facebook: threats to privacy this paper produce from student of master alan alyawir to dr.lo’ai...

46
Facebook: Threats to Privacy Facebook: Threats to Privacy This paper This paper Produce from student of master Produce from student of master alan alyawir alan alyawir To dr .lo’ai tawalbeh To dr .lo’ai tawalbeh

Upload: baldwin-rogers

Post on 27-Dec-2015

218 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

Facebook: Threats to PrivacyFacebook: Threats to Privacy

This paperThis paper

Produce from student of master alan alyawirProduce from student of master alan alyawir

To dr .lo’ai tawalbehTo dr .lo’ai tawalbeh

Page 2: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

AbstractAbstract

End-users share a wide variety of information on Facebook, but a discussion of the privacyEnd-users share a wide variety of information on Facebook, but a discussion of the privacyimplications of doing so has yet to emerge. We examined how Facebook aects privacy, andimplications of doing so has yet to emerge. We examined how Facebook aects privacy, andfound serious aws in the system. Privacy on Facebook is undermined by three principal factorsfound serious aws in the system. Privacy on Facebook is undermined by three principal factors::

users disclose too much, Facebook does not take adequate steps to protect user privacy, andusers disclose too much, Facebook does not take adequate steps to protect user privacy, andthird parties are actively seeking out end-user information using Facebook. We based our endthird parties are actively seeking out end-user information using Facebook. We based our end--user ndings on a survey of MIT students and statistical analysis of Facebook data from MITuser ndings on a survey of MIT students and statistical analysis of Facebook data from MIT,,

Harvard, NYU, and the University of Oklahoma. We analyzed the Facebook system in terms ofHarvard, NYU, and the University of Oklahoma. We analyzed the Facebook system in terms ofFair Information Practices as recommended by the Federal Trade Commission. In light of theFair Information Practices as recommended by the Federal Trade Commission. In light of theinformation available and the system that protects it, we used a threat model to analyze specicinformation available and the system that protects it, we used a threat model to analyze specicprivacy risks. Specically, university administrators are using Facebook for disciplinary purposesprivacy risks. Specically, university administrators are using Facebook for disciplinary purposes,,

rms are using it for marketing purposes, and intruders are exploiting security holes. For eachrms are using it for marketing purposes, and intruders are exploiting security holes. For eachthreat, we analyze the ecacy of the current protection, and where solutions are inadequatethreat, we analyze the ecacy of the current protection, and where solutions are inadequate,,we make recommendations on how to address the issuewe make recommendations on how to address the issue..

Page 3: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

11 IntroductionIntroduction

Facebook1 (www.facebook.com) is one of the foremost social networking websites, with over 8Facebook1 (www.facebook.com) is one of the foremost social networking websites, with over 8million users spanning 2,000 college campuses. [4] With this much detailed information arrangedmillion users spanning 2,000 college campuses. [4] With this much detailed information arrangeduniformly and aggregated into one place, there are bound to be risks to privacy. University aduniformly and aggregated into one place, there are bound to be risks to privacy. University ad--

ministrators or police ocers may search the site for evidence of students breaking their school'sministrators or police ocers may search the site for evidence of students breaking their school'sregulations. Users may submit their data without being aware that it may be shared with regulations. Users may submit their data without being aware that it may be shared with advertisersadvertisers..

Third parties may build a database of Facebook data to sell. Intruders may steal passwords, or Third parties may build a database of Facebook data to sell. Intruders may steal passwords, or entireentiredatabases, from Facebook. We undertook several steps to investigate these privacy risks. Our goaldatabases, from Facebook. We undertook several steps to investigate these privacy risks. Our goalwas to rst analyze the extent of disclosure of data, then to analyze the steps that the system tookwas to rst analyze the extent of disclosure of data, then to analyze the steps that the system tookto protect that data. Finally, we conducted a \threat model" analysis to investigate ways in whichto protect that data. Finally, we conducted a \threat model" analysis to investigate ways in whichthese factors could produce unwanted disclosure of private data. Our analysis found that Facebookthese factors could produce unwanted disclosure of private data. Our analysis found that Facebookwas rmly entrenched in college students' lives, but users had not restricted who had access to thiswas rmly entrenched in college students' lives, but users had not restricted who had access to thisportion of their life. We discovered questionable information practices with Facebook, and foundportion of their life. We discovered questionable information practices with Facebook, and foundthat third parties were actively seeking out informationthat third parties were actively seeking out information..

To analyze the extent of user disclosure, we constructed a spider that \crawls" and indexesTo analyze the extent of user disclosure, we constructed a spider that \crawls" and indexesFacebook, attempting to download every single prole at a given school. Using this tool, weFacebook, attempting to download every single prole at a given school. Using this tool, weindexed the entire Facebook accessible to a typical user at Massachusetts Institute of Technologyindexed the entire Facebook accessible to a typical user at Massachusetts Institute of Technology

))MITMIT ,( ,(Harvard, New York University (NYU), and the University of Oklahoma. To supplement thisHarvard, New York University (NYU), and the University of Oklahoma. To supplement thisdata, we surveyed the MIT student body to ascertain the level of use of certain Facebook featuresdata, we surveyed the MIT student body to ascertain the level of use of certain Facebook features..

Our study found that upwards of 80% of matriculating freshmen join Facebook before even arrivingOur study found that upwards of 80% of matriculating freshmen join Facebook before even arrivingfor Orientation, and that these users share signicant amounts of personal information. We alsofor Orientation, and that these users share signicant amounts of personal information. We alsofound that Facebook's privacy measures are not utilized by the majority of college studentsfound that Facebook's privacy measures are not utilized by the majority of college students

Page 4: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

To analyze the Facebook system we investigated the facets of the website, and of the terms of useTo analyze the Facebook system we investigated the facets of the website, and of the terms of useand compared them against the current standards of \Fair Information Practices" as dened byand compared them against the current standards of \Fair Information Practices" as dened bythe Federal Trade Commission, as well as the standards set by competing sites. Although manythe Federal Trade Commission, as well as the standards set by competing sites. Although manyFacebook features empower users to control their private information, there are still signicantFacebook features empower users to control their private information, there are still signicantshortcomings. Finally, we took the perspective of a third party acting in a self-interested mannershortcomings. Finally, we took the perspective of a third party acting in a self-interested manner,,

looking either for nancial gain or for assistance in the enforcement of university policy. We surveyedlooking either for nancial gain or for assistance in the enforcement of university policy. We surveyednews articles on the consequences of Facebook information disclosure, and interviewed students thatnews articles on the consequences of Facebook information disclosure, and interviewed students thatharvested data, as well as students who were punished for disclosing too much. Given the existingharvested data, as well as students who were punished for disclosing too much. Given the existingthreats to security, we constructed a threat model that attempted to address all possible categoriesthreats to security, we constructed a threat model that attempted to address all possible categoriesof privacy failures. From a systems perspective, there are a number of changes that can be madeof privacy failures. From a systems perspective, there are a number of changes that can be made,,

both to give the user a reasonable perception of the level of privacy protection available, and toboth to give the user a reasonable perception of the level of privacy protection available, and toprotect against disclosure to intruders. For each threat, we make recommendations for Facebook, its protect against disclosure to intruders. For each threat, we make recommendations for Facebook, its users, and college administrators. These include eliminating the consecutive prole IDs, using SSLusers, and college administrators. These include eliminating the consecutive prole IDs, using SSLfor login, extending \My Privacy" to cover photos, and educating end-users about privacy concernsfor login, extending \My Privacy" to cover photos, and educating end-users about privacy concerns..

Page 5: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

22 BackgroundBackground

2.12.1 Social Networking and FacebookSocial Networking and Facebook

Users share a variety of information about themselves on their Facebook proles, including photosUsers share a variety of information about themselves on their Facebook proles, including photos,,contact information, and tastes in movies and books. They list their \friends", including friends atcontact information, and tastes in movies and books. They list their \friends", including friends atother schools. Users can also specify what courses they are taking and join a variety of \groups" ofother schools. Users can also specify what courses they are taking and join a variety of \groups" ofpeople with similar interests (\Red Sox Nation", \Northern California"). The site is often used topeople with similar interests (\Red Sox Nation", \Northern California"). The site is often used toobtain contact information, to match names to faces, and to browse for entertainment. [4]obtain contact information, to match names to faces, and to browse for entertainment. [4]Facebook was founded in 2004 by Mark Zuckerburg, then a Harvard undergraduate. The siteFacebook was founded in 2004 by Mark Zuckerburg, then a Harvard undergraduate. The siteis unique among social networking sites in that it is focused around universities { \Facebook" isis unique among social networking sites in that it is focused around universities { \Facebook" isactually a collection of sites, each focused on one of 2,000 individual colleges. Users need anactually a collection of sites, each focused on one of 2,000 individual colleges. Users need an

@@college.edu email address to sign up for a particular college's account, and their privileges on college.edu email address to sign up for a particular college's account, and their privileges on thethesite are largely limited to browsing the proles of students of that collegesite are largely limited to browsing the proles of students of that college..

Over the last two years, Facebook has become xture at campuses nationwide, and FacebookOver the last two years, Facebook has become xture at campuses nationwide, and Facebookevolved from a hobby to a full-time job for Zuckerburg and his friends. In May 2005, Facebookevolved from a hobby to a full-time job for Zuckerburg and his friends. In May 2005, Facebookreceived $13 million dollars in venture funding. Facebook sells targeted advertising to users of itsreceived $13 million dollars in venture funding. Facebook sells targeted advertising to users of itssite, and parters with rms such as Apple and JetBlue to assist in marketing their products to site, and parters with rms such as Apple and JetBlue to assist in marketing their products to collegecollegestudents. [14]students. [14]

Page 6: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

2.22.2 Information that Facebook storesInformation that Facebook stores

First-party informationFirst-party information All data elds on Facebook may be left blank, aside from name, All data elds on Facebook may be left blank, aside from name, e-maile-mailaddress, and user status (one of: Alumnus/Alumna, Faculty, Grad Student, Sta, address, and user status (one of: Alumnus/Alumna, Faculty, Grad Student, Sta, Student, andStudent, andSummer Student). A minimal Facebook prole will only tell a user's name, date of joining, Summer Student). A minimal Facebook prole will only tell a user's name, date of joining, schoolschool,,

status, and e-mail address. Any information posted beyond these basic elds is posted status, and e-mail address. Any information posted beyond these basic elds is posted by the will ofby the will ofthe end user. Although the required amount of information for a Facebook account is the end user. Although the required amount of information for a Facebook account is minimal, theminimal, thetotal amount of information a user can post is quite large. User-congurable setting on total amount of information a user can post is quite large. User-congurable setting on FacebookFacebookcan be divided into eight basic categories: prole, friends, photos, groups, events, can be divided into eight basic categories: prole, friends, photos, groups, events, messages, accountmessages, accountsettings, and privacy settings. For the purposes of this paper, we will investigate proles, settings, and privacy settings. For the purposes of this paper, we will investigate proles, friendsfriends,,and privacy settingsand privacy settings..

Prole information is divided into six basic categories: Basic, Contact Info, Personal, Prole information is divided into six basic categories: Basic, Contact Info, Personal, ProfesProfes--

sional, Courses, and Picture. All six of these categories allow a user to post personally sional, Courses, and Picture. All six of these categories allow a user to post personally identiableidentiableinformation to the service. Users can enter information about their home towns, their information to the service. Users can enter information about their home towns, their currentcurrentresidences and other contact information, personal interests, job information, and a residences and other contact information, personal interests, job information, and a

descriptive phodescriptive photographtograph- -

Page 7: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

. .We will investigate the amount and kind of information a typical user at a given school isWe will investigate the amount and kind of information a typical user at a given school is

able to see, and look for trends. A major goal of Facebook is to allow users to interact with eachable to see, and look for trends. A major goal of Facebook is to allow users to interact with each

other online. Users dene each other as friends through the service, creating a visible connectionother online. Users dene each other as friends through the service, creating a visible connection..

Page 8: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

Third-party informationThird-party information

Two current features of Facebook have to do with third parties associTwo current features of Facebook have to do with third parties associ--ating information with a user's prole. The \Wall" allows other users a bulletin board of ating information with a user's prole. The \Wall" allows other users a bulletin board of sorts on asorts on auser's prole page. Other users can leave notes, birthday wishes, and personal user's prole page. Other users can leave notes, birthday wishes, and personal messages. The \Mymessages. The \MyPhotos" service allows users to upload, store and view photos. Users can append Photos" service allows users to upload, store and view photos. Users can append metadata to themetadata to thephotographs that allows other users to see who is in the photographs, and where in the photographs that allows other users to see who is in the photographs, and where in the photographphotographthey are located. These tags can be cross-linked to user proles, and searched from a they are located. These tags can be cross-linked to user proles, and searched from a search dialogsearch dialog..

The only recourse a user has against an unwelcome Facebook photo posted by The only recourse a user has against an unwelcome Facebook photo posted by someone else, asidesomeone else, asidefrom asking them to remove it, is to manually remove the metadata tag of their name, from asking them to remove it, is to manually remove the metadata tag of their name, individuallyindividually,,

from each photograph. Users may disable others' access to their Wall, but not to the from each photograph. Users may disable others' access to their Wall, but not to the Photos featurePhotos feature..

Page 9: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

My PrivacyMy Privacy

Facebook's privacy features give users a good deal of exibility in who is Facebook's privacy features give users a good deal of exibility in who is allowed toallowed to

see their information. By default, all other users at a user's school are see their information. By default, all other users at a user's school are allowed to see any informationallowed to see any information

a user posts to the service. The privacy settings page allows a user to a user posts to the service. The privacy settings page allows a user to specify who can see them inspecify who can see them in

searches, who can see their prole, who can see their contact info, and searches, who can see their prole, who can see their contact info, and which elds other users canwhich elds other users can

see. In addition, the privacy settings page allows users to block specic see. In addition, the privacy settings page allows users to block specic people from seeing theirpeople from seeing their

prole. As per the usage agreement, a user can request Facebook to not prole. As per the usage agreement, a user can request Facebook to not share information withshare information with

third parties, though the method of specifying this is not located on the third parties, though the method of specifying this is not located on the privacy settings pageprivacy settings page..

Page 10: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

33 Principles and Methods of ResearchPrinciples and Methods of ResearchIn order to investigate the ways in which Facebook is used, we closely investigated the In order to investigate the ways in which Facebook is used, we closely investigated the usage patternsusage patternsof Facebook. We employ two methods of data collection to learn more about the way of Facebook. We employ two methods of data collection to learn more about the way users interactusers interactwith Facebook. First, we conducted a survey of MIT students on the use of Facebook's with Facebook. First, we conducted a survey of MIT students on the use of Facebook's featuresfeatures..Second, we harvested data from the Facebook site directlySecond, we harvested data from the Facebook site directly..

3.13.1 Usage patterns of interestUsage patterns of interest..

Our main objective in gathering and analyzing Facebook user data was to make Our main objective in gathering and analyzing Facebook user data was to make statements andstatements andgeneralizations regarding the way users use their Facebook accounts. We investigated generalizations regarding the way users use their Facebook accounts. We investigated when userswhen userscreate their accounts, and which kinds of users create accounts. Though the friending create their accounts, and which kinds of users create accounts. Though the friending service is of great interest to social network research, for the purposes of our paper, we service is of great interest to social network research, for the purposes of our paper, we primarily investigatedprimarily investigatedthe number of friends users have on the service as an indicator of use, and look for the number of friends users have on the service as an indicator of use, and look for trendstrends..

Page 11: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh
Page 12: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

3.23.2 User surveysUser surveys

Our direct user data collection procedure employed both paper surveys and Web based forms to Our direct user data collection procedure employed both paper surveys and Web based forms to askaskindividual users questions concerning their Facebook practicesindividual users questions concerning their Facebook practices..

In designing our survey, we aimed for a minimum number of straightforward, multiple choiceIn designing our survey, we aimed for a minimum number of straightforward, multiple choicequestions which would serve to reveal usage patterns, familiarity with various aspects of the questions which would serve to reveal usage patterns, familiarity with various aspects of the serviceservice,,

and opinions on the quality of the service. The questions asked about the subject's gender, and opinions on the quality of the service. The questions asked about the subject's gender, residenceresidence,,

and status, their date of joining Facebook and utilization thereof. It also asked about their and status, their date of joining Facebook and utilization thereof. It also asked about their knowledgeknowledgeof Facebook's Terms of Service, Privacy Policy, and privacy features, as well as their familiarity withof Facebook's Terms of Service, Privacy Policy, and privacy features, as well as their familiarity withFacebook's practices. We designed the survey such that it would t on one printed page, andFacebook's practices. We designed the survey such that it would t on one printed page, andtake approximately three minutes to complete. The complete text of our survey is included as antake approximately three minutes to complete. The complete text of our survey is included as anappendixappendix..

In order to diversify the survey results, we gathered data through four routes. We set up a tableIn order to diversify the survey results, we gathered data through four routes. We set up a tablein the MIT Student Center, oering students a chocolate-based incentive for completing surveysin the MIT Student Center, oering students a chocolate-based incentive for completing surveys..

We asked classmates in Public Policy, MIT course 17.30J/11.002J, to complete the survey. ViaWe asked classmates in Public Policy, MIT course 17.30J/11.002J, to complete the survey. Viae-mail, we asked the residents of the East Campus, Burton-Conner, Simmons Hall, and Randome-mail, we asked the residents of the East Campus, Burton-Conner, Simmons Hall, and RandomHall dormitories to complete the surveys. Finally, we asked all survey takers to notify others of theHall dormitories to complete the surveys. Finally, we asked all survey takers to notify others of thesurveysurvey..

Page 13: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

3.33.3 Direct data collectionDirect data collection

Our collection of data directly from Facebook served two principles. It served as a proof of Our collection of data directly from Facebook served two principles. It served as a proof of conceptconcept,,

to demonstrate that it is possible for an individual to automatically gather large amounts of datato demonstrate that it is possible for an individual to automatically gather large amounts of data

from Facebook. The collection of data was not entirely trivial, but we were able to produce thefrom Facebook. The collection of data was not entirely trivial, but we were able to produce the

scripts necessary to do so within 48 hours. Also, the collection of data from Facebook will providescripts necessary to do so within 48 hours. Also, the collection of data from Facebook will provide

us with a large, nearly exhaustive and statistically signicant data set, from which we can drawus with a large, nearly exhaustive and statistically signicant data set, from which we can draw

valuable conclusions on usage trendsvaluable conclusions on usage trends..

3.43.4 Obscuring personal dataObscuring personal data

Before analyzing data, we aggregated it into a spreadsheet. When we considered sets of more Before analyzing data, we aggregated it into a spreadsheet. When we considered sets of more thanthan

one record, we obscured data we deemed to be personally identiable { Name, Phone Number, one record, we obscured data we deemed to be personally identiable { Name, Phone Number, AOLAOL

Screenname, High School, and Dormitory. These elds were unchanged if left blank by the userScreenname, High School, and Dormitory. These elds were unchanged if left blank by the user,,

and replaced by \OBSCURED"2and replaced by \OBSCURED"2..

Page 14: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

3.53.5 A brief technical description of Facebook from a user perspectiveA brief technical description of Facebook from a user perspective

Facebook uses server-side Hypertext Preprocesser (PHP) scripts and applications to host and Facebook uses server-side Hypertext Preprocesser (PHP) scripts and applications to host and formatformatthe content available on the service. Content is stored centrally on Facebook servers. Scripts andthe content available on the service. Content is stored centrally on Facebook servers. Scripts andapplications at Facebook get, process, and lter information on demand, and deliver it to users inapplications at Facebook get, process, and lter information on demand, and deliver it to users inreal time, to a Web browser over the Internet. Users begin their Facebook session at the service'sreal time, to a Web browser over the Internet. Users begin their Facebook session at the service's

top level site, http://www.facebook.comtop level site, http://www.facebook.com././At the main Facebook page, a user can log in to the service, or browse the small amount ofAt the main Facebook page, a user can log in to the service, or browse the small amount ofinformation available to the general public. The main page of the service is spartan, and does notinformation available to the general public. The main page of the service is spartan, and does notprovide any personally identiable information or technical insight. Facebook does require a schoolprovide any personally identiable information or technical insight. Facebook does require a schoole-mail address to use their servicee-mail address to use their service..

To log in to Facebook, users enter their username and password into the appropriate elds onTo log in to Facebook, users enter their username and password into the appropriate elds onthe page, and click Login. This sends a special URL to the servicethe page, and click Login. This sends a special URL to the service::

http : ==www:facebook:com=login:php?email = USERNAME@SCHOOL:edu&pass = PASSWORDhttp : ==www:facebook:com=login:php?email = USERNAME@SCHOOL:edu&pass = PASSWORD))11((

Note that this URL contains a user's login credentials in clear text. This information is vulnerableNote that this URL contains a user's login credentials in clear text. This information is vulnerableto detection by a third party. No secure socket layer (SSL) or other encryption is used in logging into detection by a third party. No secure socket layer (SSL) or other encryption is used in logging intot he servicetot he service..

Page 15: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

During the login process, the service provides the user's web browser with some informationDuring the login process, the service provides the user's web browser with some information,,which is stored in the form of a cookie. Some of this information, such as the user's e-mail which is stored in the form of a cookie. Some of this information, such as the user's e-mail addressaddress,,

is written to a le so the user does not have to enter his or her e-mail at the next login. Facebook'sis written to a le so the user does not have to enter his or her e-mail at the next login. Facebook'sservice creates and gives a user a unique checksum at every login, which the browser stores as aservice creates and gives a user a unique checksum at every login, which the browser stores as asession cookie and generally does not write to a le. This checksum varies from login to login, butsession cookie and generally does not write to a le. This checksum varies from login to login, butother parameters do notother parameters do not..

Once logged in to the service, a user is free to interact with Facebook. The user may edit theirOnce logged in to the service, a user is free to interact with Facebook. The user may edit theirprole, look at others' proles, add or change their friends lost or personally identiable informationprole, look at others' proles, add or change their friends lost or personally identiable information,,and explore the serviceand explore the service..

The majority of features on Facebook are requested via simple, human-readable URLs. ForThe majority of features on Facebook are requested via simple, human-readable URLs. Forexample, prole URLs are retrieved by requesting a URL of the formexample, prole URLs are retrieved by requesting a URL of the form::

http : ==SCHOOL:facebook:com=profile:php?id = USERID (2)http : ==SCHOOL:facebook:com=profile:php?id = USERID (2)Facebook will read the school and user ID, and give the user either the requested user's prole Facebook will read the school and user ID, and give the user either the requested user's prole pagepage,,

ltered for privacy by the user's request before being delivered, or return the user's home page ifltered for privacy by the user's request before being delivered, or return the user's home page ifthe prole he requested is blocked or does not exist. The rst user at every school is called \Thethe prole he requested is blocked or does not exist. The rst user at every school is called \TheCreator." This prole's USERID is the lowest userid at any given school. The date of its creation isCreator." This prole's USERID is the lowest userid at any given school. The date of its creation isthe date which Facebook was opened to that school. User Ids continue to be assigned sequentiallythe date which Facebook was opened to that school. User Ids continue to be assigned sequentiallyfrom the rst valid number, created at the time of creation of each new accountfrom the rst valid number, created at the time of creation of each new account..

Page 16: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

Facebook's human-readable URLs and regularly formatted HTML make automated Facebook's human-readable URLs and regularly formatted HTML make automated acquisitionacquisition,,

parsing, and analysis relatively easy. We discuss how we and others have done this in parsing, and analysis relatively easy. We discuss how we and others have done this in the nextthe nextsectionsection..

Each separate school has its own Facebook \server" for its content. Users with a schoolEach separate school has its own Facebook \server" for its content. Users with a schoole-mail address @SCHOOL.edu will go through http://SCHOOL.facebook.com/. For the e-mail address @SCHOOL.edu will go through http://SCHOOL.facebook.com/. For the mostmostpart, many of these \servers" redirect to the same machine. For example, part, many of these \servers" redirect to the same machine. For example, harvard.facebook.comharvard.facebook.com,,

mit.facebook.com, nyu.facebook.com, and ou.facebook.com all redirect to mit.facebook.com, nyu.facebook.com, and ou.facebook.com all redirect to 204.15.20.25. This ar204.15.20.25. This ar--

chitecture allows Facebook to easily move dierent schools to dierent servers if chitecture allows Facebook to easily move dierent schools to dierent servers if necessarynecessary..

By default, a new user's prole and all information are fully visible to all other users at the By default, a new user's prole and all information are fully visible to all other users at the samesameschool, but not visible to anyone at another school. Many users do not change their school, but not visible to anyone at another school. Many users do not change their default settingsdefault settings,,making their information accessiblemaking their information accessible..

When a user logs out of Facebook or closes their web browser, the session cookies are When a user logs out of Facebook or closes their web browser, the session cookies are lost. Thislost. Thisgenerally means that once a user exits the service, they must enter at least their generally means that once a user exits the service, they must enter at least their password to usepassword to usethe service againthe service again..

Page 17: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

3.5.13.5.1 Data acquisitionData acquisition

We are not the rst to download user proles from Facebook in large numbers. In the past, othersWe are not the rst to download user proles from Facebook in large numbers. In the past, othershave utilized Facebook's use of predictable, easy to understand URLs to automatically requesthave utilized Facebook's use of predictable, easy to understand URLs to automatically requestinformation and save user information for further analysis. Our approach used the incrementalinformation and save user information for further analysis. Our approach used the incrementalprole identier to download information in large quantitiesprole identier to download information in large quantities..The algorithm we used to gather this data is very straightforwardThe algorithm we used to gather this data is very straightforward::

11 . .Log in to Facebook and save session cookiesLog in to Facebook and save session cookies..22 . .Load your home page and note the USERID of the pageLoad your home page and note the USERID of the page..

33 . .Decrease the USERID until you nd the ID of \The Creator," the rst prole at a given schoolDecrease the USERID until you nd the ID of \The Creator," the rst prole at a given school..Save this number as USERID-LOWSave this number as USERID-LOW..

44 . .Increase the USERID until you nd the ID of a user who joined recently, i.e. within the pastIncrease the USERID until you nd the ID of a user who joined recently, i.e. within the pastday. Save this number as USERID-HIGHday. Save this number as USERID-HIGH..

55 . .For every prole from USERID-LOW to USERID-HIGH at a given school SCHOOL: Get theFor every prole from USERID-LOW to USERID-HIGH at a given school SCHOOL: Get theprole, using URLprole, using URLhttp : ==SCHOOL:facebook:com=profile:php?id = USERID (3)http : ==SCHOOL:facebook:com=profile:php?id = USERID (3)

, ,and save the prole as a leand save the prole as a le..To implement our algorithm, we used wget, \the non-interactive network downloader." InTo implement our algorithm, we used wget, \the non-interactive network downloader." Inaddition to implementing the above algorithm, we made wget pretend to be another web browseraddition to implementing the above algorithm, we made wget pretend to be another web browserby changing its user agent (to avoid potential suspicion at using wget to log in to Facebook). Weby changing its user agent (to avoid potential suspicion at using wget to log in to Facebook). Wealso had wget randomly insert a delay between requests, to keep load o of Facebook's servers andalso had wget randomly insert a delay between requests, to keep load o of Facebook's servers andmake our requests less dicult to detect. We took advantage of the fact that logins and passwordsmake our requests less dicult to detect. We took advantage of the fact that logins and passwordsare not encrypted, and can be sent as part of the login URL as an email and password pairare not encrypted, and can be sent as part of the login URL as an email and password pair..The nal application we used to download proles was a short (ve line!) BASH shell scriptThe nal application we used to download proles was a short (ve line!) BASH shell script,,which we include in the appendixwhich we include in the appendix..

We ran this script four times: once for Harvard, MIT, the University of Oklahoma (OU), andWe ran this script four times: once for Harvard, MIT, the University of Oklahoma (OU), andNew York University (NYU)New York University (NYU)..

Page 18: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

Collected Facebook dataCollected Facebook data

In general, we were able to collect large numbers of user prolesIn general, we were able to collect large numbers of user proles

from Facebook using our information collection system. We exhaustively downloaded every prolefrom Facebook using our information collection system. We exhaustively downloaded every prole

available at our four subject schools, so there is no sampling uncertainty, as long as we limit ouravailable at our four subject schools, so there is no sampling uncertainty, as long as we limit our

conclusions to generalizations about the population of students with accessible Facebook prolesconclusions to generalizations about the population of students with accessible Facebook proles..

We will attempt to statistically correlate certain variables to prove hypotheses, and at other pointsWe will attempt to statistically correlate certain variables to prove hypotheses, and at other points

we will show raw data when we want to indicate a trend. The following table summarizes our successwe will show raw data when we want to indicate a trend. The following table summarizes our success

in downloading informationin downloading information..

