Skip to main content

Graphical User Interfaces for Privacy Settings

  • Reference work entry
  • First Online:
Encyclopedia of Social Network Analysis and Mining

Synonyms

Evolution of privacy settings; User interfaces for data disclosure

Glossary

CD:

Community detection

CHI:

Computer human interaction

ML:

Machine learning

Definition

Continuing research in privacy on social networks has resulted in well-defined concepts and applications, but improvements in personal data privacy are still limited by how graphical user interfaces are used. In this work, we will outline the evolution of privacy research on graphical user interfaces. Starting with visual aspects, we will point out the contributions from machine learning and community detection communities and show how their impact has changed graphical user interfaces. Through a survey conducted on 127 real-life social networks, we will also present the state of art in privacy interfaces and show the adoption rate of different concepts from privacy research.

Introduction

With the increasing popularity of social networks during the last decade, protection of personal information have gained...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 2,500.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Anwar M, Fong PWL (2012) A visualization tool for evaluating access control policies in Facebook-style social network systems. In: Proceedings of the 27th annual ACM symposium on applied computing, ser. SAC ’12. ACM, New York, pp 1443–1450 [Online]. http://doi.acm.org/10.1145/2245276.2232007

  • Ayalon O, Toch E, (2013) Retrospective privacy: managing longitudinal privacy in online social networks. In: Proceedings of the ninth symposium on usable privacy and security, ACM, p 4

    Google Scholar 

  • Bonneau J, Preibusch S (2010) The privacy jungle: on the market for data protection in social networks. Econ Inf Secur Priv 1:121–167

    Article  Google Scholar 

  • Bonneau J, Anderson J, Church L (2009) Privacy suites: shared privacy for social networks. In: Symposium on usable privacy and security (SOUPS)

    Google Scholar 

  • Coscia M, Giannotti F, Pedreschi D (2012) A classification for community discovery methods in complex networks. CoRR vol. abs/1206.3552:1–32

    Google Scholar 

  • Danezis G (2009) Inferring privacy policies for social networking services. In: Proceedings of the 2nd ACM workshop on security and artificial intelligence. ACM, New York, pp 5–10

    Google Scholar 

  • Ellison N, Steinfield C, Lampe C (2007) The benefits of Facebook friends: social capital and college students use of online social network sites. J Comput-Mediat Commun 12(4):1143–1168

    Article  Google Scholar 

  • Fang L, LeFevre K (2010) Privacy wizards for social networking sites. In: Proceedings of the 19th international conference on World wide web. ACM, New York, pp 351–360

    Google Scholar 

  • Fruchterman T, Reingold E (1991) Graph drawing by force-directed placement. Softw: Prac Exp 21(11):1129–1164

    Google Scholar 

  • Gross R, Acquisti A (2005) Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM workshop on privacy in the electronic society. ACM, New York, pp 71–80

    Google Scholar 

  • Gürses S (2010) D2. 1-state of the art. Technology 19(1):44

    Google Scholar 

  • Joinson A (2008) Looking at, looking up or keeping up with people?: motives and use of Facebook. In: Proceedings of the twenty-sixth annual SIGCHI conference on human factors in computing systems. ACM, New York, pp 1027–1036

    Google Scholar 

  • Jones S, O’Neill E (2010) Feasibility of structural network clustering for group-based privacy control in social networks. In: Proceedings of the sixth symposium on usable privacy and security, ACM, New York, p 9

    Google Scholar 

  • Kauer M, Franz B, Pfeiffer T, Heine M, Christin D (2013) Improving privacy settings for Facebook by using interpersonal distance as criterion. In: CHI’13 extended abstracts on human factors in computing systems. ACM, New York, pp 793–798

    Google Scholar 

  • Lampinen A, Lehtinen V, Lehmuskallio A, Tamminen S (2011) We’re in it together: interpersonal management of disclosure in social network services. In: Proceedings of the 2011 annual conference on human factors in computing systems. ACM, New York, pp 3217–3226

    Google Scholar 

  • Lipford H, Besmer A, Watson J (2008) Understanding privacy settings in Facebook with an audience view. In: Proceedings of the 1st conference on usability, psychology, and security. USENIX Association, Berkeley, pp 1–8

    Google Scholar 

  • Lipford H, Watson J, Whitney M, Froiland K, Reeder R (2010) Visual vs. compact: A comparison of privacy policy interfaces. In: Proceedings of the 28th international conference on Human factors in computing systems. ACM, New York, pp 1111–1114

