Abstract
With over 2 billion people using the Internet and over 800 million people registered on the popular social networking website Facebook, one problem that is widely discussed in the media and extensively researched in academic circles is that of ensuring privacy of the users. Privacy has been defined as the “individuals right to control information about themselves”, but this right is hard to enforce if one does not understand the flow of information. In this paper, we suggest that in order to bring privacy enhancing protocols into life, for the user, we need to visualise the information flow from the user to the Internet and vice versa. This would help users better understand what information they are sharing with whom and disable any undesired flows, with a mouse-click or a finger-tap, before it is too late.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Obama advises caution in use of Facebook. Associated Press (September 8, 2009)
Facebook bug sees Zuckerberg pictures posted online. BBC (December 7, 2011)
Internet World Stats (2011), http://www.internetworldstats.com/stats.htm
Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Security & Privacy 3(1), 26–33 (2005)
Anderson, R.J.: Security engineering - a guide to building dependable distributed systems, 2nd edn. Wiley (2008)
Baddeley, A.: Working memory. Science 255(31), 556–559 (1992)
Berger, P.L.: Models of Bounded Rationality, vol. I-III. The MIT Press, Cambridge (1982)
Efrati, A.: GM signs Google apps pact, in initial step toward cloud. The Wall Street Journal (November 2011)
Facebook. Facebook Statistics, http://www.facebook.com/press/info.php?statistics
Gross, R., Acquisti, A., John Heinz III, H.: Information revelation and privacy in online social networks. In: WPES, pp. 71–80 (2005)
Lewman, A.: Tor: Onion routing. UCL Computer Science, Information Security Seminar Series (January 11, 2012)
Mackay, W.E.: Triggers and barriers to customizing software. In: CHI, pp. 153–160 (1991)
Mahmood, S., Desmedt, Y.: Poster: preliminary analysis of google+’s privacy. In: ACM Conference on Computer and Communications Security, pp. 809–812 (2011)
Michael Henderson, D.L., de Zwart, M., Phillips, M.: Will u friend me? Legal Risks of Social Networking Sites. Monash University (2011)
Monkovic, T.: Eagles employee fired for Facebook post. New York Times, March 10 (2009)
Naraine, R.: Facebook offers https browsing, but not yet by default (2011), http://www.zdnet.com/blog/security/facebook-offers-https-browsing-but-not-yet-by-default/8009
Wang, Y., Komanduri, S., Leon, P.G., Norcie, G., Acquisti, A., Cranor, L.F.: I regretted the minute I pressed share.: A qualitative study of regrets on Facebook. In: SOUPS (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mahmood, S., Desmedt, Y. (2012). Usable Privacy by Visual and Interactive Control of Information Flow. In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J. (eds) Security Protocols XX. Security Protocols 2012. Lecture Notes in Computer Science, vol 7622. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35694-0_20
Download citation
DOI: https://doi.org/10.1007/978-3-642-35694-0_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35693-3
Online ISBN: 978-3-642-35694-0
eBook Packages: Computer ScienceComputer Science (R0)