Privacy Risks in Social Network Sites

Prioritization and Framework

David Riphagen

Social Network Sites?

1.Personal profile 2.Friends list 3.Ability to view other profiles 4.Membership rules

Severe Privacy Threats for Users of Social Network Sites

Prioritize Threats

Deconstruct Threats

by 1. Activities that cause damage

2. Reasons why activities are damaging

Threat?

Collection

Processing
Disseminatio n

Threat

Information Collection

“Joe”

Source: Riphagen, D., 2008. The Online Panopticon. Privacy Risks for Users of Social Network Sites. Identification and prioritizations of privacy rirks for users of Social Network Sites and cosniderations for policy makers to minimize these risks. , 149. Available at: www.davidriphagen.nl/Riphagen_2008_PrivacyRisksForUsersofSocialNetworkSites.pdf.

Threat

Collection

Processing

“Joe”

Threat

Information Processing

Δ

Processing

Joe changed his relationshi status from ‘in a relation’ to ‘invisible’

Threat

Collection

Processing

“Joe” Dissemination

Threat

Information Dissemination

“If you use a service from a partner, the privacy statement of that partner applies. Check their privacy statement when visiting their website.”
Source: Hyves Prvacy Policy. Available at: http://www.hyves.nl/privacy/

Threat

Information Dissemination

Source: API Methods Hyves API. Available at: http://trac.hyves-api.nl/wiki/APIMethods

Incident?

Survey
Threat

• American privacy and Internet
experts

Incident

• Identify privacy incidents • How much damage incurred? • How many users affected?

Damage?

Collection

Processing
Disseminatio n

Threat

How is this Damaging? 1. Information-based harm 1. Informational

Incident

inequality 1. Informational
Damage

injustice 1. Restriction of moral autonom / Inability to create moral

Recovery?

Threat

Incident

Damage

Recovery

Severe Privacy Threats for Users of Social Network Sites

Prioritize Threats

Deconstruct Threats

by 1. Activities that cause damage

2. Reasons why activities are damaging

Privacy Risks in Social Network Sites
Questions?

Back-up

Research Activities

1
Literatu re Review

2
Desk Researc h

3
Faceboo k Case Study

4
Expert Survey

Threat

Collection

“Joe”

Privacy threats in Social Network Collection Sites
Processing should be conceptualized as

unwanted access to Disseminatio Identity-Relevant Information
n

The main incident that puts the privacy of users of SNS at risk is: Collection
Processing The collection of information

from secondary sources, Disseminatio Which is used by the
n

Sign up to vote on this title
UsefulNot useful