Page 19: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

Aggregate StatisticsAggregate Statistics

We established a "disclosure score" to quantitatively rank the amount ofWe established a "disclosure score" to quantitatively rank the amount of

PII disclosed by dierent colleges, classes, and genders. The overall score is the sum of PII disclosed by dierent colleges, classes, and genders. The overall score is the sum of the percentthe percent--

age disclosure of (Gender, Major, Dorm, High School, AIM Screenname, Mobile age disclosure of (Gender, Major, Dorm, High School, AIM Screenname, Mobile Phone, InterestsPhone, Interests,,

Clubs, Music, Movies, and Books). From there, we created two sub-scores, one to Clubs, Music, Movies, and Books). From there, we created two sub-scores, one to reect contactreect contact

information that could conceivably be used to contact or locate users (Dorm, AIM information that could conceivably be used to contact or locate users (Dorm, AIM Screenname, MoScreenname, Mo--

bile Phone, and Clubs/Jobs), as well as a sub-score reecting disclosure of user bile Phone, and Clubs/Jobs), as well as a sub-score reecting disclosure of user interests (Interestsinterests (Interests,,

Clubs/Jobs, Music, Movies, and BooksClubs/Jobs, Music, Movies, and Books.(.(

Page 20: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

44 End-Users' Interaction with FacebookEnd-Users' Interaction with Facebook4.14.1 Major trendsMajor trends

After processing the results of our user survey and downloaded Facebook proles, we After processing the results of our user survey and downloaded Facebook proles, we found somefound somegeneral trends in Facebook usage. Facebook is ubiquitous at the schools where it has general trends in Facebook usage. Facebook is ubiquitous at the schools where it has been estabbeen estab--

lished. Users put real time and eort into their proles. Students tend to join as soon as lished. Users put real time and eort into their proles. Students tend to join as soon as possiblepossible,,

often before arriving on campus. Users share lots of information but do not guard it. often before arriving on campus. Users share lots of information but do not guard it. Users giveUsers giveimperfect explicit consent to the distribution and sharing of their information. Privacy imperfect explicit consent to the distribution and sharing of their information. Privacy concernsconcernsdier across gendersdier across genders..

In the following pages, we analyze the collected data along numerous lines, and In the following pages, we analyze the collected data along numerous lines, and statisticallystatisticallyjustify our ndings. Our full numerical ndings are included in the appendixjustify our ndings. Our full numerical ndings are included in the appendix..

Page 21: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh
Page 22: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

4.24.2 Facebook is ubiquitousFacebook is ubiquitous

Possession of a Facebook account Survey results indicated that large majority of MIT studentsPossession of a Facebook account Survey results indicated that large majority of MIT studentshave Facebook proles. Of 413 respondents, 374 (91%) claimed to have Facebook accounts, have Facebook proles. Of 413 respondents, 374 (91%) claimed to have Facebook accounts, whilewhileonly 39 (9%) did not. Indexing the Facebook seemed to indicate a similar result; the vast only 39 (9%) did not. Indexing the Facebook seemed to indicate a similar result; the vast majoritymajorityof undergraduates have Facebook accounts. Although fake accounts could bloat the number ofof undergraduates have Facebook accounts. Although fake accounts could bloat the number ofaccounts, the fact that the Facebook user base is quite similar to the MIT undergraduate accounts, the fact that the Facebook user base is quite similar to the MIT undergraduate populationpopulationpoint to the fact that a large percentage of Facebook users are genuine. There are 948, 1016, point to the fact that a large percentage of Facebook users are genuine. There are 948, 1016, and 921and 921accounts that provide the class years of 2007, 2008, and 2009, respectively, compared to a accounts that provide the class years of 2007, 2008, and 2009, respectively, compared to a class sizeclass sizeof roughly 1,000. As shown below, the majority of Facebook accounts are updated at least of roughly 1,000. As shown below, the majority of Facebook accounts are updated at least monthlymonthly,,

which ts the prole of large numbers of users updating information about themselves. Aside fromwhich ts the prole of large numbers of users updating information about themselves. Aside fromher romantic attachments perhaps, a Paris Hilton account3 would not need to be constantly her romantic attachments perhaps, a Paris Hilton account3 would not need to be constantly updatedupdated..

At NYU, where potential pranksters are limited to two e-mail addresses[18], the number of At NYU, where potential pranksters are limited to two e-mail addresses[18], the number of accountsaccountsfor the classes of 2007-2009 (3850, 4012, 4076) correspond closely to the class sizes of 4,250. for the classes of 2007-2009 (3850, 4012, 4076) correspond closely to the class sizes of 4,250. [16][16]

Page 23: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

4.34.3 Users put time and eort into profilesUsers put time and eort into profiles

The vast majority of users update their accounts frequently, with over half updating in NovemberThe vast majority of users update their accounts frequently, with over half updating in November2005420054 . .This indicates that not only do the majority of undergraduates have Facebook accounts, theThis indicates that not only do the majority of undergraduates have Facebook accounts, the

majority of them also keep them constantly updatedmajority of them also keep them constantly updated..

4.44.4 Students join Facebook before arriving on campusStudents join Facebook before arriving on campus

We looked at the distributions of prole creating dates of members of the classes of 2008, and 2009We looked at the distributions of prole creating dates of members of the classes of 2008, and 2009..The class of 2008 enrolled at MIT admission and had access to Athena by May of 2004, whereasThe class of 2008 enrolled at MIT admission and had access to Athena by May of 2004, whereasthe class of 2009, the current freshman class, had Athena accounts by May of 2005 5. Note thatthe class of 2009, the current freshman class, had Athena accounts by May of 2005 5. Note thatMIT admits classes of approximately 1,000 freshmenMIT admits classes of approximately 1,000 freshmen..

Members of the MIT class of 2008 tended to create their proles as soon as they heard aboutMembers of the MIT class of 2008 tended to create their proles as soon as they heard aboutFacebook, which was generally over the summer or during orientation. The majority of the class ofFacebook, which was generally over the summer or during orientation. The majority of the class of

20082008 joined Facebook from June 2004 to August 2004. In this time, 699 members of the class ofjoined Facebook from June 2004 to August 2004. In this time, 699 members of the class of20082008 created their proles. Approximately 100 created their proles in May of 2004 (i.e. as soon ascreated their proles. Approximately 100 created their proles in May of 2004 (i.e. as soon as

they could), and the remainder created their proles at later times, dropping to approximately 10they could), and the remainder created their proles at later times, dropping to approximately 10per month. We were able to access 1016 members of the class of 2008 with Facebook proles6per month. We were able to access 1016 members of the class of 2008 with Facebook proles6..

The class of 2009 had an even more pronounced spike at matriculation time, indicating theThe class of 2009 had an even more pronounced spike at matriculation time, indicating theextraordinary draw of the Facebook. During May and June of 2005, 538 members of the class ofextraordinary draw of the Facebook. During May and June of 2005, 538 members of the class of

20092009 created Facebook accounts. At present, 921 members of the class of 2009 have unrestrictedcreated Facebook accounts. At present, 921 members of the class of 2009 have unrestrictedFacebook accountsFacebook accounts..At other schools, users exhibit similar behavior in creating their Facebook proles. StrikinglyAt other schools, users exhibit similar behavior in creating their Facebook proles. Strikingly,,

over 948 (roughly 60%) Harvard Class of 2009 freshmen created their accounts within a monthover 948 (roughly 60%) Harvard Class of 2009 freshmen created their accounts within a monthof getting their email address. Freshmen create their accounts as soon as they can. The Harvardof getting their email address. Freshmen create their accounts as soon as they can. The Harvardtrends are even more pronounced as we can see from the graph, with most 2008 freshmen signing uptrends are even more pronounced as we can see from the graph, with most 2008 freshmen signing up

Page 24: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh
Page 25: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

4.54.5 A substantial proportion of students share identiable informationA substantial proportion of students share identiable information

Facebook users at MIT tend to give a large amount of personal information, Facebook users at MIT tend to give a large amount of personal information, and tend not to restrictand tend not to restrict

access to it. Furthermore, Facebook users are more wary of some kinds of access to it. Furthermore, Facebook users are more wary of some kinds of personal information thanpersonal information than

others. Users were most willing to indicate their high school, and became others. Users were most willing to indicate their high school, and became increasingly protective ofincreasingly protective of

their information regarding residence hall, interests, screen name, music their information regarding residence hall, interests, screen name, music interests, favorite moviesinterests, favorite movies,,

favorite books, clubs and jobs, and mobile telephone numberfavorite books, clubs and jobs, and mobile telephone number..

Page 26: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

4.64.6 The most active users disclose the mostThe most active users disclose the most

Users who frequently update their profiles tend to be even more open. Of the 5279 Users who frequently update their profiles tend to be even more open. Of the 5279 MIT profilesMIT profiles

updated on or after September 1, 2005, we found that, although the general trends updated on or after September 1, 2005, we found that, although the general trends of relativeof relative

disclosure did not change, the relative willingness to disclose all information disclosure did not change, the relative willingness to disclose all information increasedincreased..

Using another heuristic for determining active users, users with lots of friends tend to Using another heuristic for determining active users, users with lots of friends tend to be muchbe much

more forthcoming with their personal information, particularly that which might be more forthcoming with their personal information, particularly that which might be valuable tovaluable to

advertisersadvertisers..

Facebook has grown extremely rapidly, establishing a user base of 8,000,000 users, Facebook has grown extremely rapidly, establishing a user base of 8,000,000 users, and close toand close to

100%100% penetration at certain schools. If Facebook continues to grow in popularity, the penetration at certain schools. If Facebook continues to grow in popularity, the average useraverage user

will likely become more and more like the \well-connected" user. If this trend will likely become more and more like the \well-connected" user. If this trend continues, the levelcontinues, the level

Page 27: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh
Page 28: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh
Page 29: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

4.74.7 Undergraduates share the most, and classes keep sharing moreUndergraduates share the most, and classes keep sharing more

As shown in the table below, undergraduates share much more data than average, in As shown in the table below, undergraduates share much more data than average, in almost everyalmost everycase. As the majority of new registrants for Facebook each year are going to be case. As the majority of new registrants for Facebook each year are going to be undergraduatesundergraduates,,

and the undergraduates most likely to disclose information no less, this is another and the undergraduates most likely to disclose information no less, this is another indication thatindication thatmore and more data will become available on Facebookmore and more data will become available on Facebook..

Dierence between classesDierence between classes In order to determine if there is a statistically signicant dierenceIn order to determine if there is a statistically signicant dierencebetween courses, we attempted to correlate disclosure scores to class years. We ran between courses, we attempted to correlate disclosure scores to class years. We ran a regressiona regressionof number of years in attendance at the college7 against the disclosure index, and of number of years in attendance at the college7 against the disclosure index, and the contact andthe contact andinterest subscores. We did this at all four schools, and the result was that all interest subscores. We did this at all four schools, and the result was that all disclosure scores weredisclosure scores wereweakly correlated to class year (r = -.496 for the overall score, r = -.151 for the weakly correlated to class year (r = -.496 for the overall score, r = -.151 for the contact score, andcontact score, and

.-.-187187 for the interest score.). This means that there is a correlation between being in for the interest score.). This means that there is a correlation between being in a youngera youngerclass and disclosing more informationclass and disclosing more information..

Page 30: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

4.84.8 Dierences among universitiesDierences among universities

Among the four universities we investigated, we found subtle dierences in Among the four universities we investigated, we found subtle dierences in the way student interactthe way student interactwith Facebook. Of the universities, Harvard provided us with the lowest with Facebook. Of the universities, Harvard provided us with the lowest percentage of visible prolespercentage of visible prolesfrom existing proles (66%), whereas MIT provided the highest (79%). from existing proles (66%), whereas MIT provided the highest (79%). Students at the UniversityStudents at the Universityof Oklahoma were much less likely to share contact information (such as of Oklahoma were much less likely to share contact information (such as residence, screen nameresidence, screen name,,

and mobile phone number) than students from any other university in our and mobile phone number) than students from any other university in our study. On the other handstudy. On the other hand,,

students at Oklahoma were the most forthcoming about their tastes in students at Oklahoma were the most forthcoming about their tastes in books, movies, and musicbooks, movies, and music..

The dierences we found really speak to the notion that Facebook is dierent The dierences we found really speak to the notion that Facebook is dierent at every school itat every school itsupports. The dierences we noted are probably a function of many variables supports. The dierences we noted are probably a function of many variables specic to the schoolspecic to the school,,

such as the social atmospheres at the school, policies on information such as the social atmospheres at the school, policies on information sharing, administrative advicesharing, administrative adviceon Facebook usage, and so on. Such topics are outside the scope of this on Facebook usage, and so on. Such topics are outside the scope of this paperpaper..

Page 31: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh
Page 32: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

4.94.9 Even more students share commercially valuable informationEven more students share commercially valuable information

The information most relevant to advertisers would likely be demographic data (age, The information most relevant to advertisers would likely be demographic data (age, gender, location)gender, location)

as paired with interests. In general, over 70% of users are willing to disclose both as paired with interests. In general, over 70% of users are willing to disclose both categories ofcategories of

information, making the Facebook a valuable trove of demographic data for information, making the Facebook a valuable trove of demographic data for marketers. In additionmarketers. In addition,,

this database of interests could easily be cross-referenced by a database from a this database of interests could easily be cross-referenced by a database from a third-party venthird-party ven--

dor, matching the details about users' interests and current location to addresses, dor, matching the details about users' interests and current location to addresses, phone numbersphone numbers,,

and social security numbers. As shown above, dedicated users have a tendency to and social security numbers. As shown above, dedicated users have a tendency to disclose thisdisclose this

information much more often, which may be a leading indicator of even greater information much more often, which may be a leading indicator of even greater disclosuredisclosure..

Page 33: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

4.104.10 Users are not guarded about who sees their informationUsers are not guarded about who sees their information

Knowledge and use of \My Privacy" featureKnowledge and use of \My Privacy" feature

As a whole, users are familiar with the privacyAs a whole, users are familiar with the privacy

features Facebook oers, and choose not to use them. Of 389 users features Facebook oers, and choose not to use them. Of 389 users indicating familiarity with \Myindicating familiarity with \My

Privacy", 289 (74%) say they are familiar with \My Privacy," while 100 (26%) Privacy", 289 (74%) say they are familiar with \My Privacy," while 100 (26%) say they are notsay they are not..

