Skip to main content

Information Privacy Violations in Ephemeral Communications

  • Conference paper
  • First Online:
Third International Congress on Information and Communication Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 797))

Abstract

Snapchat, by its ephemeral nature, has always portrayed itself as a service in which users can securely send messages that can vanish after viewing. The research examined Snapchat’s recent updates in light of Helen Nissenbaum’s theory of privacy as “contextual integrity.” Users’ profiling, replay feature, third-party apps tracking, and privacy policy have serious violation to the information and distribution norm that is considered a breach which results in contextual integrity being violated. There are many questions about the alleged false sense of privacy Snapchat is publicizing since users can only have a very low expectation of privacy in any electronic messaging. Snapchat have been accused of denying its users even the most basic privacy protection by failing to provide an adequate level of encryption (end-to-end) as a default. Privacy issues identified could be tackled by making a better job in its architectural design decisions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Khatibloo F (2013) The new privacy: it’s all about context. Vision: the customer trust and privacy playbook. [online] Forrester Research, Inc, pp 1–26. Available at: https://bit.ly/2KlaslQ. Accessed 23 March 2015

  2. Riphagen D (2008) The online Panopticon. Privacy risks for users of social network sites. Centre for Ethics and Technology, The Netherlands, 4TU

    Google Scholar 

  3. Felt A, Greenwood K, Wagner D (2011) The effectiveness of application permissions. In: 2nd USENIX conference on Web application development (WebApps’11). USENIX Association, Berkeley, CA

    Google Scholar 

  4. Solove DJ (2006) A taxonomy of privacy. Uni Pennsylvania Law Rev 154(3):477

    Article  Google Scholar 

  5. Acquisti A, Gross R (2006) Imagined Communities: awareness, information sharing, and privacy on the facebook. Robinson College, Cambridge, United Kingdom. Available at: https://petsymposium.org/2006/program.html (Accessed 3 Nov 2016)

  6. Colao JJ (2014) The hackers who revealed Snapchat’s security flaws received one response from the company four months later. Available at: http://www.forbes.com/sites/jjcolao/2014/01/02/the-hackers-who-revealed-snapchats-security-flaws-received-one-response-from-the-company-four-months-later/#297442bb29ad (Accessed 3 Nov 2016)

  7. Gross D (2014) Millions of accounts compromised in Snapchat hack. Available at: www.cnn.com/2014/01/01/tech/social-media/snapchat-hack/ (Accessed 7 Nov 2016)

  8. Gellman R (2014) Fair information practices: a basic history. SSRN Electron J

    Google Scholar 

  9. van den Hoven M (2008) ‘Information technology, privacy and the protection of personal data. In: van den Hoven M, Weckert J (eds) Information technology and moral philosophy. Cambridge University Press, Cambridge, UK

    Google Scholar 

  10. Frier S (2016) Snapchat user ‘stories’ fuel 10 billion daily video views. (21 Jun 2016). Bloomberg technology blogs URL http://www.bloomberg.com/news/articles/2016-04-28/snapchat-user-content-fuels-jump-to-10-billion-daily-video-views

  11. Litt E, Hargittai E (2014) ‘Smile, snap, and share? A nuanced approach to privacy and online photo-sharing’, Poetics 42:1–21

    Google Scholar 

  12. Piwek L, Joinson A (2016) What do they snapchat about? Patterns of use in time-limited instant messaging service. Comput Hum Behav 54:358–367

    Article  Google Scholar 

  13. Wohlsen M (2015) I’m too old for Snapchat, which is exactly why it should be worth $19B (23 Feb 2015). Wired Online URL http://www.wired.com/2015/02/im-old-get-snapchat-exactly-worth-19b/

  14. Cook J (2014b) Snapsaved admits it was the source of 100,000 leaked snapchat photos and videos (13 Oct 2014). Business insider URL http://uk.businessinsider. com/snapsaved-admits-it-was-source-of-leaked-snapchat-photos-2014-10

  15. Notopoulos K (2012) How anybody can secretly save your snapchat videos forever (21 Jun 2016). BuzzFeed URL https://www.buzzfeed.com/katienotopoulos/how-anybody-can-secretly-save-your-snapchat-videos?utm_term=.twPlmkBpl#.bojZMbNpZ

  16. Nissenbaum H (2009) Privacy in context. Stanford Law Books, Stanford, Calif

    Google Scholar 

  17. Nissenbaum H (2011) A contextual approach to privacy online. Daedalus 140(4):32–48

    Article  Google Scholar 

  18. Nissenbaum H (2015) “Respect for context”: fulfilling the promise of the white house report. In: Rotenberg M, Horwitz J, Scott J (eds) Privacy in the modern age: the search for solutions. The New Press, United States, pp 152–164

    Google Scholar 

  19. Jonas J (2015) The surveillance society and transparent you. In: Rotenberg M, Horwitz J, Scott J (eds) Privacy in the modern age: the search for solutions. The New Press, United States, pp 93–103

