Skip to main content

A Prediction Model of Privacy Control for Online Social Networking Users

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10844))

Abstract

With the growing popularity of social network sites (SNS), organizations have started to leverage them for encouraging both personal and professional data sharing. However, inherent privacy problems in social networks have become a concern for organizations deploying them. So companies have started investing in systems for evaluating employees’ behaviors on SNSs. In evaluating employees’ behaviors on SNSs, this study aims at developing a mechanism for learning users’ behaviors on SNS and predicting their control of privacy on SNS. Privacy prediction is based on the revelation of actual privacy characteristics of users through the analysis of their SNS usage patterns. Using the Design Science research methodology, this study presents the design and instantiation of a prediction model that is trained using survey data and SNS data of graduate students from a prominent Northeastern University in the United States, which is used to generate class labels associated with their privacy control. The prediction model provides a data analytics component for reliable predictions of users’ privacy control using Machine Learning algorithm SVM and a randomized ensemble of decision trees. The results suggest that the prediction model represents a reliable method for predicting privacy control based on user actions on SNS.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    https://clutch.co/agencies/social-media-marketing/resources/social-media-survey-2017.

References

  • Abeel, T., Helleputte, T., Van de Peer, Y., Dupont, P., Saeys, Y.: Robust biomarker identification for cancer diagnosis with ensemble feature selection methods. Bioinformatics 26(3), 392–398 (2009)

    Article  Google Scholar 

  • Acquisti, A., Grossklags, J.: Privacy attitudes and privacy behavior. In: Camp, L.J., Lewis, S. (eds.) Economics of Information Security. ADIS, vol. 12, pp. 165–178. Springer, Boston (2004). https://doi.org/10.1007/1-4020-8090-5_13

    Chapter  Google Scholar 

  • Altman, I.: The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding, No. 156 A4 (1975)

    Google Scholar 

  • An, S., Liu, W., Venkatesh, S.: Fast cross-validation algorithms for least squares support vector machine and kernel ridge regression. Pattern Recognit. 40, 2154–2162 (2007)

    Article  Google Scholar 

  • Arlot, S., Celisse, A.: A survey of cross-validation procedures for model selection. Stat. Surv. 4, 40–79 (2010)

    Article  MathSciNet  Google Scholar 

  • Auria, L., Moro, R.A.: Support vector machines (SVM) as a technique for solvency analysis. DIW Discussion Papers, No. 811 (2008)

    Google Scholar 

  • Basnet, R.: Automated Quality Assessment of Printed Objects Using Subjective and Objective Methods Based on Imaging and Machine Learning Techniques. Rochester Institute of Technology, Rochester (2017)

    Google Scholar 

  • Bradley, A.P.: The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern Recognit. 30(7), 1145–1159 (1997)

    Article  Google Scholar 

  • Brandimarte, L., Acquisti, A., Loewenstein, G.: Misplaced confidences privacy and the control paradox. Soc. Psychol. Pers. Sci. 4(3), 340–347 (2013)

    Article  Google Scholar 

  • Burges, C.J.: A tutorial on support vector machines for pattern recognition. Data Min. Knowl. Discov. 2(2), 121–167 (1998)

    Article  Google Scholar 

  • Chong, A.Y.L.: Predicting m-commerce adoption determinants: a neural network approach. Expert Syst. Appl. 40(2), 523–530 (2013)

    Article  Google Scholar 

  • Compano, R., Lusoli, W.: The policy maker’s anguish: regulating personal data behavior between paradoxes and dilemmas. In: Moore, T., Pym, D. (eds.) Economics of Information Security and Privacy, pp. 169–185. Springer, Boston (2010). https://doi.org/10.1007/978-1-4419-6967-5_9

    Chapter  Google Scholar 

  • Culnan, M.J.: How did they get my name?: An exploratory investigation of consumer attitudes toward secondary information use. MIS Q. 17, 341–363 (1993)

    Article  Google Scholar 

  • DiMicco, J.M., Geyer, W., Millen, D.R., Dugan, C., Brownholtz, B.: People sensemaking and relationship building on an enterprise social network site. In: 42nd Hawaii International Conference on System Sciences, pp. 1–10. IEEE (2009)

    Google Scholar 

  • Dinev, T., Hart, P.: Internet privacy concerns and their antecedents-measurement validity and a regression model. Behav. Inf. Technol. 23(6), 413–422 (2004)

    Article  Google Scholar 

  • Dong, C., Jin, H., Knijnenburg, B.P.: Predicting privacy behavior on online social networks. In: Ninth International AAAI Conference on Web and Social Media (2015)

    Google Scholar 

  • Geurts, P., Ernst, D., Wehenkel, L.: Extremely randomized trees. Mach. Learn. 63(1), 3–42 (2006)

    Article  Google Scholar 

  • Geyer, W., Dugan, C., DiMicco, J., Millen, D.R., Brownholtz, B., Muller, M.: Use and reuse of shared lists as a social content type. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1545–1554 (2008)

    Google Scholar 

  • Gregor, S., Hevner, A.R.: Positioning and presenting design science research for maximum impact. MIS Q. 37(2), 337–355 (2013)

    Article  Google Scholar 

  • Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 71–80. ACM (2005)

    Google Scholar 

  • Hastie, T., Rosset, S., Tibshirani, R., Zhu, J.: The entire regularization path for the support vector machine. J. Mach. Learn. Res. 5, 1391–1415 (2004)

    MathSciNet  MATH  Google Scholar 

  • Heumann, B.W.: An object-based classification of mangroves using a hybrid decision tree—Support vector machine approach. Remote Sens. 3(11), 2440–2460 (2011)

    Article  Google Scholar 

  • Hevner, A., March, S.T., Park, J., Ram, S.: Design science in information systems research. MIS Q. 28(1), 75–105 (2004)

    Article  Google Scholar 

  • Hoadley, C.M., Xu, H., Lee, J.J., Rosson, M.B.: Privacy as information access and illusory control: the case of the Facebook News Feed privacy outcry. Electron. Commer. Res. Appl. 9(1), 50–60 (2010)

    Article  Google Scholar 

  • Joachims, T.: Text categorization with support vector machines: learning with many relevant features. In: Nédellec, C., Rouveirol, C. (eds.) ECML 1998. LNCS, vol. 1398, pp. 137–142. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0026683

    Chapter  Google Scholar 

  • Johnson, C.A.: Privacy as personal control. Man-Environ. Interact.: Eval. Appl.: Part 2, 83–100 (1974)

    Google Scholar 

  • Kairam, S., Brzozowski, M., Huffaker, D., Chi, E.: Talking in circles: selective sharing in Google+. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1065–1074. ACM (2012)

    Google Scholar 

  • Kisekka, V., Bagchi-Sen, S., Rao, H.R.: Extent of private information disclosure on online social networks: an exploration of Facebook mobile phone users. Comput. Hum. Behav. 29(6), 2722–2729 (2013)

    Article  Google Scholar 

  • Koch, M., Schwabe, G., Briggs, R.O.: CSCW and social computing. Bus. Inf. Syst. Eng. 57(3), 149–153 (2015)

    Article  Google Scholar 

  • Kohavi, R.: A study of cross-validation and bootstrap for accuracy estimation and model selection. In: IJCAI, vol. 14, no. 2, pp. 1137–1145 (1995)

    Google Scholar 

  • Kostakos, V., Venkatanathan, J., Reynolds, B., Sadeh, N., Toch, E., Shaikh, S.A., Jones, S.: Who’s your best friend?: Targeted privacy attacks in location-sharing social networks. In: Proceedings of the 13th International Conference on Ubiquitous Computing, pp. 177–186. ACM (2011)

    Google Scholar 

  • Laufer, R.S., Wolfe, M.: Privacy as a concept and a social issue: a multidimensional developmental theory. J. Soc. Issues 33(3), 22–42 (1977)

    Article  Google Scholar 

  • Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inf. Syst. Res. 15(4), 336–355 (2004)

    Article  Google Scholar 

  • Margulis, S.T.: Conceptions of privacy: current status and next steps. J. Soc. Issues 33(3), 5–21 (1977)

    Article  Google Scholar 

  • Margulis, S.T.: On the status and contribution of Westin’s and Altman’s theories of privacy. J. Soc. Issues 59(2), 411–429 (2003a)

    Article  Google Scholar 

  • Margulis, S.T.: Privacy as a social issue and behavioral concept. J. Soc. Issues 59(2), 243–261 (2003b)

    Article  Google Scholar 

  • McLaren, T.S., Head, M.M., Yuan, Y., Chan, Y.E.: A multilevel model for measuring fit between a firm’s competitive strategies and information systems capabilities. MIS Q. 35(4), 909–929 (2011)

    Article  Google Scholar 

  • Mingers, J.: An empirical comparison of selection measures for decision-tree induction. Mach. Learn. 3(4), 319–342 (1989)

    Google Scholar 

  • Mohammadi, P., Ebrahimi-Moghadam, A., Shirani, S.: Subjective and objective quality assessment of image: a survey, pp. 1–50. arXiv Preprint https://arxiv.org/abs/1406.7799 (2014)

  • Morris, C.W., Autret, A., Boddy, L.: Support vector machines for identifying organisms—A comparison with strongly partitioned radial basis function networks. Ecol. Model. 146(1), 57–67 (2001)

    Article  Google Scholar 

  • Mountrakis, G., Im, J., Ogole, C.: Support vector machines in remote sensing: a review. ISPRS J. Photogramm. Remote Sens. 66(3), 247–259 (2011)

    Article  Google Scholar 

  • Mullen, C., Hamilton, N.F.: Adolescents’ response to parental Facebook friend requests: the comparative influence of privacy management, parent-child relational quality, attitude and peer influence. Comput. Hum. Behav. 60, 165–172 (2016)

    Article  Google Scholar 

  • Nachev, A., Stoyanov, B.: Product quality analysis using support vector machines. Inf. Models Anal. 1, 179–192 (2012)

    Google Scholar 

  • Pal, M., Foody, G.M.: Evaluation of SVM, RVM and SMLR for accurate image classification with limited ground data. IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens. 5, 1344–1355 (2012)

