Skip to main content

Not That Kind of Friend

Misleading Divergences between Online Social Networks and Real-World Social Protocols

  • Conference paper
Security Protocols XVII (Security Protocols 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7028))

Included in the following conference series:

  • 617 Accesses

Abstract

Current social networking technology provides users with little of the privacy that they expect and are promised. While some individuals may truly wish to be “open books,” violating most users’ privacy expectations leads to serious consequences for both the users and their network. We propose that, in order for users to truly be in control of their personal information, we need to respect and learn from the social protocols that have been built up over the millennia.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bennett, R.: Plea to ban employers trawling Facebook. The Times (2008), http://technology.timesonline.co.uk/tol/news/tech_and_web/article3613896.ece

  2. Shepherd, J., Shariatmadari, D.: Would-be students checked on Facebook. The Guardian (2008), http://www.guardian.co.uk/uk/2008/jan/11/accesstouniversity.highereducation

  3. Rabkin, A.: Personal knowledge questions for fallback authentication. In: Proceedings of the 4th Symposium on Usable Privacy and Security - SOUPS 2008, pp. 13–23. ACM (2008)

    Google Scholar 

  4. Jagatic, T.N.: Social phishing. Communications of the ACM 50(10), 94 (2007)

    Article  Google Scholar 

  5. Pilkington, E.: Blackmail claim stirs fears over Facebook. The Guardian (2007), http://www.guardian.co.uk/business/2007/jul/16/usnews.news

  6. Randall, D., Richards, V.: Facebook can ruin your life. And so can MySpace, Bebo... The Independent (2008), http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html

  7. CBC News: Student recruits unfit for service, say former border guards. Canadian Broadcasting Corporation (2007), http://www.cbc.ca/canada/british-columbia/story/2007/10/01/bc-borderguards.html

  8. Facebook Privacy Policy (2007), http://www.facebook.com/policy.php

  9. Whitten, A.: Making Security Usable. PhD thesis. Carnegie Mellon University (2004)

    Google Scholar 

  10. Aiello, L.C., Dunbar, R.: Neocortex Size, Group Size, and the Evolution of Language. Current Anthropology 34(2), 184–193 (1993)

    Article  Google Scholar 

  11. Yee, K.P.: Aligning security and usability. IEEE Security and Privacy Magazine 2(5), 48 (2004)

    Article  Google Scholar 

  12. Godfray, H.C.J.: Parasitoids. Current Biology 14(12), R456 (2004)

    Google Scholar 

  13. Binmore, K.: Game Theory and the Social Contract. Just Playing, vol. 2. MIT Press (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Anderson, J., Stajano, F. (2013). Not That Kind of Friend. In: Christianson, B., Malcolm, J.A., Matyáš, V., Roe, M. (eds) Security Protocols XVII. Security Protocols 2009. Lecture Notes in Computer Science, vol 7028. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36213-2_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36213-2_37

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36212-5

  • Online ISBN: 978-3-642-36213-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics