IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Information revelation and privacy in online social networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Proceedings of the 16th international conference on World Wide Web
Communications of the ACM
Feedback effects between similarity and social influence in online communities
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
A user study of the expandable grid applied to P3P privacy policy visualization
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Proceedings of the 18th international conference on World wide web
Differential privacy: a survey of results
TAMC'08 Proceedings of the 5th international conference on Theory and applications of models of computation
Inferring privacy information from social networks
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Beyond k-anonymity: a decision theoretic framework for assessing privacy risk
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
Proceedings of the 2010 ICSE Workshop on Software Engineering in Health Care
A secret sharing based privacy enforcement mechanism for untrusted social networking operators
MiFor '11 Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence
Stalking online: on user privacy in social networks
Proceedings of the second ACM conference on Data and Application Security and Privacy
Hi-index | 0.00 |
Social networking services well know that some users are unwilling to freely share the information they store with the service (e.g. profile information). To address this, ser vices typically provide various privacy "knobs" that the user may adjust to limit access by content type or user identity. However, the main purpose of social networks, community building, is largely at odds with this, hence it is unsurprising that privacy breaches in social networks are increasingly discovered. We argue that this tension between social networking goals and privacy suggests that research efforts should be focused more on efficient methods for detecting privacy breaches in social networks and on building user awareness of privacy risks and the trade-off between privacy and utility. We support our argument with a simple method for discovering LinkedIn contacts ostensibly hidden by privacy settings. This method appears discoverable with a straightforward analysis of the LinkedIn system and its features (indeed, LinkedIn is likely aware of this method), however Linkedin's privacy instructions suggest to users that implementing a privacy setting will prevent such discovery.