CFP last date
20 March 2024
Call for Paper
April Edition
IJCA solicits high quality original research papers for the upcoming April edition of the journal. The last date of research paper submission is 20 March 2024

Submit your paper
Know more
Reseach Article

Overview of Privacy in Social Networking Sites (SNS)

by Pallavi I. Powale, Ganesh D. Bhutkar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 74 - Number 19
Year of Publication: 2013
Authors: Pallavi I. Powale, Ganesh D. Bhutkar
10.5120/13005-0311

Pallavi I. Powale, Ganesh D. Bhutkar . Overview of Privacy in Social Networking Sites (SNS). International Journal of Computer Applications. 74, 19 ( July 2013), 39-46. DOI=10.5120/13005-0311

@article{ 10.5120/13005-0311,
author = { Pallavi I. Powale, Ganesh D. Bhutkar },
title = { Overview of Privacy in Social Networking Sites (SNS) },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 74 },
number = { 19 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 39-46 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume74/number19/13005-0311/ },
doi = { 10.5120/13005-0311 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:42:46.143015+05:30
%A Pallavi I. Powale
%A Ganesh D. Bhutkar
%T Overview of Privacy in Social Networking Sites (SNS)
%J International Journal of Computer Applications
%@ 0975-8887
%V 74
%N 19
%P 39-46
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Social Networking Sites (SNS) have become an integral part of communication and life style of people in today's world. Because of the wide range of services offered by SNSs mostly for free of cost, these sites are attracting the attention of all possible Internet users. Most importantly, users from all age groups have become members of SNSs. Since many of the users are not aware of the data thefts associated with information sharing, they freely share their personal information with SNSs. Therefore, SNSs may be used for investigating users' character and social habits by familiar or even unknown persons and agencies. Such commercial and social scenario, has led to number of privacy and security threats. Though, all major issues in SNSs need to be addressed, by SNS providers, privacy of SNS users is the most crucial. And therefore, focus of this paper is on 'privacy in SNSs'. Different ways of Personally Identifiable Information (PII) leakages from SNSs, information revelation to third-party domains without user consent and privacy related threats associated with such information sharing are discussed in this paper. This comprehensive overview on privacy in SNSs will definitely help in raising user awareness about sharing data and managing their privacy with SNSs. It will also help SNS providers to rethink about their privacy policies.

References
  1. Bhutkar, G. 2009. Users on Social Networking Sites, Journal of HCI Vistas, Volume V (2).
  2. Boyd, D. 2004. Friendster and Publicly Articulated Social Networking, ACM Conference on Human Factors and Computing Systems (CHI), Vienna, Austria.
  3. Boyd, D. 2008. Facebook's Privacy Trainwreck: Exposure, Invasion, and Social Convergence, International Journal of Research into New Media Techchnologies, Volume 14, pp. 13–20.
  4. Boyd, D. and Hargittai, E. 2010. Facebook Privacy Settings: Who Cares? , Journal of First Monday, Volume 15 (8).
  5. Boyd, D. and Schultz, E. , Schultz, J. and Palfrey, J. 2011. Why Parents Help Their Children lie to Facebook about Age: Unintended Consequences of the 'Children's Online Privacy Act', Journal of First Monday, Volume 16 (11).
  6. Chin, Y. , Roussev, V. , Richard III, G. and Gao, Y. 2005. Content-Based Image Retrieval for Digital Forensics, The International Federation for Information Processing, Volume 194, pp 271-282.
  7. Ellison, N. and Boyd, D. 2013. Sociality through Social Networking Sites, The Oxford Handbook of Internet Studies (Ed. William H. Dutton). Oxford: Oxford University Press.
  8. Gross, R. and Acquisti, A. 2005. Information Revelation and Privacy in Online Social Networks, ACM Workshop, Privacy Electronic Society, pp. 71–80.
  9. Hogben, G. 2007. Security Issues and Recommendations for Online Social Network, European Network and Information Security Agency (ENISA), Position Paper.
  10. Krishnamurthy, B. and Wills, C. 2008. Characterizing Privacy in Online Social Networks, ACM Workshop on Online Social Networks, Seattle, USA, pp. 37–42.
  11. Krishnamurthy, B. and Wills, C. 2009. On the Leakage of Personally Identifiable Information via Online Social Networks, ACM workshop on Online Social Networks, pp. 7-12.
  12. Kumaraguru, P. and Cranor, L. 2005. Privacy in India: Attitudes and Awareness, Workshop on Privacy Enhancing Technologies, Dubrovnik, Croatia.
  13. Patil, T. , Bhutkar, G. and Tarapore, N. 2012. Usability Evaluation Using Specialized Heuristics with Qualitative Indicators for Intrusion Detection System. Advances in Computing and Information Technology, Springer Berlin Heidelberg, pp. 317-328.
  14. First European agreement of Social Networks - A Step Forward to Child Safety Online, available at http://europa. eu/rapid/pressReleasesAction. do?reference=SPEECH/09/46&format=HTML&aged=0&language=EN&guiLanguage=fr , accessed on 26th Apr. 2013.
  15. Blackmail Claim Stirs Fears over Facebook, available at http://www. guardian. co. uk/business/2007/jul/16/usnews. news, accessed on 4th Apr. 2013.
  16. Validation, Authorization: the Next Steps to Identity Management, available at http://business. highbeam. com/409220/article-1G1-214562083/validation-authorization-next-steps-identity-management, accessed on 14th Apr. 2013.
  17. Campus Police Use Facebook, available at http://badgerherald. com/news/2006/01/25/campus_police_use_fa. php, accessed on 14th May. 2013.
  18. CBIR Demonstration, available at www. cs. washington. edu/research/imagedatabase/demo/, accessed on 20th Apr. 2013.
  19. Defending Your Rights in the Digital World- Harry Potter and the Digital Fingerprints, available at https://www. eff. org/deeplinks/2007/07/harry-potter-and-digital-fingerprints, accessed on 10th May. 2013.
  20. Delete Your Bad Web Reputation, available at www. wired. com/science/discoveries/news/2006/11/72063, accessed on 23rd Feb. 2013.
  21. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with regard to the Processing of Personal Data and on the Free Movement of Such Data, Official Journal of the European Communities of 23 November 1995 No L. 281 p. 31, available at http://eur-lex. europa. eu/LexUriServ/LexUriServ. do?uri=CELEX:31995L0046:en:NOT , accessed on 12th May. 2013.
  22. Facebook - Data Use Policy, available at https://www. facebook. com/about/privacy/your-info, accessed on 15th May. 2013.
  23. Facebook - Tagging Photo, available at http://www. facebook. com/help/463455293673370/, accessed on 5th Feb. 2013.
  24. Facebook: Threats to Privacy, available at http://groups. csail. mit. edu/mac/classes/6. 805/student-papers/fall05-papers/facebook. pdf, accessed on 27th Apr. 2013.
  25. Hofstede Analysis, available at http://www. cyborlink. com/besite/hofstede. htm, accessed on 20th Apr. 2013.
  26. List of Social Networking Sites, available at http://en. wikipedia. org/wiki/List_of_social_networking_websites, accessed on 10th Feb. 2013.
  27. Photos & Videos as Social Currency Online, available at http://pewinternet. org/Reports/2012/Online-Pictures/Additional-Material-and-Demographics/Demo-Portrait. aspx, accessed on 18th Apr. 2013.
  28. Privacy and Security Issues in Social Networking, available at http://www. fastcompany. com/articles/2008/10/social-networking-security. html?page=0%2C0, accessed on 7th Nov. 2012.
  29. Privacy, available at http://en. wikipedia. org/wiki/Privacy, accessed on 3rd Oct. 2012.
  30. Social Network Service, available at http://en. wikipedia. org/wiki/Social_network_service, accessed on 4th Feb. 2013.
  31. Teens Kindness & Cruelty on Social Network Sites, available at http://pewinternet. org/Reports/2011/Teens-and-social-media. aspx, accessed on 18th Nov. 2012.
  32. Tennis LTA Suspends Top Junior Players, available at http://news. bbc. co. uk/sport2/hi/tennis/7010983. stm, accessed on 3rd May. 2013.
  33. Top 15 Most Popular Social Networking Sites, available at http://www. ebizmba. com/articles/social-networking-websites, accessed on 10th Feb. 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Social Networking Sites SNS privacy Personally Identifiable Information PII PII leakage privacy related threats