An Investigation of Facebook Grouping Robin Brewer Yael Mayer Lorrie Cranor Patrick Kelley facebook Home Profile Account Search.

Slides:



Advertisements
Similar presentations
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Advertisements

 Met with my groups face to face, presented a topic and had open time for questions  ed the information once a week to Moms that attended the.
I. S. W. M.It Starts With Me Cyber Communication Awareness.
Facebook Presented by: Keystone Computer Concepts.
Students’ online profiles for employability and community Frances Chetwynd, Karen Kear, Helen Jefferis and John Woodthorpe The Open University.
Helpful Guide for Members IMFFA Social Community 1.
Teenagers and The Internet Ms Julie Clune Saint Ignatius’ College.
Digital Footprints Where have you been? Where are you going?
Usable Security (Part 1 – Oct. 30/07) Dr. Kirstie Hawkey Content primarily from Teaching Usable Privacy and Security: A guide for instructors (
+ Promoting Facebook & Measuring Success Robin Pratt.
Adjusting your Facebook Privacy Settings Privacy, please!
Outline of presentation Brief introduction of Facebook as a social networking tool Research questions Methods Findings and Results Some Experimentation.
COMP6703 : eScience Project III ArtServe on Rubens Emy Elyanee binti Mustapha Supervisor: Peter Stradzins Client: Professor Michael.
User studies. Why user studies? How do we know security and privacy solutions are really usable? Have to observe users! –you may be surprised by what.
HICSS Socialware - Cathy Dwyer1 Social networking site for the general public Cathy Dwyer Pace University
Evaluation of Project Engage - Staff Side Team RENEU - Anran Ye - Aalap Doshi - Gaurav Pimprikar - Yung-Ju Chang.
AUTHENTICATION TASK FORCE NEEDS ASSESSMENT PRESENTATION OF RESEARCH PRESENTED TO THE MASSACHUSETTS BOARD OF LIBRARY COMMISSIONERS (MBLC) SUBMITTED BY Anne.
Project Fragmentation The Project Fragmentation Problem in Personal Information Management Bergman, et al CHI 2006 proceedings.
Taking the Headache out of. Reach your sphere of influence on a daily basis – AT NO COST? Reconnect with friends and stay in touch with family – AT NO.
Online Social Networks and Security and Privacy Risks DCS860A-2008 Team 2 Andrew Boyd, Kaven Williams, and Sridevi Puramsetti.
You can customize your privacy settings. The privacy page gives you control over who can view your content. At most only your friends, their friends and.
 By: Mallory Mayert & Brooke Atkins.  Introduction Introduction  Why This Topic? Why This Topic?  Harmful Effects Harmful Effects  How to Choose.
Safety In CyberSpace. ‘Report Abuse’ in action Look for this link on websites Microsoft have made a real commitment Approx £30,000 per month revenue.
Teenangel Gabriella. AIM is an instant messaging system. You have to be thirteen years old to use AIM. Besides sending messages, AIM is also used to tell.
Why Use Social Media for Rotary? Peter Borner The Rotary Club of Towcester.
Teens, Online Stranger Contact and Cyberbullying What the research is telling us… Amanda Lenhart Internet Safety Task Force April 30, 2008 Washington,
What is social networking? 1.Social networking is the grouping of individuals into specific groups 2.networking is possible in person, for example in.
Social Media Safety Manchester Township Middle School Guidance Department
Parenting in the Internet Age Tips for Keeping Kids Safe and you Connected to your Teen.
Using Flickr as a inter-school arts network. 1. Create a Flickr account You can easily create a Flickr account using your Yahoo, Google or Facebook account.
The New SIMnet.org with Social Networking User Orientation Notes June 21,
Tippecanoe 4-H Computer Project Mikel BergerBret Madsen Ed Evans
Protecting Your Personal Information November 15, 2013.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
How to safely use Facebook. Ken Loveday. TIPS FOR PROTECTING PERSONAL INFORMATION FACEBOOK LOGIN  Required Info  Name   Password  Birthday.
Be More…Tech Savvy A Workshop for Elementary Students about Internet Safety.
Location is Irrelevant for Usability Studies Jakob Nielsen's Alertbox, April 30, 2007.
Face your Facebook Fears Take control of your profile privacy settings and use Facebook to communicate with students MOACAC Conference, 4/12/11 Presenters:
D IRECTIONS FOR R AISING P RIVACY A WARENESS IN SNS P LATFORMS Konstantina Vemou, Maria Karyda, Spyros Kokolakis 18th Panhellenic Conference on Informatics.
Social Media 101 An Overview of Social Media Basics.
1. Go to 2. Complete the requested information.
Online Safety and You!. Introduction The good and the bad about the internet Protecting your Personal Information –Password protection Safety.
How to Use Facebook This guide will help you navigate around the social networking site, Facebook.
User Management. Basics SDMS shall maintain a database of all users. SDMS shall maintain a database of all users. SDMS shall not limit the number of registered.
Profile Dr Alice Good (MSc, BSC, PGCE, FHEA) Senior Lecturer Human Computer Interaction (SoC) Research Interests Supporting mental health and wellbeing.
Employing Wikis for online collaboration in the e-learning environment: Case study 1 Raitman, R., Augar, N. & Zhou, W. (2005). Employing Wikis for online.
Online Safety Parent Workshop Windsor Community Primary School December 10 th 2015.
How To Look Like An All-Star on LinkedIn Presented By: Cody Pierson.
Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean, Responsible Conduct of Research Weill Medical College of Cornell.
Facebook for Beginners One Session Class. What will you learn today? What can you do on Facebook? Creating a profile Privacy Connecting with friends Sending.
Assessment of Google Flights Lanny Chung Junior at Bentley University.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
E-safety Helping your children stay safe on-line A presentation for Parents.
DIGITAL CITIZENSHIP TRAINING BEING A SAFE AND SUCCESSFUL USER OF ICT.
Dissertation Research: Managing Visual Privacy in Web Browsers Dr. Kirstie Hawkey Dalhousie University.
Tech Tuesday: Facebook 101 People’s Resource Center January 26, 2016.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
E-Safety Parent Talk Helping to keep your children safe online.
PROFESSIONALISM AND SOCIAL MEDIA Created by: Bedig Galladian.
Your Online Profile Presenting the best of YOU!. Social Networking, Are you online? Many students today have profiles on social networks such as Facebook.
Get Secure! Facebook Privacy Tutorial Becky Benishek | November 2013.
AN INTRODUCTION TO FACEBOOK. Learning Objectives A brief introduction to the social networking site Facebook. Instructions to create an account. How to.
Career Services: Introduction to Internships & Resources
Creating your online identity
Social Media Security: Understanding how to keep yourself safe.
Sharing on the Internet
Job Search: Networking
LinkedIn Basics Monica Dombrowski Technology Education Manager
How to Select and Use Privacy Settings
Welcome to FaceBook 101 Presented by Nicholas Clayton,
Presentation transcript:

An Investigation of Facebook Grouping Robin Brewer Yael Mayer Lorrie Cranor Patrick Kelley facebook Home Profile Account Search

facebook Home Profile Account Search Outline o Introduction o Related Work o Methodology o Observations o Future Steps

introductionrelated workmethodologyobservationsfuture steps Facebook’s privacy settings have changed over the years. Each time making more information public by default.

introductionrelated workmethodologyobservationsfuture steps Facebook’s privacy settings have changed over the years. Each time making more information public by default.

introductionrelated workmethodologyobservationsfuture steps Facebook’s privacy settings have changed over the years. Each time making more information public by default.

introductionrelated workmethodologyobservationsfuture steps Facebook’s privacy settings have changed over the years. Each time making more information public by default.

Changing the settings requires navigation through many levels of Facebook pages April 2010 The New York Times introductionrelated workmethodologyobservationsfuture steps

June 2010 Robin Brewer introductionrelated workmethodologyobservationsfuture steps

o The difference? Less privacy controls o Still confusing o The “Friends Only” option may not be enough o Our solution? Make it easier for people to edit their privacy settings… introductionrelated workmethodologyobservationsfuture steps

o The difference? Less privacy controls o Still confusing o The “Friends Only” option may not be enough. o Our solution? Make it easier for people to edit their privacy settings… by making it easier for people to make groups introductionrelated workmethodologyobservationsfuture steps

Goals o Gather information about people’s thought process when grouping Facebook friends o Create interface for Facebook friend lists o Make it easier for people to control their privacy settings on Facebook introductionrelated workmethodologyobservationsfuture steps

Goals o Gather information about people’s thought process when grouping Facebook friends o Create interface for Facebook friend lists o Make it easier for people to control their privacy settings on Facebook introductionrelated workmethodologyobservationsfuture steps

Why Group-Based Privacy? o “The diversity of a network predicts online tension as a consequence of visible communication across social spheres” [Binder, Howes, Sutcliffe 2009] o People manage group co-presence by “using suitable channels of communication”, “self-censorship”, “trust” and “being responsible” [Lampinen, Tamminen, Oulasvira 2009] o In a small (10 participant) thesis study, nobody used friend lists to prevent online tension [Smart 2009]

Automated Approach to Grouping Friends o Work on developing an algorithm to group friends [Jones 2010] o 15 participants to sorted their friends on xSort, card-sorting software o The groups participants made were used as a base truth to compare with the algorithmic groups o Algorithmic grouping is at best about 70% accurate compared to participants’ groups introduction related work methodologyobservationsfuture steps

Limitations o Focus on algorithm, not groups o Largest Network examined: 312 Friends o xSort does not allow placing people in multiple groups o Do the groups participants make actually correspond to their sharing preferences? introduction related work methodologyobservationsfuture steps

Making Groups o We examined 4 different methods for people to group their friends in individual interviews: Card Sorting Grid Tagging Facebook Friend Lists Interface File Hierarchy o We do not want to prime subjects to group their friends in a certain manner

Card Sort introductionrelated work methodology observationsfuture steps

Grid Tagging introductionrelated work methodology observationsfuture steps

Facebook Friend Lists Interface introductionrelated work methodology observationsfuture steps

File Hierarchy introductionrelated work methodology observationsfuture steps

Free-form Individual Interviews o Participants categorized their friends into different groups o Participants were asked a series of privacy-related questions: o “Can you show us with who you would share your____ ?” Contact info Last vacation album Location o “Can you show us which of your friends you talk to the most on Facebook?” o “Can you show us who would you invite to a party at your home?” introductionrelated work methodology observationsfuture steps

Demographics No. of participants: 26 Infographic from Mashable:

introductionrelated work methodology observationsfuture steps General ways to group friends Method One: Group by Group o Make a group o Put all friends in that group o Create next group Participant browses friends more than once Method Two: Friend by Friend o Look at a friend o Place friend in a group o Look at next friend Participant browses friends only once

introductionrelated work methodology observationsfuture steps Grouping mechanism by sorting method Group by group Friend by friend

introductionrelated work methodology observationsfuture steps

Average of 7 groups

introductionrelated work methodology observationsfuture steps

o 30% of participants had Friend Lists in their accounts Current Usage of Friend Lists

introductionrelated work methodology observationsfuture steps “Can I do this?” May not be apparent that they can place people into multiple groups Pictures Please? Card sorting – couldn’t recognize people with just a picture Name and picture may not be enough, links needed Mac vs. PC File hierarchy problems because it’s a mac or it’s a computer? Method-Specific Observations

introductionrelated work methodology observationsfuture steps Common Tags : school/college, city, company/occupation, native country, where user met them Common Group Names: college, high school, family, close friends, others, people I don’t know Dynamic vs. Static Groups Groups change based on different scenarios More Friends – Good or Bad? “I could have been more accurate with less friends” Less friends = more likely to look through all friends when re- grouping Observations About the Groups

introductionrelated work methodology observationsfuture steps The Public Assumption “I assume everything is public once I put it on Facebook” Profile Privacy Concerns Parents, future employers Farmville Addicts Blocking applications vs. blocking people Untag Me! Unflattering or inappropriate “This is not about privacy. They are just pictures. I don’t think pictures are private” Observations About Facebook and Privacy

introductionrelated work methodology observations future steps o Observe more studies and see which method(s) are clearly better o overlap good or bad? o Design and test an interface based on the best method(s) o Perhaps use as a secondary method to Simon Jones’ automated algorithm approach Future Steps

Questions? facebook Home Profile Account Search

References o Binder, J., Howes, A., and Sutcliffe, A. (2009). Conflicting Social Spheres And Experienced Tension In Social Networking Sites. In CHI 2009 (Boston, MA, USA, April 4–9, 2009). ACM /09/04. o Jones, S., and O’Neil, E. (2010). Feasibility of Structural Network Clustering for Group-Based Privacy Control in Social Networks. In Symposium on Usable Privacy and Security (SOUPS) July , Redmond, WA, USA. o Lampinen, A., Tamminen, S., and Oulasvirta, A. (2009). All My People Right Here, Right Now: Management of Group co-Presence on a Social Networking Site. In Proceedings of the ACM 2009 international Conference on Supporting Group Work (Sanibel Island, Florida, USA, May 10-13, 2009). GROUP ‘09. ACM, New York, NY, o Smart, D. (2009). How do people limit their behaviour in response to their perception of potential social tension? A study of Facebook. Manchester Business School Bsc. Interactive Systems Design. facebook Home Profile Account Search