Not That Kind of Friend

Misleading Divergences between Online Social Networks and Real-World Social Protocols
  • Jonathan Anderson
  • Frank Stajano
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7028)


Current social networking technology provides users with little of the privacy that they expect and are promised. While some individuals may truly wish to be “open books,” violating most users’ privacy expectations leads to serious consequences for both the users and their network. We propose that, in order for users to truly be in control of their personal information, we need to respect and learn from the social protocols that have been built up over the millennia.


Social Network Access Control Social Networking Site Social Contract Open Book 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bennett, R.: Plea to ban employers trawling Facebook. The Times (2008),
  2. 2.
    Shepherd, J., Shariatmadari, D.: Would-be students checked on Facebook. The Guardian (2008),
  3. 3.
    Rabkin, A.: Personal knowledge questions for fallback authentication. In: Proceedings of the 4th Symposium on Usable Privacy and Security - SOUPS 2008, pp. 13–23. ACM (2008)Google Scholar
  4. 4.
    Jagatic, T.N.: Social phishing. Communications of the ACM 50(10), 94 (2007)CrossRefGoogle Scholar
  5. 5.
    Pilkington, E.: Blackmail claim stirs fears over Facebook. The Guardian (2007),
  6. 6.
    Randall, D., Richards, V.: Facebook can ruin your life. And so can MySpace, Bebo... The Independent (2008),
  7. 7.
    CBC News: Student recruits unfit for service, say former border guards. Canadian Broadcasting Corporation (2007),
  8. 8.
    Facebook Privacy Policy (2007),
  9. 9.
    Whitten, A.: Making Security Usable. PhD thesis. Carnegie Mellon University (2004)Google Scholar
  10. 10.
    Aiello, L.C., Dunbar, R.: Neocortex Size, Group Size, and the Evolution of Language. Current Anthropology 34(2), 184–193 (1993)CrossRefGoogle Scholar
  11. 11.
    Yee, K.P.: Aligning security and usability. IEEE Security and Privacy Magazine 2(5), 48 (2004)CrossRefGoogle Scholar
  12. 12.
    Godfray, H.C.J.: Parasitoids. Current Biology 14(12), R456 (2004)Google Scholar
  13. 13.
    Binmore, K.: Game Theory and the Social Contract. Just Playing, vol. 2. MIT Press (1998)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Jonathan Anderson
    • 1
  • Frank Stajano
    • 1
  1. 1.Computer LaboratoryUniversity of CambridgeUK

Personalised recommendations