Glossary
- CD:
-
Community detection
- CHI:
-
Computer human interaction
- ML:
-
Machine learning
Definition
Continuing research in privacy on social networks has resulted in well-defined concepts and applications, but improvements in personal data privacy are still limited by how graphical user interfaces are used. In this work, we will outline the evolution of privacy research on graphical user interfaces. Starting with visual aspects, we will point out the contributions from machine learning and community detection communities and show how their impact has changed graphical user interfaces. Through a survey conducted on 127 real-life social networks, we will also present the state of art in privacy interfaces and show the adoption rate of different concepts from privacy research.
Introduction
With the increasing popularity of social networks during the last decade, protection of personal information have gained...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Anwar M, Fong PWL (2012) A visualization tool for evaluating access control policies in Facebook-style social network systems. In: Proceedings of the 27th annual ACM symposium on applied computing, ser. SAC ’12. ACM, New York, pp 1443–1450 [Online]. http://doi.acm.org/10.1145/2245276.2232007
Ayalon O, Toch E, (2013) Retrospective privacy: managing longitudinal privacy in online social networks. In: Proceedings of the ninth symposium on usable privacy and security, ACM, p 4
Bonneau J, Preibusch S (2010) The privacy jungle: on the market for data protection in social networks. Econ Inf Secur Priv 1:121–167
Bonneau J, Anderson J, Church L (2009) Privacy suites: shared privacy for social networks. In: Symposium on usable privacy and security (SOUPS)
Coscia M, Giannotti F, Pedreschi D (2012) A classification for community discovery methods in complex networks. CoRR vol. abs/1206.3552:1–32
Danezis G (2009) Inferring privacy policies for social networking services. In: Proceedings of the 2nd ACM workshop on security and artificial intelligence. ACM, New York, pp 5–10
Ellison N, Steinfield C, Lampe C (2007) The benefits of Facebook friends: social capital and college students use of online social network sites. J Comput-Mediat Commun 12(4):1143–1168
Fang L, LeFevre K (2010) Privacy wizards for social networking sites. In: Proceedings of the 19th international conference on World wide web. ACM, New York, pp 351–360
Fruchterman T, Reingold E (1991) Graph drawing by force-directed placement. Softw: Prac Exp 21(11):1129–1164
Gross R, Acquisti A (2005) Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM workshop on privacy in the electronic society. ACM, New York, pp 71–80
Gürses S (2010) D2. 1-state of the art. Technology 19(1):44
Joinson A (2008) Looking at, looking up or keeping up with people?: motives and use of Facebook. In: Proceedings of the twenty-sixth annual SIGCHI conference on human factors in computing systems. ACM, New York, pp 1027–1036
Jones S, O’Neill E (2010) Feasibility of structural network clustering for group-based privacy control in social networks. In: Proceedings of the sixth symposium on usable privacy and security, ACM, New York, p 9
Kauer M, Franz B, Pfeiffer T, Heine M, Christin D (2013) Improving privacy settings for Facebook by using interpersonal distance as criterion. In: CHI’13 extended abstracts on human factors in computing systems. ACM, New York, pp 793–798
Lampinen A, Lehtinen V, Lehmuskallio A, Tamminen S (2011) We’re in it together: interpersonal management of disclosure in social network services. In: Proceedings of the 2011 annual conference on human factors in computing systems. ACM, New York, pp 3217–3226
Lipford H, Besmer A, Watson J (2008) Understanding privacy settings in Facebook with an audience view. In: Proceedings of the 1st conference on usability, psychology, and security. USENIX Association, Berkeley, pp 1–8
Lipford H, Watson J, Whitney M, Froiland K, Reeder R (2010) Visual vs. compact: A comparison of privacy policy interfaces. In: Proceedings of the 28th international conference on Human factors in computing systems. ACM, New York, pp 1111–1114
Madejski M, Johnson M, Bellovin S (2011) The failure of online social network privacy settings. Dept. of Computer Science, Columbia University, Technical report CUCS-010-11
Mazzia A, LeFevre K, Adar E (2011) The pviz comprehension tool for social network privacy settings. University of Michigan CSE, Technical report CSE-TR-570-11
Netter M, Riesner M, Pernul G (2011) Assisted social identity management-enhancing privacy in the social web. In: 10th international conference on Wirtschaftsinformatik
Nguyen D, Mynatt E 2002 Privacy mirrors: understanding and shaping socio-technical ubiquitous computing systems. Georgia institute of technology, Atlanta, Technical report GIT-GVU-02-16
Nissenbaum H (2009) Privacy in context: technology, policy, and the integrity of social life. Stanford Law Books, Stanford
Onwuasoanya A, Skornyakov M, Post J (2008) Enhancing privacy on social networks by segregating different social spheres. Rutgers Gov Sch Eng Technol Res J 3:1–10
Patil S, Page X, Kobsa A (2011) With a little help from my friends: can social navigation inform interpersonal privacy preferences? In: Proceedings of the ACM 2011 conference on computer supported cooperative work. ACM, New York, pp 391–394
Paul T, Puscher D, Strufe T (2011) Improving the usability of privacy settings in Facebook. Arxiv preprint arXiv:1109.6046 1:1
Raber F, De Luca A, Graus M (2016) Privacy wedges: area-based audience selection for social network posts. In: Twelfth symposium on usable privacy and security (SOUPS 2016). USENIX Association
Reeder R, Bauer L, Cranor L, Reiter M, Bacon K, How K, Strong H (2008) Expandable grids for visualizing and authoring computer security policies. In: Proceedings of the twenty-sixth annual SIGCHI conference on Human factors in computing systems. ACM, New York, pp 1473–1482
Richards R (2010) Slapp in the Facebook: assessing the impact of strategic lawsuits against public participation on social networks, blogs and consumer gripe sites. DePaul J Art Tech Intell Prop Law 21:221
Schneier B (2010) A taxonomy of social networking data. IEEE Secur Priv 8(4):88–88
Schwartz B (2005) The paradox of choice: why more is less. Harper Collins New York, NY, USA
Shneiderman B (1996) The eyes have it: a task by data type taxonomy for information visualizations. In: Visual languages, 1996. Proceedings of the IEEE symposium on IEEE, pp 336–343
Stutzman F, Kramer-Duffield J (2010) Friends only: examining a privacy enhancing behavior in Facebook. In: Proceedings of the 28th international conference on human factors in computing systems. ACM, New York, pp 1553–1562
Talukder N, Ouzzani M, Elmagarmid A, Elmeleegy H, Yakout M (2010) Privometer: privacy protection in social networks. In: Data engineering workshops (ICDEW), 2010 I.E. 26th international conference on IEEE, pp 266–269
Tufekci Z (2008) Can you see me now? Audience and disclosure regulation in online social network sites. Bull Sci Technol Soc 28(1):20–36
van den Berg B, Leenes R (2010) Audience segregation in social network sites. In: Proceedings of the 2010 I.E. second international conference on social computing, ser. SOCIALCOM ’10.IEEE Computer Society, Washington, DC, pp 1111–1116 [Online]. https://doi.org/10.1109/SocialCom.2010.165
Vaniea K, Bauer L, Cranor L, Reiter M (2012) Out of sight, out of mind: effects of displaying access-control information near the item it controls. In: Proceedings of the privacy, security and trust (PST)
Wang Y, Leon PG, Acquisti A, Cranor LF, Forget A, Sadeh N (2014) A field trial of privacy nudges for Facebook. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM, New York, pp 2367–2376
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2018 Springer Science+Business Media LLC, part of Springer Nature
About this entry
Cite this entry
Akcora, C.G., Ferrari, E. (2018). Graphical User Interfaces for Privacy Settings. In: Alhajj, R., Rokne, J. (eds) Encyclopedia of Social Network Analysis and Mining. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-7131-2_360
Download citation
DOI: https://doi.org/10.1007/978-1-4939-7131-2_360
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4939-7130-5
Online ISBN: 978-1-4939-7131-2
eBook Packages: Computer ScienceReference Module Computer Science and Engineering