Your Privacy Is Your Friend's Privacy: Examining Interdependent Information Disclosure on Online Social Networks

The highly interactive nature of interpersonal communication on online social networks (OSNs) impels us to think about privacy as a communal matter, with users’ private information being revealed by not only their own voluntary disclosures, but also the activities of their social ties. The current privacy literature has identified two types of information disclosures in OSNs: self-disclosure, i.e., the disclosure of an OSN user’s private information by him/herself; and co-disclosure, i.e., the disclosure of the user’s private information by other users. Although co-disclosure has been increasingly identified as a new source of privacy threat inherent to the OSN context, few systematic attempts have been made to provide a framework for understanding the commonalities and distinctions between selfvs. co-disclosure, especially pertaining to different types of private information. To address this gap, this paper presents a data-driven study that builds upon an innovative measurement for quantifying the extent to which others’ co-disclosure could lead to actual privacy harm. The results demonstrate the significant harm caused by co-disclosure and illustrate the differences between the identity elements revealed through selfand co-disclosure.

[1]  Xiaobai Li,et al.  Valuation of Personal Information , 2015, ICIS.

[2]  Yu Pu,et al.  Using Conjoint Analysis to Investigate the Value of Interdependent Privacy in Social App Adoption Scenarios , 2015, ICIS.

[3]  Jacob Kramer-Duffield,et al.  Friends only: examining a privacy-enhancing behavior in facebook , 2010, CHI.

[4]  Paul Ohm Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization , 2009 .

[5]  Hsinchun Chen,et al.  Identity matching using personal and social identity features , 2011, Inf. Syst. Frontiers.

[6]  Vitaly Shmatikov,et al.  Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[7]  Paul M. Schwartz,et al.  The PII Problem: Privacy and a New Concept of Personally Identifiable Information , 2011 .

[8]  Jean-Pierre Hubaux,et al.  Addressing the concerns of the lacks family: quantification of kin genomic privacy , 2013, CCS.

[9]  G. C. Homans,et al.  Social Behavior as Exchange , 1958, American Journal of Sociology.

[10]  G. Loewenstein,et al.  Privacy and human behavior in the age of information , 2015, Science.

[11]  Omar Abuzaghleh,et al.  MEASURING PRIVACY IN ONLINE SOCIAL NETWORKS , 2015 .

[12]  Elisa Bertino,et al.  A Survey of Quantification of Privacy Preserving Data Mining Algorithms , 2008, Privacy-Preserving Data Mining.

[13]  Heng Xu,et al.  Information Privacy Research: An Interdisciplinary Review , 2011, MIS Q..

[14]  L. Sweeney Simple Demographics Often Identify People Uniquely , 2000 .

[15]  Sung-Hyuk Park,et al.  A Social Network-Based Inference Model for Validating Customer Profile Data , 2012, MIS Q..

[16]  Bo Xiao,et al.  Embarrassing Exposures in Online Social Networks: An Integrated Perspective of Privacy Invasion and Relationship Bonding , 2015, Inf. Syst. Res..

[17]  Adam Joinson,et al.  Privacy, Trust, and Disclosure Online , 2008 .

[18]  Virgílio A. F. Almeida,et al.  Studying User Footprints in Different Online Social Networks , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.

[19]  Cliff Lampe,et al.  The Benefits of Facebook "Friends: " Social Capital and College Students' Use of Online Social Network Sites , 2007, J. Comput. Mediat. Commun..

[20]  Robert E. Crossler,et al.  Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..

[21]  Nan Zhang,et al.  Linking virtual and real-world identities , 2015, 2015 IEEE International Conference on Intelligence and Security Informatics (ISI).

[22]  Bruce Schneier,et al.  A Taxonomy of Social Networking Data , 2010, IEEE Security & Privacy.

[23]  Steve Benford,et al.  Can you see me now? , 2006, TCHI.

[24]  Jiexun Li,et al.  A framework of identity resolution: evaluating identity attributes and matching algorithms , 2015, Security Informatics.

[25]  Alessandro Acquisti,et al.  Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.

[26]  Lise Getoor,et al.  Collective entity resolution in relational data , 2007, TKDD.

[27]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[28]  Paul Jen-Hwa Hu,et al.  Role of Affect in Self-Disclosure on Social Network Websites: A Test of Two Competing Models , 2015, J. Manag. Inf. Syst..

[29]  Yunan Chen,et al.  Using contextual integrity to examine interpersonal information boundary on social network sites , 2013, CHI.

[30]  Sarah Spiekermann,et al.  Online social networks: why we disclose , 2010, J. Inf. Technol..

[31]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[32]  R. Gavison Privacy and the Limits of Law , 1980 .

[33]  Jiexun Li,et al.  Criminal identity resolution using social behavior and relationship attributes , 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics.

[34]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[35]  Ninghui Li,et al.  On the tradeoff between privacy and utility in data publishing , 2009, KDD.

[36]  Xin Jin,et al.  Algorithm-safe privacy-preserving data publishing , 2010, EDBT '10.

[37]  Alexander K. Saeri,et al.  Threats to belonging on Facebook: lurking and ostracism , 2015 .

[38]  Vitaly Shmatikov,et al.  The cost of privacy: destruction of data-mining utility in anonymized data publishing , 2008, KDD.

[39]  Miriam J. Metzger Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce , 2006, J. Comput. Mediat. Commun..

[40]  R. Eisenberger,et al.  Perceived Organizational Support and Employee Diligence, Commitment, and Innovation , 1990 .

[41]  Tom Postmes,et al.  Two faces of anonymity: Paradoxical effects of cues to identity in CMC , 2007, Comput. Hum. Behav..

[42]  Alessandro Acquisti,et al.  Silent Listeners: The Evolution of Privacy and Disclosure on Facebook , 2013, J. Priv. Confidentiality.

[43]  Rainer Böhme,et al.  Trading Agent Kills Market Information - Evidence from Online Social Lending , 2013, WINE.

[44]  Michael E. Roloff Interpersonal Communication: The Social Exchange Approach , 1982 .

[45]  Vitaly Shmatikov,et al.  De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[46]  Sadie Creese,et al.  Tools for understanding identity , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).

[47]  Pern Hui Chia,et al.  Interdependent Privacy: Let Me Share Your Data , 2013, Financial Cryptography.

[48]  Yaniv Erlich,et al.  Routes for breaching and protecting genetic privacy , 2013 .

[49]  Alessandro Acquisti,et al.  Privacy and Security of Personal Information - Economic Incentives and Technological Solutions , 2004, Economics of Information Security.

[50]  H. Nissenbaum A Contextual Approach to Privacy Online , 2011, Daedalus.

[51]  W. Keller,et al.  Disclosure control of microdata , 1990 .

[52]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[53]  Haiyan Jia,et al.  Measuring Individuals' Concerns over Collective Privacy on Social Networking Sites , 2016, ICIS.