Abstract
Online social networks such as Friendster, MySpace, or the Facebook have experienced exponential growth in membership in recent years. These networks offer attractive means for interaction and communication, but also raise privacy and security concerns. In this study we survey a representative sample of the members of the Facebook (a social network for colleges and high schools) at a US academic institution, and compare the survey data to information retrieved from the network itself. We look for underlying demographic or behavioral differences between the communities of the network’s members and non-members; we analyze the impact of privacy concerns on members’ behavior; we compare members’ stated attitudes with actual behavior; and we document the changes in behavior subsequent to privacy-related information exposure. We find that an individual’s privacy concerns are only a weak predictor of his membership to the network. Also privacy concerned individuals join the network and reveal great amounts of personal information. Some manage their privacy concerns by trusting their ability to control the information they provide and the external access to it. However, we also find evidence of members’ misconceptions about the online community’s actual size and composition, and about the visibility of members’ profiles.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Parker, R.: Alcohol policy violated. Kansan.com (February 28, 2006)
Youngwood, S.: Networking by the ‘book’. The Times Argus (February 26, 2006)
Kharif, O.: Big brother is reading your blog. BusinessWeek online (February 28, 2006)
Gross, R., Acquisti, A.: Privacy and information revelation in online social networks. In: Proceedings of the ACM CCS Workshop on Privacy in the Electronic Society (WPES 2005) (2005)
Boyd, D.: Reflections on friendster, trust and intimacy. In: Intimate (Ubiquitous) Computing Workshop - Ubicomp 2003, Seattle, Washington, USA, October 12-15 (2003)
Boyd, D.: Friendster and publicly articulated social networking. In: Conference on Human Factors and Computing Systems (CHI 2004), Vienna, Austria, April 24-29 (2004)
Donath, J., Boyd, D.: Public displays of connection. BT Technology Journal 22, 71–82 (2004)
Liu, H., Maes, P.: Interestmap: Harvesting social network profiles for recommendations. In: Beyond Personalization - IUI 2005, San Diego, California, USA (January 9, 2005)
Jagatic, T., Johnson, N., Jakobsson, M., Menczer, F.: Social phishing. Communications of the ACM (2006) (forthcoming)
Stutzman, F.: An evaluation of identity-sharing behavior in social network communities. In: Proceedings of the 2006 iDMAa and IMS Code Conference, Oxford, Ohio (2006)
Sege, I.: Where everybody knows your name. Boston.com (April 27, 2005)
Anderson, B.: Imagined Communities: Reflections on the Origin and Spread of Nationalism, Verso, Revised edn., London and New York (1991)
Wall, L., Christiansen, T., Orwant, J.: Programming Perl, 3rd edn. O’Reilly, Sebastopol (2000)
Burke, S.: Perl & LWP. O’Reilly, Sebastopol (2002)
Westin, A.F.: Harris-equifax consumer privacy survey (1991). Technical report, Equifax, Inc., Atlanta, GA (1991)
Acquisti, A., Grossklags, J.: Privacy and rationality in decision making. IEEE Security & Privacy, 24–30 (January-February, 2005)
Berry, M., Linoff, G.: Data Mining Techniques for Marketing, Sales and Customer Support. Wiley, New York (1997)
Acquisti, A.: Privacy in electronic commerce and the economics of immediate gratification. In: Proceedings of the ACM Conference on Electronic Commerce (EC 2004), pp. 21–29 (2004)
Kornblum, J., Marklein, M.B.: What you say online could haunt you. USA Today (March 8, 2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Acquisti, A., Gross, R. (2006). Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. In: Danezis, G., Golle, P. (eds) Privacy Enhancing Technologies. PET 2006. Lecture Notes in Computer Science, vol 4258. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11957454_3
Download citation
DOI: https://doi.org/10.1007/11957454_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-68790-0
Online ISBN: 978-3-540-68793-1
eBook Packages: Computer ScienceComputer Science (R0)