TY - JOUR
T1 - Identifying hidden social circles for advanced privacy configuration
AU - Squicciarini, Anna
AU - Karumanchi, Sushama
AU - Lin, Dan
AU - Desisto, Nicole
N1 - Funding Information:
Portion of the work from Squicciarini and Karumanchi was supported by the National Science Foundation under grant NSF CT-0831247 and a Google Research Award . The work of DeSisto was supported in part by the Distributed Research Experiences for Undergraduates (DREU) program, a joint project of the CRA Committee on the Status of Women in Computing Research (CRA-W) and the Coalition to Diversify Computing (CDC), which is funded in part by the NSF program (NSF CNS-0540631).
PY - 2014/3
Y1 - 2014/3
N2 - With the dramatic increase of users on social network websites, the needs to assist users to manage their large number of contacts as well as providing privacy protection become more and more evident. Unfortunately, limited tools are available to address such needs and reduce users' workload on managing their social relationships. To tackle this issue, we propose an approach to facilitate online social network users to group their contacts into social circles with common interests. Further, we leverage the social group practice to automate the privacy setting process for users who add new contacts or upload new data items. We evaluate our approach using real-world data collected through a user study. The study also includes an analysis of the properties that are most critical for privacy related decisions.
AB - With the dramatic increase of users on social network websites, the needs to assist users to manage their large number of contacts as well as providing privacy protection become more and more evident. Unfortunately, limited tools are available to address such needs and reduce users' workload on managing their social relationships. To tackle this issue, we propose an approach to facilitate online social network users to group their contacts into social circles with common interests. Further, we leverage the social group practice to automate the privacy setting process for users who add new contacts or upload new data items. We evaluate our approach using real-world data collected through a user study. The study also includes an analysis of the properties that are most critical for privacy related decisions.
UR - http://www.scopus.com/inward/record.url?scp=84894252450&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84894252450&partnerID=8YFLogxK
U2 - 10.1016/j.cose.2013.07.007
DO - 10.1016/j.cose.2013.07.007
M3 - Article
AN - SCOPUS:84894252450
SN - 0167-4048
VL - 41
SP - 40
EP - 51
JO - Computers and Security
JF - Computers and Security
ER -