Nyoni 2018
Nyoni 2018
Page 1 of 5
KEYWORDS: Introduction
social networks; personal data;
online profiling; third-party Social media have attracted robust debate around user privacy as these sites store users’ personal data online.1,2
applications; online advertising User-generated content is at the core of Facebook as users share their opinions, personal pictures, location, age or
gender.2 When users share personal data, they do so without an understanding of the risks involved.2 They assume
HOW TO CITE: that Facebook is a trusted computing platform but that is not always the case.2 For example, hackers can create
Nyoni P, Velempini M. false accounts or clone user accounts to steal personal data.3
Privacy and user awareness
Third-party applications such as games on Facebook also present a threat to users’ personal data.2,3 These
on Facebook. S Afr J
Sci. 2018;114(5/6), Art. applications can also be used to access sensitive data as they always attempt to access users’ Facebook profiles.
#2017-0103, 5 pages. A users’ privacy can then be violated through the third-party application which can publish content using the
http://dx.doi.org/10.17159/ identity of users which may violate privacy.4 Third-party applications can profile and track online users’ activities.1
sajs.2018/20170103
Criminals can also track the movements of users whenever users post their geo-location data on Facebook, and
could break into users’ properties when they are away on holiday.5 Facebook has attempted to offer tools for
ARTICLE INCLUDES: protecting users’ privacy but the awareness of users of these tools is still lacking.2 It is necessary to highlight
Supplementary material
possible risks associated with such self-disclosure tools.6 It is envisioned that increased privacy awareness may
× Data set encourage users to secure their data.6
FUNDING: We evaluated users’ awareness of their privacy on Facebook. Our aim was to highlight social media privacy risks
North-West University by using Facebook as a case study. Facebook was selected as it is popular and has been associated with a number
of documented incidents of privacy violations. The site also encourages users to search for other users’ profiles
and add them as ‘friends’, which may violate their privacy.3 This open sharing of data is at the heart of this study.
© 2018. The Author(s). Previous studies have focused on the usage patterns of university students on Facebook and did not examine the
Published under a Creative privacy issues faced by these students on Facebook.9 In this study, we highlight the online privacy issues that users
Commons Attribution Licence. of Facebook encounter and we suggest how these issues may be mitigated.
on the convenience sample drawn from a population of 5701 users side effect of this accessibility is that not everyone wants to be a friend
who liked the NWU Facebook page. This sample size was calculated on Facebook.
using guidelines provided by Krejcie and Morgan20. Their guidelines
help researchers find appropriately representative samples from target Most users (75%; n=269) either often share or sometimes share their
populations. Data collection took approximately 2 months in total and at geo-location with their friends on Facebook (Figure 3). Most of these
least 15 minutes per user. users indicated that they share their location when they travel for
holidays or when they spend time with friends. Users trust that their
Facebook account cloning attack data are safe and share their daily activities on Facebook. Criminals can
To validate the results of the polling checklist, a fake Facebook profile use this information to track users’ movements and map their patterns,
page was created. The aim of this account cloning attack was to evaluate resulting in a high number of scams on Facebook.
whether users were able to detect a false account trying to gain access Chart Title
to their account. The attack began by sending out friend requests from
the fake account. Once the request was accepted, users were informed
about the purpose of the attack. The personal information of the users
who accepted the request was made available to the researcher for
25% 31%
analysis. A total of 237 users were ‘friended’. Often
Sometimes
User surveys
Never
Two short user surveys were also conducted. The first survey was
based on the polling checklist and the second on the account cloning 44%
attack. The surveys were done to support and validate the results of the
previous methods. The first survey used convenience sampling to access
participants from the population. Questionnaires were distributed to the
research participants for completion and were collected as soon as the
Figure 3: Geo-location1sharing
2 3by users.
participants were done. A total of 25 individuals participated. The total
number of responses was considered to be sufficient as this short survey
Figure 4 shows that 56% (n=202) of users post daily on Facebook,
was designed to validate the online observation results. The second
while 38% (n=135) post at least once or twice a week. Figure 4 also
survey was based on 30 third-year and honours students who volunteered
to participate in a cyber security awareness training programme. reveals that many users access Facebook through their mobile devices
as smart devices have global-positioning sensors on them which
Results can share location. Anyone can profile a user’s daily routine from the
The online observation phase of data collection was based on the users frequency of their updates and location of their postings. Personal data
who had liked the NWU Facebook page. The sample population consists are generated on a daily basis which makes it possible to track and
profile such users.
of 357 users of whom 55% (n=198) are women and 45% (n=159)
are men. The most active users were within the 18–25 year age group
Chart Title
(n=214); this finding was to be expected considering that the majority
of students using Facebook are undergraduate students. 6%
It was also found that 67% (n=240) of Facebook users’ personal data
are partially available, while 33% (n=117) have their full personal details
available (Figure 2). Facebook does not put a default block on new users’
Daily
personal information when they sign up to be a member on the site,
which makes it easier for users to view each other’s information, and 38% 56% Weekly
also makes it possible for those with malicious intent to obtain sensitive Monthly
data. Attackers seek out user names and passwords for Facebook by
data mining those credentials. Other people use that information to
Chart Title
deceive or market their products to the users through spam email.
150 33% Partial car registration number or house number. This practice is not exclusive
1 to Facebook as other sites such as Instagram also have such images.
100
2
Table 1: Frequency of user activity
50
Activity Frequency
0
Full Partial
1 2 Posting 169 users (47%)
Most users’ data are partially available on Facebook, possibly because Liking 68 users (19%)
Facebook needs user profiles to be semi-accessible to the public in order
Uploading 50 users (14%)
for people to connect with users with common interests. The unfortunate
Some users also post pictures of friends and Facebook’s facial recog that these settings exist or may not know how to activate them, which
nition feature tags them automatically without their consent.13 These may leave their personal data vulnerable to any potential profiling.
pictures can be digitally altered or used for cyber bullying (using the Chart Title
user’s image for online jokes or memes) or for propaganda in the case of
a public figure.13 These practices can damage a user’s reputation unless
the user quickly un-tags themself from the image.
12%
Facebook account cloning attack
An account was cloned and used to see if users could be lured by a
fake account. Friend requests were sent out and as users responded,
they were informed about the objective of this profile. The response rate Yes
to this page is shown in Figure 5. A total of 87 out of 237 users had No
accepted the invitation at the time the results were retrieved. This attack 88%
was run over the course of 1 month.
Chart Title
Figure 7: 1 2
Privacy settings usage.
87, The second short survey was to investigate whether users were willing
Respondents
37% to meet someone they connected with on Facebook. A total population
150, Non-Respondents
of 30 students were asked how they would respond to a request to meet
63% in the real world. The results showed that 41% (combined from 33%
and 7%) were willing to meet in person a Facebook friend who they had
never met before (Figure 8). This willingness to trust a total stranger
may lead to the users being defrauded or scammed by impersonators
on Facebook.5
1 2
Figure 5: Response rate to a friend request from a fake account. Chart Title
3%
The users who responded did not verify the personal details to assess 23% No internet
34%
the veracity of the profile page. For example, users did not realise that Meet in public
the profile name and the name of the owner had been modified. It is 33% Invite home
7% Avoid stranger
common practice for Facebook users to either misspell their names
Other
purposely or use pseudo-names because they want to hide their identity,
but this practice can also lead to users being tricked into accepting
1 2 3 4 5
account impersonators. The attack indicates that a number of users on
Facebook still lack privacy awareness. Figure 8: Willingness to meet with a stranger friended on Facebook.
Lack awareness 6. Balduzzi M, Platzer C, Holz T, Kirda E, Balzarotti D, Kruegel C. Abusing social
networks for automated user profiling. In: Jha S, Sommer R, Kreibich C,
Secure User security
editors. Recent advances in intrusion detection. RAID 2010. Lecture Notes
Desensitised in Computer Science. 2010;6307:422–441. https://doi.org/10.1007/978-3-
Vulnerable
642-15512-3_22
No access 7. Digital Insights. Social media statistics for 2014 [webpage on the Internet].
Protected Sensitive c2014 [cited 2016 Apr 14]. Available from: http://www.adweek.com/
information socialtimes/files/2014/06/social-media-statistics-2014.htm
3rd Party Facebook 8. Social Bakers. Africa Facebook users infographic [webpage on the Internet].
c2013 [cited 2016 Nov 20]. Available from: http://www.socialbakers.com/
africa-facebook-users-infographic.jpg
Figure 9: Model of the responsibilities of online actors.
9. Pempek TA, Yermolayeva YA, Calvert SL. College students’ social networking
experiences on Facebook. J Appl Dev Psychol. 2009;30(3):227–238. https://
The actors have a shared responsibility to protect and maintain the doi.org/10.1016/j.appdev.2008.12.010
privacy of data. Users should make use of privacy settings to secure
their data whenever they are online. Meanwhile Facebook is responsible 10. Johnson B. Privacy no longer a social norm says Facebook founder [webpage
for the provision of a secure platform and the enforcement of its privacy on the Internet]. c2010 [cited 2016 Oct 01]. The Guardian. 2010 January
11. Available from: https://www.theguardian.com/technology/2010/jan/11/
policy. Third parties must also ensure that personal data are not stolen or
facebook-privacy
misused. Pro-activeness is necessary for each of these responsibilities
to be achieved. 11. Furnell SM. Online identity: Giving it all away? Information Security Technical
Report. 2010;15(2):42–46. https://doi.org/10.1016/j.istr.2010.09.002
Conclusion 12. Security and Privacy in Online Social Networks. From social media service
This study has revealed that users regularly post sensitive data, which to advertising network: A critical analysis of Facebook’s revised policies and
can be used to track their movements and activities. Most users are not terms [document on the Internet]. c2015 [cited 2016 Sep 14]. Available from:
aware that their posts and updates are in the public domain and can https://www.law.kuleuven.be/icri/en/news/item/facebooks-revised-policies-
and-terms-v1-2.pdf
be easily accessed. It is necessary to raise users’ privacy awareness
to protect them from possible loss of property or surveillance. Privacy 13. Payton T, Claypoole T. Privacy in the age of big data. Lanham: Rowman &
settings on Facebook should be simplified for users to understand and Littlefield; 2014.
given more emphasis so they are used. It is also important for laws that 14. Conger S. Emerging technologies, emerging privacy issues. In: Luppicini R,
protect users’ data to be enforced by regulators. Based on our findings, Adell R, editors. Handbook of research on technoethics. Hershey, PA: IGI
privacy awareness could be achieved through better user training on Global; 2009. p. 767–793. https://doi.org/10.4018/978-1-60566-022-6.
how to use privacy settings on Facebook. Users must be taught the ch050
different ways in which they can secure their personal information. 15. Riesch H. Levels of uncertainty. In: Handbook of risk theory. Amsterdam:
Springer; 2012. p. 87–110. https://doi.org/10.1007/978-94-007-1433-5_4
Acknowledgement
16. Westin A. Privacy and freedom. New York: IG Publishing; 1967. p. 15–20.
We thank North-West University for supporting this study.
17. Wacks R. Privacy: A very short introduction. New York: Oxford Press; 2010.
Authors’ contributions https://doi.org/10.1093/actrade/9780199556533.003.0001
P.N. was responsible for conceptualisation of the study, methodology, 18. Ellison N, Vitak J, Steinfield C, Gray R, Lampe C. Negotiating privacy concerns
data collection, data analysis, sample analysis, validation, data curation, and social capital needs in a social media environment. In: Trepte S, Reinecke
and writing the initial draft. M.V. was responsible for conceptualisation, L, editors. Privacy online. Berlin: Springer; 2010. p. 19–32.
methodology, student supervision, project leadership, critically reviewing 19. Hesse-Biber SN. Mixed methods research: Merging theory with practice. New
the initial draft and the revisions, and acquiring the funding. York: Guilford; 2010.
20. Krejcie R.V, Morgan D.W. Determining sample size for research
References activities. J Educ Psychol Measure. 1970;30(608):56. https://doi.
1. Titiriga R. Social transparency through recommendation engines and its org/10.1177/001316447003000308
challenges: Looking beyond privacy. Econ Inform J. 2010;15(4):147–155.
21. Facebook. Privacy policy of Facebook [webpage on the Internet]. No date
2. Kumar DV, Varma P, Pabboju SS. Security issues in social networking. Int J [updated 2014; cited 2016 Apr 14]. Available from: http://www.facebook.
Comput Sci Netw Security. 2013;13(6):120–124. com/policies/privacy/basic/?ref_component