Nav: Home

Researchers aim to safeguard privacy on social networks

March 31, 2015

LAWRENCE -- At the end of 2014, Facebook reported 1.39 billion monthly active users. In the meantime, 500 million tweets were sent each day on Twitter. Indeed, social networks have come to dominate aspects of our lives. But all our social sharing comes with a price. Last year, the Pew Research Center found 81 percent of Americans feel "not very" or "not at all secure" using social media sites when they want to share private information with another trusted person or organization.

Now, a researcher at the University of Kansas' Information and Telecommunication Technology Center is investigating solutions that could shore up personal privacy on leading social media sites.

"Part of the problem is the business model," said Bo Luo, associate professor of electrical engineering and computer science. "Social network providers aggressively expand their user bases and promote socialization and sharing. They're not really motivated to protect user privacy until the privacy concern becomes significant enough to impact the growth of their business."

Now, with a pair of three-year grants from the National Science Foundation amounting to about $500,000, Luo and Dongwon Lee of Pennsylvania State University, are developing technology to shore up user privacy.

The project will hone methods to detect the discrepancies between users' information-sharing expectations and actual disclosure; design a user-centered yet computationally efficient formal model of user privacy in social networks; and develop a mechanism to effectively enforce privacy policies in the proposed model, according to the researchers.

Luo said many users of social networks remain unaware that shared information isn't necessarily kept to their intended group of contacts and that parties with malicious intent easily may gain access. Researchers call this privacy problem a "leaky boundary."

"Large amounts of personal information are voluntarily posted to social networks," he said. "Often, the true audience of such information is much larger than the data owner perceives. That is, when 'Alice' posts a message to a social network, it's intended for selected users -- for example, she thinks, 'I want my friends to see this' -- however, many more users, including adversaries, may have access to the message."

Thus, seemingly trivial sharing on social networks could leave users open to "undesired information disclosures" and "information aggregation attacks."

"Each single message only contains a very small amount of information," Luo said. "However, by aggregating all the posts from a certain user, the adversary learns a lot about this user."

Luo sees a prevalent contradiction -- privacy concerns voiced by users who are at the same time playing fast and loose with their own data -- as a call to action.

"Studies have shown a massive disconnection between users' privacy perceptions and their behaviors -- widely known as the 'privacy paradox,'" Luo said. "That is, most users do not take appropriate actions to protect their information, although they express concerns on the privacy of such information."

To help with the problem, the researchers plan to design a formal privacy model that will restrict information sharing to users' social circles.

"Social circles of a user's network are hidden structures of closely connected clusters," Luo said. "For instance, a user's high-school friends may constitute a circle, while his or her colleagues belong to a different circle, and his or her family members constitute yet another circle."

Luo and his team will develop a real-time privacy enforcement tool that would provide privacy protection across several sites and detect leaky boundaries that allow private information to travel beyond social circles.

Lastly, the researchers will carry out user studies to shrink the gap between perceived and actual privacy on social media and improve decision making in sharing personal information.

Until then, Lou suggested that users of sites like Facebook, Twitter and Google+ choose the strictest privacy protections available on those sites, even though "many of the existing privacy protection mechanisms are somehow difficult to use."

"Users should always employ privacy protection functions provided by social network providers," he said. "Users should also be conservative and think more about the possible consequences before they post any potentially sensitive information."
-end-


University of Kansas

Related Social Media Articles:

Can seeing the Facebook logo make you crave social media?
A new study examined how social media cues such as the Facebook logo may affect frequent and less frequent social media users differently, sparking spontaneous hedonic reactions that make it difficult to resist social media cravings.
People could be genetically predisposed to social media use
Chance York (Kent State University) used a behavior genetics framework and twin study data from the 2013 Midlife in the United States survey, York examined how both environmental and genetic factors contribute to social media use by applying an analytical model called Defries-Fulker Regression.
New survey reveals almost 6 in 10 teens take a break from social media
A new survey reveals that 58 percent of American teens report taking significant breaks from social media, and that many of these breaks are voluntary.
Who are you on social media? New research examines norms of online personas
According to the Pew Research center, the majority of adults on the internet have more than one social networking profile on sites like Facebook, Twitter, and LinkedIn.
Social media tools can reinforce stigma and stereotypes
Researchers have developed new software to analyze social media comments, and used this tool in a recent study to better understand attitudes that can cause emotional pain, stigmatize people and reinforce stereotypes.
More Social Media News and Social Media Current Events

Best Science Podcasts 2019

We have hand picked the best science podcasts for 2019. Sit back and enjoy new science podcasts updated daily from your favorite science news services and scientists.
Now Playing: TED Radio Hour

Teaching For Better Humans
More than test scores or good grades — what do kids need to prepare them for the future? This hour, guest host Manoush Zomorodi and TED speakers explore how to help children grow into better humans, in and out of the classroom. Guests include educators Olympia Della Flora and Liz Kleinrock, psychologist Thomas Curran, and writer Jacqueline Woodson.
Now Playing: Science for the People

#534 Bacteria are Coming for Your OJ
What makes breakfast, breakfast? Well, according to every movie and TV show we've ever seen, a big glass of orange juice is basically required. But our morning grapefruit might be in danger. Why? Citrus greening, a bacteria carried by a bug, has infected 90% of the citrus groves in Florida. It's coming for your OJ. We'll talk with University of Maryland plant virologist Anne Simon about ways to stop the citrus killer, and with science writer and journalist Maryn McKenna about why throwing antibiotics at the problem is probably not the solution. Related links: A Review of the Citrus Greening...