Access the full text.
Sign up today, get DeepDyve free for 14 days.
Christopher Morris (1995)
Imagined communities: Reflections on the origin and spread of nationalismHistory of European Ideas, 21
(2004)
Uniqueness of simple demographics in the U.S. population. Technical report
Maury Silver, S. Milgram, J. Sabini (1992)
The Individual In A Social World: Essays and Experiments
L. Sweeney (2002)
k-Anonymity: A Model for Protecting PrivacyInt. J. Uncertain. Fuzziness Knowl. Based Syst., 10
(2005)
University Planning
(2004)
Is Friendster the new TIA? TechCentralStation
W. Mackay (1991)
Triggers and barriers to customizing softwareProceedings of the SIGCHI Conference on Human Factors in Computing Systems
(2005)
A new kind of fame. The Columbian Missourian
S. Sweet (1984)
Imagined Communities: Reflections on the Origin and Spread of NationalismTelos, 1984
H. Christensen, P. Phillips (2002)
Empirical Evaluation Methods in Computer Vision
Hugo Liu (2004)
InterestMap : Harvesting Social Network Profiles for Recommendations
H. Holland, Kelly Mazzoli (2001)
Where Everybody Knows Your NamePhi Delta Kappan Magazine, 83
D. Boyd (2004)
Friendster and publicly articulated social networking
(2005)
Boston.com
Yajie Tian, T. Kanade, J. Cohn (2003)
Handbook of face recognition
F. Schoeman (1984)
Philosophical Dimensions of Privacy: An Anthology
R. Gross, Jianbo Shi, J. Cohn (2001)
Quo vadis Face Recognition
Mark Granovetter (1973)
The Strength of Weak TiesAmerican Journal of Sociology, 78
(2005)
16 to 25? Pentagon has your number, and more. The New York Times
P. Samarati, L. Sweeney (1998)
Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression
J. Donath, D. Boyd (2004)
Public Displays of ConnectionBT Technology Journal, 22
Robert Gerstein (1978)
Intimacy and PrivacyEthics, 89
(2005)
editors
(2004)
The perils and promise of online schmoozing
Sharon Milgram (1967)
The Small World ProblemPsychology today, 2
(2005)
Re-identifying facial images. Technical report,
D. Watts (2003)
Six Degrees: The Science of a Connected Age
A. Acquisti (2004)
Privacy in electronic commerce and the economics of immediate gratification
Kevin Mitnick, W. Simon (2001)
The Art of Deception: Controlling the Human Element of Security
P. Phillips, P. Flynn, W. Scruggs, K. Bowyer, Jin Chang, Kevin Hoffman, Joe Marques, Jaesik Min, W. Worek (2005)
Conference on Computer Vision and Pattern Recognition 2005 . Overview of the Face Recognition Grand Challenge ∗
(2004)
You are who you know
(2003)
Defenses lacking at social network sites
(1998)
Six degrees to nowhere. Salon.com
L. Strahilevitz (2004)
A Social Networks Theory of PrivacyUniversity of Chicago Coase-Sandor Institute for Law & Economics Research Paper Series
(2005)
The Facebook. Privacy policy
D. Boyd (2003)
Reflections on Friendster, Trust and Intimacy
Information Revelation and Privacy in Online Social Networks Ralph Gross Data Privacy Laboratory School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 Alessandro Acquisti H. John Heinz III School of Public Policy and Management Carnegie Mellon University Pittsburgh, PA 15213 [email protected] ABSTRACT Participation in social networking sites has dramatically increased in recent years. Services such as Friendster, Tribe, or the Facebook allow millions of individuals to create online pro Âles and share personal information with vast networks of friends - and, often, unknown numbers of strangers. In this paper we study patterns of information revelation in online social networks and their privacy implications. We analyze the online behavior of more than 4,000 Carnegie Mellon University students who have joined a popular social networking site catered to colleges. We evaluate the amount of information they disclose and study their usage of the site Âs privacy settings. We highlight potential attacks on various aspects of their privacy, and we show that only a minimal percentage of users changes the highly permeable privacy preferences. [email protected] commercial interest only arose well after the advent of the Internet.1 The rapid increase in participation in very recent years has been accompanied by a
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.