The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May-June (2013 vol.11)
pp: 51-60
Jonathan Anderson , University of Cambridge
Frank Stajano , University of Cambridge
ABSTRACT
Online social networks have serious privacy drawbacks, some of which stem from the business model. Must this be? Is the current OSN business model the only viable one? Or can we construct alternatives that are technically and economically feasible?
INDEX TERMS
Data privacy, Online services, Advertising, Computer security, Facebook, Social network services, Internet, social network services, Data privacy, Online services, Advertising, Computer security, Facebook, Social network services, Internet, computer security, Data privacy, Online services, Advertising, Computer security, Facebook, Social network services, Internet, data security, technology social factors, professional communication, information retrieval
CITATION
Jonathan Anderson, Frank Stajano, "Must social networking conflict with privacy?", IEEE Security & Privacy, vol.11, no. 3, pp. 51-60, May-June 2013, doi:10.1109/MSP.2013.23
REFERENCES
1. Liorean, blog, 2004; http://codingforums.comshowpost.php?p=206569.
2. W. Xu, X. Zhou, and L. Li, "Inferring Privacy Information via Social Relations," Proc. IEEE 24th Int'l Conf. Data Engineering Workshop, IEEE CS, 2008, pp. 525–530; http://ieeexplore.ieee.org/xplarticleDetails.jsp?arnumber=4498373.
3. R. Sanghvi, "New Tools to Control Your Experience," Facebook blog, 9 Dec. 2009; https://www.facebook.com/blogblog.php?post=196629387130.
4. P. Ganapati, "Scribd Facebook Instant Personalization Is a Privacy Nightmare," Wired,30 Sept. 2010; www.wired.com/epicenter/2010/09scribd-facebook-instant-personalization.
5. E. Steel and G.A. Fowler, "Facebook in Privacy Breach," Wall Street J.,17 Oct. 2010; http://online.wsj.com/articleSB10001424052702304772804575558484075236968.html.
6. A. Korolova, "Privacy Violations Using Microtargeted Ads: A Case Study," Proc. 10th IEEE Int'l Conf. Data Mining Workshops (ICDMW 10), IEEE CS, 2010, pp. 474–482; http://ieeexplore.ieee.org/xplarticleDetails.jsp?arnumber=5693335.
7. B. Krishnamurthy and C.E. Wills, "On the Leakage of Personally Identifiable Information via Online Social Networks," Proc. 2nd ACM Workshop Online Social Networks (WOSN 09), ACM, 2009; http://dl.acm.orgcitation.cfm?id=1592665.1592668.
8. N. Jentzsch, S. Preibusch, and A. Harasser, Study on Monetising Privacy, tech. report, Feb. 2012; www.enisa.europa.eu/activities/identity-and-trust/ library/deliverablesmonetising-privacy.
9. J. Grossklags and A. Acquisti, "When 25 Cents Is Too Much: An Experiment on Willingness-to-Sell and Willingness-to-Protect Personal Information," Proc. 6th Workshop Economics of Information Security (WEIS 07), 2007; http://weis2007.econinfosec.org/papers66.pdf.
10. A. Acquisti, "Privacy in Electronic Commerce and the Economics of Immediate Gratification," Proc. 5th ACM Conf. Electronic Commerce (EC 04), ACM, 2004; http://portal.acm.orgcitation.cfm?id=988772.988777.
11. V. Toubiana et al., "Adnostic: Privacy Preserving Targeted Advertising," Proc. Network and Distributed System Security Symposium (NDSS 10), Internet Soc., 2010; www.isoc.org/isoc/conferences/ndss/10/pdf 05.pdf.
12. S. Guha, K. Tang, and P. Francis, "NOYB: Privacy in Online Social Networks," Proc. 1st Workshop Online Social Networks (WOSN 08), ACM, 2008; http://portal.acm.orgcitation.cfm?id=1397735.1397747.
13. M.M. Lucas and N. Borisov, "FlyByNight: Mitigating the Privacy Risks of Social Networking," Proc. 7th ACM Workshop Privacy in the Electronic Society (WPES 08), ACM, 2008; http://portal.acm.orgcitation.cfm?id=1456403.1456405.
14. L.A. Cutillo, R. Molva, and T. Strufe, "Safebook: Feasibility of Transitive Cooperation for Privacy on a Decentralized Social Network," Proc. 3rd Int'l IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC 09), IEEE, 2009, pp. 1–6; http://ieeexplore.ieee.org/xplarticleDetails.jsp?arnumber=5282446.
15. B. Viswanath et al., "An Analysis of Social Network-Based Sybil Defenses," Proc. ACM SIGCOMM 2010 Conf. Data Communication (SIGCOMM 10), ACM, 2010; http://dl.acm.orgcitation.cfm?id=1851182.1851226.
16. A. Narayanan and V. Shmatikov, "Robust De-anonymization of Large Sparse Datasets," Proc. 29th IEEE Symp. Security and Privacy (SP 08), IEEE CS, 2008, pp. 111–125; http://ieeexplore.ieee.org/xplarticleDetails.jsp?arnumber=4531148.
17. K.-P. Yee, "Aligning Security and Usability," IEEE Security & Privacy, vol. 2, no. 5, 2004, pp. 48–55; http://doi.ieeecomputersociety.org/10.1109 MSP.2004.64.
18. J. Anderson, "Privacy Engineering for Social Networks," PhD dissertation, Computer Laboratory, Univ. Cambridge, 2012; www.dspace.cam.ac.uk/handle/1810244239.
19. A. Felt and D. Evans, "Privacy Protection for Social Networking Platforms," Web 2.0 Security and Privacy (W2SP 08), IEEE, 2008; http://w2spconf.com/2008/paperss3p1.pdf.
39 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool