Abstract
Snapchat, by its ephemeral nature, has always portrayed itself as a service in which users can securely send messages that can vanish after viewing. The research examined Snapchat’s recent updates in light of Helen Nissenbaum’s theory of privacy as “contextual integrity.” Users’ profiling, replay feature, third-party apps tracking, and privacy policy have serious violation to the information and distribution norm that is considered a breach which results in contextual integrity being violated. There are many questions about the alleged false sense of privacy Snapchat is publicizing since users can only have a very low expectation of privacy in any electronic messaging. Snapchat have been accused of denying its users even the most basic privacy protection by failing to provide an adequate level of encryption (end-to-end) as a default. Privacy issues identified could be tackled by making a better job in its architectural design decisions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Khatibloo F (2013) The new privacy: it’s all about context. Vision: the customer trust and privacy playbook. [online] Forrester Research, Inc, pp 1–26. Available at: https://bit.ly/2KlaslQ. Accessed 23 March 2015
Riphagen D (2008) The online Panopticon. Privacy risks for users of social network sites. Centre for Ethics and Technology, The Netherlands, 4TU
Felt A, Greenwood K, Wagner D (2011) The effectiveness of application permissions. In: 2nd USENIX conference on Web application development (WebApps’11). USENIX Association, Berkeley, CA
Solove DJ (2006) A taxonomy of privacy. Uni Pennsylvania Law Rev 154(3):477
Acquisti A, Gross R (2006) Imagined Communities: awareness, information sharing, and privacy on the facebook. Robinson College, Cambridge, United Kingdom. Available at: https://petsymposium.org/2006/program.html (Accessed 3 Nov 2016)
Colao JJ (2014) The hackers who revealed Snapchat’s security flaws received one response from the company four months later. Available at: http://www.forbes.com/sites/jjcolao/2014/01/02/the-hackers-who-revealed-snapchats-security-flaws-received-one-response-from-the-company-four-months-later/#297442bb29ad (Accessed 3 Nov 2016)
Gross D (2014) Millions of accounts compromised in Snapchat hack. Available at: www.cnn.com/2014/01/01/tech/social-media/snapchat-hack/ (Accessed 7 Nov 2016)
Gellman R (2014) Fair information practices: a basic history. SSRN Electron J
van den Hoven M (2008) ‘Information technology, privacy and the protection of personal data. In: van den Hoven M, Weckert J (eds) Information technology and moral philosophy. Cambridge University Press, Cambridge, UK
Frier S (2016) Snapchat user ‘stories’ fuel 10 billion daily video views. (21 Jun 2016). Bloomberg technology blogs URL http://www.bloomberg.com/news/articles/2016-04-28/snapchat-user-content-fuels-jump-to-10-billion-daily-video-views
Litt E, Hargittai E (2014) ‘Smile, snap, and share? A nuanced approach to privacy and online photo-sharing’, Poetics 42:1–21
Piwek L, Joinson A (2016) What do they snapchat about? Patterns of use in time-limited instant messaging service. Comput Hum Behav 54:358–367
Wohlsen M (2015) I’m too old for Snapchat, which is exactly why it should be worth $19B (23 Feb 2015). Wired Online URL http://www.wired.com/2015/02/im-old-get-snapchat-exactly-worth-19b/
Cook J (2014b) Snapsaved admits it was the source of 100,000 leaked snapchat photos and videos (13 Oct 2014). Business insider URL http://uk.businessinsider. com/snapsaved-admits-it-was-source-of-leaked-snapchat-photos-2014-10
Notopoulos K (2012) How anybody can secretly save your snapchat videos forever (21 Jun 2016). BuzzFeed URL https://www.buzzfeed.com/katienotopoulos/how-anybody-can-secretly-save-your-snapchat-videos?utm_term=.twPlmkBpl#.bojZMbNpZ
Nissenbaum H (2009) Privacy in context. Stanford Law Books, Stanford, Calif
Nissenbaum H (2011) A contextual approach to privacy online. Daedalus 140(4):32–48
Nissenbaum H (2015) “Respect for context”: fulfilling the promise of the white house report. In: Rotenberg M, Horwitz J, Scott J (eds) Privacy in the modern age: the search for solutions. The New Press, United States, pp 152–164
Jonas J (2015) The surveillance society and transparent you. In: Rotenberg M, Horwitz J, Scott J (eds) Privacy in the modern age: the search for solutions. The New Press, United States, pp 93–103
Nakanishi L (2014) The big data dilemma: balancing privacy and utility. Available at: http://www.edelman.com/post/big-data-dilemma-balancing-privacy-utility/ (Accessed 20 Sept 2016)
O’Kane S (2015) Snapchat now lets you pay to replay snaps (23 Jun 2016). The verge URL http://www.theverge.com/2015/9/15/9330955/snapchat-replay-snaps-paid-in-app
Angwin J, Singer-Vine J (2012) Selling you on Facebook. Available at: http://on.wsj.com/HR3pYb (Accessed 7 Dec 2016)
Huber M, Mulazzani M, Schrittwieser S, Weippl E (2013) App inspect large-scale evaluation of social networking apps. Association for Computing Machinery (ACM), Boston, Massachusetts, USA
Krishnamurthy B, Wills CE (2009) On the leakage of personally identifiable information via online social networks. WOSN’09. Association for Computing Machinery (ACM), Barcelona, Spain. Available at: http://conferences.sigcomm.org/sigcomm/2009/workshops/wosn/papers/p7.pdf (Accessed 7 Dec 2016)
Milne G (2015) Digital privacy in the marketplace: perspectives on the information exchange. Business Expert Press
Chewae M, Hayikader S, Hasan MH, Ibrahim J (2015) How much privacy we still have on social network? Int J Sci Res Publ 5(1), Jan 2015
Kerr Ian (2001) The legal relationship between online service providers and users. Can Bus Law J 35:1–40
Good NS, Grossklags J, Mulligan DK, Konstan JA (2007) Noticing notice: a large-scale experiment on the timing of software license agreements. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM Press, San Jose, pp. 607–616
Smith O (2013) Facebook terms and conditions: why you don’t own your online life. Available at: http://www.telegraph.co.uk/technology/social-media/9780565/Facebook-terms-and-conditions-why-you-dont-own-your-online-life.html (Accessed 24 Oct 2016)
Snapchat (2016) Privacy policy. Available at: https://www.snapchat.com/privacy (Accessed 20 Oct 2016)
Goel V, Wyatt E (2013) Facebook privacy change is subject of F.T.C. inquiry. The New York Times. Retrieved from http://www.nytimes.com/2013/09/12/technology/personaltech/ftc-looking-into-facebook-privacy-policy.html Google (n.d.). Privacy policy. Retrieved from http://www.google.com/policies/privacy/
Kravets D (2013) Judge approves $20 M Facebook ‘sponsored stories’ settlement. Wired. Retrieved from http://www.wired.com/threatlevel/2013/08/judge-approves-20-million-facebook-sponsored-stories-settlement/
Federal Trade Commission (2000) Privacy online: fair information practices in the electronic marketplace. Retrieved from http://www.ftc.gov/reports/privacy-online-fair-information-practices-electronic-marketplace-federal-trade-commission. Ghostery, n.d., http://www.ghostery.com/
Federal Trade Commission (2014) Snapchat settles FTC charges that promises of disappearing messages were false. Retrieved from https://www.ftc.gov/news-events/press-releases/2014/05/snapchat-settles-ftc-charges-promises-disappearing-messages-were
Gross R, Acquisti A (2005) Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM workshop on privacy in the electronic society (WPES). ACM, pp 71–80
Stutzman F, Gross R, Acquisti A (2012) Silent listeners: the evolution of privacy and disclosure on facebook. J Priv Confidentiality 4(2):7–41
Chin E, Porter Felt A, Sekar V, Wagner D (2012) Measuring user confidence in smartphone security and privacy. SOUPS, Washington, DC, USA
Tsai JY, Egelman S, Cranor L, Acquisti A (2011) The effect of online privacy information on purchasing behavior: an experimental study. Inf Syst Res 22(2):254–268
Angulo J, Fischer-Hübner S, Wästlund E, Pulls T (2011) Towards usable privacy policy display and management. Inf Manage Comput Secur 20(1):4–17
Steinfeld N (2016) ‘“I agree to the terms and conditions”: (how) do users read privacy policies online? An eye-tracking experiment’. Comput Human Behav 55:992–1000
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
AlOshan, M.S. (2019). Information Privacy Violations in Ephemeral Communications. In: Yang, XS., Sherratt, S., Dey, N., Joshi, A. (eds) Third International Congress on Information and Communication Technology. Advances in Intelligent Systems and Computing, vol 797. Springer, Singapore. https://doi.org/10.1007/978-981-13-1165-9_7
Download citation
DOI: https://doi.org/10.1007/978-981-13-1165-9_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1164-2
Online ISBN: 978-981-13-1165-9
eBook Packages: EngineeringEngineering (R0)