skip to main content
10.1145/2435349.2435352acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
research-article

Do online social network friends still threaten my privacy?

Authors Info & Claims
Published:18 February 2013Publication History

ABSTRACT

A user's online social network (OSN) friends commonly share information on their OSN profiles that might also characterize the user him-/herself. Therefore, OSN friends are potentially jeopardizing users' privacy. Previous studies demonstrated that third parties can potentially infer personally identifiable information (PII) based on information shared by users' OSN friends if sufficient information is accessible. However, when considering how privacy settings have been adjusted since then, it is unclear which attributes can still be predicted this way. In this paper, we present an empirical study on PII of Facebook users and their friends. We show that certain pieces of PII can easily be inferred. In contrast, other attributes are rarely made publicly available and/or correlate too little so that not enough information is revealed for intruding user privacy. For this study, we analyzed more than 1.2 million OSN profiles in a compliant manner to investigate the privacy risk due to attribute prediction by third parties. The data shown in this paper provides the basis for acting in a risk aware fashion in OSNs.

References

  1. S. Ahmadinejad, M. Anwar, and P. Fong. Inference attacks by third-party extensions to social network systems. In IEEE Int'l Conf. on Pervasive Computing and Communications Workshops (PERCOM Workshops), pages 282--287, 2011.Google ScholarGoogle Scholar
  2. C. Akcora, B. Carminati, and E. Ferrari. Privacy in social networks: How risky is your social graph? In IEEE 28th Int'l Conf. on Data Engineering (ICDE), pages 9--19, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All your contacts are belong to us: automated identity theft attacks on social networks. In Proc. of the 18th Int'l Conf. on World Wide Web, WWW'09, pages 551--560, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. G. Brown, T. Howe, M. Ihbe, A. Prakash, and K. Borders. Social networks and context-aware spam. In Proc. of the 2008 ACM Conf. on Computer Supported Cooperative Work, pages 403--412, New York, NY, USA, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. D. Gayo Avello. All liaisons are dangerous when all your friends are known to us. In Proc. of the 22nd ACM Conf. on Hypertext and hypermedia, HT'11, pages 171--180, New York, NY, USA, 2011. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Gjoka, M. Kurant, C. T. Butts, and A. Markopoulou. Walking in facebook: a case study of unbiased sampling of OSNs. In Proc. of the 29th Conf. on Information communications, INFOCOM'10, pages 2498--2506, Piscataway, NJ, USA, 2010. IEEE Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. N. Z. Gong, A. Talwalkar, L. Mackey, L. Huang, E. C. R. Shin, E. Stefanov, E. R. Shi, and D. Song. Jointly predicting links and inferring attributes using a social-attribute network (SAN). In Proc. of the 6th Int'l ACM Wksp. on Social Network Mining and Analysis (SNA-KDD'12), Beijing, China, 2012.Google ScholarGoogle Scholar
  8. R. Gross and A. Acquisti. Information revelation and privacy in online social networks. In Proc. of the 2005 ACM Wksp. on Privacy in the Electronic Soc., WPES, pages 71--80, New York, NY, USA, 2005. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. He, W. W. Chu, and Z. V. Liu. Inferring privacy information from social networks. In IEEE Int'l Conf. on Intelligence and Security Informatics, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. C. Jernigan and B. F. T. Mistree. Gaydar: Facebook friendships expose sexual orientation. First Monday, 14(10), 2009.Google ScholarGoogle Scholar
  11. H. Krasnova and N. F. Veltri. Privacy calculus on social networking sites: Explorative evidence from Germany and USA. In Proc. of the 2010 43rd Hawaii Int'l Conf. on System Sciences, HICSS'10, pages 1--10, Washington, DC, USA, 2010. IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. B. Krishnamurthy and C. Wills. Characterizing privacy in online social networks. In Proc. of the 1st Wksp. on Online Social Networks, WOSP'08, pages 37--42, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. B. Krishnamurthy and C. Wills. On the leakage of personally identifiable information via online social networks. SIGCOMM Comput. Com. Rev., 40:112--117, Jan. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. S. Labitzke. Who got all of my personal data? enabling users to monitor the proliferation of shared personally identifiable information. In J. Camenisch, B. Crispo, S. Fischer-Hübner, R. Leenes, and G. Russello, editors, Privacy and Identity Management for Life, volume 375 of IFIP Advances in Information and Communication Technology, pages 116--129. Springer Boston, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  15. S. Labitzke, J. Dinger, and H. Hartenstein. How I and others can link my various social network profiles as a basis to reveal my virtual appearance. In LNI - Proc. of the 4th DFN Forum Com. Techn., GI-Edition, 2011.Google ScholarGoogle Scholar
  16. S. Labitzke, I. Taranu, and H. Hartenstein. What your friends tell others about you: Low cost linkability of social network profiles. In Proc. of the 5th Int'l ACM Wksp. on Social Network Mining and Analysis (SNA-KDD). ACM, 2011.Google ScholarGoogle Scholar
  17. C. A. C. Lampe, N. Ellison, and C. Steinfield. A familiar face(book): profile elements as signals in an online social network. In Proc. of the SIGCHI Conf. on Human Factors in Computing Systems, CHI'07, pages 435--444, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. Leon-Garcia. Probability, Statistics, and Random Processes For Electrical Engineering. Prentice Hall, 2008.Google ScholarGoogle Scholar
  19. K. Lewis, M. Gonzalez, and J. Kaufman. Social selection and peer influence in an online social network. Proc. of the National Academy of Sciences, 109(1):68--72, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  20. J. Lindamood, R. Heatherly, M. Kantarcioglu, and B. Thuraisingham. Inferring private information using social network data. In Proc. of the 18th Int'l Conf. on World wide web, WWW'09, pages 1145--1146, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Y. Liu, K. P. Gummadi, B. Krishnamurthy, and A. Mislove. Analyzing facebook privacy settings: user expectations vs. reality. In Proc. of the 2011 ACM SIGCOMM Conf. on Internet measurement, IMC'11, pages 61--70, New York, NY, USA, 2011. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. M. McPherson, L. Smith-Lovin, and J. M. Cook. Birds of a feather: Homophily in social networks. Annual Review of Sociology, 27(1):415--444, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  23. A. Mislove, B. Viswanath, K. P. Gummadi, and P. Druschel. You are who you know: inferring user profiles in online social networks. In Proc. of the third ACM Int'l Conf. on Web search and data mining, WSDM'10, page 251--260, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. D. Rao, D. Yarowsky, A. Shreevats, and M. Gupta. Classifying latent user attributes in twitter. In Proc. of the 2nd Int'l Wksp. on Search and mining user-generated contents, SMUC'10, pages 37--44, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. D. J. Solove. 'I've got nothing to hide' and other misunderstandings of privacy. San Diego Law Review, GWU Law School Public Law Research Paper, 44(289), 2007.Google ScholarGoogle Scholar
  26. W. Xu, X. Zhou, and L. Li. Inferring privacy information via social relations. In Data Engineering Wksp., 2008. ICDEW 2008. IEEE 24th Int'l Conf. on, pages 525--530, april 2008.Google ScholarGoogle Scholar
  27. E. Zheleva and L. Getoor. How friendship links and group memberships affect the privacy of individuals in social networks. Technical report, University of Maryland, College Park, 2008.Google ScholarGoogle Scholar
  28. E. Zheleva and L. Getoor. To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In Proc. of the 18th Int'l Conf. on World wide web, WWW'09, pages 531--540, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Do online social network friends still threaten my privacy?

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CODASPY '13: Proceedings of the third ACM conference on Data and application security and privacy
          February 2013
          400 pages
          ISBN:9781450318907
          DOI:10.1145/2435349
          • General Chairs:
          • Elisa Bertino,
          • Ravi Sandhu,
          • Program Chair:
          • Lujo Bauer,
          • Publications Chair:
          • Jaehong Park

          Copyright © 2013 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 18 February 2013

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          CODASPY '13 Paper Acceptance Rate24of107submissions,22%Overall Acceptance Rate149of789submissions,19%

          Upcoming Conference

          CODASPY '24

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader