Abstract
In 2008, a group of researchers publicly released profile data collected from the Facebook accounts of an entire cohort of college students from a US university. While good-faith attempts were made to hide the identity of the institution and protect the privacy of the data subjects, the source of the data was quickly identified, placing the privacy of the students at risk. Using this incident as a case study, this paper articulates a set of ethical concerns that must be addressed before embarking on future research in social networking sites, including the nature of consent, properly identifying and respecting expectations of privacy on social network sites, strategies for data anonymization prior to public release, and the relative expertise of institutional review boards when confronted with research projects based on data gleaned from social media.
- Albrechtslund, A. (2008). Online social networking as participatory surveillance. First Monday Retrieved 2008, March 3, from http:// www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/ 2142/1949.Google Scholar
- Barbaro, M., & Zeller Jr, T. (2006). A face is exposed for AOL searcher no. 4417749. The New York Times, p. A1.Google Scholar
- Barnes, S. (2006). A privacy paradox: Social networking in the United States. First Monday Retrieved October 12, 2007, from http://www.firstmonday.org/ISSUES/issue11_9/barnes/.Google Scholar
- Bloustein, E. (1964). Privacy as an aspect of human dignity: An answer to Dean Prosser. New York University Law Review, 39, 962-1007.Google Scholar
- boyd, D. (2008a). Putting privacy settings in the context of use (in Facebook and elsewhere). Apophenia Retrieved October 22, 2008, from http://www.zephoria.org/thoughts/archives/2008/10/ 22/putting_privacy.html.Google Scholar
- boyd, D. (2008b). Taken out of context: American teen sociality in networked publics. Unpublished Dissertation, University of California-Berkeley.Google Scholar
- boyd, D., & Ellison, N. (2008). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), 210-230.Google Scholar
- Ess, C., & AoIR ethics working committee. (2002). Ethical decision-making and Internet research. Retrieved March 12, 2010, from http://www.aoir.org/reports/ethics.pdf.Google Scholar
- Gatt, A. (2002). Click-wrap agreements the enforceability of clickwrap agreements. Computer Law & Security Report, 18(6), 404-410.Google Scholar
- Grimmelmann, J. (2009). Facebook and the social dynamics of privacy. Iowa Law Review, 95, 4.Google Scholar
- Gross, R., & Acquisti, A. (2005). Information revelation and privacy in online social networks. Paper presented at the 2005 ACM workshop on Privacy in the electronic society, Alexandria, VA. Google Scholar
- Jansen, B. J., & Resnick, M. (2005). Examining searcher perceptions of and interactions with sponsored results. Paper presented at the Workshop on Sponsored Search Auctions at ACM Conference on Electronic Commerce, Vancouver, BC.Google Scholar
- Jansen, B. J., & Spink, A. (2005). How are we searching the world wide web? A comparison of nine search engine transaction logs. Information Processing & Management, 42(1), 248-263. Google ScholarCross Ref
- Kaufman, J. (2008a). Considering the sociology of Facebook: Harvard Research on Collegiate Social Networking {Video}.: Berkman Center for Internet & Society.Google Scholar
- Kaufman, J. (2008b). I am the Principal Investigator... {Blog comment}. On the "Anonymity" of the Facebook dataset Retrieved September 30, 2008, from http://michaelzimmer.org/ 2008/09/30/on-the-anonymity-of-the-facebook-dataset/.Google Scholar
- Kaufman, J. (2008c). Michael--We did not consult... {Blog comment}. michaelzimmer.org Retrieved September 30, 2008, from http://michaelzimmer.org/2008/09/30/on-the-anonymity-of-the-facebook-dataset/.Google Scholar
- Lenhart, A., & Madden, M. (2007). Teens, privacy & online social networks. Pew internet & American life project Retrieved April 20, 2007, from http://www.pewinternet.org/pdfs/PIP_Teens_ Privacy_SNS_Report_Final.pdf.Google Scholar
- Lewis, K. (2008). Tastes, Ties, and Time: Cumulative codebook. Retrieved September 30, 2008, from http://dvn.iq.harvard.edu/ dvn/dv/t3.Google Scholar
- Lewis, K., Kaufman, J., Gonzalez, M., Wimmer, A., & Christakis, N. (2008). Tastes, Ties, and time: A new social network dataset using Facebook. com. Social Networks, 30(4), 330-342.Google ScholarCross Ref
- McGeveran, W. (2007). Facebook, context, and privacy. Info/Law Retrieved October 3, 2008, from http://blogs.law.harvard.edu/ infolaw/2007/09/17/facebook-context/.Google Scholar
- N.A. (2008). Tastes, Ties, and Time: Facebook data release. Berkman Center for Internet & Society Retrieved September 30, 2008, from http://cyber.law.harvard.edu/node/4682.Google Scholar
- Narayanan, A., & Shmatikov, V. (2008). Robust de-anonymization of large sparse datasets. Paper presented at the IEEE Symposium on Security and Privacy, 2008. Google Scholar
- Narayanan, A., & Shmatikov, V. (2009). De-anonymizing social networks. Paper presented at the 30th IEEE Symposium on Security and Privacy. Google Scholar
- Nissenbaum, H. (1998). Protecting privacy in an information age: The problem of privacy in public. Law and Philosophy, 17(5), 559-596.Google Scholar
- Nissenbaum, H. (2004). Privacy as contextual integrity. Washington Law Review, 79(1), 119-157.Google Scholar
- Nissenbaum, H. (2009). Privacy in context: Technology, policy, and the integrity of social life. Stanford, CA: Stanford University Press. Google Scholar
- Nussbaum, E. (2007). Kids, the Internet, and the end of privacy. New York Magazine Retrieved February 13, 2007, from http://nymag.com/ news/features/27341/.Google Scholar
- Rosenbloom, S. (2007). On Facebook, scholars link up with data. New York Times Retrieved September 30, 2008, from http://www.ny times.com/2007/12/17/style/17facebook.html?ref=us.Google Scholar
- Simmel, G., & Wolff, K. H. (1964). The sociology of Georg Simmel. Glencoe, Ill: Free Press.Google Scholar
- Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly, 20(2), 167-196. Google ScholarDigital Library
- Solove, D. (2007). The future of reputation: Gossip, rumor, and privacy on the internet. New Haven, CT: Yale University Press. Google Scholar
- Stutzman, F. (2006). How Facebook broke its culture. Unit Structures Retrieved 2008, October 3, from http://chimprawk.blogspot.com/ 2006/09/how-facebook-broke-its-culture.html.Google Scholar
- Stutzman, F. (2008). Facebook datasets and private chrome. Unit Structures Retrieved 2008, September 30, from http://fstutzman.com/ 2008/09/29/facebook-datasets-and-private-chrome/.Google Scholar
- Sweeney, L. (2002). k-anonymity: A model for protecting privacy. International Journal of Uncertainty Fuzziness and Knowledge-Based Systems, 10(5), 557-570. Google ScholarDigital Library
- Wellman, B., & Berkowitz, S. D. (1988). Social structures: A network approach. Cambridge: University Press Cambridge.Google Scholar
- Zimmer, M. (2006). More on Facebook and the contextual integrity of personal information flows. michaelzimmer.org Retrieved 2008, October 3, from http://michaelzimmer.org/2006/09/08/more-on-facebook-and-the-contextual-integrity-of-personal-information-flows/.Google Scholar
- Zimmer, M. (2008a). More on the "Anonymity" of the Facebook dataset--It's Harvard College. michaelzimmer.org Retrieved October 3, 2008, from http://michaelzimmer.org/2008/10/03/more-on-the-anonymity-of-the-facebook-dataset-its-harvard-college/.Google Scholar
- Zimmer, M. (2008b). On the "Anonymity" of the Facebook dataset. michaelzimmer.org Retrieved September 30, 2008, from http:// michaelzimmer.org/2008/09/30/on-the-anonymity-of-the-face book-dataset/.Google Scholar
Recommendations
Privacy antecedents for SNS self-disclosure
Social networking sites privacy issues and self-disclosure are examined.A research model of privacy issues and self-disclosure is built.Structural equations modeling is used to assess the model fit.Path analysis is done to analyze hypothesis whereas 11 ...
Privacy in social networks
The only way to be aware of the risks and threats of Facebook, the most commonly used social networking site in the world and Turkey, is to be a careful user changing the default settings or simply not to have a Facebook account. In Turkey, there is ...
(α, k)-anonymous data publishing
Privacy preservation is an important issue in the release of data for mining purposes. The k-anonymity model has been introduced for protecting individual identification. Recent studies show that a more sophisticated model is necessary to protect the ...
Comments