Skip to main content

A Visual Model for Privacy Awareness and Understanding in Online Social Networks

  • Conference paper
  • First Online:
Future Data and Security Engineering (FDSE 2019)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11814))

Included in the following conference series:

  • 1408 Accesses

Abstract

The number of users participating in online social networks is increasing significantly recently. As a result, the amount of information created and shared by them is exploding. On one hand, sharing information online helps people stay in touch with each other, although virtually. But on the other hand, sharing too much information may lead to sensitive personal data being leaked unexpectedly. To protect their users’ private information, online social network providers often employ technical methods like access control and cryptography among others. Although these approaches are good enough for their designated purposes, they provide little to no protection when are used wrongly. To reduce the number of mistakes users may make, online social network providers also offers them visual interfaces, instead of lengthy and boring texts, for privacy settings selection and configuration. Unfortunately, private information is stilled shared publicly, with or without its owners’ awareness. In this paper, we attempt to mitigate the privacy leakage problem by proposing a novel visual model for measuring and representing users’ privacy in online social network environment and associated privacy controller for protecting it. A concrete instance of the model has been designed and implemented. A demonstration of the model instance has been executed for one of the biggest social networks, Facebook. Initial results indicate the effectiveness of the proposed model and its concrete instance. However, a more important and difficult problem is whether online social network providers are willing to apply these results, which may affect sharing activities and go against their business objectives.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Hootsuite: The global state of digital in 2019 report, https://hootsuite.com/pages/digital-in-2019.

  2. 2.

    Facebook Help Center, https://www.facebook.com/help/227499947267037.

  3. 3.

    Facebook Login for developers, https://developers.facebook.com/docs/facebook-login.

References

  1. Huang, Z., Benyoucef, M.: From e-commerce to social commerce: a close look at design features. Electron. Commer. Res. Appl. 12, 246–259 (2013). https://doi.org/10.1016/j.elerap.2012.12.003

    Article  Google Scholar 

  2. Safiullah, M., Pathak, P., Singh, S., Anshul, A.: Social media as an upcoming tool for political marketing effectiveness. Asia Pacific Manag. Rev. 22, 10–15 (2017). https://doi.org/10.1016/j.apmrv.2016.10.007

    Article  Google Scholar 

  3. Lampe, C., Ellison, N., Steinfield, C.: The benefits of facebook “friends:” Social capital and college students’ use of online social network sites. J. Comput. Commun. 12, 1143–1168 (2007). https://doi.org/10.1111/j.1083-6101.2007.00367.x

    Article  Google Scholar 

  4. Bayer, J.B., Ellison, N.B., Schoenebeck, S.Y., Falk, E.B.: Sharing the small moments: ephemeral social interaction on Snapchat. Inf. Commun. Soc. 19, 956–977 (2016). https://doi.org/10.1080/1369118X.2015.1084349

    Article  Google Scholar 

  5. Bilgihan, A., Barreda, A., Okumus, F., Nusair, K.: Consumer perception of knowledge-sharing in travel-related onlinesocial networks. Tour. Manage. 52, 287–296 (2016). https://doi.org/10.1016/j.tourman.2015.07.002

    Article  Google Scholar 

  6. Krishnamurthy, B., Wills, C.E.: On the leakage of personally identifiable information via online social networks. In: ACM SIGCOMM Computer Communication Review, p. 112 (2012). https://doi.org/10.1145/1672308.1672328

    Article  Google Scholar 

  7. Sandhu, R., Samarati, P.: Access control: principle and practice. IEEE Commun. Mag. 32, 40–48 (1994)

    Article  Google Scholar 

  8. Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography (1996)

    Google Scholar 

  9. Whitten, A., Tygar, J.D.: Why Johnny can’t encrypt: a usability evaluation of PGP 5.0. In: Proceedings of the 8th USENIX Security Symposium, pp. 169–184 (1999)

    Google Scholar 

  10. Sheng, S., Broderick, L., Hyland, J.J., Koranda, C.A.: Why Johnny still can’t encrypt: evaluating the usability of email encryption software. In: Symposium on Usable Privacy and Security, pp. 3–4 (2006)

    Google Scholar 

  11. Herzberg, A.: Why Johnny can’t surf (safely)? attacks and defenses for web users. Comput. Secur. 28, 63–71 (2009). https://doi.org/10.1016/j.cose.2008.09.007

    Article  Google Scholar 

  12. Dang, T.K., Dang, T.T.: A survey on security visualization techniques for web information systems. Int. J. Web Inf. Syst. 9, 6–31 (2013). https://doi.org/10.1108/17440081311316361

    Article  Google Scholar 

  13. Adelsbach, A., Gajek, S., Schwenk, J.: Visual spoofing of SSL protected web sites and effective countermeasures. In: Deng, R.H., Bao, F., Pang, H., Zhou, J. (eds.) ISPEC 2005. LNCS, vol. 3439, pp. 204–216. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-31979-5_18

    Chapter  Google Scholar 

  14. Dhamija, R., Tygar, J.D.: The battle against phishing: dynamic security skins. In: Symposium on Usable Privacy and Security (SOUPS), pp. 77–88 (2005). https://doi.org/10.1145/1073001.1073009

  15. Herzberg, A., Jbara, A.: Security and identification indicators for browsers against spoofing and phishing attacks. ACM Trans. Internet Technol. 8, 1–36 (2008). https://doi.org/10.1145/1391949.1391950

    Article  Google Scholar 

  16. Sunshine, J., Egelman, S., Almuhimedi, H., Atri, N., Cranor, L.F.: Crying wolf: an empirical study of SSL warning effectivenes. In: 18th USENIX Security Symposium, pp. 399–432 (2009). https://doi.org/10.1016/S1353-4858(01)00916-3

    Article  Google Scholar 

  17. Cate, F.H.: The limits of notice and choice. IEEE Secur. Priv. 8, 59–62 (2010). https://doi.org/10.1109/MSP.2010.84

    Article  Google Scholar 

  18. Cranor, L.F.: Necessary but not sufficient: standardized mechanisms for privacy notice and choice. J. Telecommun. High Technol. Law. 10, 273–308 (2012)

    Google Scholar 

  19. Schaub, F., Balebako, R., Cranor, L.F.: Designing effective privacy notices and controls. IEEE Internet Comput. 21, 70–77 (2017). https://doi.org/10.1109/MIC.2017.75

    Article  Google Scholar 

  20. Wagner, I., He, Y., Rosenberg, D., Janicke, H.: User interface design for privacy awareness in eHealth technologies. In: 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 38–43. IEEE (2016)

    Google Scholar 

  21. Schaub, F., Balebako, R., Durity, A.L., Cranor, L.F.: A design space for effective privacy notices. In: The Cambridge Handbook of Consumer Privacy, pp. 365–393 (2018). https://doi.org/10.1017/9781316831960.021

  22. Madejski, M., Bellovin, S.M.: The failure of online social network privacy settings. (2011)

    Google Scholar 

  23. Reeder, R.W., Kelley, P.G., McDonald, A.M., Cranor, L.F.: A user study of the expandable grid applied to P3P privacy policy visualization. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 45–54 (2008). https://doi.org/10.1145/1456403.1456413

  24. Reeder, R.W., et al.: Expandable grids for visualizing and authoring computer security policies. In: Conference on Human Factors in Computing Systems – Proceedings, pp. 1473–1482 (2008). https://doi.org/10.1145/1357054.1357285

  25. Ghazinour, K., Majedi, M., Barker, K.: A model for privacy policy visualization. In: Proceedings - International Computer Software and Applications Conference, pp. 335–340 (2009). https://doi.org/10.1109/COMPSAC.2009.156

  26. Lipford, H.R., Besmer, A., Watson, J.: Understanding privacy settings in facebook with an audience view. In: Proceedings of the 1st Conference on Usability, Psychology, and Security, pp. 1–8 (2008). https://doi.org/10.1.1.140.7904

    Google Scholar 

  27. Lipford, H.R., Watson, J., Whitney, M., Froiland, K., Reeder, R.W.: Visual vs. compact: a comparison of privacy policy interfaces. In: Conference on Human Factors in Computing Systems – Proceedings, pp. 1111–1114 (2010). https://doi.org/10.1145/1753326.1753492

  28. Wang, Y., Gou, L., Xu, A., Zhou, M.X., Yang, H., Badenes, H.: VeilMe: an interactive visualization tool for privacy configuration of using personality traits. In: Conference on Human Factors in Computing Systems – Proceedings, pp. 817–826 (2015). https://doi.org/10.1145/2702123.2702293

  29. Acquisti, A., et al.: Nudges for privacy and security: Understanding and assisting users’ choices online. ACM Comput. Surv. 50 (2017). https://doi.org/10.1145/3054926

    Article  Google Scholar 

Download references

Acknowledgment

This research is funded by Vietnam National University HoChiMinh City (VNU-HCM) under grant number C2018-20-12. We would like to thank D-STAR lab members from HCMUT who proofread and provided constructive feedback. We also would like to thank volunteer students from my teaching classes who devoted their time and effort in the experiment of this research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tran Tri Dang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dang, T.T., Küng, J. (2019). A Visual Model for Privacy Awareness and Understanding in Online Social Networks. In: Dang, T., Küng, J., Takizawa, M., Bui, S. (eds) Future Data and Security Engineering. FDSE 2019. Lecture Notes in Computer Science(), vol 11814. Springer, Cham. https://doi.org/10.1007/978-3-030-35653-8_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-35653-8_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-35652-1

  • Online ISBN: 978-3-030-35653-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics