Skip to main content
Log in

How people share digital images in social networks: a questionnaire-based study of privacy decisions and access control

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The blind sharing of digital images in social networks may lead to threats to privacy. Currently, privacy decision recommendations and access control mechanisms are inadequate with respect to sharing digital images in social networking systems. In this study, a questionnaire was designed to investigate the purposes, attitudes, preferences, modes and recommendations for sharing images (or making privacy decisions) based on studies of human-computer interaction. The survey results showed that first, there is a partial order based on either privacy levels or attribute tags for image sharing in social networks. Second, it is currently essential for social networks to have fine-grained access control settings. Third, online privacy calculus (utility maximization) is still valid for social network image sharing and the design of access control mechanisms. The findings of this survey may provide supporting evidence based on human-computer interaction for the design of models of privacy decisions and access control mechanisms for sharing images in social networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Notes

  1. https://web.wechat.com/.

  2. http://weibo.com/.

  3. http://qzone.qq.com/.

  4. http://www.renren.com/.

  5. http://www.sojump.com/jq/7896892.aspx.

  6. http://www.sojump.com/.

References

  1. Ahern S, Eckles D, Good N, King S, Naaman M (2007) NairR: over-exposed?: privacy patterns and considerations in online and mobile photo sharing. In: Proceedings of CHI 2007. San Jose, pp 357–366

  2. Bell P L (1973) Secure computer systems: mathematical foundations and model. Bedfrod, Mass: The MITRE Corp., pp 74–244

  3. Besmer A, Lipford H R (2009) Tagged photos: concerns, perceptions, and protections. In: Proc. of CHI 2009: CHI ’09 extended abstracts on human factors in computing systems. Boston, pp 4585–4590

  4. Carminati B, Ferrari E, Heatherly R, Kantarcioglu M (2009) A semantic web based framework for social network access control. In: Proceedings of the 14th ACM symposium on access control models and technologies. New York, pp 177–185

  5. Denning D E (1976) A lattice model of secure information flow. Commun ACM 19(5):236–243

    Article  MathSciNet  MATH  Google Scholar 

  6. Dinev T, Hart P, Mullen M R (2008) Internet privacy concerns and beliefs about government surveillance an empirical investigation. J Strat Inf Syst 17(3):214–233

    Article  Google Scholar 

  7. Donghui H, Chen F, Wu X, Zhao Z (2016) A framework of privacy decision recommendation for image sharing in online social networks. In: 2016 IEEE First international conference on data science in cyberspace. Changsha, pp 13–16

  8. Fong P W L, Anwar M, Zhao Z (2009) A privacy preservation model for facebook-style social network systems. In: Proceedings of the 14th European conference on research in computer security. Berlin, pp 303–320

  9. Hart M, Castille C, Johnson R, Stent A (2009) Usable privacy controls for blogs. In: Proc. ICCSE. Vancouver, pp 401–408

  10. Joinsona A N, Reipsb U D, Buchananc T, Schofieldd C B P (2010) Privacy, trust, and self-disclosure online. Human Comput Intern 24(1):1–24

    Google Scholar 

  11. Jones S, O Neill E (2011) Contextual dynamics of group-based sharing decisions. In: Proceedings of CHI 2011. Vancouver, pp 1777–1786

  12. Li Y, Li Y J, Yan Q, Robert H D (2015) Privacy leakage analysis in online social networks. Comput Secur 49:239–254

    Article  Google Scholar 

  13. Miller A D, Edwards W K (2007) Give and take: a study of consumer photo sharing culture and practice. In: Proc. of CHI 2007. San Jose, pp 347–356

  14. Minkus T, Liu K, Ross K W (2015) Children seen but not heard: when parents compromise childrens online privacy. In: Proceedings of the 24th international conference on world wide web, WWW15. Republic and Canton of Geneva, pp 776–786

  15. Minkus T, Liu K, Keith W R (2015) Children seen but not heard: when parents compromise childrens online privacy. WWW 2015. Florence

  16. Mohamed Fathimal P, Arockia Jansi Rani P Hierarchical threshold secret sharing scheme for color images. Multimed Tools Appl, 2016:1–15. doi:10.1007/s11042-016-4074-y

  17. Neustaedter C, Greenberg S, Boyle M (2006) Blur filtration fails to preserve privacy for home-based video conferencing. In: Journal ACM transactions on computer-human interaction (TOCHI). New York, pp 1–36

  18. Sandhu R, Coyne E J, Feinstein H L Role-based access control models. IEEE Comput, 1996: 38–47

  19. Squicciarini A C, Sundareswaran S, Lin D, Wede J (2011) A3p: adaptive policy prediction for shared images over popular content sharing sites. In: Proceedings of the 22nd ACM conference on hypertext and hypermedia. ACM, New York, pp 261–270

  20. Vyas N H, Squicciarini A C, Chang C-C, Yao D (2009) Towards automatic privacy management in Web 2.0 with semantic analysis on annotations. In: International conference on collaborative computing: networking, applications and worksharing. Washington DC, pp 1–10

  21. Wijesekera D, Jajodia S (2004) A logic-based framework for attribute based access control. In: Proceedings of 2004 ACM workshop on formal methods in security engineer. ACM Press, Washington D.C., pp 45–55

    Google Scholar 

  22. Xu H, Teo H H, Tan B C Y, Agarwal R (2009) The role of push-pull technology in privacy calculus: the case of location-based services. J Manag Inf Syst 26 (3):135–173

    Article  Google Scholar 

  23. Yeung C A, Kagal L, Gibbins N, Shadbolt N (2009) Providing access control to online photo albums based on tags and linked data. AAAI spring symposium on social semantic web: where Web 2.0 meets Web 3.0. Stanford, pp 450–455

  24. Zerr S, Siersdorfer S, Hare J (2012) DemidovaE: privacy-aware image classification and search. In: SIGIR ’12: Proceedings of the 35th international ACM SIGIR conference on research and development in information retrieval. ACM, New York, pp 35–44

  25. Zhang X W, Li Y J, Nalla D (2005) An attribute-based access matrix model. In: Proceedings of 2005 ACM symposium on applied computing. ACM Press, New Mexico, pp 359–393

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Donghui Hu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hu, X., Hu, D., Zheng, S. et al. How people share digital images in social networks: a questionnaire-based study of privacy decisions and access control. Multimed Tools Appl 77, 18163–18185 (2018). https://doi.org/10.1007/s11042-017-4402-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4402-x

Keywords

Navigation