Abstract
Current social networking technology provides users with little of the privacy that they expect and are promised. While some individuals may truly wish to be “open books,” violating most users’ privacy expectations leads to serious consequences for both the users and their network. We propose that, in order for users to truly be in control of their personal information, we need to respect and learn from the social protocols that have been built up over the millennia.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bennett, R.: Plea to ban employers trawling Facebook. The Times (2008), http://technology.timesonline.co.uk/tol/news/tech_and_web/article3613896.ece
Shepherd, J., Shariatmadari, D.: Would-be students checked on Facebook. The Guardian (2008), http://www.guardian.co.uk/uk/2008/jan/11/accesstouniversity.highereducation
Rabkin, A.: Personal knowledge questions for fallback authentication. In: Proceedings of the 4th Symposium on Usable Privacy and Security - SOUPS 2008, pp. 13–23. ACM (2008)
Jagatic, T.N.: Social phishing. Communications of the ACM 50(10), 94 (2007)
Pilkington, E.: Blackmail claim stirs fears over Facebook. The Guardian (2007), http://www.guardian.co.uk/business/2007/jul/16/usnews.news
Randall, D., Richards, V.: Facebook can ruin your life. And so can MySpace, Bebo... The Independent (2008), http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html
CBC News: Student recruits unfit for service, say former border guards. Canadian Broadcasting Corporation (2007), http://www.cbc.ca/canada/british-columbia/story/2007/10/01/bc-borderguards.html
Facebook Privacy Policy (2007), http://www.facebook.com/policy.php
Whitten, A.: Making Security Usable. PhD thesis. Carnegie Mellon University (2004)
Aiello, L.C., Dunbar, R.: Neocortex Size, Group Size, and the Evolution of Language. Current Anthropology 34(2), 184–193 (1993)
Yee, K.P.: Aligning security and usability. IEEE Security and Privacy Magazine 2(5), 48 (2004)
Godfray, H.C.J.: Parasitoids. Current Biology 14(12), R456 (2004)
Binmore, K.: Game Theory and the Social Contract. Just Playing, vol. 2. MIT Press (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Anderson, J., Stajano, F. (2013). Not That Kind of Friend. In: Christianson, B., Malcolm, J.A., Matyáš, V., Roe, M. (eds) Security Protocols XVII. Security Protocols 2009. Lecture Notes in Computer Science, vol 7028. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36213-2_37
Download citation
DOI: https://doi.org/10.1007/978-3-642-36213-2_37
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36212-5
Online ISBN: 978-3-642-36213-2
eBook Packages: Computer ScienceComputer Science (R0)