Collateral damage of Facebook third-party applications: a comprehensive study

被引:21
|
作者
Symeonidis, Iraklis [1 ]
Biczok, Gergely [2 ]
Shirazi, Fatemeh [1 ]
Perez-Sola, Cristina [3 ]
Schroers, Jessica [4 ,5 ]
Preneel, Bart [1 ]
机构
[1] Katholieke Univ Leuven, IMEC, COSIC, Leuven, Belgium
[2] Budapest Univ Technol & Econ, Dept Networked Syst & Serv, CrySyS Lab, Budapest, Hungary
[3] Univ Autonoma Barcelona, DEIC, Barcelona, Spain
[4] Katholieke Univ Leuven, Ctr IT & IP Law, Leuven, Belgium
[5] Katholieke Univ Leuven, IMEC, Leuven, Belgium
关键词
Interdependent privacy; Facebook; Applications; Application providers; Transparency enhancing technologies (TETs); SOCIAL NETWORKS; ACCESS-CONTROL; PRIVACY; AWARENESS;
D O I
10.1016/j.cose.2018.03.015
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Third-party applications on Facebook can collect personal data of the users who install them, but also of their friends. This raises serious privacy issues as these friends are not notified by the applications nor by Facebook and they have not given consent. This paper presents a detailed multi-faceted study on the collateral information collection of the applications on Facebook. To investigate the views of the users, we designed a questionnaire and collected the responses of 114 participants. The results show that participants are concerned about the collateral information collection and in.particular about the lack of notification and of mechanisms to control the data collection. Based on real data, we compute the likelihood of collateral information collection affecting users: we show that the probability is significant and greater than 80% for popular applications such as TripAdvisor. We also demonstrate that a substantial amount of profile data can be collected by applications, which enables application providers to profile users. To investigate whether collateral information collection is an issue to users' privacy we analysed the legal framework in light of the General Data Protection Regulation. We provide a detailed analysis of the entities involved and investigate which entity is accountable for the collateral information collettion. To provide countermeasures, we propose a privacy dashboard extension that implements privacy scoring computations to enhance transparency toward collateral information collection. Furthermore, we discuss alternative solutions highlighting other countermeasures such as notification and access control mechanisms, cryptographic solutions and application auditing. To the best of our knowledge this is the first work that provides a detailed multi-faceted study of this problem and that analyses the threat of user profiling by application providers. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:179 / 208
页数:30
相关论文
共 50 条
  • [1] A look into user privacy and third-party applications in Facebook
    Seng, Sovantharith
    Al-Ameen, Mahdi Nasrullah
    Wright, Matthew
    INFORMATION AND COMPUTER SECURITY, 2021, 29 (02) : 283 - 313
  • [2] A Comprehensive Study on Third-Party User Tracking in Mobile Applications
    Paci, Federica
    Pizzoli, Jacopo
    Zannone, Nicola
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [3] Classification of Third-Party Applications on Facebook to Mitigate Users' Information Leakage
    Kavianpour, Sanaz
    Ismail, Zuraini
    Shanmugam, Bharanidharan
    RECENT ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1, 2017, 569 : 144 - 154
  • [4] Third-Party Apps on Facebook: Privacy and the Illusion of Control
    Wang, Na
    Xu, Heng
    Grossklags, Jens
    PROCEEDINGS OF THE 5TH ACM SYMPOSIUM ON COMPUTER HUMAN INTERACTION FOR MANAGEMENT OF INFORMATION TECHNOLOGY (CHIMIT 2011), 2011,
  • [5] Study on Failure of Third-Party Damage for Urban Gas Pipeline Based on Fuzzy Comprehensive Evaluation
    Li, Jun
    Zhang, Hong
    Han, Yinshan
    Wang, Baodong
    PLOS ONE, 2016, 11 (11):
  • [6] A different kind of third-party damage
    Veazey, MV
    MATERIALS PERFORMANCE, 2005, 44 (02) : 16 - 17
  • [7] Collateral Consequences for Third-Party Interviewees in Forensic Contexts
    Goldenson, Julie
    Brodsky, Stanley L.
    Heilbrun, Kirk
    JOURNAL OF THE AMERICAN ACADEMY OF PSYCHIATRY AND THE LAW, 2023, 51 (04): : 520 - 528
  • [8] Misinformation in Third-party Voice Applications
    Bispham, Mary
    Sattar, Suliman Kalim
    Zard, Clara
    Ferrer-Aran, Xavier
    Edu, Jide
    Suarez-Tangil, Guillermo
    Such, Jose
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON CONVERSATIONAL USER INTERFACES, CUI 2023, 2023,
  • [9] Third-party purchase: An empirical study of third-party logistics providers in China
    Shi, Yangyan
    Zhang, Abraham
    Arthanari, Tiru
    Liu, Yanping
    Cheng, T. C. E.
    INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 2016, 171 : 189 - 200
  • [10] Third-party purchase: an empirical study of Chinese third-party logistics users
    Shi, Yangyan
    Zhang, Abraham
    Arthanari, Tiru
    Liu, Yanping
    INTERNATIONAL JOURNAL OF OPERATIONS & PRODUCTION MANAGEMENT, 2016, 36 (03) : 286 - 307