Taxonomy for Privacy Policies of Social Networks Sites

Abstract

Social networking sites (SNSs) are becoming increasingly popular on the Web. Sharing personal information in these networks can be dangerous, considering that malicious users can get access to this information and use them for purposes other than the original. Although SNSs typically provide tools for users to set who can access their shared data, this access restriction only applies to network users and not for third parties and the social network itself. In this paper, we present both a mechanism to enhance privacy in SNSs and taxonomy for classifying SNSs privacy policies. We combine and extend two taxonomies of privacy, unifying them to classify SNSs privacy policies and also the aforemen-tioned mechanism. We evaluated the taxonomy classifying six SNSs privacy policies and the mechanism, presenting the results and our findings about the classification.

Share and Cite:

Donizetti Zorzo, S. , Pereira Botelho, R. and Muniz de Ávila, P. (2013) Taxonomy for Privacy Policies of Social Networks Sites. Social Networking, 2, 157-164. doi: 10.4236/sn.2013.24015.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] A. L. Young and A. Quan-Haase, “Information Revelation and Internet Privacy Concerns on Social Network Sites: A Case Study of Facebook,” International Conference on Communities and Technologies, University Park, New York, 2009, pp. 265-274.
[2] R. P. Botelho and S. D. Zorzo, “Privacify: Extending Privacy in Online Social Networking,” Lecture Notes in Informatik, Berlin Informatik, Vol. 192, 2011, p. 432.
[3] B. Schneier, “A Taxonomy of Social Networking Data,” IEEE Security and Privacy, Vol. 8, No. 4, 2010, p. 88. http://dx.doi.org/10.1109/MSP.2010.118
[4] D. M. Boyd and N. B. Ellison, “Social Network Sites: Definition, History, and Scholarship,” Journal of Computer-Mediated Communication, Vol. 13, No. 1, 2008, pp. 210-230.
[5] L. Wu, et al., “Analysis of Social Networking Privacy Policies,” Proceedings of the 2010 EDBT/ICDT Workshops, Lausanne, 2010.
[6] D. J. Solove, “A Taxonomy of Privacy,” University of Pennsylvania Law Review, Vol. 154, No. 3, 2006, pp. 477-570. http://dx.doi.org/10.2307/40041279
[7] K. Barker, et al., “A Data Privacy Taxonomy,” Proceedings of the 26th British National Conference on Databases: Dataspace: The Final Frontier, Vol. 5588, Springer-Verlag, Birmingham, 2009, pp. 42-54.
[8] A. Besmer, et al., “Social Applications: Exploring a More Secure Framework,” Symposium on Usable Privacy and Security, Mountain View, ACM, California, 2009. http://dx.doi.org/10.1145/1572532.1572535
[9] J. Delgado, E. Rodríguez and S. Llorente, “User’s Privacy in Applications Provided Through Social Networks,” Workshop on Social Media, ACM SIGM, Firenze, 2010.

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.