    Google Scholar 

  • Madejski M, Johnson M, Bellovin S (2011) The failure of online social network privacy settings. Dept. of Computer Science, Columbia University, Technical report CUCS-010-11

    Google Scholar 

  • Mazzia A, LeFevre K, Adar E (2011) The pviz comprehension tool for social network privacy settings. University of Michigan CSE, Technical report CSE-TR-570-11

    Google Scholar 

  • Netter M, Riesner M, Pernul G (2011) Assisted social identity management-enhancing privacy in the social web. In: 10th international conference on Wirtschaftsinformatik

    Google Scholar 

  • Nguyen D, Mynatt E 2002 Privacy mirrors: understanding and shaping socio-technical ubiquitous computing systems. Georgia institute of technology, Atlanta, Technical report GIT-GVU-02-16

    Google Scholar 

  • Nissenbaum H (2009) Privacy in context: technology, policy, and the integrity of social life. Stanford Law Books, Stanford

    Google Scholar 

  • Onwuasoanya A, Skornyakov M, Post J (2008) Enhancing privacy on social networks by segregating different social spheres. Rutgers Gov Sch Eng Technol Res J 3:1–10

    Google Scholar 

  • Patil S, Page X, Kobsa A (2011) With a little help from my friends: can social navigation inform interpersonal privacy preferences? In: Proceedings of the ACM 2011 conference on computer supported cooperative work. ACM, New York, pp 391–394

    Google Scholar 

  • Paul T, Puscher D, Strufe T (2011) Improving the usability of privacy settings in Facebook. Arxiv preprint arXiv:1109.6046 1:1

    Google Scholar 

  • Raber F, De Luca A, Graus M (2016) Privacy wedges: area-based audience selection for social network posts. In: Twelfth symposium on usable privacy and security (SOUPS 2016). USENIX Association

    Google Scholar 

  • Reeder R, Bauer L, Cranor L, Reiter M, Bacon K, How K, Strong H (2008) Expandable grids for visualizing and authoring computer security policies. In: Proceedings of the twenty-sixth annual SIGCHI conference on Human factors in computing systems. ACM, New York, pp 1473–1482

    Google Scholar 

  • Richards R (2010) Slapp in the Facebook: assessing the impact of strategic lawsuits against public participation on social networks, blogs and consumer gripe sites. DePaul J Art Tech Intell Prop Law 21:221

    Google Scholar 

  • Schneier B (2010) A taxonomy of social networking data. IEEE Secur Priv 8(4):88–88

    Article  Google Scholar 

  • Schwartz B (2005) The paradox of choice: why more is less. Harper Collins New York, NY, USA

    Google Scholar 

  • Shneiderman B (1996) The eyes have it: a task by data type taxonomy for information visualizations. In: Visual languages, 1996. Proceedings of the IEEE symposium on IEEE, pp 336–343

    Google Scholar 

  • Stutzman F, Kramer-Duffield J (2010) Friends only: examining a privacy enhancing behavior in Facebook. In: Proceedings of the 28th international conference on human factors in computing systems. ACM, New York, pp 1553–1562

    Google Scholar 

  • Talukder N, Ouzzani M, Elmagarmid A, Elmeleegy H, Yakout M (2010) Privometer: privacy protection in social networks. In: Data engineering workshops (ICDEW), 2010 I.E. 26th international conference on IEEE, pp 266–269

    Google Scholar 

  • Tufekci Z (2008) Can you see me now? Audience and disclosure regulation in online social network sites. Bull Sci Technol Soc 28(1):20–36

    Article  Google Scholar 

  • van den Berg B, Leenes R (2010) Audience segregation in social network sites. In: Proceedings of the 2010 I.E. second international conference on social computing, ser. SOCIALCOM ’10.IEEE Computer Society, Washington, DC, pp 1111–1116 [Online]. https://doi.org/10.1109/SocialCom.2010.165

  • Vaniea K, Bauer L, Cranor L, Reiter M (2012) Out of sight, out of mind: effects of displaying access-control information near the item it controls. In: Proceedings of the privacy, security and trust (PST)

    Google Scholar 

  • Wang Y, Leon PG, Acquisti A, Cranor LF, Forget A, Sadeh N (2014) A field trial of privacy nudges for Facebook. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM, New York, pp 2367–2376

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cuneyt Gurcan Akcora .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Science+Business Media LLC, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Akcora, C.G., Ferrari, E. (2018). Graphical User Interfaces for Privacy Settings. In: Alhajj, R., Rokne, J. (eds) Encyclopedia of Social Network Analysis and Mining. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-7131-2_360

Download citation

Publish with us

Policies and ethics