Shujaat Mirza, Christina Pöpper (New York University)

Online social networks accumulate unprecedented amounts of data that continue to exist on user profiles long after the time of posting. Given that these platforms primarily provide a venue for people to connect and foster online friendships, the influence and the risks associated with longitudinal data may impact users and their reasons for using these platforms. To better understand these issues, we conducted two user studies of Facebook users analyzing the history of past postings w. r. t. to their perceived relevance, longitudinal exposure, and impact on the users’ befriending behavior. The studies give us a cross-cultural undergraduate student sample (n=89, campus study) and a Mechanical Turk sample of two cultural backgrounds from the US and India (n=209, MTurk study). Our findings reveal that a sizable group of participants consider their past postings irrelevant and, at times, embarrassing. However, participants’ awareness and usage of longitudinal privacy control features (e. g., Limit Past Posts) are limited, resulting in overexposure of their past postings and personal information. Importantly, we find support that these overexposed, yet irrelevant, past postings (of both participants and friend requesters) have the potential to influence users’ fundamental behavior on the platform: friend network expansion. Participants greatly valued friend requester’s past postings, particularly in the absence of prior personal interactions, but are influenced by their backgrounds (American users rely significantly more than their Indian counterparts on the requesters’ past postings for their befriending behavior). We close by discussing the implications of our findings on the future of longitudinal privacy controls.

View More Papers

Evaluating Personal Data Control In Mobile Applications Using Heuristics

Alain Giboin (UCA, INRIA, CNRS, I3S), Karima Boudaoud (UCA, CNRS, I3S), Patrice Pena (Userthink), Yoann Bertrand (UCA, CNRS, I3S), Fabien Gandon (UCA, INRIA, CNRS, I3S)

Read More

In Control with no Control: Perceptions and Reality of...

Jason Morris, Ingolf Becker, Simon Parkin (University College London)

Read More

A Devil of a Time: How Vulnerable is NTP...

Yarin Perry (The Hebrew University of Jerusalem), Neta Rozen-Schiff (The Hebrew University of Jerusalem), Michael Schapira (The Hebrew University of Jerusalem)

Read More

Evading Voltage-Based Intrusion Detection on Automotive CAN

Rohit Bhatia (Purdue University), Vireshwar Kumar (Indian Institute of Technology Delhi), Khaled Serag (Purdue University), Z. Berkay Celik (Purdue University), Mathias Payer (EPFL), Dongyan Xu (Purdue University)

Read More