Information Revelation and Privacy in Online Social Networks (The Facebook Case) Pre-Proceedings Version

Information Revelation and Privacy in Online Social Networks (The Facebook Case) Pre-Proceedings Version

Information Revelation and Privacy in Online Social Networks (The Facebook case) Pre-proceedings version. ACM Workshop on Privacy in the Electronic Society (WPES), 2005 Ralph Gross Alessandro Acquisti Data Privacy Laboratory H. John Heinz III School of Computer Science School of Public Policy and Management Carnegie Mellon University Carnegie Mellon University Pittsburgh, PA 15213 Pittsburgh, PA 15213 [email protected] [email protected] ABSTRACT In recent years online social networking has moved from Participation in social networking sites has dramatically in- niche phenomenon to mass adoption. Although the concept creased in recent years. Services such as Friendster, Tribe, dates back to the 1960s (with University of Illinois Plato or the Facebook allow millions of individuals to create online computer-based education tool, see [16]), viral growth and commercial interest only arose well after the advent of the profiles and share personal information with vast networks 1 of friends - and, often, unknown numbers of strangers. In Internet. The rapid increase in participation in very recent this paper we study patterns of information revelation in years has been accompanied by a progressive diversification and sophistication of purposes and usage patterns across a online social networks and their privacy implications. We 2 analyze the online behavior of more than 4,000 Carnegie multitude of different sites. The Social Software Weblog Mellon University students who have joined a popular so- now groups hundreds of social networking sites in nine cat- cial networking site catered to colleges. We evaluate the egories, including business, common interests, dating, face- amount of information they disclose and study their usage to-face facilitation, friends, pets, and photos. of the site’s privacy settings. We highlight potential attacks While boundaries are blurred, most online networking on various aspects of their privacy, and we show that only sites share a core of features: through the site an individ- a minimal percentage of users changes the highly permeable ual offers a “profile” - a representation of their sel[ves] (and, privacy preferences. often, of their own social networks) - to others to peruse, with the intention of contacting or being contacted by oth- ers, to meet new friends or dates (Friendster,3 Orkut4), find Categories and Subject Descriptors new jobs (LinkedIn5), receive or provide recommendations 6 K.4.1 [Computer and Society]: Public Policy Issues— (Tribe ), and much more. Privacy It is not unusual for successful social networking sites to experience periods of viral growth with participation ex- panding at rates topping 20% a month. Liu and Maes es- General Terms timate in [18] that “well over a million self-descriptive per- Human Factors sonal profiles are available across different web-based social networks” in the United States, and Leonard, already in 2004, reported in [16] that world-wide “[s]even million peo- Keywords ple have accounts on Friendster. [...] Two million are regis- Facebok, Online privacy, information revelation, social net- tered to MySpace. A whopping 16 million are supposed to working sites have registered on Tickle for a chance to take a personality test.” 1. EVOLUTION OF ONLINE The success of these sites has attracted the attention of the media (e.g., [23], [3], [16], [4], [26]) and researchers. The NETWORKING latter have often built upon the existing literature on social network theory (e.g., [20], [21], [11], [12], [32]) to discuss 1One of the first networking sites, SixDegrees.com, was Permission to make digital or hard copies of all or part of this work for launched in 1997 but shut down in 2000 after “struggling personal or classroom use is granted without fee provided that copies are to find a purpose for [its] concept” [5]. not made or distributed for profit or commercial advantage and that copies 2Http://www.socialsoftware.weblogsinc.com/ . bear this notice and the full citation on the first page. To copy otherwise, to 3Http://www.friendster.com/ . republish, to post on servers or to redistribute to lists, requires prior specific 4Http://www.orkut.com/ . permission and/or a fee. 5Http://www.linkedin.com/ . WPES’05, November 7, 2005, Alexandria, Virginia, USA. 6 Copyright 2005 ACM X-XXXXX-XX-X/XX/XX ...