Metrics for Privacy Assessment When Sharing Information in Online Social Networks

Privacy risk in Online Social Networks has become an important social concern. Users, with different perceptions of risk, share information without considering the audience that has access to the information disclosed or how far a publication will go. According to this, we propose two metrics (Audience and Reachability) based on information flows and friendship layers that indicate the privacy risk of sharing information, addressing the posts’ scope and invisible audience. We assess these metrics through agent simulations in well-known models of networks. The findings show a strong relationship between metrics and structural centrality network properties. We also studied scenarios where there is no previous information about users activity or the information about the traces of the messages cannot be obtained. To deal with privacy assessment in these scenarios, we analyze the relationship between the proposed privacy metrics and local centrality properties as an estimation of privacy risk. The results showed that effectiveness centrality can be used as a suitable approximation of the proposed privacy measures.

[1]  Danah Boyd,et al.  Facebook privacy settings: Who cares? , 2010, First Monday.

[2]  Daniel G. Goldstein,et al.  The structure of online diffusion networks , 2012, EC '12.

[3]  Jessica Staddon,et al.  Are privacy concerns a turn-off?: engagement and privacy in social networks , 2012, SOUPS.

[4]  Eerke A. Boiten,et al.  Privacy Risk Assessment: From Art to Science, By Metrics , 2018, DPM/CBT@ESORICS.

[5]  Robert G. Capra,et al.  Factors mediating disclosure in social network sites , 2011, Comput. Hum. Behav..

[6]  Kristen LeFevre,et al.  Privacy wizards for social networking sites , 2010, WWW '10.

[7]  Keke Chen,et al.  Tweet Properly: Analyzing Deleted Tweets to Understand and Identify Regrettable Ones , 2016, WWW.

[8]  Livio Bioglio,et al.  Network-aware privacy risk estimation in online social networks , 2019, Social Network Analysis and Mining.

[9]  S. Desmarais,et al.  Hey Mom, What’s on Your Facebook? Comparing Facebook Disclosure and Privacy in Adolescents and Adults , 2012 .

[10]  Yang Wang,et al.  Privacy nudges for social media: an exploratory Facebook study , 2013, WWW.

[11]  Berker Agir,et al.  Adaptive information-sharing for privacy-aware mobile social networks , 2013, UbiComp.

[12]  A. Leaf GRAPH THEORY AND PROBABILITY , 1957 .

[13]  Cheng Huang,et al.  Information Diffusion Model Based on Privacy Setting in Online Social Networking Services , 2015, Comput. J..

[14]  P. Bonacich Power and Centrality: A Family of Measures , 1987, American Journal of Sociology.

[15]  Raymond K. Wong,et al.  Privacy Scoring of Social Network Users as a Service , 2015, 2015 IEEE International Conference on Services Computing.

[16]  M. Milton Joe,et al.  A Survey of Various Security Issues in Online Social Networks , 2015 .

[17]  Rosanna E. Guadagno,et al.  Make new friends or keep the old: Gender and personality differences in social networking use , 2012, Comput. Hum. Behav..

[18]  Bashar Nuseibeh,et al.  Adaptive Sharing for Online Social Networks: A Trade-off Between Privacy Risk and Social Benefit , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[19]  Michael S. Bernstein,et al.  Quantifying the invisible audience in social networks , 2013, CHI.

[20]  Éva Tardos,et al.  Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..

[21]  Pinar Yolum,et al.  PROTOSS: A Run Time Tool for Detecting Privacy Violations in Online Social Networks , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.

[22]  Lise Getoor,et al.  To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles , 2009, WWW '09.

[23]  Yi-Cheng Zhang,et al.  Leaders in Social Networks, the Delicious Case , 2011, PloS one.

[24]  Glenn Lawyer,et al.  Understanding the influence of all nodes in a network , 2015, Scientific Reports.

[25]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[26]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[27]  Yang Wang,et al.  "I regretted the minute I pressed share": a qualitative study of regrets on Facebook , 2011, SOUPS.

[28]  Ruggero G. Pensa,et al.  Impact of Neighbors on the Privacy of Individuals in Online Social Networks , 2017, ICCS.

[29]  Pinar Yolum,et al.  Negotiating Privacy Constraints in Online Social Networks , 2015, CARE/MFSC@AAMAS.

[30]  L. Freeman,et al.  Centrality in valued graphs: A measure of betweenness based on network flow , 1991 .

[31]  Joshua Fogel,et al.  Internet social network communities: Risk taking, trust, and privacy concerns , 2009, Comput. Hum. Behav..

[32]  Alessandro Vespignani,et al.  Epidemic spreading in scale-free networks. , 2000, Physical review letters.

[33]  Bashar Nuseibeh,et al.  Privacy Dynamics: Learning Privacy Norms for Social Software , 2016, 2016 IEEE/ACM 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS).

[34]  Evimaria Terzi,et al.  A Framework for Computing the Privacy Scores of Users in Online Social Networks , 2009, 2009 Ninth IEEE International Conference on Data Mining.

[35]  Wenjing Xie,et al.  See you, see me: Teenagers' self-disclosure and regret of posting on social network site , 2015, Comput. Hum. Behav..

[36]  Helen Nissenbaum,et al.  Privacy and contextual integrity: framework and applications , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[37]  Duanbing Chen,et al.  Identifying Influential Spreaders by Weighted LeaderRank , 2013, ArXiv.

[38]  Wanlei Zhou,et al.  Using epidemic betweenness to measure the influence of users in complex networks , 2017, J. Netw. Comput. Appl..

[39]  Jon Kleinberg,et al.  Maximizing the spread of influence through a social network , 2003, KDD '03.

[40]  Mark E. J. Newman A measure of betweenness centrality based on random walks , 2005, Soc. Networks.

[41]  Elisa Bertino,et al.  Security and privacy in social networks , 2017, Concurr. Comput. Pract. Exp..

[42]  Livio Bioglio,et al.  Modeling the Impact of Privacy on Information Diffusion in Social Networks , 2017 .

[43]  Mark Newman,et al.  Networks: An Introduction , 2010 .

[44]  Zhiming Zheng,et al.  Searching for superspreaders of information in real-world social media , 2014, Scientific Reports.

[45]  L. Freeman Centrality in social networks conceptual clarification , 1978 .

[46]  Kon Shing Kenneth Chung,et al.  Egocentric analysis of co-authorship network structure, position and performance , 2012, Inf. Process. Manag..

[47]  Leonard M. Freeman,et al.  A set of measures of centrality based upon betweenness , 1977 .

[48]  Qiang Guo,et al.  Locating influential nodes via dynamics-sensitive centrality , 2015, Scientific Reports.

[49]  Alessandro Acquisti,et al.  Silent Listeners: The Evolution of Privacy and Disclosure on Facebook , 2013, J. Priv. Confidentiality.