Managing Privacy Through Key Performance Indicators When Photos and Videos Are Shared via Social Media

  • Srinivas MadhisettyEmail author
  • Mary-Anne Williams
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 857)


There are many definitions of privacy. What is considered sensitive varies from individual to individual. When a document is shared it may reveal certain information, the exchange of information is grounded with a specific context. This contextual grounding may not be afforded when photos and videos are shared, because they may contain rich semantic and syntactic information coded as tacit knowledge. Identifying sensitive information in a photo or a video is a major problem; therefore, rather than making assumptions about what is sensitive in a photo or a video, this research asked a group of study participants why they share content and what their concerns are (if any)? This enabled inferences to be made about categories of sensitivity in accordance with the participants’ responses. Interview data was gathered and Grounded Theory was applied. The following themes emerged from the data: a major theme, in which no privacy concerns were developed, three sub-themes in which varying levels of privacy concerns were developed and key performance indicators which manage levels of privacy were determined. This paper focuses on the main themes’ key performance indicators and how they can manage privacy when photos and videos are shared over social media.


Privacy Photos and videos key performance indicators 


  1. 1.
    Allen, A.L.: Uneasy access: privacy for women in a free society. Rowman & Littlefield, Totowa, N.J. (1988).
  2. 2.
    Bennett, C., Raab, C.: Governance of privacy: policy instruments in global perspective. Barnes & Noble, London (2002)Google Scholar
  3. 3.
    Chen, S., Williams, M-A.: Towards a comprehensive requirements architecture for privacy-aware social recommender systems. In: Proceedings of the 7th Asia-Pacific Conference on Conceptual Modelling, vol. 110, pp. 33–42 (2010)Google Scholar
  4. 4.
    Corbin, J., Strauss, J.: Basics of qualitative research: techniques and procedures for developing grounded theory. Thousand Oaks, CA ( 2008)Google Scholar
  5. 5.
    Chen, S., Williams, M-A.: Privacy in social networks: A comparative study. In: PACIS 2009 Proceedings 81 (2009).
  6. 6.
    Denzin, N.K., Lincoln, Y.S.: The landscape of qualitative research (Vol. 1). Sage (2008)Google Scholar
  7. 7.
    Erikson, E.H.: Identity, Youth, and Crisis. Norton, New York (1968)Google Scholar
  8. 8.
    Goffman, E.: The presentation of self in everyday life. Doubleday, New York (1959)Google Scholar
  9. 9.
    Gregor, S.: Design theory in information systems. Australas. J. Inf. Syst. 10(1) (2002)
  10. 10.
    Gray, D.E.: Doing Research in the Real World, 2nd edn. Sage, London (2009)Google Scholar
  11. 11.
    Verkuyten, M.: Ethnic group identification and group evaluation among minority and majority groups: testing the multiculturalism hypothesis. J. Pers. Soc. Psychol. 88(1), 121–138 (2004)CrossRefGoogle Scholar
  12. 12.
    Warren, S.D., Brandeis, L.D.: The right to privacy. Harv. Law Rev. 4(5), 1890–1891 (1890). Scholar
  13. 13.
    Schoeman, F.D.:, ‘Privacy and intimate information. In: Schoeman, F.D. (ed), Philosophical Dimensions of Privacy: An Anthology, pp. 403–418. Cambridge University Press (1984)
  14. 14.
    Gavison, R.: Privacy and the limits of law. Yale Law J. 89(3), 421–471 (1980)CrossRefGoogle Scholar
  15. 15.
    Margulis, S.T.: Conceptualization of privacy: current status and next steps. J. Soc. Issues 33(3), 5–21 (1977)CrossRefGoogle Scholar
  16. 16.
    Goemans, C., Dumortier, J.: Mandatory retention of traffic data in the EU: possible impact on privacy and on-line anonymity. In: Nicoll, C., Corien Prins, M., van Dellen, M.J.M. (eds.) Digital Anonymity and the Law, vol. 2, pp. 161–183. Asser Press, The Hague (2003)Google Scholar
  17. 17.
    Govani, T., Pashley, H.: Student awareness of the privacy implications when using Facebook, viewed 11 January 2015 (2005),
  18. 18.
    Markus, M.L., Robey, D.: Information technology and organizational change: Causal structure in theory and research. Manag. Sci. 34(5), 583–598 (1988)CrossRefGoogle Scholar
  19. 19.
    Simmel, G., Wolff, K.H. (eds.): The sociology of Georg Simmel, trans. K. H. Wolff, The Free Press, Glencoe (1950).
  20. 20.
    Simmel, G.: The metropolis and mental life. In: Individuality and Social Forms: Selected Writings, pp. 324–340. University of Chicago Press (1971)Google Scholar
  21. 21.
    Murphy, R.F.: Social distance and the veil. Am. Anthropol. 66(6), 1257–1274 (1964). Scholar
  22. 22.
    Miles, M.B., Huberman, A.M.: Qualitative Data Analysis: A Sourcebook of New Methods, 2nd edn. Sage, Newbury Park (1994)Google Scholar
  23. 23.
    Westin, A.: Privacy and Freedom. Atheneum, NewYork (1967)Google Scholar
  24. 24.
    Park, R.E., Burgess, E.W.: Introduction to the science of sociology. University of Chicago Press (1921)Google Scholar
  25. 25.
    Petronio, S., Durham, W.: Understanding and applying communication privacy management theory. In: Baxter, L.A., Braithwaite, D.O. (eds.) Engaging Theories in Interpersonal Communication, pp. 309–322. Sage, Thousand Oaks (2008)Google Scholar
  26. 26.
    Simon, B.: Identity in Modern Society. A Social Psychological Perspective.Blackwell. Oxford (2004)Google Scholar
  27. 27.
    Marshall, Catherine, Rossman, G.B.: Designing Qualitative Research, 3rd edn. Sage Publication, London (1999)Google Scholar
  28. 28.
    Morse, J.: Determining sample size. Qual. Health Res. 10(1), 3–5 (2000)MathSciNetCrossRefGoogle Scholar
  29. 29.
    Thompson, B.: Foundations of Behavioral Statistics: An Insight-Based Approach. Guilford, New York (2006)Google Scholar
  30. 30.
    Glaser, B.G., Strauss, A.L.: The Discovery of Grounded Theory: Strategies for Qualitative Research. Aldine Publishing Company, Chicago, IL (1967)Google Scholar
  31. 31.
    Liamputtong, P.: Qualitative Research Methodology, 3rd (ed.). Oxford University Press, Melbourne (2009)Google Scholar
  32. 32.
    UN General Assembly: Universal declaration of human rights 217A (III), Paris (1948)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.University of Technology SydneyUltimoAustralia

Personalised recommendations