IWantPrivacy : Widespread Violation of Privacy Settings in the Twitter Social Network

Twitter is a social network that focuses on creating and sharing short 140 character messages know as tweets. Twitter’s sole privacy policy is a binary option that either allows every message a user creates to be publicly available, or allows only a user’s followers to see posted messages. As the Twitter community grew, conventions organically formed that allowfor rich expressiveness with only 140 characters. Repeating wh at someone else says is called retweeting; this behavior facilitates the spread of information and commentary in real-time. We have performed a large-scale collection of data from the Twitter social network by means of the publicly available application programming interface (API) they provide. Our data set contains over 2.7 billion messages, 80 million user profi les, and a 2.6 billion edge social network. We analyze these data and uncover the growing trend where users defeat Twitter’s simple privacy mechanism of “protecting one’s tweets” by si mply retweeting a protected tweet. We have shown through quantitative and qualitative analysi s that these privacy-violating retweets are a growing problem. More than 4.42 million tweets exist in our corpus that expose protected information. As Twitter gains popularity over ti me, we see an increasing trend in the number of privacy-violating retweets. Although there are many users who are unaware that their private tweets are being broadcast to the public, ther e are some who are aware of this problem.

[1]  Abigail Sellen,et al.  Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.

[2]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[3]  Sameer Patil,et al.  Who gets to know what when: configuring privacy permissions in an awareness application , 2005, CHI.

[4]  Alessandro Acquisti,et al.  Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.

[5]  Timothy W. Finin,et al.  Why we twitter: understanding microblogging usage and communities , 2007, WebKDD/SNA-KDD '07.

[6]  Mor Naaman,et al.  Over-exposed?: privacy patterns and considerations in online and mobile photo sharing , 2007, CHI.

[7]  Christos Faloutsos,et al.  Dynamics of large networks , 2008 .

[8]  Balachander Krishnamurthy,et al.  A few chirps about twitter , 2008, WOSN '08.

[9]  S. Herring,et al.  Beyond Microblogging: Conversation and Collaboration via Twitter , 2009, 2009 42nd Hawaii International Conference on System Sciences.

[10]  Lorrie Faith Cranor,et al.  Location-Sharing Technologies: Privacy Risks and Controls , 2009 .

[11]  Lorrie Faith Cranor,et al.  Who's viewed you?: the impact of feedback in a mobile location-sharing application , 2009, CHI.

[12]  Susannah Fox,et al.  Twitter and status updating , 2009 .

[13]  Danah Boyd,et al.  Tweet, Tweet, Retweet: Conversational Aspects of Retweeting on Twitter , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[14]  Hosung Park,et al.  What is Twitter, a social network or a news media? , 2010, WWW '10.