Abstract
The blind sharing of digital images in social networks may lead to threats to privacy. Currently, privacy decision recommendations and access control mechanisms are inadequate with respect to sharing digital images in social networking systems. In this study, a questionnaire was designed to investigate the purposes, attitudes, preferences, modes and recommendations for sharing images (or making privacy decisions) based on studies of human-computer interaction. The survey results showed that first, there is a partial order based on either privacy levels or attribute tags for image sharing in social networks. Second, it is currently essential for social networks to have fine-grained access control settings. Third, online privacy calculus (utility maximization) is still valid for social network image sharing and the design of access control mechanisms. The findings of this survey may provide supporting evidence based on human-computer interaction for the design of models of privacy decisions and access control mechanisms for sharing images in social networks.
Similar content being viewed by others
References
Ahern S, Eckles D, Good N, King S, Naaman M (2007) NairR: over-exposed?: privacy patterns and considerations in online and mobile photo sharing. In: Proceedings of CHI 2007. San Jose, pp 357–366
Bell P L (1973) Secure computer systems: mathematical foundations and model. Bedfrod, Mass: The MITRE Corp., pp 74–244
Besmer A, Lipford H R (2009) Tagged photos: concerns, perceptions, and protections. In: Proc. of CHI 2009: CHI ’09 extended abstracts on human factors in computing systems. Boston, pp 4585–4590
Carminati B, Ferrari E, Heatherly R, Kantarcioglu M (2009) A semantic web based framework for social network access control. In: Proceedings of the 14th ACM symposium on access control models and technologies. New York, pp 177–185
Denning D E (1976) A lattice model of secure information flow. Commun ACM 19(5):236–243
Dinev T, Hart P, Mullen M R (2008) Internet privacy concerns and beliefs about government surveillance an empirical investigation. J Strat Inf Syst 17(3):214–233
Donghui H, Chen F, Wu X, Zhao Z (2016) A framework of privacy decision recommendation for image sharing in online social networks. In: 2016 IEEE First international conference on data science in cyberspace. Changsha, pp 13–16
Fong P W L, Anwar M, Zhao Z (2009) A privacy preservation model for facebook-style social network systems. In: Proceedings of the 14th European conference on research in computer security. Berlin, pp 303–320
Hart M, Castille C, Johnson R, Stent A (2009) Usable privacy controls for blogs. In: Proc. ICCSE. Vancouver, pp 401–408
Joinsona A N, Reipsb U D, Buchananc T, Schofieldd C B P (2010) Privacy, trust, and self-disclosure online. Human Comput Intern 24(1):1–24
Jones S, O Neill E (2011) Contextual dynamics of group-based sharing decisions. In: Proceedings of CHI 2011. Vancouver, pp 1777–1786
Li Y, Li Y J, Yan Q, Robert H D (2015) Privacy leakage analysis in online social networks. Comput Secur 49:239–254
Miller A D, Edwards W K (2007) Give and take: a study of consumer photo sharing culture and practice. In: Proc. of CHI 2007. San Jose, pp 347–356
Minkus T, Liu K, Ross K W (2015) Children seen but not heard: when parents compromise childrens online privacy. In: Proceedings of the 24th international conference on world wide web, WWW15. Republic and Canton of Geneva, pp 776–786
Minkus T, Liu K, Keith W R (2015) Children seen but not heard: when parents compromise childrens online privacy. WWW 2015. Florence
Mohamed Fathimal P, Arockia Jansi Rani P Hierarchical threshold secret sharing scheme for color images. Multimed Tools Appl, 2016:1–15. doi:10.1007/s11042-016-4074-y
Neustaedter C, Greenberg S, Boyle M (2006) Blur filtration fails to preserve privacy for home-based video conferencing. In: Journal ACM transactions on computer-human interaction (TOCHI). New York, pp 1–36
Sandhu R, Coyne E J, Feinstein H L Role-based access control models. IEEE Comput, 1996: 38–47
Squicciarini A C, Sundareswaran S, Lin D, Wede J (2011) A3p: adaptive policy prediction for shared images over popular content sharing sites. In: Proceedings of the 22nd ACM conference on hypertext and hypermedia. ACM, New York, pp 261–270
Vyas N H, Squicciarini A C, Chang C-C, Yao D (2009) Towards automatic privacy management in Web 2.0 with semantic analysis on annotations. In: International conference on collaborative computing: networking, applications and worksharing. Washington DC, pp 1–10
Wijesekera D, Jajodia S (2004) A logic-based framework for attribute based access control. In: Proceedings of 2004 ACM workshop on formal methods in security engineer. ACM Press, Washington D.C., pp 45–55
Xu H, Teo H H, Tan B C Y, Agarwal R (2009) The role of push-pull technology in privacy calculus: the case of location-based services. J Manag Inf Syst 26 (3):135–173
Yeung C A, Kagal L, Gibbins N, Shadbolt N (2009) Providing access control to online photo albums based on tags and linked data. AAAI spring symposium on social semantic web: where Web 2.0 meets Web 3.0. Stanford, pp 450–455
Zerr S, Siersdorfer S, Hare J (2012) DemidovaE: privacy-aware image classification and search. In: SIGIR ’12: Proceedings of the 35th international ACM SIGIR conference on research and development in information retrieval. ACM, New York, pp 35–44
Zhang X W, Li Y J, Nalla D (2005) An attribute-based access matrix model. In: Proceedings of 2005 ACM symposium on applied computing. ACM Press, New Mexico, pp 359–393
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hu, X., Hu, D., Zheng, S. et al. How people share digital images in social networks: a questionnaire-based study of privacy decisions and access control. Multimed Tools Appl 77, 18163–18185 (2018). https://doi.org/10.1007/s11042-017-4402-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4402-x