Definition of Private Information for Image Sharing in Social Networking Services

  • Erwan ChaussyEmail author
  • Shimon Machida
  • Noboru Sonehara
  • Isao Echizen
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9023)


With the increasing use of online image sharing and social networks, such as Facebook or Instagram, people share more and more personal information and privacy issues can arise. Such issues are already occurring and people are becoming aware of it. Helping them managing their privacy and improving privacy awareness has become essential. Recent studies have gathered testimonies of regrets and users’ concerns or created access control systems that help the users to manage their privacy. However, there is no guidelines to define privacy-sensitive information contained in images. In this work, we propose a classification table of private information for images in Social Networking Services as such guidelines in order to improve privacy awareness and prevent future privacy invasion. We then verify it by submitting the table to the users and asking them to rank information according to privacy level. Results reveal that people agree to it and feel the need of such classification table. Finally propose a method that uses these guidelines in order to create settings for access control.


Privacy invasion Photo sharing Social Networking Services 


  1. 1.
  2. 2.
  3. 3.
  4. 4.
    Teacher sacked for posting picture of herself holding glass of wine and mug of beer on Facebook (2011).
  5. 5.
    KFC Mashed Potatoes Photo: Woman Fired for Sharing Image of Licking Food (2013).
  6. 6.
    Ahern, S., Eckles, D., Good, N., King, S., Naaman, M., Nair, R.: Over-exposed? privacy patterns and considerations in online and mobile photo sharing. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2007, pp. 357–366 (2007)Google Scholar
  7. 7.
    Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P., Cranor, L.F.: “I regretted the minute I pressed share”: a qualitative study of regrets on facebook. In: Proceedings of the 7th Symposium on Usable Privacy and Security, SOUPS 2011, article n\(^{\circ }\) 10 (2011)Google Scholar
  8. 8.
    Strater, K., Lipford, H.R.: Strategies and struggles with privacy in an oline social networking community. In: Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction, BCS-HCI 2008, vol. 1, pp. 111–119 (2008)Google Scholar
  9. 9.
    Sleeper, M., Balebako, R., Das, S.: The post that wasnt: exploring self-censorship on facebook. In: Proceedings of the 2013 Conference on Computer Supported Cooperative Work, CSCW 2013, pp. 793–802 (2013)Google Scholar
  10. 10.
    Henne, B., Smith, M.: Awareness about photos on the web and how privacy-privacy-tradeoffs could help. In: Adams, A.A., Brenner, M., Smith, M. (eds.) FC 2013. LNCS, vol. 7862, pp. 131–148. Springer, Heidelberg (2013) CrossRefGoogle Scholar
  11. 11.
    Besmer, A., Lipford, H.R.: Moving beyond untagging: photo privacy in a tagged world. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2010, pp. 1563–157 (2010)Google Scholar
  12. 12.
    Klemperer, P.F., Liang, Y., Mazurek, M.L., Sleeper, M., Ur, B., Bauer, L., Cranos, L.F., Gupta, N., Reiter, M.: Tag, you can see it! using tags for access control in photo sharing. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2012, pp. 377–386 (2012)Google Scholar
  13. 13.
    Squicciarini, A., Sundareswaran, S., Lin, D.: A3P: adaptative policy prediction for shared images over popular content sharing sites. In: Proceedings of the 22nd ACM Conference on Hypertext and Hypermedia, HT 2011, pp. 261–270 (2011)Google Scholar
  14. 14.
    Zerr, S., Siersdorfer, S., Hare, J.: PicAlert!: a system for privacy-aware image classification and retrieval. In: Proceedings of the 21st ACM International Conference of Information and Knowledge Management, CIKM 2012, pp. 2710–2712 (2012)Google Scholar
  15. 15.
    Machida, S., Shimada, S., Echizen, I.: Settings of access control by detecting privacy leaks in SNS. In: International Conference of Signal-Image Technologies and Internet-Based Systems (SITIS), pp. 660–666. IEEE Press (2013)Google Scholar
  16. 16.
    Dunbar, R.I.M.: The social brain hypothesis. Evol. Anthropol. 6(5), 178–190 (1998). Wiley-Liss, IncCrossRefGoogle Scholar
  17. 17.
    Gala, M., Arnaboldi, V., Passarella, A., Conti, M.: Ego-net digger: a new way to study ego networks in online social networks. In: Proceedings of the First ACM International Workshop on Hot Topics on Interdisciplinary Social Networks Research, HotSocial 2012, pp. 9–16 (2012)Google Scholar
  18. 18.
    Twitter user says vacation tweets led to burglary (2009).
  19. 19.
    DiMicco, J.M., Millen, D.R.: Identity management: multiple presentations of self in facebook. In: Proceedings of the International ACM Conference on Supporting Group Work, GROUP 2007, pp. 383–386 (2007)Google Scholar
  20. 20.
    Ayalon, O., Toch, E.: Retrospective privacy: managing longitudinal privacy in online social networks. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, SOUPS 2013, article n\(^{\circ }\) 4 (2013)Google Scholar
  21. 21.
    Interpol wants facial recognition database to catch suspects (2008).
  22. 22.
    Smith, S.M., Albaum, G.S.: Fundamentals of Marketing Research, Chap. 10. SAGE Publications Inc., Thousand Oaks (2005) Google Scholar
  23. 23.
    Thalheimer, W., Cook, S.: How to calculate effectsizes from published research articles: A simplified methodology (2002). Accessed on 26 June 2014
  24. 24.
    Stutzman, F., Kramer-Duffield, J.: Friends only: examining a privacy-enhancing behavior in facebook. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2010, pp. 1553–1562 (2010)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Erwan Chaussy
    • 1
    Email author
  • Shimon Machida
    • 2
  • Noboru Sonehara
    • 2
    • 3
  • Isao Echizen
    • 2
    • 3
  1. 1.Polytech Paris-Sud at University of Paris-SudOrsayFrance
  2. 2.The Graduate University for Advanced StudiesHayamaJapan
  3. 3.National Institute of InformaticsTokyoJapan

Personalised recommendations