Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2501604.2501608acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
research-article

Retrospective privacy: managing longitudinal privacy in online social networks

Published: 24 July 2013 Publication History

Abstract

Online social networks provide access to the user's information for long periods of time after the information's initial publication. In this paper, we investigate the relation between information aging and its sharing preferences on Facebook. Our findings are based on a survey of 193 Facebook users, in which we asked users to specify their sharing preferences and intentions towards posts that were published in different periods of time (from the time of the survey and up to 24 months prior to the time of the survey.) Our results show that willingness to share significantly drops with the time passed since publishing the post. The occurrence of life changes, such as graduating from college or moving to a new town, is correlated with a further decrease in the willingness to share. We discuss our findings by relating it to information aging theories and privacy theories. Finally, we use our results to reflect on privacy mechanisms for long-term usage of online social networks, such as expiry date for content and historical information reviewing processes.

References

[1]
Gross, R. and Acquisti, A. (2005). Information revelation and privacy in online social networks. WPES'05 (pp. 71--80). Alexandria, VA: ACM.
[2]
Rosenblum, D. (2007). What anyone can know: The privacy risks of social networking sites. IEEE Security & Privacy Magazine, 5(3): 40.
[3]
Madden, M. and Smith, A. (2010, May 26). Reputation management and social media. Retrieved from The Pew Research Center's Internet & American Life Project: http://www.pewinternet.org/Reports/2010/Reputation-Management.aspx
[4]
Palen, L. and Dourish, P. (2003). Unpacking "Privacy" for a Networked World. CHI '03 (pp. 5(1):129--136.). Fort Lauderdale, Florida: ACM.
[5]
Altman, I. (1975). The environment and social behavior: Privacy, personal space, territory and crowding. Monterey, CA: Brooks/Cole Pub. Co., Inc.
[6]
Barua, D., Kay, J., Kummerfeld, B. and Paris, C. (2011). Theoretical foundations for user-controlled forgetting in scrutable long term user models. OZCHI, (pp. 40--49). Canberra.
[7]
Conley, C. (2010). The right to delete. AAAI Spring Symposium Series, 53--58.
[8]
Bond, M. (2011, February 11). Facebook Timeline a new privacy test. Retrieved from USA today: http://usatoday30.usatoday.com/tech/news/internetprivacy/story/2011-11-02/facebook-timeline-privacy/51047658/1
[9]
Mayer-Schönberger, V. (2009). Delete: The Virtue of Forgetting in the Digital Age. Princeton University Press.
[10]
Downs, J. S., Holbrook, M. B., S. Sheng, S., and Cranor, L. F. (2010). Are your participants gaming the system? Screening Mechanical Turk workers. CHI'10 (pp. 2399--2402). New York, NY, USA: ACM.
[11]
Wang, Y., Komanduri, S., Leon, P., Norcie, G., Acquisti, A., and Cranor, L. (2011). "I regretted the minute I pressed share": A qualitative study of regrets on Facebook. SOUPS'11, (pp. 1--13). Newcastle, UK.
[12]
Stutzman, F. and Kramer-Duffield, J. (2010). Friends Only: Examining a privacy-enhancing behavior in Facebook. CHI'10 (pp. 1553--1562). Atlanta, Georgia: ACM.
[13]
Egelman, S., Oates, A. and Krishnamurthi, S. (2011). Oops, I did it again: mitigating repeated access control errors on Facebook. CHI'11 (pp. 2295--2304). Vancouver BC: ACM.
[14]
Madejski, M., Johnson, M. and Bellovin, S. M. (February 2011). The Failure of Online Social Network Privacy Settings. Technical Report CUCS-010-11, Columbia University.
[15]
Liu, Y., Gummadi, K. P., Krishnamurthy, B., and Mislove, A. (2011). Analyzing Facebook privacy settings: User expectations vs. reality. IMC'11. Berlin: ACM.
[16]
Bornoe, N. and Barkhuus, L. (2011). Privacy management in a connected world: 131 students' perception of Facebook privacy settings. Workshop on collaborative Privacy Practices in Social Media.
[17]
Lewis, K., Kaufman, J., and Christakis, N. (2008). The taste for privacy: An analysis of college student privacy settings in an online social network. Journal of Computer-Mediated Communication, 14(1):79--100.
[18]
Geambasu, R., Kohno, T., Levy, A. and Levy H. M. (2009). Vanish: Increasing data privacy with self-destructing destructing data. USENIX Security Symp, (pp. 299--314). Montreal.
[19]
Tang, Y. L. (2010). FADE: Secure overlay cloud storage with file assured deletion. SecureComm. Singapore.
[20]
Web 2.0 Suicide Machine, http://suicidemachine.org/
[21]
Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79(30).
[22]
Blanchette, J. F. and Johnson, D. G. (2002). Data retention and the panoptic society: The social benefits of forgetfulness. The Information Society, 18(1):33--45.
[23]
Dodge, M. and Kitchin, R. (2007). "Outlines of a world coming into existence": Pervasive computing and the ethics of forgetting. Environment and Planning B, 34 (3):431--445.
[24]
Westin, A. F. (1967). Privacy and Freedom. New York: Atheneum.
[25]
Birenhack, M. D. (2010). Private Space: Privacy, Law & Technology {Hebrew}. Ramat Gan: Bar Ilan University, Nevo.
[26]
Wortham, J. (2013, February 8). A growing app lets you see it, then you don't. Retrieved from The New York Times: http://www.nytimes.com/2013/02/09/technology/snapchat-a-growing-app-lets-you-see-it-then-you-dont.html?pagewanted=1&_r=0
[27]
Mackay, W. (1991). Triggers and barriers to customizing software. CHI' 91 (pp. 153--160). New Orleans, LA: ACM.
[28]
Vaniea, K., Bauer, L., Cranor, L. F., and Reiter, M. K. (2012). Out of sight, out of mind: Effects of displaying access-control information near the item it controls. Privacy, Security and Trust (PST), 2012 Tenth Annual International Conference on (pp. 128--136). IEEE.
[29]
Kairam, S., Brzozowski, M., Huffaker, D., and Chi, E. (2012). Talking in circles: Selective sharing in google+. CHI'12 (pp. 1065--1074). Austin, Texas: ACM.
[30]
Sleeper, M., Balebako, R., Das, S., McConahy, A. L., Wiese, J., and Cranor, L. F. (2013). The post that wasn't: exploring self-censorship on facebook. The 2013 conference on Computer supported cooperative work (pp. 793--802). ACM.
[31]
Mazzia, A., LeFevre, K., and Adar, E. (2012). The PViz comprehension tool for social network privacy settings. The Eighth Symposium on Usable Privacy and Security (pp. 13). ACM.
[32]
Patil, S., and Kobsa, A. (2010). Enhancing privacy management support in instant messaging. interacting with computers, 22(3), 206--217.
[33]
Zhao, X., Salehi, N., Naranjit, S., Alwaalan, S., Voida, S., & Cosley, D. (2013). The Many Faces of Facebook: Experiencing Social Media as Performance, Exhibition, and Personal Archive. CHI'13 (pp. 1--10). Paris, France: ACM. Zhao, X., Salehi, N., Naranjit, S., Alwaalan, S., Voida, S., & Cosley, D. (2013). The Many Faces of Facebook: Experiencing Social Media as Performance, Exhibition, and Personal Archive. CHI'13 (pp. 1--10). Paris, France: ACM.
[34]
Braunstein, A., Granka, L., & Staddon, J. (2011). Indirect content privacy surveys: measuring privacy without asking about it. In Proceedings of the Seventh Symposium on Usable Privacy and Security (pp. 15). ACM.

