Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3025453.3025668acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article
Open access

Photo Privacy Conflicts in Social Media: A Large-scale Empirical Study

Published: 02 May 2017 Publication History

Abstract

Items in social media such as photos may be co-owned by multiple users, i.e., the sharing decisions of the ones who upload them have the potential to harm the privacy of the others. Previous works uncovered coping strategies by co-owners to manage their privacy, but mainly focused on general practices and experiences. We establish an empirical base for the prevalence, context and severity of privacy conflicts over co-owned photos. To this aim, a parallel survey of pre-screened 496 uploaders and 537 co-owners collected occurrences and type of conflicts over co-owned photos, and any actions taken towards resolving them. We uncover nuances and complexities not known before, including co-ownership types, and divergences in the assessment of photo audiences. We also find that an all-or-nothing approach seems to dominate conflict resolution, even when parties actually interact and talk about the conflict. Finally, we derive key insights for designing systems to mitigate these divergences and facilitate consensus.

References

[1]
P. Alasuutari, L. Bickman, and J. Brannen. The sage handbook of social research methods. 2008.
[2]
I. Altman. The environment and social behavior: Privacy, personal space, territory, and crowding. 1975.
[3]
M. S. Bernstein, E. Bakshy, M. Burke, and B. Karrer. Quantifying the invisible audience in social networks. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 21--30. ACM, 2013.
[4]
A. Besmer and H. Richter Lipford. Moving beyond untagging: photo privacy in a tagged world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 1563--1572. ACM, 2010.
[5]
J. Binder, A. Howes, and A. Sutcliffe. The problem of conflicting social spheres: effects of network structure on experienced tension in social network sites. In Proceedings of the SIGCHI conference on human factors in computing systems, pages 965--974. ACM, 2009.
[6]
D. Boyd and A. Marwick. Social steganography: Privacy in networked publics. International Communication Association, Boston, MA, 2011.
[7]
I. Brown, A. A. Adams, et al. The ethical challenges of ubiquitous healthcare. International Review of Information Ethics, 8(12):53--60, 2007.
[8]
A. Bryman. Social Research Methods. Oxford University Press, New York, forth edition, 2012.
[9]
M. Buhrmester, T. Kwang, and S. D. Gosling. Amazon's mechanical turk a new source of inexpensive, yet high-quality, data? Perspectives on psychological science, 6(1):3--5, 2011.
[10]
M. Burke, C. Marlow, and T. Lento. Social network activity and social well-being. In Proceedings of the SIGCHI conference on human factors in computing systems, pages 1909--1912. ACM, 2010.
[11]
G. Calikli, M. Law, A. K. Bandara, A. Russo, L. Dickens, B. A. Price, A. Stuart, M. Levine, and B. Nuseibeh. Privacy dynamics: Learning privacy norms for social software. In Proceedings of the 11th International Workshop on Software Engineering for Adaptive and Self-Managing Systems, pages 47--56. ACM, 2016.
[12]
B. Carminati and E. Ferrari. Collaborative access control in on-line social networks. In IEEE CollaborateCom, pages 231--240, 2011.
[13]
H. Cho and A. Filippova. Networked privacy management in facebook: A mixed-methods and multinational study. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, pages 503--514. ACM, 2016.
[14]
S. Clinch, N. Davies, M. Mikusz, P. Metzger, M. Langheinrich, A. Schmidt, and G. Ward. Collecting shared experiences through lifelogging: Lessons learned. IEEE Pervasive Computing, 15(1):58--67, 2016.
[15]
N. Criado and J. M. Such. Implicit contextual integrity in online social networks. Information Sciences, 325:48--69, 2015.
[16]
T. Denning, Z. Dehlawi, and T. Kohno. In situ with bystanders of augmented reality glasses: Perspectives on recording and privacy-mediating technologies. In Proceedings of the 32nd annual ACM conference on Human factors in computing systems, pages 2377--2386. ACM, 2014.
[17]
M. Deutsch, P. T. Coleman, and E. C. Marcus. The handbook of conflict resolution: Theory and practice. John Wiley & Sons, 2011.
[18]
J. C. Flanagan. The critical incident technique. Psychological bulletin, 51(4):327, 1954.
[19]
R. L. Fogues, P. Murukanniah, J. M. Such, and M. P. Singh. Sharing policies in multiuser privacy scenarios: Incorporating context, preferences, and arguments in decision making. ACM Transactions on Computer-Human Interaction, page In press, 2017.
[20]
U. Gadiraju, R. Kawase, S. Dietze, and G. Demartini. Understanding malicious behavior in crowdsourcing platforms: The case of online surveys. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pages 1631--1640. ACM, 2015.
[21]
H. Hu, G.-J. Ahn, and J. Jorgensen. Multiparty access control for online social networks: model and mechanisms. Knowledge and Data Engineering, IEEE Transactions on, 25(7):1614--1627, 2013.
[22]
H. Hu, G.-J. Ahn, Z. Zhao, and D. Yang. Game theoretic analysis of multiparty access control in online social networks. In Proceedings of the 19th ACM symposium on Access control models and technologies, pages 93--102. ACM, 2014.
[23]
P. Ilia, I. Polakis, E. Athanasopoulos, F. Maggi, and S. Ioannidis. Face/off: Preventing privacy leakage from photos in social networks. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pages 781--792. ACM, 2015.
[24]
H. Jia and H. Xu. Autonomous and interdependent: Collaborative privacy management on social networking sites. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pages 4286--4297. ACM, 2016.
[25]
A. N. Joinson. Looking at, looking up or keeping up with people? motives and use of facebook. In Proceedings of the SIGCHI conference on Human Factors in Computing Systems, pages 1027--1036. ACM, 2008.
[26]
S. Kairam, M. Brzozowski, D. Huffaker, and E. Chi. Talking in circles: selective sharing in google+. In Proceedings of the SIGCHI conference on human factors in computing systems, pages 1065--1074. ACM, 2012.
[27]
D. Keküllüoğlu, N. Kökciyan, and P. Yolum. Strategies for privacy negotiation in online social networks. In Proceedings of the 1st International Workshop on AI for Privacy and Security, page 2. ACM, 2016.
[28]
M. Korayem, R. Templeman, D. Chen, and D. C. A. Kapadia. Enhancing lifelogging privacy by detecting screens. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pages 4309--4314. ACM, 2016.
[29]
H. Krasnova, S. Spiekermann, K. Koroleva, and T. Hildebrand. Online social networks: why we disclose. Journal of Information Technology, 25(2):109--125, 2010.
[30]
W. H. Kruskal and W. A. Wallis. Use of ranks in one-criterion variance analysis. Journal of the American statistical Association, 47(260):583--621, 1952.
[31]
A. Lampinen, V. Lehtinen, A. Lehmuskallio, and S. Tamminen. We're in it together: interpersonal management of disclosure in social network services. In Proceedings of the SIGCHI conference on human factors in computing systems, pages 3217--3226. ACM, 2011.
[32]
H. Lipford, A. Besmer, and J. Watson. Understanding privacy settings in facebook with an audience view. In Proceedings of the 1st Conference on Usability, Psychology, and Security, pages 1--8. USENIX Association Berkeley, CA, USA, 2008.
[33]
K. M. MacQueen, E. McLellan, K. Kay, and B. Milstein. Codebook development for team-based qualitative analysis. Cultural anthropology methods, 10(2):31--36, 1998.
[34]
B. Marder, A. Joinson, A. Shankar, and D. Houghton. The extended chilling effect of facebook: The cold reality of ubiquitous social networking. Computers in Human Behavior, 60:582--592, 2016.
[35]
W. Mason and S. Suri. Conducting behavioral research on amazons mechanical turk. Behavior research methods, 44(1):1--23, 2012.
[36]
A. Mazzia, K. LeFevre, and E. Adar. The pviz comprehension tool for social network privacy settings. In Proceedings of the Eighth Symposium on Usable Privacy and Security, page 13. ACM, 2012.
[37]
H. Nissenbaum. Privacy as contextual integrity. Wash. L. Rev., 79:119, 2004.
[38]
L. Palen and P. Dourish. Unpacking privacy for a networked world. In Proceedings of the SIGCHI conference on Human factors in computing systems, pages 129--136. ACM, 2003.
[39]
E. Peer, J. Vosgerau, and A. Acquisti. Reputation as a sufficient condition for data quality on amazon mechanical turk. Behav Res methods, pages 1--9, 2013.
[40]
S. Petronio. Boundaries of privacy: Dialectics of disclosure. Suny Press, 2012.
[41]
S. Preibusch, B. Hoser, S. Gürses, and B. Berendt. Ubiquitous social networks - opportunities and challenges for privacy-aware user modelling. In Workshop on Data Mining for User Modelling at UM, pages 50--62, 2007.
[42]
E. Rader, R. Wash, and B. Brooks. Stories as informal lessons about security. In Proceedings of the Eighth Symposium on Usable Privacy and Security, page 6. ACM, 2012.
[43]
J. Saldaña. The coding manual for qualitative researchers. Sage, 2015.
[44]
F. Schaub, B. Könings, and M. Weber. Context-adaptive privacy: Leveraging context awareness to support privacy decision making. IEEE Pervasive Computing, 14(1):34--43, 2015.
[45]
M. Sleeper, R. Balebako, S. Das, A. L. McConahy, J. Wiese, and L. F. Cranor. The post that wasn't: exploring self-censorship on facebook. In Proceedings of the 2013 conference on Computer supported cooperative work, pages 793--802. ACM, 2013.
[46]
A. C. Squicciarini, M. Shehab, and F. Paci. Collective privacy management in social networks. In Proceedings of the 18th international conference on World wide web, pages 521--530. ACM, 2009.
[47]
J. M. Such and N. Criado. Resolving multi-party privacy conflicts in social media. IEEE Transactions on Knowledge and Data Engineering, 28(7):1851--1863, 2016.
[48]
J. M. Such and M. Rovatsos. Privacy policy negotiation in social media. ACM Transactions on Autonomous and Adaptive Systems, 11(1):4:1--4:29, 2016.
[49]
K. Thomas, C. Grier, and D. M. Nicol. unfriendly: Multi-party privacy risks in social networks. In Privacy Enhancing Technologies, pages 236--252. Springer, 2010.
[50]
K. W. Thomas. Conflict and conflict management: Reflections and update. Journal of organizational behavior, 13(3):265--274, 1992.
[51]
K. Vaniea and Y. Rashidi. Tales of software updates: The process of updating software. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pages 3215--3226. ACM, 2016.
[52]
J. Vitak, P. Wisniewski, X. Page, A. Lampinen, E. Litt, R. De Wolf, P. G. Kelley, and M. Sleeper. The future of networked privacy: Challenges and opportunities. In Proceedings of the 18th ACM Conference Companion on Computer Supported Cooperative Work & Social Computing, pages 267--272. ACM, 2015.
[53]
Y. Wang, P. G. Leon, A. Acquisti, L. F. Cranor, A. Forget, and N. Sadeh. A field trial of privacy nudges for facebook. In Proceedings of the SIGCHI conference on human factors in computing systems, pages 2367--2376. ACM, 2014.
[54]
Y. Wang, P. G. Leon, K. Scott, X. Chen, A. Acquisti, and L. F. Cranor. Privacy nudges for social media: an exploratory facebook study. In Proceedings of the 22nd International Conference on World Wide Web, pages 763--770. ACM, 2013.
[55]
P. Wisniewski, A. Islam, H. Richter Lipford, and D. C. Wilson. Framing and measuring multi-dimensional interpersonal privacy preferences of social networking site users. Communications of the Association for Information Systems, 38(1):10, 2016.
[56]
P. Wisniewski, H. Lipford, and D. Wilson. Fighting for my space: Coping mechanisms for sns boundary regulation. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 609--618. ACM, 2012.
[57]
P. Wisniewski, H. Xu, H. Lipford, and E. Bello-Ogunu. Facebook apps and tagging: The trade-off between personal privacy and engaging with friends. Journal of the Association for Information Science and Technology, 66(9):1883--1896, 2015.
[58]
H. Xu. Reframing privacy 2.0 in online social network. U. Pa. J. Const. L., 14:1077, 2011.

Cited By

View all
  • (2024)Beyond Individual Concerns: Multi-user Privacy in Large Language ModelsProceedings of the 6th ACM Conference on Conversational User Interfaces10.1145/3640794.3665883(1-6)Online publication date: 8-Jul-2024
  • (2024)Healthcare Voice AI Assistants: Factors Influencing Trust and Intention to UseProceedings of the ACM on Human-Computer Interaction10.1145/36373398:CSCW1(1-37)Online publication date: 26-Apr-2024
  • (2024)DIPA2Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36314397:4(1-30)Online publication date: 12-Jan-2024
  • Show More Cited By

Index Terms

  1. Photo Privacy Conflicts in Social Media: A Large-scale Empirical Study

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems
      May 2017
      7138 pages
      ISBN:9781450346559
      DOI:10.1145/3025453
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 02 May 2017

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. co-ownership
      2. conflicts
      3. online social networks
      4. photo sharing
      5. privacy
      6. social media

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      CHI '17
      Sponsor:

      Acceptance Rates

      CHI '17 Paper Acceptance Rate 600 of 2,400 submissions, 25%;
      Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)324
      • Downloads (Last 6 weeks)50
      Reflects downloads up to 15 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Beyond Individual Concerns: Multi-user Privacy in Large Language ModelsProceedings of the 6th ACM Conference on Conversational User Interfaces10.1145/3640794.3665883(1-6)Online publication date: 8-Jul-2024
      • (2024)Healthcare Voice AI Assistants: Factors Influencing Trust and Intention to UseProceedings of the ACM on Human-Computer Interaction10.1145/36373398:CSCW1(1-37)Online publication date: 26-Apr-2024
      • (2024)DIPA2Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36314397:4(1-30)Online publication date: 12-Jan-2024
      • (2024)Designing Accessible Obfuscation Support for Blind Individuals’ Visual Privacy ManagementProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642713(1-19)Online publication date: 11-May-2024
      • (2024)Designing a Data-Driven Survey System: Leveraging Participants' Online Data to Personalize SurveysProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642572(1-22)Online publication date: 11-May-2024
      • (2024)Examining Human Perception of Generative Content Replacement in Image Privacy ProtectionProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642103(1-16)Online publication date: 11-May-2024
      • (2023)PACCART: Reinforcing Trust in Multiuser Privacy Agreement SystemsProceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems10.5555/3545946.3599078(2787-2789)Online publication date: 30-May-2023
      • (2023)A Tale of Two Cultures: Comparing Interpersonal Information Disclosure Norms on TwitterProceedings of the ACM on Human-Computer Interaction10.1145/36100457:CSCW2(1-40)Online publication date: 4-Oct-2023
      • (2023)An Approach to Multi-Party Privacy Conflict Resolution for Co-owned Images on Content Sharing PlatformsProceedings of the 2023 8th International Conference on Machine Learning Technologies10.1145/3589883.3589923(264-268)Online publication date: 10-Mar-2023
      • (2023)DIPA : An Image Dataset with Cross-cultural Privacy Concern AnnotationsCompanion Proceedings of the 28th International Conference on Intelligent User Interfaces10.1145/3581754.3584176(259-266)Online publication date: 27-Mar-2023
      • Show More Cited By

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media