Third-Party Apps On Facebook Privacy and The Illus
Third-Party Apps On Facebook Privacy and The Illus
Third-Party Apps On Facebook Privacy and The Illus
net/publication/239761048
CITATIONS READS
67 2,600
3 authors, including:
Heng Xu
Pennsylvania State University
121 PUBLICATIONS 4,548 CITATIONS
SEE PROFILE
All content following this page was uploaded by Heng Xu on 05 October 2014.
1
There are a total of 60 extended permissions for additional reading,
Figure 1. User Interface of Privacy Settings on Facebook as of writing, and page management operations (as of 5/10/2011). See URL:
5/10/2011. http://developers.facebook.com/docs/authentication/permissions.
categories are business, education, entertainment, friends &
family, games, just for fun, lifestyle, sports, and utilities. We
collected data from the top 200 most popular applications from
each category. By going through the list of these applications, we
recorded the profile page URL for each application. Then, we
used the software “Locoyspider” to collect and save data from
these profile pages, as well as record the number of monthly
active users for these applications. Next, we used the list of “Go to
App” URLs to either access the authentication dialog (“Request
for Permission”) which lists all the information that the app
requests from users, or to be redirected to the app’s external page.
In our dataset, we only consider those applications which would
pop-up the privacy authentication dialog after clicking the button
of “Go to App”. From these authentication dialogs, we capture the
types of information each app desires to access from users.
Combining this information (i.e., types of information requests)
with the number of monthly active users for each application, we
can count how many times a specific type of information is
released to an app within a month.
Among those 1800 most popular applications, there were 1305
Figure 3. Current Third-Party Apps’ Authentication Dialog as applications displaying authentication dialogs when they
of 5/10/2011. requested data access from users. From the end user’s perspective,
there were 12 categories of information/behavior requested by the
authentication dialogs. For each category of these requests, we
2.2.2 Information Control after Installing Apps first compiled a list of applications that require it. We summed up
In the Facebook privacy settings, there is a section called “Apps the number of monthly active users for each application on the list
and Websites” which enables users to control certain aspects of to get the total number of users who were requested for this type
the information sharing between them and previously installed of information. We treat this total number as the total times that
apps. As shown in Figure 4, users could remove some such user information is requested per month (see Table 1).
information categories from this list, which would make that type
of information no longer available to the app. There are, however,
four categories of information that cannot be removed (i.e., “Send Table 1. Authorization Requests Presented to the User.
me email”, “Access my profile information”, “Access my friends’ Data Category/ Number of apps Total times a
information”, and “Access my photos and videos”). Access Category requesting category category is
(percentage of apps requested by apps
requesting category)
Access my basic
1305 (100%) 857,821,274
information
Send me email 454 (34.79%) 238,991,048
Post to my wall 670 (51.34%) 137,473,280
Access my profile
148 (11.34%) 178,912,316
information*
Access my data any
76 (5.82%) 17,450,664
time
Manage my pages 8 (0.61%) 237,067
Figure 4. Post-Installation Privacy Settings for Apps as of Access my photos
5/10/2011. 128 (9.81%) 43,227,008
and videos
Access my friends’
148 (11.34%) 68,436,680
3. THIRD-PARTY APPS’ DATA information
Access posts in my
COLLECTION PRACTICES 66 (5.06%) 30,635,352
News Feed
In this section, we discuss the scope of user information that apps Online Presence 16 (1.23%) 4,003,824
could potentially collect from users of the Facebook platform and Access my family &
transmit to advertising companies or other third parties. Field data 28 (2.15%) 6,617,296
relationship
from the most popular 1800 third-party apps on Facebook was Access Facebook
collected in December 2010 and analyzed to investigate third- 8 (0.61%) 1,739,160
Chat
party apps’ data collection practices. Send me SMS
10 (0.77%) 1,195,720
messages
From the Facebook application directory2, we locate the URLs for * User information accessed by this category may vary based on different
the most popular 1800 applications in nine categories. These nine app requests.
2
See URL: https://www.facebook.com/directory/applications/.
As shown in Table 1, more than 850 million times users were 4.1.2 Further Tests of Privacy Violations
asked to release their basic information to applications. Further, In the above case, we used “birthday” as a representative type of
the top three most frequently requested extended permissions are: personal information to supply an example of third-party apps
“Send me email”, “Access my profile information”, and “Post to overriding users' privacy settings. We further utilized our own app
my Wall”. “Permission Experiment” to run several similar tests for other
types of information. Our results indicate that the privacy breach
4. THIRD-PARTY APPS' PRACTICES FOR demonstrated in the case of “Happy Calendar 2011” is
generalizable to many different types of information requests. As
PRIVACY NOTICE AND CONSENT long as a user grants the app the permission to access her own and
To examine the current privacy notice and consent practices by her friends’ data, in conjunction with a publishing permission,
third-party apps on Facebook, we developed our own Facebook then user’s profile information like “birthday” but also other
app “Permission Experiment” and performed a series of tests to contents (e.g., photos, videos, comments, and everything she
address the following two questions: shared), could be accessed and released by that app. Thus, we
Question 1 (Q1): To which extent could third-party apps override conclude with respect to Q1 that privacy violations may exist
users' global privacy settings on Facebook? when there is conflict between users’ privacy settings and apps’
Question 2 (Q2): To which extent does the authentication dialog data collection and publishing practices. Our tests confirm that
truly reflect the third-party apps' information practices? Facebook’s powerful API enables application developers to
collect and publish user data in an aggressive fashion.
We present our findings in the sub-sections below.
4.2 Tests of Reflection (Q2)
4.1 Tests of Privacy Violations (Q1) Question 2 asks about the extent to which the authentication
4.1.1 A Case of “Happy Calendar 2011” dialog truly reflects the third-party apps' information practices. To
User A prefers to block disclosure of her birthday. Accordingly, address this question, we use our app “Permission Experiment” to
her privacy setting for this information category is “Only me”, request different extended permissions from a hypothetical user
which means her birthday cannot be seen by other users on account (User A) and examine the scope of information that can
Facebook except herself. When this user adds the app “Happy be accessed when the permission is being granted. The following
Calendar 2011” to her profile, she is asked to grant the app procedures state the process of our tests:
permissions to access her and her friends’ birthdays and to publish
them. Like most users, User A immediately grants the app all Step 1. Different extended permissions were added to the source
requested permissions. Later, User A finds out that “Happy code of our app “Permission Experiment” for requesting extended
Calendar 2011” created an album in her profile and posted all her permissions from User A.
friends’ birthdays that she can access, as well as her own, in a Step 2. Observe how the authentication dialog changed
calendar image with their profile pictures being visible in the correspondingly.
corresponding date fields (see Figure 5). Moreover, User A’s Step 3. The app “Permission Experiment” was added to the user’s
friends received a wall post notifying them of the creation of this profile.
album and how they can access it. As a result, the “birthday”,
which User A intended to keep private, is now accessible by her Step 4. Referred to the Facebook developer’s documentation to
friends. We consider this case as a privacy violation in which the carefully examine these extended permissions, e.g., what kind of
third-party app overrides users' global privacy settings. user information can be accessed by the app.
Step 5. Went to User A’s “Apps and Websites” settings to observe
which extended permission(s) can be removed.
Next, we discuss our findings.
4.2.1 Chaotic Display
When developers change the source code to request different
permissions for accessing users’ personal information or
publishing rights, the authentication dialog will change, however,
the display can be chaotic. For example, when the app is asking to
access photos and videos uploaded by the user’s friends as well as
those photos and videos friends were tagged in, the display of
these two groups of permissions would look confusing, as
highlighted in Figure 6.
Regarding the phrase of “Photos, Videos and Photos and Videos
of Them” marked by the red line in Figure 6, we anticipate users
to experience confusion concerning its implications. Further, the
somewhat awkward treatment of English grammar does very
likely reduce users’ understanding. Thus, it might be very difficult
for them to understand the meaning and implication of these
extended permissions.
Conflict caution – The authentication dialog should provide As Carroll highlighted in his book [9], “people rely on analogies
warning signals to the users when data and publishing permissions with familiar, readily envisaged domains to build mental models
requested by the app will violate their global privacy settings. of less-familiar, less-visible domains”. Following this design
Privacy indication – The authentication dialog should reflect a guideline, we have adopted icons and color themes that are well
user’s current privacy settings. consistent with users’ mental models in their familiar and readily
envisaged domains. For instance, as a sign for alert in our daily
The first three design principles were developed to address the life, we have used the red exclamation mark to indicate the
identified flaws that exist in current designs of authentication conflict between users’ privacy settings and apps’ requests for
dialogs. The fourth design principle was developed to test whether data access.
users want the authentication dialog to further reflect their privacy
settings. In order to better isolate the implications of the fourth Envisioned by the proposed design heuristics and previous
design principle, we split our analysis by providing two new analyses, we now present our alternative interfaces for privacy
designs addressing different aspects of our suggestions. authentication dialogs by third-party apps on Facebook.