    Google Scholar 

  20. Nakanishi L (2014) The big data dilemma: balancing privacy and utility. Available at: http://www.edelman.com/post/big-data-dilemma-balancing-privacy-utility/ (Accessed 20 Sept 2016)

  21. O’Kane S (2015) Snapchat now lets you pay to replay snaps (23 Jun 2016). The verge URL http://www.theverge.com/2015/9/15/9330955/snapchat-replay-snaps-paid-in-app

  22. Angwin J, Singer-Vine J (2012) Selling you on Facebook. Available at: http://on.wsj.com/HR3pYb (Accessed 7 Dec 2016)

  23. Huber M, Mulazzani M, Schrittwieser S, Weippl E (2013) App inspect large-scale evaluation of social networking apps. Association for Computing Machinery (ACM), Boston, Massachusetts, USA

    Google Scholar 

  24. Krishnamurthy B, Wills CE (2009) On the leakage of personally identifiable information via online social networks. WOSN’09. Association for Computing Machinery (ACM), Barcelona, Spain. Available at: http://conferences.sigcomm.org/sigcomm/2009/workshops/wosn/papers/p7.pdf (Accessed 7 Dec 2016)

  25. Milne G (2015) Digital privacy in the marketplace: perspectives on the information exchange. Business Expert Press

    Google Scholar 

  26. Chewae M, Hayikader S, Hasan MH, Ibrahim J (2015) How much privacy we still have on social network? Int J Sci Res Publ 5(1), Jan 2015

    Google Scholar 

  27. Kerr Ian (2001) The legal relationship between online service providers and users. Can Bus Law J 35:1–40

    Google Scholar 

  28. Good NS, Grossklags J, Mulligan DK, Konstan JA (2007) Noticing notice: a large-scale experiment on the timing of software license agreements. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM Press, San Jose, pp. 607–616

    Google Scholar 

  29. Smith O (2013) Facebook terms and conditions: why you don’t own your online life. Available at: http://www.telegraph.co.uk/technology/social-media/9780565/Facebook-terms-and-conditions-why-you-dont-own-your-online-life.html (Accessed 24 Oct 2016)

  30. Snapchat (2016) Privacy policy. Available at: https://www.snapchat.com/privacy (Accessed 20 Oct 2016)

  31. Goel V, Wyatt E (2013) Facebook privacy change is subject of F.T.C. inquiry. The New York Times. Retrieved from http://www.nytimes.com/2013/09/12/technology/personaltech/ftc-looking-into-facebook-privacy-policy.html Google (n.d.). Privacy policy. Retrieved from http://www.google.com/policies/privacy/

  32. Kravets D (2013) Judge approves $20 M Facebook ‘sponsored stories’ settlement. Wired. Retrieved from http://www.wired.com/threatlevel/2013/08/judge-approves-20-million-facebook-sponsored-stories-settlement/

  33. Federal Trade Commission (2000) Privacy online: fair information practices in the electronic marketplace. Retrieved from http://www.ftc.gov/reports/privacy-online-fair-information-practices-electronic-marketplace-federal-trade-commission. Ghostery, n.d., http://www.ghostery.com/

  34. Federal Trade Commission (2014) Snapchat settles FTC charges that promises of disappearing messages were false. Retrieved from https://www.ftc.gov/news-events/press-releases/2014/05/snapchat-settles-ftc-charges-promises-disappearing-messages-were

  35. Gross R, Acquisti A (2005) Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM workshop on privacy in the electronic society (WPES). ACM, pp 71–80

    Google Scholar 

  36. Stutzman F, Gross R, Acquisti A (2012) Silent listeners: the evolution of privacy and disclosure on facebook. J Priv Confidentiality 4(2):7–41

    Google Scholar 

  37. Chin E, Porter Felt A, Sekar V, Wagner D (2012) Measuring user confidence in smartphone security and privacy. SOUPS, Washington, DC, USA

    Book  Google Scholar 

  38. Tsai JY, Egelman S, Cranor L, Acquisti A (2011) The effect of online privacy information on purchasing behavior: an experimental study. Inf Syst Res 22(2):254–268

    Article  Google Scholar 

  39. Angulo J, Fischer-Hübner S, Wästlund E, Pulls T (2011) Towards usable privacy policy display and management. Inf Manage Comput Secur 20(1):4–17

    Article  Google Scholar 

  40. Steinfeld N (2016) ‘“I agree to the terms and conditions”: (how) do users read privacy policies online? An eye-tracking experiment’. Comput Human Behav 55:992–1000

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maryam S. AlOshan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

AlOshan, M.S. (2019). Information Privacy Violations in Ephemeral Communications. In: Yang, XS., Sherratt, S., Dey, N., Joshi, A. (eds) Third International Congress on Information and Communication Technology. Advances in Intelligent Systems and Computing, vol 797. Springer, Singapore. https://doi.org/10.1007/978-981-13-1165-9_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1165-9_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1164-2

  • Online ISBN: 978-981-13-1165-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics