Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1240624.1240683acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Article

Over-exposed?: privacy patterns and considerations in online and mobile photo sharing

Published: 29 April 2007 Publication History

Abstract

As sharing personal media online becomes easier and widely spread, new privacy concerns emerge - especially when the persistent nature of the media and associated context reveals details about the physical and social context in which the media items were created. In a first-of-its-kind study, we use context-aware camerephone devices to examine privacy decisions in mobile and online photo sharing. Through data analysis on a corpus of privacy decisions and associated context data from a real-world system, we identify relationships between location of photo capture and photo privacy settings. Our data analysis leads to further questions which we investigate through a set of interviews with 15 users. The interviews reveal common themes in privacy considerations: security, social disclosure, identity and convenience. Finally, we highlight several implications and opportunities for design of media sharing applications, including using past privacy patterns to prevent oversights and errors.

References

[1]
Acquisti, A. and Grossklags, J. Privacy and Rationality: Preliminary Evidence from Pilot Data. In Proc. WEIS 2004.
[2]
Acquisti, A. and Gross, R. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. Privacy Enhancing Technologies (2006).
[3]
Barkhuus, L., Dey, A.K. Location-based services for mobile telephony: a study of users' privacy concerns. In Proc. Interact 2003, (2003) 709--712.
[4]
Barnes, S. A privacy paradox: Social networking in the United States. First Monday 10, 9 (2006).
[5]
Bellotti, V. and Sellen, A. Design for Privacy in Ubiquitous Computing Environments. In Proc. ECSCW 1993, Kluwer (1993), 77--92.
[6]
Bellotti, V. What You Don't Know Can Hurt You: Privacy in Collaborative Computing. In Proc. HCI on People and Computers XI, ACM Press (1996), 241--261.
[7]
Consolvo, S., Smith, I. E., Matthews, T., LaMarca, A., Tabert, J., and Powledge, P. Location disclosure to social relations: why, when, & what people want to share. In Proc. CHI 2005, ACM Press (2005), 81--90.
[8]
Flickr -- http://flickr.com
[9]
Gemmell, J., Williams, L., Wood, K., Lueder, R., and Bell, G. Passive capture and ensuing issues for a personal lifetime store. In Proc. CARPE 2004, ACM Press (2004), 48--55.
[10]
Good, N. S. and Krekelberg, A. Usability and privacy: a study of Kazaa P2P file-sharing. In Proc. CHI '03. ACM Press (2003), 137--144.
[11]
Gruteser, M. and Grunwald, D. Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis. Mob. Netw. Appl. 10, 3 (2005), 315--325.
[12]
Gruteser, M., Schelle, G., Jain, A., and Grunwald. D. Privacy-aware location sensor networks. In Proc. HotOS 2003, (2003).
[13]
Halderman, J. A., Waters, B., and Felten, E. W. Privacy management for portable recording devices. In Proc. WPES 2004, ACM Press (2004), 16--24.
[14]
Hawkey, K. and Inkpen, K. M. Keeping up appearances: understanding the dimensions of incidental information privacy. In Proc. CHI 2006, ACM Press, 821--830.
[15]
Iachello, G., Truong, K. N., Abowd, G. D., Hayes, G. R., and Stevens, M. Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world. In Proc. CHI 2006, ACM Press, 1009--1018.
[16]
Ito, M., Okabe, D., and Matsuda, M. Personal, Portable, Pedestrian: Mobile Phones in Japanese Life. MIT Press (2005).
[17]
Hong, J. and Landay, J. An architecture for privacy-sensitive ubiquitous computing. In Proc. Conference on Mobile Systems, Applications, and Services, 2004.
[18]
Hull, R., Kumar, B., Lieuwen, D., Patel-Schneider, P. F., Sahuguet, A., Varadarajan, S. and Vyas A. Enabling Context-Aware and Privacy-Conscious User Data Sharing. In Proc. MDM 2004, IEEE (2004), 187--198.
[19]
Kindberg, T., Spasojevic, M., Fleck, R. and Sellen, A. The Ubiquitous Camera: An In-depth Study of Cameraphone Use. IEEE Pervasive Comp. 4, 2 (2005), 42--50.
[20]
Lederer, S., Hong, I., Dey, K. and Landay, A. Personal privacy through understanding and action: five pitfalls for designers. Personal Ubiquitous Computing. 8, 6 (Nov. 2004), 440--454.
[21]
Palen, L. and Dourish, P. Unpacking "privacy" for a networked world. In Proc. CHI 2003, ACM Press (2003), 129--136.
[22]
Patil, S. and Lai, J. Who gets to know what when: configuring privacy permissions in an awareness application. In Proc. CHI 2005, ACM Press (2005), 101--110.
[23]
Spiekermann, S., Grossklags, J., Berendt, B. Stated Privacy Preferences versus Actual Behaviour in EC environments: a Reality Check. In Proc. WI-IF 2001.
[24]
Stutzman, F. An Evaluation of Identity-Sharing Behavior in Social Network Communities. In Proc. iDMAa and IMS Code Conference, 2006.
[25]
Tang, K. P., Keyani, P., Fogarty, J., and Hong, J. I. Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications. In Proc. CHI 2006, ACM Press (2006), 93--102.
[26]
van House, N., Davis, M., Ames, M., Finn, M., and Viswanathan, V. The uses of personal networked digital imaging: an empirical study of cameraphone photos and sharing. In Ext. Abstracts CHI 2006, ACM Press (2006), 1853--1856.
[27]
Varian, H. Economic Aspects of personal privacy. In Privacy and Self-Regulation in the Information Age, NTIA report (1996).

Cited By

View all
  • (2024)The Roles of Trust in Government and Sense of Community in the COVID-19 Contact Tracing Privacy Calculus: Mixed Method Study Using a 2-Wave Survey and In-Depth InterviewsJMIR mHealth and uHealth10.2196/4898612(e48986)Online publication date: 7-Mar-2024
  • (2024)Designing Privacy-Protecting System with Visual Masking Based on Investigation of Privacy Concerns in Virtual Screen Sharing EnvironmentsProceedings of the ACM on Human-Computer Interaction10.1145/36981338:ISS(165-188)Online publication date: 24-Oct-2024
  • (2024)Manipulate to Obfuscate: A Privacy-Focused Intelligent Image Manipulation Tool for End-UsersAdjunct Proceedings of the 37th Annual ACM Symposium on User Interface Software and Technology10.1145/3672539.3686778(1-3)Online publication date: 13-Oct-2024
  • Show More Cited By

Index Terms

  1. Over-exposed?: privacy patterns and considerations in online and mobile photo sharing

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI '07: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
    April 2007
    1654 pages
    ISBN:9781595935939
    DOI:10.1145/1240624
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 29 April 2007

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. context-aware
    2. location-aware
    3. online content
    4. photo sharing
    5. photos
    6. privacy
    7. social software

    Qualifiers

    • Article

    Conference

    CHI07
    Sponsor:
    CHI07: CHI Conference on Human Factors in Computing Systems
    April 28 - May 3, 2007
    California, San Jose, USA

    Acceptance Rates

    CHI '07 Paper Acceptance Rate 182 of 840 submissions, 22%;
    Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

    Upcoming Conference

    CHI '25
    CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2025
    Yokohama , Japan

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)124
    • Downloads (Last 6 weeks)21
    Reflects downloads up to 09 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)The Roles of Trust in Government and Sense of Community in the COVID-19 Contact Tracing Privacy Calculus: Mixed Method Study Using a 2-Wave Survey and In-Depth InterviewsJMIR mHealth and uHealth10.2196/4898612(e48986)Online publication date: 7-Mar-2024
    • (2024)Designing Privacy-Protecting System with Visual Masking Based on Investigation of Privacy Concerns in Virtual Screen Sharing EnvironmentsProceedings of the ACM on Human-Computer Interaction10.1145/36981338:ISS(165-188)Online publication date: 24-Oct-2024
    • (2024)Manipulate to Obfuscate: A Privacy-Focused Intelligent Image Manipulation Tool for End-UsersAdjunct Proceedings of the 37th Annual ACM Symposium on User Interface Software and Technology10.1145/3672539.3686778(1-3)Online publication date: 13-Oct-2024
    • (2024)Transferable Adversarial Facial Images for Privacy ProtectionProceedings of the 32nd ACM International Conference on Multimedia10.1145/3664647.3681344(10649-10658)Online publication date: 28-Oct-2024
    • (2024)The Subversive AI Acceptance Scale (SAIA-8): A Scale to Measure User Acceptance of AI-Generated, Privacy-Enhancing Image ModificationsProceedings of the ACM on Human-Computer Interaction10.1145/36410248:CSCW1(1-43)Online publication date: 26-Apr-2024
    • (2024)On Being an Expert: Habitus as a Lens for Understanding Privacy ExpertiseProceedings of the ACM on Human-Computer Interaction10.1145/36373798:CSCW1(1-25)Online publication date: 26-Apr-2024
    • (2024)FamilyScope: Visualizing Affective Aspects of Family Social Interactions using Passive Sensor DataProceedings of the ACM on Human-Computer Interaction10.1145/36373348:CSCW1(1-27)Online publication date: 26-Apr-2024
    • (2024)DIPA2Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36314397:4(1-30)Online publication date: 12-Jan-2024
    • (2023)A Comprehensive Picture of Factors Affecting User Willingness to Use Mobile Health ApplicationsACM Transactions on Computing for Healthcare10.1145/36269625:1(1-31)Online publication date: 10-Oct-2023
    • (2023)A Tale of Two Cultures: Comparing Interpersonal Information Disclosure Norms on TwitterProceedings of the ACM on Human-Computer Interaction10.1145/36100457:CSCW2(1-40)Online publication date: 4-Oct-2023
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media