At the same time, of the 380 users who gave information regarding their use At the same time, of the 380 users who gave information regarding their use of \My Privacy," 234of \My Privacy," 234

))62%62% ( (said they use the feature, while 146 (38%) said they do not. Actively said they use the feature, while 146 (38%) said they do not. Actively choosing to not usechoosing to not use

\\My Privacy" indicates that users believe there is a benet to providing My Privacy" indicates that users believe there is a benet to providing information and allowinginformation and allowing

others to see itothers to see it..

Page 34: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

Concerns about Facebook privacyConcerns about Facebook privacy As a whole, survey respondents expressly indicated low conAs a whole, survey respondents expressly indicated low con--

cern for Facebook's privacy policies. Of 329 respondents, 76 (23%) are not concerned with cern for Facebook's privacy policies. Of 329 respondents, 76 (23%) are not concerned with FacebookFacebookprivacy, 117 (35.5%) are barely concerned, 104 (31.6%) are somewhat concerned, 20 (6.1%) areprivacy, 117 (35.5%) are barely concerned, 104 (31.6%) are somewhat concerned, 20 (6.1%) arequite concerned, and 12 (3.6%) are very concernedquite concerned, and 12 (3.6%) are very concerned..

Likelihood of \friending" strangersLikelihood of \friending" strangers . .Facebook users at MIT tend to friend people they knowFacebook users at MIT tend to friend people they know,,

doing so almost exclusively. Of the 383 respondents to this question, 243 people (63.45%) neverdoing so almost exclusively. Of the 383 respondents to this question, 243 people (63.45%) neverfriend strangers, 110 people (28.72%) friend strangers on occasion, and 30 (7.83%) claim to friend strangers, 110 people (28.72%) friend strangers on occasion, and 30 (7.83%) claim to friendfriendstrangers. Although this seems like an intuitive notion, it merits further attention. Only allowingstrangers. Although this seems like an intuitive notion, it merits further attention. Only allowingpeople whom users know in real life to access their information is a good Facebook security people whom users know in real life to access their information is a good Facebook security strategystrategywhen combined with other privacy features and selective posting. This tendency of users is when combined with other privacy features and selective posting. This tendency of users is furtherfurtherevidence that Facebook use is more characteristic of physical relationships than that of an evidence that Facebook use is more characteristic of physical relationships than that of an exclusivelyexclusivelyonline community, a powerful metaphor that is at the heart of the way users share their online community, a powerful metaphor that is at the heart of the way users share their informationinformationon Facebook. Women and men are equally unlikely to add a stranger to their list of friendson Facebook. Women and men are equally unlikely to add a stranger to their list of friends..

Page 35: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

4.114.11 Users Are Not Fully Informed About PrivacyUsers Are Not Fully Informed About Privacy

Familiarity with the TOS and the Privacy PolicyFamiliarity with the TOS and the Privacy Policy We asked Facebook users if they had readWe asked Facebook users if they had readFacebook's policies regarding their use of the service. Of 389 respondents, 353 Facebook's policies regarding their use of the service. Of 389 respondents, 353 (91%) had not read(91%) had not read

the Terms of Service. Of 390 respondents, 347 (89%) had never read the Privacy the Terms of Service. Of 390 respondents, 347 (89%) had never read the Privacy PolicyPolicy..

Understanding of Privacy PolicyUnderstanding of Privacy Policy

We asked users to guess whether or not Facebook can shareWe asked users to guess whether or not Facebook can share

your information with other companies. Of 374 respondents, 174 (47%) your information with other companies. Of 374 respondents, 174 (47%) believed Facebook couldbelieved Facebook couldnot do this, while 200 (53%) believed Facebook could. Facebook can not do this, while 200 (53%) believed Facebook could. Facebook can indeed share your informationindeed share your informationwith other companies for advertising or other purposes, as indicated in with other companies for advertising or other purposes, as indicated in their privacy policy8their privacy policy8..

Page 36: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

4.124.12 As Facebook Expands, More Risks Are PresentedAs Facebook Expands, More Risks Are Presented

Familiarity with \My Photos" featureFamiliarity with \My Photos" feature The overwhelming majority of Facebook users are familiarThe overwhelming majority of Facebook users are familiar

with the \My Photo" feature. Of 389 respondents, some 342 (87.9%) were familiar with the \My Photo" feature. Of 389 respondents, some 342 (87.9%) were familiar with thewith the

feature. Furthermore, although most users are familiar with the feature, few seem to feature. Furthermore, although most users are familiar with the feature, few seem to worry aboutworry about

its potential implications. When asked if users have any control over the \My Photo" its potential implications. When asked if users have any control over the \My Photo" content ofcontent of

others, specically, on restricting access to photos posted on the service, 196 users others, specically, on restricting access to photos posted on the service, 196 users of 416 respondentsof 416 respondents

))47%47% ( (said yes, 139 users (33%) said no, and some 84 (20%) did not know, or did said yes, 139 users (33%) said no, and some 84 (20%) did not know, or did not provide annot provide an

answeranswer..

Page 37: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

4.134.13 Women self-censor their dataWomen self-censor their data

In addition to the above analysis, we compared the In addition to the above analysis, we compared the trends of male and female users. Women are moretrends of male and female users. Women are morelikely to log into Facebook, have more friends, and likely to log into Facebook, have more friends, and have a higher percentage of friends from MIThave a higher percentage of friends from MIT..

Both genders are equally unfamiliar with Facebook's Both genders are equally unfamiliar with Facebook's Terms of Service and Privacy Policy. WomenTerms of Service and Privacy Policy. Womenwere more likely to use Facebook's \My Privacy" were more likely to use Facebook's \My Privacy" feature in our survey, but not to a statisticallyfeature in our survey, but not to a statisticallysignicant level. Women denitely self-censor their signicant level. Women denitely self-censor their Facebook data more than men do. This isFacebook data more than men do. This ispronounced in the number of mobile phone numbers pronounced in the number of mobile phone numbers made available to the public, as shown in themade available to the public, as shown in thetable9table9..

In addition, we calculated the correlation between In addition, we calculated the correlation between self-reported gender percentages at the difself-reported gender percentages at the dif--

ferent universities, and correlated these to the ferent universities, and correlated these to the contact information index. We found that schoolscontact information index. We found that schoolswith more women share proportionately less contact with more women share proportionately less contact

information, with a correlation coecient rinformation, with a correlation coecient r= = .-.-462462..

Page 38: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

4.144.14 Men talk less about themselvesMen talk less about themselves

In contrast, we compared gender ratios to the interest data index (the extent In contrast, we compared gender ratios to the interest data index (the extent to which users shareto which users share

their interests, clubs, and favorite books, etc.). Here we found that the male-their interests, clubs, and favorite books, etc.). Here we found that the male-dominated schoolsdominated schools

tended to share less information, which may indicate that women are more tended to share less information, which may indicate that women are more likely to share informationlikely to share information

about themselves which will not lead to phone calls or unwanted visits. The about themselves which will not lead to phone calls or unwanted visits. The correlation coecientcorrelation coecient

between self-reported female percentage and the interest index was r=.625between self-reported female percentage and the interest index was r=.625..

