[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/2042182.2042202guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

An investigation into facebook friend grouping

Published: 05 September 2011 Publication History

Abstract

With increasingly large friend networks, Facebook users may be losing sight of exactly with whom they are sharing content they post to Facebook. When Facebook released a new privacy interface in sum- mer 2010 they simplified privacy controls; however, group-based permis- sions remain at the core of fine-grained privacy control. In order to use these fine-grained controls, users must be able to accurately and usefully specify friend groups. In a series of 46 semi-structured interviews, we investigated how participants group their online friends using four differ- ent grouping methods. Our results show that these different mechanisms alter the strategies and groups that users create, that groups created a priori need further refinement before they can adequately address pri- vacy decisions, and that users are adapting their online behavior to avoid the need to specify groups in the current Facebook interface. We con- clude with several recommendations that would allow users improved group-based access control.

References

[1]
Acquisti, A., Gross, R.: Imagined communities: Awareness, information sharing, and privacy on the facebook. In: Privacy Enhancing Technology Symposium (2006)
[2]
Adams, P.: The real life social network v2, http://www.slideshare.net/ padday/the-real-life-social-network-v2
[3]
Berteau, S.: Facebook's Misrepresentation of Beacon's Threat to Privacy: Tracking users who opt out or are not logged in (November 29, 2007), http:// community.ca.com/blogs/securityadvisor/archive/2007/11/29/ facebook-s-misrepresentation-of-beacon-s-threat-to-privacytracking-users-who-opt-out-or-are-not-logged-in.aspx
[4]
Binder, J., Howes, A., Sutcliffe, A.: Conflicting social spheres and experienced tension in social networking sites. In: CHI (2009)
[5]
Carr, A.: Facebook's New Groups, Dashboards, and Downloads Explained (October 6, 2010), http://www.fastcompany.com/1693443/ facebooks-big-announcements-dashboards-personal-information-downloads-friend-group-lists
[6]
Davis, S., Gutwin, C.: Using relationship to control disclosure in awareness servers. In: Proceedings of Graphics Interface GI 2005, School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada, pp. 145-152. Canadian Human-Computer Communications Society (2005)
[7]
Gates, G.: Facebook Privacy: A Bewildering Tangle of Options (September 18, 2010), http://www.nytimes.com/interactive/2010/05/12/business/ facebook-privacy.html
[8]
Jones, S., O'Neil, E.: Feasibility of structural network clustering for group-based privacy control in social networks. In: SOUPS (2010)
[9]
Kwasnik, B.: How a personal document's intended use or purpose affects its classification in an office. In: Proceedings of the 12th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 1989, pp. 207-210. ACM, New York (1989)
[10]
Lampinen, A., Tamminen, S., Oulasvirta, A.: All my people right here, right now: Management of group co-presence on a social networking site. In: International Conference on Supporting Group Work (2009)
[11]
Lederer, S., Hong, I., Dey, K., Landay, A.: Personal privacy through understanding and action: five pitfalls for designers. Personal Ubiquitous Comput 8, 440-454 (2004)
[12]
Malone, T.W.: How do people organize their desks?: Implications for the design of office information systems. ACM Trans. Inf. Syst. 1, 99-112 (1983)
[13]
Marsden, R.: Facebook unveils its latest trick but the implications are worrying (September 18, 2010), http://www.independent.co.uk/life-style/gadgets-andtech/ news/facebook-unveils-its-latest-trick-ndash-but-the-implications-are-worrying-2082708.html
[14]
Mccarty, C.: Structure in personal networks. Journal of Social Structure 3 (2002)
[15]
Mervis, C., Rosch, E.: Categorization of natural objects. Annual Review of Psychology 32, 89-115 (1981)
[16]
Ostrow, A.: FACEBOOK FIRED: 8% of US Companies Have Sacked Social Media Miscreants (August 10, 2009), http://mashable.com/2009/08/10/social-media-misuse/
[17]
Preibusch, S.: W3c workshop on privacy for advanced web apis. Journal of Interactive Advertising, 1213 (July 2010), http://www.w3.org/2010/api-privacy-ws/slides/preibusch.pdf
[18]
Reeder, R., Bauer, L., Cranor, L.F., Reiter, M., Bacon, K., How, K., Strong, H.: Expandable grids for visualizing and authoring computer security policies. In: CHI (2008)
[19]
Smart, D.: How do people limit their behaviour in response to their perception of potential social tension? A study of Facebook. Manchester Business School Bsc Interactive Systems Design (2009), http://intranet.cs.man.ac.uk/Intranetsubweb/ library/3yrep/2009/7024300.pdf
[20]
Stangor, C., Lynch, L., Duan, C., Glass, B.: Categorization of individuals on the basis of multiple social features. Journal of Personality and Social Psychology 62(2), 207-218 (1992)

Cited By

View all
  • (2019)Leveraging collective intelligence for behavioral prediction in signed social networks through evolutionary approachInformation Systems Frontiers10.1007/s10796-017-9760-421:2(417-439)Online publication date: 1-Apr-2019
  • (2018)When SNS Privacy Settings Become GranularProceedings of the ACM on Human-Computer Interaction10.1145/32743772:CSCW(1-21)Online publication date: 1-Nov-2018
  • (2017)Exploring Topic-Based Sharing MechanismsProceedings of the 2017 CHI Conference on Human Factors in Computing Systems10.1145/3025453.3025840(6973-6985)Online publication date: 2-May-2017
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
INTERACT'11: Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part III
September 2011
696 pages
ISBN:9783642237645

Sponsors

  • Fundacao para a Ciencia e Tecnologia
  • YDreams
  • AbERTA: AbERTA
  • Microsoft Research: Microsoft Research
  • INSEC-ID: inesc id lisboa

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 05 September 2011

Author Tags

  1. access control
  2. grouping
  3. online social networks
  4. privacy

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2019)Leveraging collective intelligence for behavioral prediction in signed social networks through evolutionary approachInformation Systems Frontiers10.1007/s10796-017-9760-421:2(417-439)Online publication date: 1-Apr-2019
  • (2018)When SNS Privacy Settings Become GranularProceedings of the ACM on Human-Computer Interaction10.1145/32743772:CSCW(1-21)Online publication date: 1-Nov-2018
  • (2017)Exploring Topic-Based Sharing MechanismsProceedings of the 2017 CHI Conference on Human Factors in Computing Systems10.1145/3025453.3025840(6973-6985)Online publication date: 2-May-2017
  • (2017)An SNS-based model for finding collaborative partnersMultimedia Tools and Applications10.1007/s11042-015-2480-176:9(11531-11545)Online publication date: 1-May-2017
  • (2016)“Just Cast the Net, and Hopefully the Right Fish Swim into It”Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing10.1145/2818048.2819933(1488-1500)Online publication date: 27-Feb-2016
  • (2015)Can I Help You Setting Your Privacy? A Survey-based Exploration of Users' Attitudes towards Privacy SuggestionsProceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia10.1145/2837126.2837130(347-356)Online publication date: 11-Dec-2015
  • (2015)Show me your phone, I will tell you who your friends areProceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia10.1145/2836041.2836048(75-83)Online publication date: 30-Nov-2015
  • (2015)Social Circle Discovery in Ego-Networks by Mining the Latent Structure of User Connections and Profile AttributesProceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 201510.1145/2808797.2809303(880-887)Online publication date: 25-Aug-2015
  • (2015)Grouping contacts for information tasksProceedings of the 2015 British HCI Conference10.1145/2783446.2783608(275-276)Online publication date: 13-Jul-2015
  • (2014)Understanding and specifying social access control listsProceedings of the Tenth USENIX Conference on Usable Privacy and Security10.5555/3235838.3235863(271-283)Online publication date: 9-Jul-2014
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media