PRIVACY IN ONLINE SOCIAL NETWORKS

Online social networks (OSNs) have become part of daily life for millions of users. Users building explicit networks that represent their social relationships and often share a wealth of personal information to their own benefit. The potential privacy risks of such behavior are often underestimated or ignored. The problem is exacerbated by lacking experience and awareness in users, as well as poorly designed tools for privacy management on the part of the OSN. Furthermore, the centralized nature of OSNs makes users dependent and puts the service provider in a position of power. Because service providers are not by definition trusted or trustworthy, their practices need to be taken into account when considering privacy risks. This chapter aims to provide insight into privacy in OSNs. First, a classification of different types of OSNs based on their nature and purpose is made. Next, different types of data contained in OSNs are distinguished. The associated privacy risks in relation to both users and service providers are identified, and finally, relevant research areas for privacy-protecting techniques are discussed. Clear mappings are made to reflect typical relations that exist between OSN type, data type, particular privacy risks, and privacy-preserving solutions.

[1]  Sonja Buchegger,et al.  A case for P2P infrastructure for social networks - opportunities & challenges , 2009, 2009 Sixth International Conference on Wireless On-Demand Network Systems and Services.

[2]  W. Mcdougall An introduction to social psychology , 1909 .

[3]  Paul Wang,et al.  Direct marketing activities and personal privacy , 1993 .

[4]  Caroline Frear Burk The Collecting Instinct , 1900 .

[5]  Nikita Borisov,et al.  FlyByNight: mitigating the privacy risks of social networking , 2008, WPES '08.

[6]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[7]  Jerry Kang Information Privacy in Cyberspace Transactions , 1998 .

[8]  S. Margulis On the Status and Contribution of Westin's and Altman's Theories of Privacy , 2003 .

[9]  Elizabeth J. Van Every,et al.  The Emergent Organization : Communication As Its Site and Surface , 1999 .

[10]  Detmar W. Straub,et al.  A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..

[11]  Zeynep Tufekci Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites , 2008 .

[12]  Christena Nippert-Eng,et al.  Calendars and keys: The classification of “home” and “work” , 1996 .

[13]  Barbara Carminati,et al.  Private Relationships in Social Networks , 2007, 2007 IEEE 23rd International Conference on Data Engineering Workshop.

[14]  Elena Karahanna,et al.  Time Flies When You're Having Fun: Cognitive Absorption and Beliefs About Information Technology Usage , 2000, MIS Q..

[15]  Virgílio A. F. Almeida,et al.  Characterizing user behavior in online social networks , 2009, IMC '09.

[16]  Robert P. Bostrom,et al.  Role conflict and ambiguity: Critical variables in the MIS user-designer relationship , 1980, SIGCPR '80.

[17]  Xiaowei Ying,et al.  Randomizing Social Networks: a Spectrum Preserving Approach , 2008, SDM.

[18]  Richard D. Johnson,et al.  Concern for Information Privacy and Online Consumer Purchasing , 2006, J. Assoc. Inf. Syst..

[19]  M. Jones Privacy: A Significant Marketing Issue for the 1990s , 1991 .

[20]  Sonja Buchegger,et al.  PeerSoN: P2P social networking: early experiences and insights , 2009, SNS '09.

[21]  Shyhtsun Felix Wu,et al.  All Friends Are Not Created Equal: An Interaction Intensity Based Approach to Privacy in Online Social Networks , 2009, 2009 International Conference on Computational Science and Engineering.

[22]  J. Phelps,et al.  Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .

[23]  Detmar W. Straub,et al.  Structural Equation Modeling and Regression: Guidelines for Research Practice , 2000, Commun. Assoc. Inf. Syst..

[24]  Stefan Weiss The Need for a Paradigm Shift in Addressing Privacy Risks in Social Networking Applications , 2007, FIDIS.

[25]  Blake E. Ashforth,et al.  All in a Day'S Work: Boundaries and Micro Role Transitions , 2000 .

[26]  Anthony D. Miyazaki,et al.  Internet Seals of Approval: Effects on Online Privacy Policies and Consumer Perceptions , 2002 .

[27]  Judee K. Burgoon,et al.  Maintaining and Restoring Privacy through Communication in Different Types of Relationships , 1989 .

[28]  M. Culnan Consumer awareness of name removal procedures: Implications for direct marketing , 1995 .

[29]  Jacob Cohen Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.

[30]  Robert E. Crossler,et al.  Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..

[31]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[32]  Panagiotis G. Ipeirotis Demographics of Mechanical Turk , 2010 .

[33]  R. Priest Data Protection Act , 1988 .

[34]  A. Joinson,et al.  Self-disclosure, Privacy and the Internet , 2009 .

[35]  Jian Pei,et al.  A brief survey on anonymization techniques for privacy preserving publishing of social network data , 2008, SKDD.

[36]  E. Michael Maximilien,et al.  Enabling Privacy as a Fundamental Construct for Social Networks , 2009, 2009 International Conference on Computational Science and Engineering.

[37]  Jerald Hage,et al.  YOUTH CRIME IN POSTINDUSTRIAL SOCIETIES An Integrated Perspective , 1976 .

[38]  Frank Stajano,et al.  Privacy-enabling social networking over untrusted networks , 2009, WOSN '09.

[39]  Jo Ellen Moore,et al.  One Road to Turnover: An Examination of Work Exhaustion in Technology Professionals , 2000, MIS Q..

[40]  Donna L. Hoffman,et al.  Building consumer trust online , 1999, CACM.

[41]  Michael J. Freedman,et al.  Efficient Private Techniques for Verifying Social Proximity , 2007, IPTPS.

[42]  Kenneth A. Bollen,et al.  Regression Diagnostics , 1985 .

[43]  Elizabeth D. Mynatt,et al.  Challenges in supporting end-user privacy and security management with social navigation , 2009, SOUPS.

[44]  Steven Lysonski,et al.  A boundary theory investigation of the product manager's role. , 1985 .

[45]  J. Porteous Home: The Territorial Core , 1976 .

[46]  N. J. Marshall DIMENSIONS OF PRIVACY PREFERENCES. , 1974, Multivariate behavioral research.

[47]  Detmar W. Straub,et al.  When Subordinates Become IT Contractors: Persistent Managerial Expectations in IT Outsourcing , 2003, Inf. Syst. Res..

[48]  Tamara Dinev,et al.  Internet privacy concerns and their antecedents - measurement validity and a regression model , 2004, Behav. Inf. Technol..

[49]  Sirkka L. Jarvenpaa,et al.  Consumer Trust in an Internet Store: A Cross-Cultural Validation , 2006, J. Comput. Mediat. Commun..

[50]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[51]  William Lewis,et al.  Research Note - Statistical Power in Analyzing Interaction Effects: Questioning the Advantage of PLS with Product Indicators , 2007, Inf. Syst. Res..

[52]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[53]  Scott Michaelsen,et al.  Border Theory: The Limits of Cultural Politics , 1997 .

[54]  Paul Dourish,et al.  Unpacking "privacy" for a networked world , 2003, CHI '03.

[55]  Ram Dantu,et al.  Privacy Management for Facebook , 2008, ICISS.

[56]  E. Schegloff,et al.  A simplest systematics for the organization of turn-taking for conversation , 1974 .

[57]  Judee K. Burgoon,et al.  Privacy and Communication , 1982 .

[58]  M. Culnan Protecting Privacy Online: Is Self-Regulation Working? , 2000 .

[59]  Mary Beth Rosson,et al.  journal homepage: www.elsevier.com/locate/ecra Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry , 2022 .

[60]  S. Lirtzman,et al.  Role Conflict and Ambiguity in Complex Organizations. , 1970 .

[61]  Colin J. Bennett Regulating privacy: data protection and public policy in europe and the u , 1992 .

[62]  Helen Harris Perlman Persona: Social Role and Personality , 1986 .

[63]  Blase Ur,et al.  Enhancing Privacy on Social Networks By Segregating Different Social Spheres , 2008 .

[64]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[65]  Jorge Correia Jesuino,et al.  Role-Conflict, Ambiguity, and Overload - a 21-Nation Study , 1995 .

[66]  Tor Guimaraes,et al.  Determinants of Turnover Intentions: Comparing IC and IS Personnel , 1992, Inf. Syst. Res..

[67]  Danah Boyd,et al.  Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..

[68]  S. Margulis Privacy as a Social Issue and Behavioral Concept , 2003 .

[69]  Mark S. Ackerman,et al.  Privacy in pervasive environments: next generation labeling protocols , 2004, Personal and Ubiquitous Computing.

[70]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[71]  D. Cardon,et al.  Le design de la visibilité , 2008 .

[72]  Heather Richter Lipford,et al.  Understanding Privacy Settings in Facebook with an Audience View , 2008, UPSEC.

[73]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[74]  Darhl M. Pedersen,et al.  MODEL FOR TYPES OF PRIVACY BY PRIVACY FUNCTIONS , 1999 .

[75]  Jon M. Kleinberg,et al.  Wherefore art thou R3579X? , 2011, Commun. ACM.

[76]  Saikat Guha,et al.  NOYB: privacy in online social networks , 2008, WOSN '08.

[77]  Panagiotis Papadimitratos,et al.  Privacy-Preserving Relationship Path Discovery in Social Networks , 2009, CANS.

[78]  Andrew J. Rohm,et al.  Consumer Privacy and Name Removal across Direct Marketing Channels: Exploring Opt-In and Opt-Out Alternatives , 2000 .

[79]  John F. Rockart,et al.  An Examination of Work-Related Correl ates of Job Satisfaction in Programmer/Analysts , 1984, ICIS.

[80]  Marc Langheinrich,et al.  The platform for privacy preferences 1.0 (p3p1.0) specification , 2002 .

[81]  Jack J. Baroudi The impact of role variables on IS personnel work attitudes and intentions , 1985 .

[82]  Cynthia Dwork,et al.  Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.

[83]  Krishna P. Gummadi,et al.  On the evolution of user interaction in Facebook , 2009, WOSN '09.

[84]  Angelos Konstantinidis,et al.  What Types of Learning may occur through Casual Use of a Social Network Site?The Case of Facebook , 2014 .

[85]  Albert H. Segars,et al.  An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..

[86]  Ramón Cáceres,et al.  Privacy, cost, and availability tradeoffs in decentralized OSNs , 2009, WOSN '09.

[87]  Eviatar Zerubavel,et al.  The fine line : making distinctions in everyday life , 1993 .

[88]  Bill C. Hardgrave,et al.  Emotional Dissonance and the Information Technology Professional , 2008, MIS Q..

[89]  K. Sheehan,et al.  Dimensions of Privacy Concern among Online Consumers , 2000 .

[90]  R. Staelin,et al.  A Model of Perceived Risk and Intended Risk-handling Activity , 1994 .

[91]  Amitava Dutta,et al.  Management's Role in Information Security in a Cyber Economy , 2002 .

[92]  Christopher A. Higgins,et al.  After-Hours Telecommuting and Work-Family Conflict: A Comparative Analysis , 1992, Inf. Syst. Res..

[93]  France Bélanger,et al.  Trustworthiness in electronic commerce: the role of privacy, security, and site attributes , 2002, J. Strateg. Inf. Syst..

[94]  D. Cardon,et al.  Le design de la visibilité : Un essai de cartographie du web 2.0 , 2008 .

[95]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[96]  Catherine Dwyer,et al.  Digital Relationships in the "MySpace" Generation: Results From a Qualitative Study , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[97]  R. Kahn,et al.  Organizational Stress: Studies in Role Conflict and Ambiguity. , 1965 .

[98]  David S. Rosenblum,et al.  What Anyone Can Know: The Privacy Risks of Social Networking Sites , 2007, IEEE Security & Privacy.

[99]  D. Hall A theoretical model of career subidentity development in organizational settings , 1971 .

[100]  Heng Xu,et al.  Examining the Formation of Individual's Privacy Concerns: Toward an Integrative View , 2008, ICIS.

[101]  Arnold Kamis,et al.  Using an Attribute-Based Decision Support System for User-Customized Products Online: An Experimental Investigation , 2008, MIS Q..

[102]  Mike Z. Yao,et al.  Predicting user concerns about online privacy , 2007 .

[103]  Alec Wolman,et al.  Lockr: better privacy for social networks , 2009, CoNEXT '09.

[104]  J. Reinsch,et al.  Multicommunicating: A Practice Whose Time Has Come? , 2008 .

[105]  Ronald E. Leenes Context Is Everything Sociality and Privacy in Online Social Network Sites , 2009, PrimeLife.