skip to main content
10.1145/1102199.1102214acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Information revelation and privacy in online social networks

Published: 07 November 2005 Publication History

Abstract

Participation in social networking sites has dramatically increased in recent years. Services such as Friendster, Tribe, or the Facebook allow millions of individuals to create online profiles and share personal information with vast networks of friends - and, often, unknown numbers of strangers. In this paper we study patterns of information revelation in online social networks and their privacy implications. We analyze the online behavior of more than 4,000 Carnegie Mellon University students who have joined a popular social networking site catered to colleges. We evaluate the amount of information they disclose and study their usage of the site's privacy settings. We highlight potential attacks on various aspects of their privacy, and we show that only a minimal percentage of users changes the highly permeable privacy preferences.

References

[1]
A. Acquisti. Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the ACM Conference on Electronic Commerce (EC '04), pages 21--29, 2004.
[2]
B. Anderson. Imagined Communities: Reflections on the Origin and Spread of Nationalism. Verso, London and New York, revised edition, 1991.
[3]
S. Arrison. Is Friendster the new TIA? TechCentralStation, January 7, 2004.
[4]
J. Black. The perils and promise of online schmoozing. BusinessWeek Online, February 20, 2004.
[5]
J. Brown. Six degrees to nowhere. Salon.com, September 21, 1998.
[6]
D. Cave. 16 to 25? Pentagon has your number, and more. The New York Times, June 24, 2005.
[7]
d. boyd. Reflections on friendster, trust and intimacy. In Intimate (Ubiquitous) Computing Workshop - Ubicomp 2003, October 12-15, Seattle, Washington, USA, 2003.
[8]
d. boyd. Friendster and publicly articulated social networking. In Conference on Human Factors and Computing Systems (CHI 2004), April 24-29, Vienna, Austria, 2004.
[9]
J. Donath and d. boyd. Public displays of connection. BT Technology Journal, 22:71--82, 2004.
[10]
S. Gerstein. Intimacy and privacy. In F. D. Schoeman, editor, Philosophical Dimensions of Privacy: An Anthology. Cambridge University Press, Cambridge, UK, 1984.
[11]
M. Granovetter. The strength of weak ties. American Journal of Sociology, 78:1360--1380, 1973.
[12]
M. Granovetter. The strength of weak ties: A network theory revisited. Sociological Theory, 1:201--233, 1983.
[13]
R. Gross. Re-identifying facial images. Technical report, Carnegie Mellon University, Institute for Software Research International, 2005. In preparation.
[14]
R. Gross, J. Shi, and J. Cohn. Quo vadis face recognition? In Third Workshop on Empirical Evaluation Methods in Computer Vision, 2001.
[15]
K. Jump. A new kind of fame. The Columbian Missourian, September 1, 2005.
[16]
A. Leonard. You are who you know. Salon.com, June 15, 2004.
[17]
S. Li and A. Jain, editors. Handbook of Face Recognition. Springer Verlag, 2005.
[18]
H. Liu and P. Maes. Interestmap: Harvesting social network profiles for recommendations. In Beyond Personalization - IUI 2005, January 9, San Diego, California, USA, 2005.
[19]
W. Mackay. Triggers and barriers to customizing software. In Proceedings of CHI'91, pages 153--160. ACM Press, 1991.
[20]
S. Milgram. The small world problem. Psychology Today, 6:62--67, 1967.
[21]
S. Milgram. The familiar stranger: An aspect of urban anonymity. In S. Milgram, J. Sabini, and M. Silver, editors, The Individual in a Social World: Essays and Experiments. Addison-Wesley, Reading, MA, 1977.
[22]
K. Mitnick, W. Simon, and S. Wozniak. The art of deception: controlling the human element of security. John Wiley & Sons, 2002.
[23]
A. Newitz. Defenses lacking at social network sites. SecurityFocus, December 31, 2003.
[24]
P. Phillips, P. Flynn, T. Scruggs, K. Bowyer, J. Chang, K. Hoffman, J. Marques, J. Min, and J. Worek. Overview of the face recognition grand challenge. In IEEE Conference on Computer Vision and Pattern Recognition, June 20-25, San Diego, California, USA, 2005.
[25]
P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and cell suppression. Technical report, SRI International, 1998.
[26]
I. Sege. Where everybody knows your name. Boston.com, April 27, 2005.
[27]
L. J. Strahilevitz. A social networks theory of privacy. The Law School, University of Chicago, John M. Olin Law & Economics Working Paper No. 230 (2D Series), December 2004.
[28]
L. Sweeney. k-Anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10(5):557--570, 2002.
[29]
L. Sweeney. Uniqueness of simple demographics in the U.S. population. Technical report, Carnegie Mellon University, Laboratory for International Data Privacy, 2004.
[30]
The Facebook. Privacy policy. http://facebook.com/policy.php, August 2005.
[31]
University Planning. Carnegie Mellon Factbook 2005. Carnegie Mellon University, February 2005.
[32]
D. Watts. Six Degrees: The Science of a Connected Age. W.W.Norton & Company, 2003.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WPES '05: Proceedings of the 2005 ACM workshop on Privacy in the electronic society
November 2005
116 pages
ISBN:1595932283
DOI:10.1145/1102199
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 November 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. information revelation
  2. online privacy
  3. social networking sites

Qualifiers

  • Article

Conference

CCS05
Sponsor:

Acceptance Rates

Overall Acceptance Rate 106 of 355 submissions, 30%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)418
  • Downloads (Last 6 weeks)33
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Connecting Visual Data to Privacy: Predicting and Measuring Privacy Risks in ImagesElectronics10.3390/electronics1404081114:4(811)Online publication date: 19-Feb-2025
  • (2025)Privacy-Aware Access Control in Decentralized Online Social NetworksEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_1599(1924-1927)Online publication date: 8-Jan-2025
  • (2024)YENİ BİR ERGİNLİK TÜRÜ: “DİJİTAL ERGİNLİK”Adalet Dergisi10.57083/adaletdergisi.1573677(855-885)Online publication date: 25-Oct-2024
  • (2024)Swipe left for identity theftProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699183(5053-5070)Online publication date: 14-Aug-2024
  • (2024)Implications of the Technological Revolution on Human Life in the Digital FutureOmnichannel Approach to Co-Creating Customer Experiences Through Metaverse Platforms10.4018/979-8-3693-1866-9.ch001(1-15)Online publication date: 5-Apr-2024
  • (2024)Ideation Platform With Security Policies and Facial Mapping FeatureAI Tools and Applications for Women’s Safety10.4018/979-8-3693-1435-7.ch012(210-218)Online publication date: 19-Jan-2024
  • (2024)Use & Abuse of Personal Information, Part II: Robust Generation of Fake IDs for Privacy ExperimentationJournal of Cybersecurity and Privacy10.3390/jcp40300264:3(546-571)Online publication date: 11-Aug-2024
  • (2024)Enhancing User Acceptance of an AI Agent’s Recommendation in Information-Sharing EnvironmentsApplied Sciences10.3390/app1417787414:17(7874)Online publication date: 4-Sep-2024
  • (2024)Relationship Between YouTube’s Recommendation Algorithm and Continuous Usage Intention : The Mediating Effect of Regulatory Attitudes Toward Algorithmic Transparency and Accountability PrinciplesKorean Journal of Journalism & Communication Studies10.20879/kjjcs.2024.68.5.00568:5(165-195)Online publication date: 31-Oct-2024
  • (2024)User Understanding and Perceptions of News Recommendation Algorithms : Relationships with Attitude-Consistent News Exposure, News Trust, and News-Seeking BehaviorKorean Journal of Journalism & Communication Studies10.20879/kjjcs.2024.68.1.01068:1(348-385)Online publication date: 29-Feb-2024
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media