Finding hidden circles may improve social network privacy settings

Nov 26, 2013 by Matthew Swayne
Finding hidden circles may improve social network privacy settings
Researchers designed a software program to better predict how users might assign privacy levels to new content to different groups of people in their networks. Credit: © iStockphoto/boygovidio

Creating a computer program to find relationships in networks, such as Google Plus and Facebook, may help users more easily set up and maintain privacy settings, according to researchers.

"We want to help configure privacy to be better protected," said Anna Squicciarini, assistant professor of and technology, Penn State. "However not all users are interested or motivated to change their privacy settings,"

The researchers designed a software program to better predict how users might assign privacy levels to new content to different groups of people in their networks.

Users may create and maintain connections—circles—that are based on more specific and temporary relationships, such as ones based on hobbies and interests, that are not included in the privacy settings provided by the social networks. Many users also skip the process of manually setting privacy restrictions as they add new content and new members to their networks because it can be time consuming or confusing.

"If users could have privacy settings automatically set when they, for instance, add new members to their circle, or when they add new content, we feel it would improve security, but not affect their experience," said Squicciarini, who worked with Sushama Karumanchi, doctoral candidate in information sciences and technology, Penn State; Dan Lin, assistant professor of computer science, Missouri University of Science and Technology; and Nicole DeSisto, systems development and operations consultant.

The program, which used data-mining techniques to find groups and connections, had an average 23 percent error rate in attempting to predict how people would respond to 75,000 different privacy settings in 15 different scenarios—for instance, how a person might choose privacy setting when posting a picture of a recent vacation.

"Our approach performs extremely well for some scenarios, reaching an error rate of 3 percent, whereas it seems to be not effective for scenarios involving re-uploading content found from others," noted the researchers, who reported their findings in a recent issue of Computers and Security. The accuracy rate improved by up to 90 percent in certain categories during later trials by making the choices about actions and membership more specific.

"Interestingly, when inferring policies targeting general friends, people with common interest and people with similar background, accuracy is up to 90 percent," the researchers said. "For policies targeting family, colleagues, close friends, the policy prediction accuracy is lower, about 78 percent."

The researchers asked 140 participants—62 percent female and 38 percent male—questions about their interests, as well as their social networking habits and attitudes about privacy settings. The subjects also reported how they would set their privacy setting on their social networks under various scenarios, including how they would share family photos, business photos, news stories and posts about hobbies.

Currently, people using social networks can manage privacy levels so that their content is only shared with select users, said Squicciarini. For example, Facebook offers customized groups for its members, while Google Plus allows its members to designated their connections as friends, family, acquaintances or following.

However, these settings do not easily allow people to create more specific interests groups within those main categories, nor can the privacy settings be automatically assigned as new contacts join a user's social network.

"There's only so much that we can learn based on surveys like this and it would be better to actually observe how users manage their in a realistic environment," said Squicciarini.

Explore further: Codebreaking has moved on since Turing's day, with dangerous implications

Related Stories

Facebook: ad policy unchanged, users in control

Nov 15, 2013

Facebook said Friday that ads on the social network featuring user endorsements and pictures were nothing new, and that members remain in control of their own content and images.

The photo tag is back on Facebook

Feb 27, 2013

Tagging photos is hardly new on Facebook. In 2012, Facebook temporarily suspended the feature to make what it called technical improvements. This may or may not have had something to do with the outcry from privacy advocates ...

Recommended for you

Forging a photo is easy, but how do you spot a fake?

Nov 21, 2014

Faking photographs is not a new phenomenon. The Cottingley Fairies seemed convincing to some in 1917, just as the images recently broadcast on Russian television, purporting to be satellite images showin ...

Algorithm, not live committee, performs author ranking

Nov 21, 2014

Thousands of authors' works enter the public domain each year, but only a small number of them end up being widely available. So how to choose the ones taking center-stage? And how well can a machine-learning ...

Professor proposes alternative to 'Turing Test'

Nov 19, 2014

(Phys.org) —A Georgia Tech professor is offering an alternative to the celebrated "Turing Test" to determine whether a machine or computer program exhibits human-level intelligence. The Turing Test - originally ...

Image descriptions from computers show gains

Nov 18, 2014

"Man in black shirt is playing guitar." "Man in blue wetsuit is surfing on wave." "Black and white dog jumps over bar." The picture captions were not written by humans but through software capable of accurately ...

User comments : 1

Adjust slider to filter visible comments by rank

Display comments: newest first

QuixoteJ
not rated yet Nov 27, 2013
How about you just don't post and share your entire life on the internet omg?

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.