    Article  Google Scholar 

  • Peffers, K., Tuunanen, T., Rothenberger, M.A., Chatterjee, S.: A design science research methodology for information systems research. J. Manag. Inf. Syst. 24(3), 45–77 (2007)

    Article  Google Scholar 

  • Petronio, S.S.: Boundaries of Privacy: Dialectics of Disclosure. State University of New York Press, Albany (2002). xix, p. 268

    Google Scholar 

  • Powers, D.M.W.: Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation. J. Mach. Learn. Technol. 2(1), 37–63 (2011)

    MathSciNet  Google Scholar 

  • Puniskis, D., Laurutis, R., Dirmeikis, R.: An artificial neural nets for spam e-mail recognition. Electron. Electr. Eng. (2006). ISSN 1392-1215

    Google Scholar 

  • Schwegmann, B., Matzner, M., Janiesch, C.: A method and tool for predictive event-driven process analytics. In: Wirtschaftsinformatik, p. 46 (2013)

    Google Scholar 

  • Sheehan, K.B., Hoy, M.G.: Dimensions of privacy concern among online consumers. J. Public Policy Mark. 19(1), 62–73 (2000)

    Article  Google Scholar 

  • Shmueli, G., Koppius, O.: Predictive analytics in information systems research. MIS Q. 35(3), 553–572 (2010)

    Article  Google Scholar 

  • Skeels, M.M., Grudin, J.: When social networks cross boundaries. In: Proceedings of the ACM 2009 International Conference on Supporting Group Work, GROUP 2009. ACM, New York (2009)

    Google Scholar 

  • Smith, H.J., Milberg, S.J., Burke, S.J.: Information privacy: measuring individuals’ concerns about organizational practices. MIS Q. 20(2), 167–196 (1996)

    Article  Google Scholar 

  • Staddon, J., Huffaker, D., Brown, L., Sedley, A.: Are privacy concerns a turn-off?: Engagement and privacy in social networks. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, Washington, DC (2012)

    Google Scholar 

  • Stehman, S.V.: Selecting and interpreting measures of thematic classification accuracy. Remote Sens. Environ. 62(1), 77–89 (1997)

    Article  Google Scholar 

  • Tan, W.K., Nguyen, T.T.D., Tha, K.K.O., Yu, X.: Designing groupware that fosters social capital creation: can Facebook support global virtual team?. In: AMCIS 2009 Proceedings, p. 525 (2009)

    Google Scholar 

  • Tuv, E., Borisov, A., Runger, G., Torkkola, K.: Feature selection with ensembles, artificial variables, and redundancy elimination. J. Mach. Learn. Res. 10, 1341–1366 (2009)

    MathSciNet  MATH  Google Scholar 

  • Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P.G., Cranor, L.F.: I regretted the minute I pressed share: a qualitative study of regrets on Facebook. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, p. 10. ACM, July 2011

    Google Scholar 

  • Wehner, B., Ritter, C., Leist, S.: Enterprise social networks: a literature review and research agenda. Comput. Netw. 114, 125–142 (2017)

    Article  Google Scholar 

  • Wellman, B., Wortley, S.: Different strokes from different folks: community ties and social support. Am. J. Sociol. 96(3), 558–588 (1990)

    Article  Google Scholar 

  • Westin, A.F.: Privacy and Freedom. Atheneum, New York (1967)

    Google Scholar 

  • Westin, A.F.: Social and political dimensions of privacy. J. Soc. Issues 59(2), 431–453 (2003)

    Article  Google Scholar 

  • Wu, X., Kumar, V., Quinlan, J.R., Ghosh, J., Yang, Q., Motoda, H., McLachlan, G.J., Ng, A., Liu, B., Yu, P.S., Zhou, Z.-H., Steinbach, M., Hand, D.J., Steinberg, D.: Top 10 algorithms in data mining. Knowl. Inf. Syst. 14(1), 1–37 (2008)

    Article  Google Scholar 

  • Xu, H.: The effects of self-construal and perceived control on privacy concerns. In: ICIS 2007 Proceedings, p. 125 (2007)

    Google Scholar 

  • Xu, H., Dinev, T., Smith, J., Hart, P.: Information privacy concerns: linking individual perceptions with institutional privacy assurances. J. Assoc. Inf. Syst. 12(12), 798 (2011)

    Google Scholar 

Download references

Acknowledgements

This research has been funded in part by NSF under grants 1651475, 0916612 and 1227353. Usual disclaimer applies. The authors would also like to thank the reviewers whose comments have greatly improved the paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rohit Valecha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Valecha, R., Chakraborty, R., Rao, H.R., Upadhyaya, S. (2018). A Prediction Model of Privacy Control for Online Social Networking Users. In: Chatterjee, S., Dutta, K., Sundarraj, R. (eds) Designing for a Digital and Globalized World. DESRIST 2018. Lecture Notes in Computer Science(), vol 10844. Springer, Cham. https://doi.org/10.1007/978-3-319-91800-6_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-91800-6_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-91799-3

  • Online ISBN: 978-3-319-91800-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics