A Conceptual Model and a Metaphor of Everyday Privacy in Ubiquitous
A Conceptual Model and a Metaphor of Everyday Privacy in Ubiquitous
CSCW '04 Proceedings of the 2004 ACM conference on Computer supported cooperative work
Personal privacy through understanding and action: five pitfalls for designers
Personal and Ubiquitous Computing
A study of preferences for sharing and privacy
CHI '05 Extended Abstracts on Human Factors in Computing Systems
Using Egocentric Networks to Understand Communication
IEEE Internet Computing
MMM2: mobile media metadata for media sharing
Proceedings of the 13th annual ACM international conference on Multimedia
Profiles as Conversation: Networked Identity Performance on Friendster
HICSS '06 Proceedings of the 39th Annual Hawaii International Conference on System Sciences - Volume 03
SCAN: a structural clustering algorithm for networks
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
Identity management: multiple presentations of self in facebook
Proceedings of the 2007 international ACM conference on Supporting group work
Predicting tie strength with social media
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
When social networks cross boundaries: a case study of workplace use of facebook and linkedin
Proceedings of the ACM 2009 international conference on Supporting group work
All My People Right Here, Right Now: management of group co-presence on a social networking site
Proceedings of the ACM 2009 international conference on Supporting group work
Contextual dynamics of group-based sharing decisions
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Who's your best friend?: targeted privacy attacks In location-sharing social networks
Proceedings of the 13th international conference on Ubiquitous computing
Proceedings of the 13th international conference on Ubiquitous computing
An investigation into facebook friend grouping
INTERACT'11 Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part III
A secret sharing based privacy enforcement mechanism for untrusted social networking operators
MiFor '11 Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence
Boundary regulation in social media
Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work
Where do facebook intelligent lists come from?
Proceedings of the 2012 ACM international conference on Intelligent User Interfaces
Friend or foe? relationship-based adaptation on public displays
AmI'11 Proceedings of the Second international conference on Ambient Intelligence
Regroup: interactive machine learning for on-demand group creation in social networks
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Talking in circles: selective sharing in google+
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Policy-by-example for online social networks
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Building a dynamic and computational understanding of personal social networks
Proceedings of the 1st ACM workshop on Mobile systems for computational social science
Facebook and privacy: it's complicated
Proceedings of the Eighth Symposium on Usable Privacy and Security
+Your circles: sharing behavior on Google+
Proceedings of the Eighth Symposium on Usable Privacy and Security
The PViz comprehension tool for social network privacy settings
Proceedings of the Eighth Symposium on Usable Privacy and Security
The importance of being placefriends: discovering location-focused online communities
Proceedings of the 2012 ACM workshop on Workshop on online social networks
Mining smartphone data to classify life-facets of social relationships
Proceedings of the 2013 conference on Computer supported cooperative work
The post that wasn't: exploring self-censorship on facebook
Proceedings of the 2013 conference on Computer supported cooperative work
How do Facebookers Use Friendlists
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
Improving privacy settings for facebook by using interpersonal distance as criterion
CHI '13 Extended Abstracts on Human Factors in Computing Systems
Usable object management approaches for online social networks
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Hi-index | 0.00 |
Users of social networking sites often want to manage the sharing of information and content with different groups of people based on their differing relationships. However, grouping contacts places a significant configuration burden on the user. Automated approaches to grouping may have the potential to reduce this burden, however, their use remains largely untested. We investigate people's rationales when grouping their contacts for the purpose of controlling their privacy, finding six criteria that they commonly considered. We assess an automated approach to grouping, based on a network clustering algorithm, whose performance may be analogous to the human's use of some of these criteria. We find that the similarity between the groups created by people and those created by the algorithm is correlated with the modularity of their network. We also demonstrate that the particular clustering algorithm, SCAN, which detects hubs and outliers within a network can be beneficial for identifying contacts who are hard to group or for whom privacy preferences are inconsistent with the rest of their group.