Verification and change-impact analysis of access-control policies
Proceedings of the 27th international conference on Software engineering
Information revelation and privacy in online social networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
A face(book) in the crowd: social Searching vs. social browsing
CSCW '06 Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work
Identity management: multiple presentations of self in facebook
Proceedings of the 2007 international ACM conference on Supporting group work
Looking at, looking up or keeping up with people?: motives and use of facebook
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Lockr: social access control for web 2.0
Proceedings of the first workshop on Online social networks
Motivations for social networking at work
Proceedings of the 2008 ACM conference on Computer supported cooperative work
Changes in use and perception of facebook
Proceedings of the 2008 ACM conference on Computer supported cooperative work
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Strategies and struggles with privacy in an online social networking community
BCS-HCI '08 Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction - Volume 1
When social networks cross boundaries: a case study of workplace use of facebook and linkedin
Proceedings of the ACM 2009 international conference on Supporting group work
Bowling online: social networking and social capital within the organization
Proceedings of the fourth international conference on Communities and technologies
Proceedings of the fourth international conference on Communities and technologies
Configuring audience-oriented privacy policies
Proceedings of the 2nd ACM workshop on Assurable and usable security configuration
Exploring the workplace communication ecology
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Friends only: examining a privacy-enhancing behavior in facebook
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Detecting professional versus personal closeness using an enterprise social network site
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A model of triangulating environments for policy authoring
Proceedings of the 15th ACM symposium on Access control models and technologies
Boundary regulation in social media
Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work
Homeless young people on social network sites
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Facebook and privacy: it's complicated
Proceedings of the Eighth Symposium on Usable Privacy and Security
Helping Johnny 2.0 to encrypt his Facebook conversations
Proceedings of the Eighth Symposium on Usable Privacy and Security
+Your circles: sharing behavior on Google+
Proceedings of the Eighth Symposium on Usable Privacy and Security
The PViz comprehension tool for social network privacy settings
Proceedings of the Eighth Symposium on Usable Privacy and Security
Studying access-control usability in the lab: lessons learned from four studies
Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results
C4PS - helping facebookers manage their privacy settings
SocInfo'12 Proceedings of the 4th international conference on Social Informatics
How do Facebookers Use Friendlists
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
Combining social authentication and untrusted clouds for private location sharing
Proceedings of the 18th ACM symposium on Access control models and technologies
A pilot study of cyber security and privacy related behavior and personality traits
Proceedings of the 22nd international conference on World Wide Web companion
Narrowcasting in social media: effects and perceptions
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Usable object management approaches for online social networks
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Privacy manipulation and acclimation in a location sharing application
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Formal definitions for usable access control rule sets from goals to metrics
Proceedings of the Ninth Symposium on Usable Privacy and Security
Retrospective privacy: managing longitudinal privacy in online social networks
Proceedings of the Ninth Symposium on Usable Privacy and Security
Hi-index | 0.01 |
We performed a study of Facebook users to examine how they coped with limitations of the Facebook privacy settings interface. Students graduating and joining the workforce create significant problems for all but the most basic privacy settings on social networking websites. We therefore created realistic scenarios exploiting work/play boundaries that required users to specify access control policies that were impossible due to various limitations. We examined whether users were aware of these problems without being prompted, and once given feedback, what their coping strategies were. Overall, we found that simply alerting participants to potential errors was ineffective, but when choices were also presented, participants introduced significantly fewer errors. Based on our findings, we designed a privacy settings interface based on Venn diagrams, which we validated with a usability study. We conclude that this interface may be more effective than the current privacy settings interface.