Not That Kind of Friend
Current social networking technology provides users with little of the privacy that they expect and are promised. While some individuals may truly wish to be “open books,” violating most users’ privacy expectations leads to serious consequences for both the users and their network. We propose that, in order for users to truly be in control of their personal information, we need to respect and learn from the social protocols that have been built up over the millennia.
KeywordsSocial Network Access Control Social Networking Site Social Contract Open Book
Unable to display preview. Download preview PDF.
- 1.Bennett, R.: Plea to ban employers trawling Facebook. The Times (2008), http://technology.timesonline.co.uk/tol/news/tech_and_web/article3613896.ece
- 2.Shepherd, J., Shariatmadari, D.: Would-be students checked on Facebook. The Guardian (2008), http://www.guardian.co.uk/uk/2008/jan/11/accesstouniversity.highereducation
- 3.Rabkin, A.: Personal knowledge questions for fallback authentication. In: Proceedings of the 4th Symposium on Usable Privacy and Security - SOUPS 2008, pp. 13–23. ACM (2008)Google Scholar
- 5.Pilkington, E.: Blackmail claim stirs fears over Facebook. The Guardian (2007), http://www.guardian.co.uk/business/2007/jul/16/usnews.news
- 6.Randall, D., Richards, V.: Facebook can ruin your life. And so can MySpace, Bebo... The Independent (2008), http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html
- 7.CBC News: Student recruits unfit for service, say former border guards. Canadian Broadcasting Corporation (2007), http://www.cbc.ca/canada/british-columbia/story/2007/10/01/bc-borderguards.html
- 9.Whitten, A.: Making Security Usable. PhD thesis. Carnegie Mellon University (2004)Google Scholar
- 12.Godfray, H.C.J.: Parasitoids. Current Biology 14(12), R456 (2004)Google Scholar
- 13.Binmore, K.: Game Theory and the Social Contract. Just Playing, vol. 2. MIT Press (1998)Google Scholar