control mechanism that eliminates information leakage via residual activities, while still allowing meaningful social interactions with user posts. We discuss its merits and drawbacks compared to existing mechanisms.

[1]  Urs Gasser,et al.  Teens, social media, and privacy , 2013 .

[2]  Steven M. Bellovin,et al.  Facebook and privacy: it's complicated , 2012, SOUPS.

[3]  Krishna P. Gummadi,et al.  Sampling Content from Online Social Networks , 2015, ACM Trans. Web.

[4]  Alessandro Acquisti,et al.  Tweets are forever: a large-scale quantitative analysis of deleted tweets , 2013, CSCW.

[5]  Rossano Schifanella,et al.  Friendship prediction and homophily in social media , 2012, TWEB.

[6]  Heather Richter Lipford,et al.  Moving beyond untagging: photo privacy in a tagged world , 2010, CHI.

[7]  M. Williams,et al.  Who Tweets? Deriving the Demographic Characteristics of Age, Occupation and Social Class from Twitter User Meta-Data , 2015, PloS one.

[8]  Ponnurangam Kumaraguru,et al.  On the Dynamics of Username Changing Behavior on Twitter , 2016, CODS.

[9]  Krishna P. Gummadi,et al.  Measuring User Influence in Twitter: The Million Follower Fallacy , 2010, ICWSM.

[10]  Miles Osborne,et al.  I Wish I Didn't Say That! Analyzing and Predicting Deleted Messages in Twitter , 2013, ArXiv.

[11]  Alessandro Acquisti,et al.  Silent Listeners: The Evolution of Privacy and Disclosure on Facebook , 2013, J. Priv. Confidentiality.

[12]  Zeynep Tufekci,et al.  Facebook, Youth and Privacy in Networked Publics , 2012, ICWSM.

[13]  Alan Mislove,et al.  The Tweets They Are a-Changin: Evolution of Twitter Users and Behavior , 2014, ICWSM.

[14]  Michael S. Bernstein,et al.  Quantifying the invisible audience in social networks , 2013, CHI.

[15]  Eran Toch,et al.  Retrospective privacy: managing longitudinal privacy in online social networks , 2013, SOUPS.

[16]  M. Thelwall Homophily in MySpace , 2009, J. Assoc. Inf. Sci. Technol..

[17]  Krishna P. Gummadi,et al.  Analyzing facebook privacy settings: user expectations vs. reality , 2011, IMC '11.

[18]  Keith W. Ross,et al.  Facebook users have become much more private: A large-scale study , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.

[19]  Blase Ur,et al.  The post anachronism: the temporal dimension of facebook privacy , 2013, WPES.

[20]  Krishna P. Gummadi,et al.  Geographic Dissection of the Twitter Network , 2012, ICWSM.

[21]  Keke Chen,et al.  Tweet Properly: Analyzing Deleted Tweets to Understand and Identify Regrettable Ones , 2016, WWW.

[22]  Mary Beth Rosson,et al.  journal homepage: www.elsevier.com/locate/ecra Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry , 2022 .

[23]  Steven M. Bellovin,et al.  The Failure of Online Social Network Privacy Settings , 2011 .

[24]  Eytan Adar,et al.  The PViz comprehension tool for social network privacy settings , 2012, SOUPS.