TY - GEN
T1 - Social information leakage
T2 - 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014 - Held as Part of 16th International Conference on Human-Computer Interaction, HCI International 2014
AU - Nouh, Mariam
AU - Almaatouq, Abdullah
AU - Alabdulkareem, Ahmad
AU - Singh, Vivek K.
AU - Shmueli, Erez
AU - Alsaleh, Mansour
AU - Alarifi, Abdulrahman
AU - Alfaris, Anas
AU - Pentland, Alex
PY - 2014/1/1
Y1 - 2014/1/1
N2 - Today, users share large amounts of information about themselves on their online social networks. Besides the intended information, this sharing process often also "leaks" sensitive information about the users - and by proxy - about their peers. This study investigates the effect of awareness about such leakage of information on user behavior. In particular, taking inspiration from "second-hand smoke" campaigns, this study creates "social awareness" campaign where users are reminded of the information they are leaking about themselves and their friends. The results indicate that the number of users disallowing the access permissions doubles with the social awareness campaign as compared to a baseline method. The findings are useful for system designers considering privacy as a holistic social challenge rather than a purely technical issue.
AB - Today, users share large amounts of information about themselves on their online social networks. Besides the intended information, this sharing process often also "leaks" sensitive information about the users - and by proxy - about their peers. This study investigates the effect of awareness about such leakage of information on user behavior. In particular, taking inspiration from "second-hand smoke" campaigns, this study creates "social awareness" campaign where users are reminded of the information they are leaking about themselves and their friends. The results indicate that the number of users disallowing the access permissions doubles with the social awareness campaign as compared to a baseline method. The findings are useful for system designers considering privacy as a holistic social challenge rather than a purely technical issue.
KW - Online social networks
KW - Peer pressure
KW - Privacy
KW - Social information leakage
UR - http://www.scopus.com/inward/record.url?scp=84903692494&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-07620-1_31
DO - 10.1007/978-3-319-07620-1_31
M3 - Conference contribution
AN - SCOPUS:84903692494
SN - 9783319076195
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 352
EP - 360
BT - Human Aspects of Information Security, Privacy, and Trust - Second International Conference, HAS 2014, Held as Part of HCI International 2014, Proceedings
PB - Springer Verlag
Y2 - 22 June 2014 through 27 June 2014
ER -