Abstract
With the growing popularity of social network sites (SNS), organizations have started to leverage them for encouraging both personal and professional data sharing. However, inherent privacy problems in social networks have become a concern for organizations deploying them. So companies have started investing in systems for evaluating employees’ behaviors on SNSs. In evaluating employees’ behaviors on SNSs, this study aims at developing a mechanism for learning users’ behaviors on SNS and predicting their control of privacy on SNS. Privacy prediction is based on the revelation of actual privacy characteristics of users through the analysis of their SNS usage patterns. Using the Design Science research methodology, this study presents the design and instantiation of a prediction model that is trained using survey data and SNS data of graduate students from a prominent Northeastern University in the United States, which is used to generate class labels associated with their privacy control. The prediction model provides a data analytics component for reliable predictions of users’ privacy control using Machine Learning algorithm SVM and a randomized ensemble of decision trees. The results suggest that the prediction model represents a reliable method for predicting privacy control based on user actions on SNS.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Abeel, T., Helleputte, T., Van de Peer, Y., Dupont, P., Saeys, Y.: Robust biomarker identification for cancer diagnosis with ensemble feature selection methods. Bioinformatics 26(3), 392–398 (2009)
Acquisti, A., Grossklags, J.: Privacy attitudes and privacy behavior. In: Camp, L.J., Lewis, S. (eds.) Economics of Information Security. ADIS, vol. 12, pp. 165–178. Springer, Boston (2004). https://doi.org/10.1007/1-4020-8090-5_13
Altman, I.: The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding, No. 156 A4 (1975)
An, S., Liu, W., Venkatesh, S.: Fast cross-validation algorithms for least squares support vector machine and kernel ridge regression. Pattern Recognit. 40, 2154–2162 (2007)
Arlot, S., Celisse, A.: A survey of cross-validation procedures for model selection. Stat. Surv. 4, 40–79 (2010)
Auria, L., Moro, R.A.: Support vector machines (SVM) as a technique for solvency analysis. DIW Discussion Papers, No. 811 (2008)
Basnet, R.: Automated Quality Assessment of Printed Objects Using Subjective and Objective Methods Based on Imaging and Machine Learning Techniques. Rochester Institute of Technology, Rochester (2017)
Bradley, A.P.: The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern Recognit. 30(7), 1145–1159 (1997)
Brandimarte, L., Acquisti, A., Loewenstein, G.: Misplaced confidences privacy and the control paradox. Soc. Psychol. Pers. Sci. 4(3), 340–347 (2013)
Burges, C.J.: A tutorial on support vector machines for pattern recognition. Data Min. Knowl. Discov. 2(2), 121–167 (1998)
Chong, A.Y.L.: Predicting m-commerce adoption determinants: a neural network approach. Expert Syst. Appl. 40(2), 523–530 (2013)
Compano, R., Lusoli, W.: The policy maker’s anguish: regulating personal data behavior between paradoxes and dilemmas. In: Moore, T., Pym, D. (eds.) Economics of Information Security and Privacy, pp. 169–185. Springer, Boston (2010). https://doi.org/10.1007/978-1-4419-6967-5_9
Culnan, M.J.: How did they get my name?: An exploratory investigation of consumer attitudes toward secondary information use. MIS Q. 17, 341–363 (1993)
DiMicco, J.M., Geyer, W., Millen, D.R., Dugan, C., Brownholtz, B.: People sensemaking and relationship building on an enterprise social network site. In: 42nd Hawaii International Conference on System Sciences, pp. 1–10. IEEE (2009)
Dinev, T., Hart, P.: Internet privacy concerns and their antecedents-measurement validity and a regression model. Behav. Inf. Technol. 23(6), 413–422 (2004)
Dong, C., Jin, H., Knijnenburg, B.P.: Predicting privacy behavior on online social networks. In: Ninth International AAAI Conference on Web and Social Media (2015)
Geurts, P., Ernst, D., Wehenkel, L.: Extremely randomized trees. Mach. Learn. 63(1), 3–42 (2006)
Geyer, W., Dugan, C., DiMicco, J., Millen, D.R., Brownholtz, B., Muller, M.: Use and reuse of shared lists as a social content type. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1545–1554 (2008)
Gregor, S., Hevner, A.R.: Positioning and presenting design science research for maximum impact. MIS Q. 37(2), 337–355 (2013)
Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 71–80. ACM (2005)
Hastie, T., Rosset, S., Tibshirani, R., Zhu, J.: The entire regularization path for the support vector machine. J. Mach. Learn. Res. 5, 1391–1415 (2004)
Heumann, B.W.: An object-based classification of mangroves using a hybrid decision tree—Support vector machine approach. Remote Sens. 3(11), 2440–2460 (2011)
Hevner, A., March, S.T., Park, J., Ram, S.: Design science in information systems research. MIS Q. 28(1), 75–105 (2004)
Hoadley, C.M., Xu, H., Lee, J.J., Rosson, M.B.: Privacy as information access and illusory control: the case of the Facebook News Feed privacy outcry. Electron. Commer. Res. Appl. 9(1), 50–60 (2010)
Joachims, T.: Text categorization with support vector machines: learning with many relevant features. In: Nédellec, C., Rouveirol, C. (eds.) ECML 1998. LNCS, vol. 1398, pp. 137–142. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0026683
Johnson, C.A.: Privacy as personal control. Man-Environ. Interact.: Eval. Appl.: Part 2, 83–100 (1974)
Kairam, S., Brzozowski, M., Huffaker, D., Chi, E.: Talking in circles: selective sharing in Google+. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1065–1074. ACM (2012)
Kisekka, V., Bagchi-Sen, S., Rao, H.R.: Extent of private information disclosure on online social networks: an exploration of Facebook mobile phone users. Comput. Hum. Behav. 29(6), 2722–2729 (2013)
Koch, M., Schwabe, G., Briggs, R.O.: CSCW and social computing. Bus. Inf. Syst. Eng. 57(3), 149–153 (2015)
Kohavi, R.: A study of cross-validation and bootstrap for accuracy estimation and model selection. In: IJCAI, vol. 14, no. 2, pp. 1137–1145 (1995)
Kostakos, V., Venkatanathan, J., Reynolds, B., Sadeh, N., Toch, E., Shaikh, S.A., Jones, S.: Who’s your best friend?: Targeted privacy attacks in location-sharing social networks. In: Proceedings of the 13th International Conference on Ubiquitous Computing, pp. 177–186. ACM (2011)
Laufer, R.S., Wolfe, M.: Privacy as a concept and a social issue: a multidimensional developmental theory. J. Soc. Issues 33(3), 22–42 (1977)
Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inf. Syst. Res. 15(4), 336–355 (2004)
Margulis, S.T.: Conceptions of privacy: current status and next steps. J. Soc. Issues 33(3), 5–21 (1977)
Margulis, S.T.: On the status and contribution of Westin’s and Altman’s theories of privacy. J. Soc. Issues 59(2), 411–429 (2003a)
Margulis, S.T.: Privacy as a social issue and behavioral concept. J. Soc. Issues 59(2), 243–261 (2003b)
McLaren, T.S., Head, M.M., Yuan, Y., Chan, Y.E.: A multilevel model for measuring fit between a firm’s competitive strategies and information systems capabilities. MIS Q. 35(4), 909–929 (2011)
Mingers, J.: An empirical comparison of selection measures for decision-tree induction. Mach. Learn. 3(4), 319–342 (1989)
Mohammadi, P., Ebrahimi-Moghadam, A., Shirani, S.: Subjective and objective quality assessment of image: a survey, pp. 1–50. arXiv Preprint https://arxiv.org/abs/1406.7799 (2014)
Morris, C.W., Autret, A., Boddy, L.: Support vector machines for identifying organisms—A comparison with strongly partitioned radial basis function networks. Ecol. Model. 146(1), 57–67 (2001)
Mountrakis, G., Im, J., Ogole, C.: Support vector machines in remote sensing: a review. ISPRS J. Photogramm. Remote Sens. 66(3), 247–259 (2011)
Mullen, C., Hamilton, N.F.: Adolescents’ response to parental Facebook friend requests: the comparative influence of privacy management, parent-child relational quality, attitude and peer influence. Comput. Hum. Behav. 60, 165–172 (2016)
Nachev, A., Stoyanov, B.: Product quality analysis using support vector machines. Inf. Models Anal. 1, 179–192 (2012)
Pal, M., Foody, G.M.: Evaluation of SVM, RVM and SMLR for accurate image classification with limited ground data. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 5, 1344–1355 (2012)
Peffers, K., Tuunanen, T., Rothenberger, M.A., Chatterjee, S.: A design science research methodology for information systems research. J. Manag. Inf. Syst. 24(3), 45–77 (2007)
Petronio, S.S.: Boundaries of Privacy: Dialectics of Disclosure. State University of New York Press, Albany (2002). xix, p. 268
Powers, D.M.W.: Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation. J. Mach. Learn. Technol. 2(1), 37–63 (2011)
Puniskis, D., Laurutis, R., Dirmeikis, R.: An artificial neural nets for spam e-mail recognition. Electron. Electr. Eng. (2006). ISSN 1392-1215
Schwegmann, B., Matzner, M., Janiesch, C.: A method and tool for predictive event-driven process analytics. In: Wirtschaftsinformatik, p. 46 (2013)
Sheehan, K.B., Hoy, M.G.: Dimensions of privacy concern among online consumers. J. Public Policy Mark. 19(1), 62–73 (2000)
Shmueli, G., Koppius, O.: Predictive analytics in information systems research. MIS Q. 35(3), 553–572 (2010)
Skeels, M.M., Grudin, J.: When social networks cross boundaries. In: Proceedings of the ACM 2009 International Conference on Supporting Group Work, GROUP 2009. ACM, New York (2009)
Smith, H.J., Milberg, S.J., Burke, S.J.: Information privacy: measuring individuals’ concerns about organizational practices. MIS Q. 20(2), 167–196 (1996)
Staddon, J., Huffaker, D., Brown, L., Sedley, A.: Are privacy concerns a turn-off?: Engagement and privacy in social networks. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, Washington, DC (2012)
Stehman, S.V.: Selecting and interpreting measures of thematic classification accuracy. Remote Sens. Environ. 62(1), 77–89 (1997)
Tan, W.K., Nguyen, T.T.D., Tha, K.K.O., Yu, X.: Designing groupware that fosters social capital creation: can Facebook support global virtual team?. In: AMCIS 2009 Proceedings, p. 525 (2009)
Tuv, E., Borisov, A., Runger, G., Torkkola, K.: Feature selection with ensembles, artificial variables, and redundancy elimination. J. Mach. Learn. Res. 10, 1341–1366 (2009)
Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P.G., Cranor, L.F.: I regretted the minute I pressed share: a qualitative study of regrets on Facebook. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, p. 10. ACM, July 2011
Wehner, B., Ritter, C., Leist, S.: Enterprise social networks: a literature review and research agenda. Comput. Netw. 114, 125–142 (2017)
Wellman, B., Wortley, S.: Different strokes from different folks: community ties and social support. Am. J. Sociol. 96(3), 558–588 (1990)
Westin, A.F.: Privacy and Freedom. Atheneum, New York (1967)
Westin, A.F.: Social and political dimensions of privacy. J. Soc. Issues 59(2), 431–453 (2003)
Wu, X., Kumar, V., Quinlan, J.R., Ghosh, J., Yang, Q., Motoda, H., McLachlan, G.J., Ng, A., Liu, B., Yu, P.S., Zhou, Z.-H., Steinbach, M., Hand, D.J., Steinberg, D.: Top 10 algorithms in data mining. Knowl. Inf. Syst. 14(1), 1–37 (2008)
Xu, H.: The effects of self-construal and perceived control on privacy concerns. In: ICIS 2007 Proceedings, p. 125 (2007)
Xu, H., Dinev, T., Smith, J., Hart, P.: Information privacy concerns: linking individual perceptions with institutional privacy assurances. J. Assoc. Inf. Syst. 12(12), 798 (2011)
Acknowledgements
This research has been funded in part by NSF under grants 1651475, 0916612 and 1227353. Usual disclaimer applies. The authors would also like to thank the reviewers whose comments have greatly improved the paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Valecha, R., Chakraborty, R., Rao, H.R., Upadhyaya, S. (2018). A Prediction Model of Privacy Control for Online Social Networking Users. In: Chatterjee, S., Dutta, K., Sundarraj, R. (eds) Designing for a Digital and Globalized World. DESRIST 2018. Lecture Notes in Computer Science(), vol 10844. Springer, Cham. https://doi.org/10.1007/978-3-319-91800-6_20
Download citation
DOI: https://doi.org/10.1007/978-3-319-91800-6_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-91799-3
Online ISBN: 978-3-319-91800-6
eBook Packages: Computer ScienceComputer Science (R0)