Advertisement

Awareness about Photos on the Web and How Privacy-Privacy-Tradeoffs Could Help

  • Benjamin Henne
  • Matthew Smith
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7862)

Abstract

Many privacy issues concerning photos on the Web and particularly the social Web have been discussed in the past. However, much of this discussion is based on anecdotal evidence and has focused on media uploaded by users themselves. We present the results of a survey conducted with 414 participants that studies user awareness of privacy issues concerning the sharing of media including media shared by others. We additionally investigate the current perception of metadata privacy, since metadata can amplify threats posed by photos on the Web, for instance by tagging people or linking photos to locations. Furthermore, we present how this metadata can be used to help to protect private information and discuss the concept of a privacy-privacy-tradeoff and how this can be used to enable people to discover photos relevant to them and therefore regain control of their media privacy.

Keywords

privacy awareness social media photo sharing metadata privacy-privacy-tradeoff 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ahern, S., Eckles, D., Good, N., King, S., Naaman, M., Nair, R.: Over-exposed? Privacy patterns and considerations in online and mobile photo sharing. In: Proc. SIGCHI Conference on Human Factors in Computing Systems, CHI 2007 (2007)Google Scholar
  2. 2.
    Besmer, A., Lipford, H.R.: Moving beyond untagging: photo privacy in a tagged world. In: Proc. of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2010 (2010)Google Scholar
  3. 3.
    Besmer, A., Lipford, H.R.: Privacy Perceptions of Photo Sharing in Facebook. In: Proc. of the Fourth Symposium on Usable Privacy and Security, SOUPS 2008 (2008)Google Scholar
  4. 4.
    Fisher, D., Dorner, L., Wagner, D.: Short paper: location privacy: user behavior in the field. In: Proc. of the 2nd ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2012 (2012)Google Scholar
  5. 5.
    Henne, B., Szongott, C., Smith, M.: Snapme if you can: Privacy threats of other peoples’ geo-tagged media and what we can do about it. In: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec) (April 2013)Google Scholar
  6. 6.
    Johnson, M., Egelman, S., Bellovin, S.M.: Facebook and privacy: it’s complicated. In: Proc. of the 8th Symposium on Usable Privacy and Security, SOUPS 2012 (2012)Google Scholar
  7. 7.
    Klemperer, P., Liang, Y., Mazurek, M., Sleeper, M., Ur, B., Bauer, L., Cranor, L.F., Gupta, N., Reiter, M.: Tag, you can see it!: using tags for access control in photo sharing. In: Proc. of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2012 (2012)Google Scholar
  8. 8.
    Krumm, J.: A survey of computational location privacy. Personal and Ubiquitous Computing 13(6) (August 2009)Google Scholar
  9. 9.
    Kumaraguru, P., Cranor, L.F.: Privacy Indexes: A Survey of Westin’s Studies. Tech. Rep. CMU-ISRI-05-138, Carnegie Mellon University (2005)Google Scholar
  10. 10.
    Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove, A.: Analyzing Facebook privacy settings: User expectations vs. reality. In: Proc. of the 2011 ACM SIGCOMM Internet Measurement Conference, pp. 61–70. ACM (2011)Google Scholar
  11. 11.
    Porter Felt, A., Egelman, S., Wagner, D.: I’ve got 99 problems, but vibration ain’t one: a survey of smartphone users’ concerns. In: Proc. of the 2nd ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2012 (2012)Google Scholar
  12. 12.
    Squicciarini, A., Xu, H., Zhang, X.: CoPE: Enabling collaborative privacy management in online social networks. Journal of the American Society for Information Science and Technology 62(3) (March 2011)Google Scholar
  13. 13.
    Warren, S.D., Brandeis, L.D.: The right to privacy. Harward Law Review 4(5), 193–220 (1890)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Benjamin Henne
    • 1
  • Matthew Smith
    • 1
  1. 1.Distributed Computing & Security GroupLeibniz Universität HannoverGermany

Personalised recommendations