skip to main content
10.1145/1978942.1979280acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Oops, I did it again: mitigating repeated access control errors on facebook

Published:07 May 2011Publication History

ABSTRACT

We performed a study of Facebook users to examine how they coped with limitations of the Facebook privacy settings interface. Students graduating and joining the workforce create significant problems for all but the most basic privacy settings on social networking websites. We therefore created realistic scenarios exploiting work/play boundaries that required users to specify access control policies that were impossible due to various limitations. We examined whether users were aware of these problems without being prompted, and once given feedback, what their coping strategies were. Overall, we found that simply alerting participants to potential errors was ineffective, but when choices were also presented, participants introduced significantly fewer errors. Based on our findings, we designed a privacy settings interface based on Venn diagrams, which we validated with a usability study. We conclude that this interface may be more effective than the current privacy settings interface.

References

  1. J. Binder, A. Howes, and A. Sutcliffe. The problem of conflicting social spheres: Effects of network structure on experienced tension in social network sites. In CHI '09: Proceedings of the 27th International Conference on Human Factors in Computing Systems, pages 965--974, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. d. boyd and E. Hargittai. Facebook privacy settings: Who cares? First Monday, 15(8), August 2010.Google ScholarGoogle Scholar
  3. C. A. Brodie, C.-M. Karat, and J. Karat. An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench. In SOUPS '06: Proceedings of the Second Symposium on Usable Privacy and Security, pages 8--19, New York, NY, USA, 2006. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Computer Research Association. CRA Conference on Grand Research Challenges in Information Security & Assurance, 2003. http://archive.cra.org/reports/trustworthy.computing.pdf.Google ScholarGoogle Scholar
  5. J. DiMicco, D. R. Millen, W. Geyer, C. Dugan, B. Brownholtz, and M. Muller. Motivations for social networking at work. In CSCW '08: Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, pages 711--720, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. M. DiMicco and D. R. Millen. Identity Management: Multiple presentations of self in Facebook. In GROUP '07: Proceedings of the 2007 International ACM Conference on Supporting Group Work, pages 383--386, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. K. Fisler and S. Krishnamurthi. A model of triangulating environments for policy authoring. In SACMAT '10: Proceeding of the 15th ACM Symposium on Access Control Models and Technologies, pages 3--12, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. K. Fisler, S. Krishnamurthi, L. A. Meyerovich, and M. C. Tschantz. Verification and change-impact analysis of access-control policies. In ICSE '05: Proceedings of the 27th International Conference on Software Engineering, pages 196--205, New York, NY, USA, 2005. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. R. Gross and A. Acquisti. Information revelation and privacy in online social networks. In WPES '05: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pages 71--80, New York, NY, USA, 2005. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. iStrategy Labs. Facebook demographics and statistics report, January 2010. http://www.istrategylabs.com/2010/01/facebook-demographics-and-statistics-re%port-2010--145-growth-in-1-year/.Google ScholarGoogle Scholar
  11. A. N. Joinson. Looking at, looking up or keeping up with people?: motives and use of facebook. In CHI '08: Proceedings of the 26th International Conference on Human Factors in Computing Systems, pages 1027--1036, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. C. Lampe, N. Ellison, and C. Steinfield. A face(book) in the crowd: Social searching vs. social browsing. In CSCW '06: Proceedings of the 2006 20th Anniversary Conference on Computer Supported Cooperative Work, pages 167--170, New York, NY, USA, 2006. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. C. Lampe, N. B. Ellison, and C. Steinfield. Changes in use and perception of Facebook. In CSCW '08: Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, pages 721--730, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. M. Skeels and J. Grudin. When social networks cross boundaries: A case study of workplace use of Facebook and LinkedIn. In GROUP '09: Proceedings of the 2009 International ACM Conference on Supporting Group Work, pages 95--104, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. C. Steinfield, J. M. DiMicco, N. B. Ellison, and C. Lampe. Bowling online: social networking and social capital within the organization. In C&T '09: Proceedings of the 4th International Conference on Communities and Technologies, pages 245--254, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. K. Strater and H. R. Lipford. Strategies and struggles with privacy in an online social networking community. In BCS-HCI '08: Proceedings of the 22nd British HCI Group Annual Conference, pages 111--119, Swinton, UK, UK, 2008. British Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. F. Stutzman and J. Kramer-Duffield. Friends only: examining a privacy-enhancing behavior in Facebook. In CHI '10: Proceedings of the 28th International Conference on Human Factors in Computing Systems, pages 1553--1562, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. Tootoonchian, K. K. Gollu, S. Saroiu, Y. Ganjali, and A. Wolman. Lockr: social access control for web 2.0. In WOSN '08: Proceedings of the 1st Workshop on Online Social Networks, pages 43--48, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. T. Turner, P. Qvarfordt, J. T. Biehl, G. Golovchinsky, and M. Back. Exploring the workplace communication ecology. In CHI '10: Proceedings of the 28th International Conference on Human Factors in Computing Systems, pages 841--850, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. J. Watson, M. Whitney, and H. R. Lipford. Configuring audience-oriented privacy policies. In SafeConfig '09: Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, pages 71--78, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. Wu, J. M. DiMicco, and D. R. Millen. Detecting professional versus personal closeness using an enterprise social network site. In CHI '10: Proceedings of the 28th International Conference on Human Factors in Computing Systems, pages 1955--1964, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. L. Young and A. Quan-Haase. Information revelation and internet privacy concerns on social network sites: a case study of Facebook. In C&T '09: Proceedings of the 4th International Conference on Communities and Technologies, pages 265--274, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Oops, I did it again: mitigating repeated access control errors on facebook
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              CHI '11: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
              May 2011
              3530 pages
              ISBN:9781450302289
              DOI:10.1145/1978942

              Copyright © 2011 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 7 May 2011

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              CHI '11 Paper Acceptance Rate410of1,532submissions,27%Overall Acceptance Rate6,199of26,314submissions,24%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader