Taxonomy for Social Network Data Types from the Viewpoint of Privacy and User Control

The growing relevance and usage intensity of Online Social Networks (OSNs) along with the accumulation of a large amount of user data has led to privacy concerns among researchers and end users. Despite a large body of research addressing OSN privacy issues, little differentiation of data types on social network sites is made and a generally accepted classification and terminology for such data is missing, hence leading to confusion in related discussions. This paper proposes a taxonomy for data types on OSNs based on a thorough literature analysis and a conceptualization of typical OSN user activities. It aims at clarifying discussions among researchers, benefiting comparisons of data types within and across OSNs and at educating the end user about characteristics and implications of OSN data types. The taxonomy is evaluated by applying it to four major OSNs.

[1]  Juan-Zi Li,et al.  Recommendation over a Heterogeneous Social Network , 2008, 2008 The Ninth International Conference on Web-Age Information Management.

[2]  Danah Boyd,et al.  Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..

[3]  Ioannis Mavridis,et al.  Surveying Privacy Leaks Through Online Social Network , 2010, 2010 14th Panhellenic Conference on Informatics.

[4]  Calton Pu,et al.  Large Online Social Footprints--An Emerging Threat , 2009, 2009 International Conference on Computational Science and Engineering.

[5]  Jan Pries-Heje,et al.  A Comprehensive Framework for Evaluation in Design Science Research 1 , 2022 .

[6]  Alan R. Hevner,et al.  Design Research in Information Systems: Theory and Practice , 2010 .

[7]  Richard Chbeir,et al.  Privacy in Online Social Networks , 2013, Security and Privacy Preserving in Social Networks.

[8]  Esma Aïmeur,et al.  Privacy protection issues in social networking sites , 2009, 2009 IEEE/ACS International Conference on Computer Systems and Applications.

[9]  Günther Pernul,et al.  Maintaining a Consistent Representation of Self across Multiple Social Networking Sites -- A Data-centric Perspective , 2012, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing.

[10]  Joon S. Park,et al.  Optimal State Management of Data Sharing in Online Social Network (OSN) Services , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[11]  Steven M. Bellovin,et al.  The Failure of Online Social Network Privacy Settings , 2011 .

[12]  Bruce Schneier,et al.  A Taxonomy of Social Networking Data , 2010, IEEE Security & Privacy.

[13]  Michael Netter,et al.  Privacy Settings in Online Social Networks -- Preferences, Perception, and Reality , 2013, 2013 46th Hawaii International Conference on System Sciences.

[14]  Marc Ziegele,et al.  Privacy in Social Network Sites , 2011, Privacy Online.

[15]  Jerzy Surma,et al.  Improving Marketing Response by Data Mining in Social Network , 2010, 2010 International Conference on Advances in Social Networks Analysis and Mining.

[16]  David S. Rosenblum,et al.  What Anyone Can Know: The Privacy Risks of Social Networking Sites , 2007, IEEE Security & Privacy.

[17]  Qi Xie,et al.  FaceCloak: An Architecture for User Privacy on Social Networking Sites , 2009, 2009 International Conference on Computational Science and Engineering.

[18]  Jessica Einspänner Privacy online: Perspectives on privacy and self-disclosure in the social web , 2013, New Media Soc..

[19]  Pavol Zavarsky,et al.  User's Perspective: Privacy and Security of Information on Social Networks , 2010, 2010 IEEE Second International Conference on Social Computing.

[20]  Alan R. Hevner,et al.  Design Science in Information Systems Research , 2004, MIS Q..

[21]  Jonathan Grudin,et al.  When social networks cross boundaries: a case study of workplace use of facebook and linkedin , 2009, GROUP.

[22]  Heather Richter Lipford,et al.  Understanding Privacy Settings in Facebook with an Audience View , 2008, UPSEC.

[23]  Alan R. Hevner,et al.  Design Research in Information Systems , 2010 .

[24]  Samir Chatterjee,et al.  A Design Science Research Methodology for Information Systems Research , 2008 .

[25]  Michael Netter,et al.  An Analysis of Implemented and Desirable Settings for Identity Management on Social Networking Sites , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.

[26]  Yuan Cheng,et al.  ACON: Activity-Centric Access Control for Social Computing , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[27]  Michael Netter,et al.  Assisted Social Identity Management , 2011, Wirtschaftsinformatik.

[28]  Gail-Joon Ahn,et al.  Detecting and resolving privacy conflicts for collaborative data sharing in online social networks , 2011, ACSAC '11.

[29]  Alexander Richter,et al.  Tweet Inside: Microblogging in a Corporate Context , 2010, Bled eConference.

[30]  Philip W. L. Fong,et al.  A Privacy Preservation Model for Facebook-Style Social Network Systems , 2009, ESORICS.