Cited By

View all
  • (2024)Designing a Data-Driven Survey System: Leveraging Participants' Online Data to Personalize SurveysProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642572(1-22)Online publication date: 11-May-2024
  • (2024)Cleaning house or quiet quitting? Large-scale analysis of account deletion behaviour on TumblrBehaviour & Information Technology10.1080/0144929X.2024.2370432(1-21)Online publication date: 18-Jul-2024
  • (2024)Overview of Usable Privacy Research: Major Themes and Research DirectionsThe Curious Case of Usable Privacy10.1007/978-3-031-54158-2_3(43-102)Online publication date: 20-Mar-2024
  • Show More Cited By

Index Terms

  1. Retrospective privacy: managing longitudinal privacy in online social networks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    SOUPS '13: Proceedings of the Ninth Symposium on Usable Privacy and Security
    July 2013
    241 pages
    ISBN:9781450323192
    DOI:10.1145/2501604
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    • Carnegie Mellon University: Carnegie Mellon University

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 24 July 2013

    Check for updates

    Author Tags

    1. information aging
    2. online social networks
    3. privacy

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    SOUPS '13
    Sponsor:
    • Carnegie Mellon University
    SOUPS '13: Symposium On Usable Privacy and Security
    July 24 - 26, 2013
    Newcastle, United Kingdom

    Acceptance Rates

    Overall Acceptance Rate 15 of 49 submissions, 31%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)40
    • Downloads (Last 6 weeks)7
    Reflects downloads up to 09 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Designing a Data-Driven Survey System: Leveraging Participants' Online Data to Personalize SurveysProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642572(1-22)Online publication date: 11-May-2024
    • (2024)Cleaning house or quiet quitting? Large-scale analysis of account deletion behaviour on TumblrBehaviour & Information Technology10.1080/0144929X.2024.2370432(1-21)Online publication date: 18-Jul-2024
    • (2024)Overview of Usable Privacy Research: Major Themes and Research DirectionsThe Curious Case of Usable Privacy10.1007/978-3-031-54158-2_3(43-102)Online publication date: 20-Mar-2024
    • (2023)A Tale of Two Cultures: Comparing Interpersonal Information Disclosure Norms on TwitterProceedings of the ACM on Human-Computer Interaction10.1145/36100457:CSCW2(1-40)Online publication date: 4-Oct-2023
    • (2023)Optimistic Access Control for the Smart Home2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179475(3043-3060)Online publication date: May-2023
    • (2022)Decaying Photos for Enhanced Privacy: User Perceptions Towards Temporal Redactions and 'Trusted' PlatformsProceedings of the ACM on Human-Computer Interaction10.1145/35555386:CSCW2(1-30)Online publication date: 11-Nov-2022
    • (2022)Just enough, just in time, just for "me"Proceedings of the ACM/IEEE 44th International Conference on Software Engineering: New Ideas and Emerging Results10.1145/3510455.3512785(56-60)Online publication date: 21-May-2022
    • (2022)Scraping Sticky Leftovers: App User Information Left on Servers After Account Deletion2022 IEEE Symposium on Security and Privacy (SP)10.1109/SP46214.2022.9833720(2145-2160)Online publication date: May-2022
    • (2022)Just Enough, Just in Time, Just for “Me”: Fundamental Principles for Engineering IoT-native Software Systems2022 IEEE/ACM 44th International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER)10.1109/ICSE-NIER55298.2022.9793531(56-60)Online publication date: May-2022
    • (2022)‘A right to be forgotten’: retrospective privacy concerns in social networking servicesBehaviour & Information Technology10.1080/0144929X.2022.204616242:7(829-850)Online publication date: 15-Mar-2022
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media