C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Search Engines and Social Networks October.

Slides:



Advertisements
Similar presentations
Shared Space Admin Demo March Admin demo introduces - Adding users Moderating users Moderating resources Adding communities and sub groups.
Advertisements

Social Media Presented by: Keystone Computer Concepts.
Privacy: Facebook, Twitter
Jeanette Hsu, Ph.D. VAPTC Meeting August 22, 2011.
Trust, Security and Privacy in Learning Networks Daniel Olmedilla L3S Research Center / Hannover University Learning Networks in Practice 10 th May, 2007.
Learning to Hide in the Digital Age Can you completely remove your online identity?
Main Page Top Menu Main Menu Top Menu About us General Information about SiML.
C MU U sable P rivacy and S ecurity Laboratory Anti-Phishing Phil The Design and Evaluation of a Game That Teaches People Not to.
INFORMATION REVELATION AND PRIVACY IN ONLINE SOCIAL NETWORKS (THE FACEBOOK CASE) Rachid Hamcha IMM.
Social Media Networking Sites Charlotte Jenkins Designing the Social Web
Social Networks: Facebook “Facebook Grows Up” by Steven Levy “Information Revelation and Privacy in Online Social Networks (The Facebook Case)” by Ralph.
Privacy in Social Networks CSCE 201. Reading Dwyer, Hiltz, Passerini, Trust and privacy concern within social networking sites: A comparison of Facebook.
Cross-linking Folksonomies Harith Alani. Multiple SNS Accounts del.icio.us.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Chapter 8 Facebook: Building a Business from the Social Graph Laila Esmail BUS 550- Spring 2011 May 17, 2011.
Chapter 12: Web Usage Mining - An introduction
GenSpace: Exploring Social Networking Metaphors for Knowledge Sharing and Scientific Collaborative Work Chris Murphy, Swapneel Sheth, Gail Kaiser, Lauren.
Privacy Online TC 310 June 17, Weekly Review Questions Courts v. FCC in mergers Jurisdiction of FCC in mergers Why FCC can block, even with DoJ.
C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Identity October 9, 2008.
Using LibGuides as a Web 2.0 Content Management System & Collaboration Tool for Engineering Librarians Richard Bernier – ASEE Annual Conference & Exposition.
C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Data Privacy October 30, 2008.
C MU U sable P rivacy and S ecurity Laboratory Philosophical definitions of privacy Lorrie Faith Cranor October 19, 2007.
1 Networks and Internet Objectives Understand basic concepts in Networking Network Types Understand basic concepts in Internet Internet Services Become.
Privacy: Challenges and Opportunities Tadayoshi Kohno Department of Computer Science and Engineering University of Washington.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Search Engines.
C MU U sable P rivacy and S ecurity Laboratory Making privacy visible Lorrie Faith Cranor October 19, 2007.
Facebook and Privacy: A Survey Facebook is a part of college life Information revelation is rampant Information revelation is dangerous Students are not.
Social Networking Sites  By:  Frank Wu  Lu Xie  Yuri Chung  Paige Borah.
Facebook is a global social networking website. Users can add friends and send them messages, and update their personal profiles to notify friends about.
Kim Carter What is a social network? a website where one connects with those sharing personal or professional interests, place of origin, education at.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Self-Service A Guide to Student Account Access Through the Central Piedmont Community College Website Start.
Interspire Website Publisher (Formerly Interspire ArticleLive)
Use The Web Your Way With You have a large audience… We've created a very innovative way for you create a completely self-funding program at absolutely.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
BargainOwl.net Your online portal to local food and drink specials!
CAREERS SITE LOG-IN INSTRUCTIONS SEPTEMBER CAREER SITE LOG-IN INSTRUCTIONS As of September 8, 2015, Vectrus has moved to a new Applicant Tracking.
Nilsa Polanco CMP 230 LA01 Meta Search Engine Presentation.
Social Media Strategy Heathlewett Public Library Lewis Sievers.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
Tippecanoe 4-H Computer Project Mikel BergerBret Madsen Ed Evans
Social Networking As A Teaching Tool Pre-Ah Hill And Carla Williams.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Pressed For Success Merrimack College October 19, 2009.
Intro To The Internet A Guide to Getting Started.
How did the creator of Facebook (Mark Zuckerberg) manage to make it into such a big success in such a short time? Constantina Constantinou Constantina.
Internet Vocabulary Quiz Period 2 Megan Fruehauf, Carissa Ladwig, & Cody Thompson.
Steve Allen Marc Greco Michael Dennis. 
Chapter 12: Web Usage Mining - An introduction Chapter written by Bamshad Mobasher Many slides are from a tutorial given by B. Berendt, B. Mobasher, M.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
Will Social Features Make Sexy Again? By: Kevin Delaney and Vauhini Vara Presented By: Nathan Miller, Amy Murray, Megan Monaco, Michelle Nicol.
FaceBook…. Really?? FaceBook…. Really?? Social networking & Facebook Pam Krambeck, ESU#3
Enhancing catalogues with user input Michele Huston Director Web Publishing National Library of Australia.
Privacy Issues on The Internet. Login if you want everyone to see your private life * * * * *
 Computer News/Tip  Facebook  Your Computer Problems  Next meeting January 11th  New & website 
C MU U sable P rivacy and S ecurity Laboratory Protecting People from Phishing: The Design and Evaluation of an Embedded Training.
LIBRARIES MEET THE GRID: Librarians in Cyberspace Virginia Allen Beth Avery.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Search Engine using Web Mining COMS E Web Enhanced Information Mgmt Prof. Gail Kaiser Presented By: Rupal Shah (UNI: rrs2146)
Social Networking By: Ning Year 10 HC. Different types of networks  There’s so many ways people can be connected together. In person, s and social.
FriendFinder Location-aware social networking on mobile phones.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Using the Personal Image Photo Library
Michael Spiegel, Esq Timothy Shimeall, Ph.D.
Introducing Knowledge for Care Scotland
The Knowledge Center.
Search Engine comparison
iCIMS 17.2 Release: Highlights
iCIMS 16.3 Release: Highlights
Presentation transcript:

C MU U sable P rivacy and S ecurity Laboratory 1 Privacy Policy, Law and Technology Search Engines and Social Networks October 21, 2008

Online Social Networks

C MU U sable P rivacy and S ecurity Laboratory 3 graph from compete.com

C MU U sable P rivacy and S ecurity Laboratory 4 MySpace  Profiles available to the public –No login required to view information  Used for “Social Browsing” –Finding new friends

C MU U sable P rivacy and S ecurity Laboratory 5 Privacy Settings

C MU U sable P rivacy and S ecurity Laboratory 6 Facebook  Perceived as a “closed community” or “for college students only” –Login required to access profiles  User for “Social Searching” –Finding existing friends, or people met in person

C MU U sable P rivacy and S ecurity Laboratory 7 Privacy Scandals  Facebook Mini-Feed/Feed Uproar –Introduced in Fall 2006 –Aggregates all “Friend” profile updates –Aggregates all actions taken on Facebook –Generated Uproar and User Backlash  User base opened to everyone –Added geographical networks –No longer limits to.edu addresses

C MU U sable P rivacy and S ecurity Laboratory 8 Pimp My Privacy  New Privacy Features introduced –Enhanced Settings –Specific Mini-Feed information can be removed –Access control granularity increased to the Network Level –Limited Profile introduced

C MU U sable P rivacy and S ecurity Laboratory 9

C MU U sable P rivacy and S ecurity Laboratory 10

C MU U sable P rivacy and S ecurity Laboratory 11

C MU U sable P rivacy and S ecurity Laboratory 12

C MU U sable P rivacy and S ecurity Laboratory 13 Privacy In Facebook  People are more privacy-protective than default setting

C MU U sable P rivacy and S ecurity Laboratory 15 Search engines  Search engine query logs can be very revealing  Provide insights into what people are doing, interested in, thinking about  Can be connected to form longitudinal profile  Difficult to anonymize completely  2006 AOL search log release – – –DEMO

16 Why share query logs? Academia has difficulty contributing to web search Untold insights into human behavior exist within logs Source: Andrew Tomkins

17 Why not share query logs? Source: Andrew Tomkins

18 “Person” attack versus “Trace” attack Trace attack: given a trace, identify the person Person attack: the dual Adversaries in person attack: –“Neighborly” knowledge –Query knowledge –Browser compromise Source: Andrew Tomkins

19 Person attack (750K users) Source: Andrew Tomkins

C MU U sable P rivacy and S ecurity Laboratory 20 Discussion  What are the privacy risks associated with social networks and search engines?  What are the web sites doing to mitigate these risks?  Is it enough?  Is opting in to having your data collected and/or shared sufficient?