The Community for Technology Leaders
RSS Icon
Issue No.03 - May-June (2013 vol.11)
pp: 29-37
Seda Gurses , KU Leuven
Claudia Diaz , KU Leuven
Privacy is one of the friction points that emerge when communications are mediated in online social networks (OSNs). Different communities of computer science researchers have framed the OSN privacy problem as one of surveillance, institutional privacy, or social privacy. In tackling these problems, researchers have also treated them as if they were independent. In this article, the authors argue that the different privacy problems are entangled and that OSN privacy research would benefit from a more holistic approach.
privacy-enhancing technologies, human-computer interaction, online social networks, surveillance, social privacy
Seda Gurses, Claudia Diaz, "Two tales of privacy in online social networks", IEEE Security & Privacy, vol.11, no. 3, pp. 29-37, May-June 2013, doi:10.1109/MSP.2013.47
1. "FTC Charges Deceptive Privacy Practices in Google's Rollout of Its Buzz Social Network," Federal Trade Commission, 30 Mar. 2011;
2. J. Grimmelmann, "Saving Facebook," Iowa Law Rev., vol. 94, 2009, pp. 1137–1206.
3. K. Raynes-Goldie, "Privacy in the Age of Facebook: Discourse, Architecture, Consequences," PhD thesis, Curtin Univ., 2012.
4. N. Andrade, A. Martin, and S. Monteleone, "'All the Better to See You with, My Dear': Facial Recognition and Privacy in Online Social Networks," IEEE Security & Privacy, vol. 11, no. 3, 2013, pp. 21–28.
5. D.K. Mulligan and J. King, "Bridging the Gap between Privacy and Design," J. Constitutional Law, vol. 14, no. 4, 2012, pp. 989–1034.
6. G. Greenwald, "Hillary Clinton and Internet Freedom," Salon,9 Dec. 2011;
7. E. Morozov, "Facebook and Twitter Are Just Places Revolutionaries Go," The Guardian,11 Mar. 2011; 07facebook-twitter-revolutionaries-cyber-utopians.
8. M. Aouragh and A. Alexander, "The Egyptian Experience: Sense and Nonsense of the Internet Revolutions," Int'l J. Comm., vol. 5, 2011, pp. 1344–1358.
9. I. Van Der Ploeg, Keys to Privacy: Translations of "the Privacy Problem" in Information Technologies, Maastricht: Shaker, 2005, pp. 15–36.
10. K.D. Haggerty and R.V. Ericson, "The Surveillant Assemblage," British J. Sociology, vol. 51, no. 4, 2000, pp. 605–622.
11. L. Palen and P. Dourish, "Unpacking 'Privacy' for a Networked World," Proc. Int'l Conf. Human Factors in Computing Systems (CHI 03), ACM, 2003, pp. 129–136.
12. F. Beato, M. Kohlweiss, and K. Wouters, "Scramble! Your Social Network Data," Privacy Enhancing Technologies, LNCS 6794, Springer, 2011, pp. 211–225.
13. E. de Cristofaro et al., "Hummingbird: Privacy at the Time of Twitter," IEEE Symp. Security and Privacy, IEEE CS, 2012, pp. 285–299.
14. J. Anderson et al., "Privacy-Enabling Social Networking over Untrusted Networks," ACM Workshop Online Social Networks (WOSN 09), ACM, 2009, pp. 1–6.
15. J. Anderson and F. Stajano, "Must Social Networking Conflict with Privacy?," IEEE Security & Privacy, vol. 11, no. 3, 2013, pp. 51–60.
16. A. Cutillo, R. Molva, and T. Strufe, "Safebook: A Privacy-Preserving Online Social Network Leveraging on Real-Life Trust," Communications Magazine, vol. 47, no. 12, 2009, pp. 94–101.
17. R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The Second-Generation Onion Router," Usenix Security Symp., Usenix, 2004, pp. 303–320.
18. F. Stutzman and W. Hartzog, "Boundary Regulation in Social Media," Proc. Conf. Computer Supported Cooperative Work (CSCW 12), ACM, 2012, pp. 769–778.
19. A. Acquisti and J. Grossklags, "Privacy and Rationality in Individual Decision Making," IEEE Security & Privacy, vol. 3, no. 1, 2005, pp. 26–33.
20. B. Berendt, O. Günther, and S. Spiekermann, "Privacy in E-Commerce: Stated Preferences vs. Actual Behavior," Comm. ACM, vol. 48, no. 4, 2005, pp. 101–106.
21. Y. Wang et al., "I Regretted the Minute I Pressed Share: A Qualitative Study of Regrets on Facebook," Proc. 7th Symp. Usable Privacy and Security (SOUPS 11), ACM, 2011, art. 10.
22. H.R. Lipford et al., "Visual vs. Compact: A Comparison of Privacy Policy Interfaces," Proc. 28th Int'l Conf. Human Factors in Computing Systems (CHI 10), ACM, 2010, pp. 1111–1114.
23. R. Sayaf and D. Clarke, "Access Control Models for Online Social Networks," Social Network Engineering for Secure Web Data and Services, IGI Global, 2012.
3 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool