Download presentation
Presentation is loading. Please wait.
1
C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ 1 Privacy Policy, Law and Technology Search Engines and Social Networks October 21, 2008
2
Online Social Networks http://services.alphaworks.ibm.com/manyeyes/view/S0yoPHsOtha6O6-7UKyQH2-
3
C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ 3 graph from compete.com
4
C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ 4 MySpace Profiles available to the public –No login required to view information Used for “Social Browsing” –Finding new friends
5
C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ 5 Privacy Settings
6
C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ 6 Facebook Perceived as a “closed community” or “for college students only” –Login required to access profiles User for “Social Searching” –Finding existing friends, or people met in person
7
C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ 7 Privacy Scandals Facebook Mini-Feed/Feed Uproar –Introduced in Fall 2006 –Aggregates all “Friend” profile updates –Aggregates all actions taken on Facebook –Generated Uproar and User Backlash User base opened to everyone –Added geographical networks –No longer limits to.edu email addresses
8
C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ 8 Pimp My Privacy New Privacy Features introduced –Enhanced Settings –Specific Mini-Feed information can be removed –Access control granularity increased to the Network Level –Limited Profile introduced
9
C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ 9
10
C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ 10
11
C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ 11
12
C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ 12
13
C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ 13 Privacy In Facebook People are more privacy-protective than default setting
15
C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ 15 Search engines Search engine query logs can be very revealing Provide insights into what people are doing, interested in, thinking about Can be connected to form longitudinal profile Difficult to anonymize completely 2006 AOL search log release –http://aolstalker.comhttp://aolstalker.com –http://aolpycho.comhttp://aolpycho.com –DEMO
16
16 Why share query logs? Academia has difficulty contributing to web search Untold insights into human behavior exist within logs Source: Andrew Tomkins
17
17 Why not share query logs? Source: Andrew Tomkins
18
18 “Person” attack versus “Trace” attack Trace attack: given a trace, identify the person Person attack: the dual Adversaries in person attack: –“Neighborly” knowledge –Query knowledge –Browser compromise Source: Andrew Tomkins
19
19 Person attack (750K users) Source: Andrew Tomkins
20
C MU U sable P rivacy and S ecurity Laboratory http://cups.cs.cmu.edu/ 20 Discussion What are the privacy risks associated with social networks and search engines? What are the web sites doing to mitigate these risks? Is it enough? Is opting in to having your data collected and/or shared sufficient?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.