$5.00. Http://www.tribe.net/ . its online incarnations. In particular, [7] discusses issues of be encouraged (through technical specifications, registration trust and intimacy in online networking; [9] and [8] focus requirements, or social norms) in college websites like the on participants’ strategic representation of their selves to Facebook, that aspire to connect participants’ profiles to others; and [18] focus on harvesting online social network their public identities. The use of real names may be toler- profiles to obtain a distributed recommender system. ated but filtered in dating/connecting sites like Friendster, In this paper, we focus on patterns of personal information that create a thin shield of weak pseudonymity between the revelation and privacy implications associated with online public identity of a person and her online persona by mak- networking. Not only are the participation rates to online ing only the first name of a participant visible to others, social networking staggering among certain demographics; and not her last name. Or, the use of real names and per- so, also, are the amount and type of information participants sonal contact information could be openly discouraged, as in freely reveal. Category-based representations of a person’s pseudonymous-based dating websites like Match.com, that broad interests are a recurrent feature across most network- attempt to protect the public identity of a person by making ing sites [18]. Such categories may include indications of a its linkage to the online persona more difficult. However, person’s literary or entertainment interests, as well as po- notwithstanding the different approaches to identifiability, litical and sexual ones. In addition, personally identified most sites encourage the publication of personal and iden- or identifiable data (as well as contact information) are of- tifiable personal photos (such as clear shots of a person’s ten provided, together with intimate portraits of a person’s face). social or inner life. Second, the type of information revealed or elicited of- Such apparent openness to reveal personal information to ten orbits around hobbies and interests, but can stride from vast networks of loosely defined acquaintances and complete there in different directions. These include: semi-public in- strangers calls for attention. We investigate information rev- formation such as current and previous schools and employ- elation behavior in online networking using actual field data ers (as in Friendster); private information such as drinking about the usage and the inferred privacy preferences of more and drug habits and sexual preferences and orientation (as than 4,000 users of a site catered to college students, the in Nerve Personals); and open-ended entries (as in LiveJour- Facebook.7 Our results provide a preliminary but detailed nal). picture of personal information revelation and privacy con- Third, visibility of information is highly variable. In cer- cerns (or lack thereof) in the wild, rather than as discerned tain sites (especially the ostensibly pseudonymous ones) any through surveys and laboratory experiments. member may view any other member’s profile. On weaker- The remainder of this paper is organized as follows. We pseudonym sites, access to personal information may be lim- first elaborate on information revelation issues in online so- ited to participants that are part of the direct or extended cial networking in Section 2. Next, we present the results network of the profile owner. Such visibility tuning controls of our data gathering in Section 3. Then, we discuss their become even more refined on sites which make no pretense implications in terms of users attitudes and privacy risks in of pseudonymity, like the Facebook. Section 4. Finally, we summarize our findings and conclude And yet, across different sites, anecdotal evidence suggests in Section 5. that participants are happy to disclose as much information as possible to as many people as possible. It is not unusual 2. INFORMATIONREVELATIONAND ON- to find profiles on sites like Friendster or Salon Personals that list their owners’ personal email addresses (or link to LINE SOCIAL NETWORKING their personal websites), in violation of the recommendation While social networking sites share the basic purpose of or requirements of the hosting service itself. In the next sub- online interaction and communication, specific goals and section, we resort to the theory of social networks to frame patterns of usage vary significantly across different services. the analysis of such behavior, which we then investigate em- The most common model is based on the presentation of the pirically in Section 3. participant’s profile and the visualization of her network of relations to others - such is the case of Friendster. This 2.1 Social Network Theory and Privacy model can stretch towards different directions. In match- The relation between privacy and a person’s social net- making sites, like Match.com8 or Nerve9 and Salon10 Per- work is multi-faceted. In certain occasions we want infor- sonals, the profile is critical and the network of relations mation about ourselves to be known only by a small circle is absent. In diary/online journal sites like LiveJournal,11 of close friends, and not by strangers. In other instances, profiles become secondary, networks may or may not be vis- we are willing to reveal personal information to anonymous ible, while participants’ online journal entries take a central strangers, but not to those who know us better. role. Online social networking thus can morph into online Social network theorists have discussed the relevance of classified in one direction and blogging in another. relations of different depth and strength in a person’s so- Patterns of personal information revelation are, therefore, cial network (see [11], [12]) and the importance of so-called quite variable.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    11 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us