vate and business data without considering potential
impacts on their real life that may come along with
that. Platforms of course get aware of private data
and social contacts explicitly given by the user. How-
ever, most users cannot even imagine how much pri-
vate, social and technical data they produce by mere
usage. Besides data explicitly given by the user, plat-
forms are able to gather information that is not explic-
itly given but can be inferred from user behaviour or
context. Even worse is the fact, that adverse infor-
mation may also be published and linked by commu-
nity contacts. There exist practical methods to kindly
“force” users into betrayal of other community mem-
bers they know. Thereby privacy of community mem-
bers may be breached without being noticed by the
affected user. However, we consider such behaviour
contradicting to laws or privacy ethics at least.
Beside own experimental results, we have anal-
ysed the state-of-the-art and media reports concerning
privacy issues, general terms and conditions as well
as the official privacy policies of the big players in the
market, e.g., of Facebook (Facebook, 2010a; Face-
book, 2010b). In this article we list in detail the user
data that are accessible by mere platform usage. We
further focus on discovering methods secretly gath-
ering more information about community members
than those to which users explicitly acknowledged to
be collected. By that we show the detailedness of user
profiles, very often reflecting real life data, captured
by the social network. Based on that we present ex-
isting privacy protecting technologies and discuss the
reasons why these cannot bear up the privacy threats
posed by social networks. Finally we conclude with
identifying important aspects for further research and
discuss potential provisions for privacy aware usage
of social communities.
2 NO ROOM FOR PRIVACY?
Within the context of data gathering, people worried
about privacy often are confronted with the slogan
“I’ve got nothing to hide” (Solove, 2007). Even if this
is true considering laws, it does not mean private data
may be public in any case. Since privacy is your right
(Warren and Brandeis, 1890) to self-determine when,
how and to what extent information about yourself
is communicated to others (Kuhlen, 1999; Westin,
1967), you should be in almost full control of your
information. As in real life, private data must also
be protected in online communities! Unfortunately,
privacy protection mechanisms provided by the so-
cial networks feature significant drawbacks. These ei-
ther provide too little options for securing any private
data or are too complex with respect to usability or do
not allow for fine-grained privacy settings. Pseudony-
mous usage of communities is also unpopular or not
permitted by platform providers.
But privacyismore than just control of data. Good
privacy practise starts with fair information about
kind and purpose of data collected. The latter is the
crux of the matter. While general terms and condi-
tions provide more or less full descriptions of what
data is collected, the purpose usually is not given.
Likewise, informative value of data collected as well
as inferences of those is difficult to understand for the
standard user. Most users do not even approximately
know the mass of information they provide. In the fol-
lowing we uncover the true detailedness of user data
collected by social networks. Beside obviously gath-
ered data voluntarily released by the user we thereby
focus on the data gathered alongside usage as well as
“methods” of concealed data acquisition. By that we
document our simple (and scary) key message, i.e.,
social networks know everything about their users.
2.1 Who is the User?
Usually creating a user profile in a social commu-
nity starts with giving basic data, such as name, birth-
date, gender, language, address and photo. This is not
much information but of course, this is enough data to
determine where you live, to guess your social state
because of your residential area, to search for your
number in public telephone registers and to look at
your house using free online street maps for example.
Also uploading a user photo, which is highly recom-
mended by all communities, allows to use face recog-
nition systems, e.g., as freely available in Google’s
Picasa
TM
, to search for other available data about the
person depicted. If such technique is combined with
mobile devices, everybody may obtain detailed data,
in our case the user profile, about any unknown per-
son just by taking a picture in public.
Data given by the user allows also getting a more
individualised idea about the person behind the user
profile. Hence, that data is even more valuable in
view of advertising. Usually, the user may disclose
status of relationship, political interests, hobbies and
favourites. Of great value are user interests, hobbies
and memberships in clubs. Marketing and selling
companies invest lots of money to acquire knowledge
about people’s favourites in music, movies and books.
The social network provider gets this information al-
most for free. Since such information is not always
given within the user profile, there also exist commu-
nity games asking for personal favourites to find other
users in the community with same or similar interests.
WEBIST 2011 - 7th International Conference on Web Information Systems and Technologies
22