Page 39: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

4.154.15 General ConclusionsGeneral Conclusions

Facebook is an institution at the colleges we surveyed. As time goes on, it is Facebook is an institution at the colleges we surveyed. As time goes on, it is becoming even morebecoming even more

entrenched in college life. Although they tend to self-censor, especially entrenched in college life. Although they tend to self-censor, especially women, users still share awomen, users still share a

lot of personal information that could be valuable to many parties. As lot of personal information that could be valuable to many parties. As Facebook becomes moreFacebook becomes more

entrenched, disclosure rates are likely to rise, until Facebook changes the entrenched, disclosure rates are likely to rise, until Facebook changes the parameters of their systemparameters of their system,,

or there are enough newsworthy privacy stories to change users' or there are enough newsworthy privacy stories to change users' perceptionsperceptions..

Page 40: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

A Facebook Privacy PolicyA Facebook Privacy Policy

IntroductionIntroduction

The Facebook Privacy Policy is designed to assist you in understanding how weThe Facebook Privacy Policy is designed to assist you in understanding how we

collect and use the personal information that you provide to us and to assist you in collect and use the personal information that you provide to us and to assist you in making informedmaking informed

decisions when using the Facebook web site located at www.facebook.com (the \decisions when using the Facebook web site located at www.facebook.com (the \Web Site")Web Site")..

Page 41: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

The Information We CollectThe Information We Collect

When you visit the Web Site you may provide us with two types ofWhen you visit the Web Site you may provide us with two types ofinformation: personal information you knowingly choose to disclose that is collected by us and information: personal information you knowingly choose to disclose that is collected by us and WebWebSite use information collected by us on an aggregate basis as you and others browse our Web Site use information collected by us on an aggregate basis as you and others browse our Web SiteSite..

When you register on the Web Site, you provide us with certain personal information, such asWhen you register on the Web Site, you provide us with certain personal information, such asyour name, your email address, your telephone number, your address, your gender, schools your name, your email address, your telephone number, your address, your gender, schools attendedattendedand any other personal or preference information that you provide to usand any other personal or preference information that you provide to us..

When you enter ourWeb Site, we collect the user's browser type and IP address. This informationWhen you enter ourWeb Site, we collect the user's browser type and IP address. This informationis gathered for all users to the Web Site. In addition, we store certain information from your is gathered for all users to the Web Site. In addition, we store certain information from your browserbrowserusing \cookies." A cookie is a piece of data stored on the user's computer tied to information using \cookies." A cookie is a piece of data stored on the user's computer tied to information aboutaboutthe user. We use session ID cookies to conrm that users are logged in. These cookies terminatethe user. We use session ID cookies to conrm that users are logged in. These cookies terminateonce the users close the browser. We do not use cookies to collect private information from anyonce the users close the browser. We do not use cookies to collect private information from anyuseruser..

Facebook also collects information about you from other sources, such as newspapers and Facebook also collects information about you from other sources, such as newspapers and instantinstantmessaging services. This information is gathered regardless of your use of the Web Sitemessaging services. This information is gathered regardless of your use of the Web Site..

Page 42: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

Children Under Age 13Children Under Age 13

Facebook does not knowingly collect or solicit personal information fromFacebook does not knowingly collect or solicit personal information fromanyone under the age of 13 or allow such persons to register. If you are anyone under the age of 13 or allow such persons to register. If you are under 13, please do notunder 13, please do notsend any information about yourself to us { including information like your send any information about yourself to us { including information like your name, address, telephonename, address, telephonenumber, or e-mail address. No one under age 13 is allowed to provide any number, or e-mail address. No one under age 13 is allowed to provide any personal information orpersonal information oruse our public forums. In the event that we learn that we have collected use our public forums. In the event that we learn that we have collected personal information frompersonal information froma child under age 13 without verication of parental consent, we will delete a child under age 13 without verication of parental consent, we will delete that information asthat information asquickly as possible. If you believe that we might have any information from quickly as possible. If you believe that we might have any information from or about a child underor about a child under

1313 , ,please contact us at: [email protected] contact us at: [email protected] Between the Ages of 13 and 18Children Between the Ages of 13 and 18

We recommend that minors over the age of 13 askWe recommend that minors over the age of 13 asktheir parents for permission before sending any information about their parents for permission before sending any information about themselves to anyone over thethemselves to anyone over theInternetInternet..

Page 43: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

Use of Information Obtained by FacebookUse of Information Obtained by Facebook

When you register on the Web Site, you create yourWhen you register on the Web Site, you create your

own prole and privacy settings. Your prole information, as well as your name, email own prole and privacy settings. Your prole information, as well as your name, email and photoand photo,,

are displayed to people in the groups specied in your privacy settings to support the are displayed to people in the groups specied in your privacy settings to support the function of thefunction of the

Web Site. In addition, we may use your name and email address to send you Web Site. In addition, we may use your name and email address to send you notications regardingnotications regarding

the Web Site and, occasionally, new services we think you may nd valuablethe Web Site and, occasionally, new services we think you may nd valuable..

No personal information that you submit to Facebook will be available to any user of No personal information that you submit to Facebook will be available to any user of the Webthe Web

Site who does not belong to at least one of the groups specied by you in your privacy Site who does not belong to at least one of the groups specied by you in your privacy settingssettings..

We use the information about you that we have collected from other sources to We use the information about you that we have collected from other sources to supplement yoursupplement your

prole unless you specify in your privacy settings that you do not want this to be doneprole unless you specify in your privacy settings that you do not want this to be done..

Page 44: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh

Sharing Your Information with Third PartiesSharing Your Information with Third Parties

We may share your information with third partiesWe may share your information with third parties,,including responsible companies with which we have a relationship. For exampleincluding responsible companies with which we have a relationship. For example::

We may provide information to service providers to help us bring you the services we oerWe may provide information to service providers to help us bring you the services we oer..Specically, we may use third parties to facilitate our business, such as to send email soliciSpecically, we may use third parties to facilitate our business, such as to send email solici--

tations. In connection with these oerings and business operations, our service providers maytations. In connection with these oerings and business operations, our service providers mayhave access to your personal information for use in connection with these business activitieshave access to your personal information for use in connection with these business activities..

We may be required to disclose customer information pursuant to lawful requests, such asWe may be required to disclose customer information pursuant to lawful requests, such assubpoenas or court orders, or in compliance with applicable laws. Additionally, we may sharesubpoenas or court orders, or in compliance with applicable laws. Additionally, we may shareaccount or other information when we believe it is necessary to comply with law or to protectaccount or other information when we believe it is necessary to comply with law or to protectour interests or property. This may include sharing information with other companies, lawyersour interests or property. This may include sharing information with other companies, lawyers,,agents or government agenciesagents or government agencies..

If the ownership of all or substantially all of the Facebook business were to change, yourIf the ownership of all or substantially all of the Facebook business were to change, youruser information would likely be transferred to the new owner. If you do not want touser information would likely be transferred to the new owner. If you do not want toreceive promotional email from Facebook and/or do not want us to share your informareceive promotional email from Facebook and/or do not want us to share your informa--

tion with third parties for marketing purposes, please submit a request by clicking heretion with third parties for marketing purposes, please submit a request by clicking herehttp://mit.facebook.com/help.php?add=1. We will make every eort to implement anyhttp://mit.facebook.com/help.php?add=1. We will make every eort to implement anychoice you make as soon as possiblechoice you make as soon as possible..

Page 45: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh
Page 46: Facebook: Threats to Privacy This paper Produce from student of master alan alyawir To dr.lo’ai tawalbeh