skip to main content
10.1145/2335356.2335369acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
research-article

Facebook and privacy: it's complicated

Published:11 July 2012Publication History

ABSTRACT

We measure users' attitudes toward interpersonal privacy concerns on Facebook and measure users' strategies for reconciling their concerns with their desire to share content online. To do this, we recruited 260 Facebook users to install a Facebook application that surveyed their privacy concerns, their friend network compositions, the sensitivity of posted content, and their privacy-preserving strategies. By asking participants targeted questions about people randomly selected from their friend network and posts shared on their profiles, we were able to quantify the extent to which users trust their "friends" and the likelihood that their content was being viewed by unintended audiences. We found that while strangers are the most concerning audience, almost 95% of our participants had taken steps to mitigate those concerns. At the same time, we observed that 16.5% of participants had at least one post that they were uncomfortable sharing with a specific friend---someone who likely already had the ability to view it---and that 37% raised more general concerns with sharing their content with friends. We conclude that the current privacy controls allow users to effectively manage the outsider threat, but that they are unsuitable for mitigating concerns over the insider threat---members of the friend network who dynamically become inappropriate audiences based on the context of a post.

References

  1. A. Acquisti and R. Gross. Imagined communities: Awareness, information sharing, and privacy on the Facebook. In Privacy Enhancing Technologies, pages 36--58. Springer Berlin, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. I. Altman. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brooks/Cole Pub. Co., 1975.Google ScholarGoogle Scholar
  3. A. Besmer and H. Richter Lipford. Moving beyond untagging: photo privacy in a tagged world. In CHI 2010, pages 1563--1572. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. d. boyd and E. Hargittai. Facebook privacy settings: Who cares? First Monday, 15(8), August 2010.Google ScholarGoogle Scholar
  5. d. m. boyd and N. B. Ellison. Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13:210--230, 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Egelman and M. Johnson. How good is good enough? the sisyphean struggle for optimal privacy settings. In Proceedings of the CSCW Reconciling Privay with Social Media Workshop, 2012.Google ScholarGoogle Scholar
  7. S. Egelman, A. Oates, and S. Krishnamurthi. Oops, I did it again: Mitigating repeated access control errors on Facebook. In CHI 2011, pages 2295--2304, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Facebook. http://newsroom.fb.com/content/default.aspx?NewsAreaId=22, 2012.Google ScholarGoogle Scholar
  9. R. Gross and A. Acquisti. Information revelation and privacy in online social networks. In Proceedings of Workshop on Privacy in the Electronic Society, pages 71--80. ACM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. istrategylabs. Facebook demographics and statistics report. http://www.istrategylabs.com/2010/06/facebookdemographics-and-statistics-report-june-2010---privacy-concerns-dont-stop-growth/, June 2010.Google ScholarGoogle Scholar
  11. A. N. Joinson. Looking at, looking up or keeping up with people?: motives and use of Facebook. In CHI 2008, pages 1027--1036. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Jones and E. O'Neill. Feasibility of structural network clustering for group-based privacy control in social networks. In SOUPS 2010, pages 9:1--9:13. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. P. G. Kelley, R. Brewer, Y. Mayer, L. F. Cranor, and N. Sadeh. An investigation into Facebook friend grouping. In INTERACT '11, pages 216--233. Springer-Verlag, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. H. Krasnova, O. Günther, S. Spiekermann, and K. Koroleva. Privacy concerns and identity in online social networks. Identity in the Information Society, 2:39--63, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  15. C. Lampe, N. B. Ellison, and C. Steinfield. Changes in use and perception of Facebook. In CSCW '08, pages 721--730, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. Lampinen, S. Tamminen, and A. Oulasvirta. All my people right here, right now: management of group co-presence on a social networking site. In GROUP 2009, pages 281--290. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. K. Lewis, J. Kaufman, and N. Christakis. The taste for privacy: An analysis of college student privacy settings in an online social network. Journal of Computer-Mediated Communication, 14(1):79--100, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  18. Y. Liu, K. Gummadi, B. Krishnamurthy, and A. Mislove. Analyzing Facebook privacy settings: User expectations vs. reality. In Proc. of Internet Measurement Conference (IMC). ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. S. Lohr. How privacy vanishes online, March 17 2010. http://www.nytimes.com/2010/03/17/technology/17privacy.html.Google ScholarGoogle Scholar
  20. M. Madden. Privacy management on social media sites. http://pewinternet.org/Reports/2012/Privacy-management-on-social-media.aspx, February 2012.Google ScholarGoogle Scholar
  21. M. Madejski, M. Johnson, and S. M. Bellovin. A study of privacy settings errors in an online social network. In Proceedings of the 4th IEEE International Workshop on Security and Social Networking, SESOC '12, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  22. Nielsen. Social media report, 2011. http://blog.nielsen.com/nielsenwire/social/.Google ScholarGoogle Scholar
  23. L. Palen and P. Dourish. Unpacking "privacy" for a networked world. In CHI '03, pages 129--136. ACM New York, NY, USA, April 5--10 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. R. W. Reeder and R. A. Maxion. User interface dependability through goal-error prevention. In Proc. of the International Conference on Dependable Systems and Networks 2005, pages 60--69. IEEE, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278--1308, Sept. 1975.Google ScholarGoogle ScholarCross RefCross Ref
  26. M. Skeels and J. Grudin. When social networks cross boundaries: a case study of workplace use of Facebook and Linkedin. In GROUP 2009, pages 95--104. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. J. Smith. Fastest growing demographic on Facebook: Women over 55, February 2 2009. http://www.insidefacebook.com/2009/02/02/fastestgrowing-demographic-on-facebook-women-over-55/.Google ScholarGoogle Scholar
  28. F. Stutzman and J. Kramer-Duffield. Friends only: examining a privacy-enhancing behavior in Facebook. In CHI 2010, pages 1553--1562. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. F. D. Stutzman and W. Hartzog. Boundary Regulation in Social Media. SSRN eLibrary, 2009.Google ScholarGoogle Scholar
  30. Z. Tufekci. Can you see me now? audience and disclosure regulation in online social network sites. Bulletin of Science, Technology & Society, 28(1):20--36, 2008.Google ScholarGoogle Scholar
  31. A. L. Young and A. Quan-Haase. Information revelation and Internet privacy concerns on social network sites: a case study of Facebook. In Proceedings of the 4th International Conference on Communities and Technologies, C&T '09, pages 265--274. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Facebook and privacy: it's complicated

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          SOUPS '12: Proceedings of the Eighth Symposium on Usable Privacy and Security
          July 2012
          216 pages
          ISBN:9781450315326
          DOI:10.1145/2335356

          Copyright © 2012 Authors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 11 July 2012

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate15of49submissions,31%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader