Skip to main content
Log in

Examining Co-Owners’ Privacy Consideration in Collaborative Photo Sharing

  • ECSCW Contribution
  • Published:
Computer Supported Cooperative Work (CSCW) Aims and scope Submit manuscript

Abstract

Researchers have investigated how collaborative photo sharing, in which users (owners) share photos on social media that reveal other users’ (co-owners) information, can violate the co-owner’s privacy and how contextual factors, such as photo content and audience, can influence the co-owner’s privacy concerns and decisions. However, it is unclear how the contextual factors interact with each other. Since co-owners’ privacy attitudes are often influenced by multiple contextual factors at the same time, it is possible that the impact of one factor depends on the other factors. Through an interview and survey study with WeChat users in China, we found significant interaction effects among the contextual factors in collaborative photo sharing. The impact of one factor on co-owners’ concerns is dependent on another factor. We suggest a more holistic evaluation of contextual factors and discuss how our findings contribute to the understanding of contextual integrity framework. We also provide implications for future privacy design for collaborative photo-sharing on social media.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1.

Similar content being viewed by others

References

  • Agresti, Alan (2012). Categorical Data Analysis. Hoboken, New Jersey, John Wiley & Sons.

  • Ahern, Shane; Dean Eckles; Nathaniel S. Good; Simon King; Mor Naaman; and Rahul Nair (2007). Over-exposed?: privacy patterns and considerations in online and mobile photo sharing. In CHI ’07: Proceedings of the SIGCHI Conf. on Human Factors in Computing Systems, San Jose, California, USA, 28 April - 3 May 2007. New York: ACM Press, pp. 357–366.

  • Altman Irwin (1975). The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Monterey, California, Brooks/Cole Publishing Company.

    Google Scholar 

  • Ammari, Tawfiq; Priya Kumar; Cliff Lampe; and Sarita Schoenebeck (2015). Managing Children’s Online Identities: How Parents Decide what to Disclose about their Children Online. In CHI ’15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, Seoul, Republic of Korea, New York: ACM Press, pp 1895–1904.

  • Atkinson, Simon (2018). WeChat hits one billion monthly users - are you one of them? BBC News, March 2018. https://www.bbc.com/news/business-43283690#:~:text=Asia%20Business%20Reporter%206%20March%202018%20WeChat%20has,Lunar%20New%20Year%20boosted%20it%20past%20the%20milestone. Accessed 13 October 2021.

  • Besmer, Andrew; and Heather Richter Lipford (2010). Moving beyond untagging: photo privacy in a tagged world. In CHI ’10: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Atlanta, Georgia, USA, April 10 - 15, 2010. New York: ACM Press, pp 1563–1572.

  • Biemans, Margit; Betsy van Dijk; Pavan Dadlani; and Aart van Halteren (2009). Let’s Stay in Touch: Sharing Photos for Restoring Social Connectedness Between Rehabilitants, Friends and Family. In Assets’09: Proceedings of the 11th International ACM SIGACCESS Conference on Computers and Accessibility, Pittsburgh, Pennsylvania, USA, October 25 - 28, 2009. New York: ACM Press, USA, pp 179–186.

  • Birnholtz, Jeremy; Moira Burke; and Annie Steele (2017). Untagging on social media: Who untags, what do they untag, and why? Computers in Human Behavior, vol. 69, Apr. 2017, pp. 166–173.

  • Chessa, Michela; Jens Grossklags; and Patrick Loiseau (2015). A Game-Theoretic Study on Non-Monetary Incentives in Data Analytics Projects with Privacy Implications. arXiv:150502414.

  • Cho, Hichang; and Anna Filippova (2016). Networked Privacy Management in Facebook: A Mixed-Methods and Multinational Study. In CSCW '16: Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, San Francisco, California, USA, 27 February - 2 March 2016, New York: ACM Press, pp 1563–1572.

  • Dhir, Amandeep; Puneet Kaur; and Risto Rajala (2018). Why do young people tag photos on social networking sites? Explaining user intentions. International Journal of Information Management, vol. 38, no. 1, pp. 117–127.

    Article  Google Scholar 

  • Dien, Dora Shu-fang (1999). Chinese Authority-Directed Orientation and Japanese Peer-Group Orientation: Questioning the Notion of Collectivism. Review of General Psychology, vol. 3, no. 4, pp. 372–385.

    Article  Google Scholar 

  • Fogues, Ricard L.; Pradeep K. Murukannaiah; Jose M. Such; and Munindar P. Singh (2017). Sharing Policies in Multiuser Privacy Scenarios: Incorporating Context, Preferences, and Arguments in Decision Making. ACM Transactions on Computer-Human Interaction, vol. 24, no. 1, pp. 5:1–5:29.

  • Hartig, Florian; and Lukas Lohse (2021). DHARMa: Residual Diagnostics for Hierarchical (Multi-Level / Mixed) Regression Models. https://cran.r-project.org/web/packages/DHARMa/index.html. Accessed 27 Mar 2021

  • Himmelsbach, Julia; Stephanie Schwarz; Cornelia Gerdenitsch; Beatrix Wais-Zechmann; Jan Bobeth; and Manfred Tscheligi (2019). Do We Care About Diversity in Human Computer Interaction: A Comprehensive Content Analysis on Diversity Dimensions in Research. In CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, Glasgow, Scotland, UK, 4 May - 9 May, 2019, New York: ACM Press, pp. 1–16.

  • Hu, Hongxin; Gail-Joon Ahn; and Jan Jorgensen (2011). Detecting and Resolving Privacy Conflicts for Collaborative Data Sharing in Online Social Networks. In ACSAC '11: Proceedings of the 27th Annual Computer Security Applications Conference, Orlando, Florida, USA, 5 December - 9 December, 2011, New York: ACM Press, pp. 103–112.

  • Hwang, Kwang-kuo (1987). Face and Favor: The Chinese Power Game. American Journal of Sociology, vol. 92, no. 4, pp. 944–974.

    Article  Google Scholar 

  • Ilia, Panagiotis; Iasonas Polakis; Elias Athanasopoulos; Federico Maggi; and Sotiris Ioannidis (2015). Face/Off: Preventing Privacy Leakage From Photos in Social Networks. In CCS '15: Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security, Denver, Colorado, USA, 12 October - 16 October, 2015, New York: ACM Press, pp. 781–792.

  • Jia, Haiyan; and Heng Xu (2016). Autonomous and Interdependent: Collaborative Privacy Management on Social Networking Sites. In CHI’16: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, San Jose, California, USA, 7 May - 12 May, 2016, New York: ACM Press, pp.4286–4297.

  • Katz, James E.; and Elizabeth Thomas Crocker (2015). Selfies and Photo Messaging as Visual Conversation: Reports from the United States, United Kingdom and China. International Journal of Communication, vol. 9, no. 0, pp. 1861–1872.

    Google Scholar 

  • Lampinen, Airi; Vilma Lehtinen; Asko Lehmuskallio; and Sakari Tamminen (2011). We’re in it together: interpersonal management of disclosure in social network services. In CHI '11: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Vancouver, Canada, 7 May - 12 May, 2011, New York: ACM Press, pp.3217–3226.

  • Lang, Caroline, and Hannah Barton (2015). Just untag it: Exploring the management of undesirable Facebook photos. Computers in Human Behavior, vol. 43, pp. 147–155.

    Article  Google Scholar 

  • Lee, Hyun O., and Randall G. Rogan (1991). A cross-cultural comparison of organizational conflict management behaviors. International Journal of Conflict Management, vol. 2, no. 3, pp. 181–199.

    Article  Google Scholar 

  • Li, Fenghua; Zhe Sun; Ang Li; Ben Niu; Hui Li; and Guohong Cao (2019). HideMe: Privacy-Preserving Photo Sharing on Social Networks. In IEEE INFOCOM’19: IEEE Conference on Computer Communications, Paris, France, 29 April - 2 May 2019, IEEE, pp 154–162.

  • Li, Yao; Xinning Gui; Yunan Chen; Heng Xu; and Alfred Kobsa (2018). When SNS Privacy Settings Become Granular: Investigating Users’ Choices, Rationales, and Influences on Their Social Experience. Proceedings of the ACM on Human-Computer Interaction, vol. 2, no. CSCW, pp. 108:1–108:21.

  • Minkus, Tehila; Kelvin Liu; and Keith W. Ross (2015). Children Seen But Not Heard: When Parents Compromise Children’s Online Privacy. In WWW '15: Proceedings of the 24th International Conference on World Wide Web, Florence, Italy, 18 May - May 22 2015, International World Wide Web Conferences Steering Committee, Florence, Italy, pp. 776–786.

  • Moser, Carol; Tianying Chen; and Sarita Y. Schoenebeck (2017). Parents’ and Children’s Preferences about Parents Sharing about Children on Social Media. In CHI’17: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, Denver, Colorado, USA, May 6 - 11, 2017, New York: ACM Press, pp. 5221–5225.

  • Nissenbaum, Helen (2009). Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford, CA, Stanford University Press.

    Book  Google Scholar 

  • Ohbuchi, Ken-Ichi; Osamu Fukushima; and James T. Tedeschi (1999). Cultural Values in Conflict Management: Goal Orientation, Goal Attainment, and Tactical Decision. Journal of Cross-Cultural Psychology, vol. 30, no. 1, pp. 51–71.

    Article  Google Scholar 

  • Oyserman, Daphna; Heather M. Coon; and Markus Kemmelmeier (2002). Rethinking individualism and collectivism: Evaluation of theoretical assumptions and meta-analyses. Psychological Bulletin, vol. 128, no. 1, pp. 3–72.

    Article  Google Scholar 

  • Pesce, João Paulo; Diego Las Casas; Gustavo Rauber; and Virgílio Almeida (2012). Privacy Attacks in Social Media Using Photo Tagging Networks: A Case Study with Facebook. In PSOSM ’12: Proceedings of the 1st Workshop on Privacy and Security in Online Social Media, Lyon, France, 17 April, New York: ACM Press, pp. 4:1–4:8.

  • Petronio, Sandra (2002). Boundaries of Privacy: Dialectics of Disclosure. Albany, NY, State University of New York Press.

    Google Scholar 

  • Rashidi, Yasmeen; Tousif Ahmed; Felicia Patel; Emily Fath; Apu Kapadia; Christena Nippert-Eng; and Norman Makoto Su (2018). “You don’t want to be the next meme”: College Students’ Workarounds to Manage Privacy in the Era of Pervasive Photography. In SOUPS’18: Fourteenth Symposium on Usable Privacy and Security, Baltimore, Maryland, USA, 12 August - 14 August, 2018, California: USENIX Association, pp. 143–157.

  • Shi, Pan; Heng Xu; and Yunan Chen (2013). Using contextual integrity to examine interpersonal information boundary on social network sites. In CHI’13: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Paris, France, 27 April 2013- 2 May, 2013, New York: ACM Press, pp 35–38

  • Shoshitaishvili, Yan; Christopher Kruegel; and Giovanni Vigna (2015). Portrait of a Privacy Invasion: Detecting Relationships Through Large-scale Photo Analysis. Proceedings on Privacy Enhancing Technologies, vol. 2015, no. 1, pp. 41–60.

    Article  Google Scholar 

  • Shu Cong; Na Hu; Xing Zhang; Yuanxiao Ma; and Xu Chen (2017). Adult attachment and profile images on Chinese social networking sites: A comparative analysis of Sina Weibo and WeChat. Computers in Human Behavior, vol. 77, pp. 266–273.

    Article  Google Scholar 

  • Squicciarini, Anna; Cornelia Caragea; and Rahul Balakavi (2017). Toward Automated Online Photo Privacy. ACM Transactions on the Web, vol. 11, no. 1, pp. 2:1–2:29.

  • Squicciarini, Anna; Mohamed Shehab; and Federica Paci (2009). Collective privacy management in social networks. In WWW’09: Proceedings of the 18th international conference on World wide web, Madrid, Spain, 20 April - 24 April, 2009, New York: ACM Press, pp. 521–530.

  • Squicciarini, Anna; Heng Xu; and Xiaolong Zhang (2011). CoPE: Enabling Collaborative Privacy Management in Online Social Networks. Journal of the American Society for Information Science and Technology, vol. 62, no. 3, pp. 521-534.

    Google Scholar 

  • Strauss, Anselm L (1987). Qualitative Analysis for Social Scientists. Cambridge, UK, Cambridge Core.

    Book  Google Scholar 

  • Sturm, Christian; Alice Oh; Sebastian Linxen; Jose Abdelnour Nocera; Susan Dray; Katharina Reinecke (2015). How WEIRD is HCI?: Extending HCI Principles to Other Countries and Cultures. In CHI EA '15: Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, Seoul, Republic of Korea, 18 April - 23 April, 2015, New York: ACM Press, pp. 2425–2428.

  • Such, Jose M.; and Natalia Criado (2018). Multiparty Privacy in Social Media. Communications of the ACM, vol. 61, no. 8, pp. 74–81.

    Article  Google Scholar 

  • Such, Jose M.; and Michael Rovatsos (2016). Privacy Policy Negotiation in Social Media. ACM Transactions on Autonomous and Adaptive Systems, vol. 11, no. 1, pp. 4:1–4:29.

  • Such, Jose M.; Joel Porter; Sören Preibusch; Adam Joinson (2017). Photo Privacy Conflicts in Social Media: A Large-scale Empirical Study. In CHI’17: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, Denver, Colorado, USA, 6 May - 11 May, 2017, New York: ACM Press, pp. 3821–3832.

  • Tang, Shengming, and Xiaoping Dong (2006). Parents’ and Children’s Perceptions of Privacy Rights In China: A Cohort Comparison. Journal of Family Issues, vol. 27, no. 3, pp. 285–300.

    Article  Google Scholar 

  • Tierney, Matt; Ian Spiro; Christoph Bregler; and Lakshminarayanan Subramanian (2013). Cryptagram: Photo Privacy for Online Social Media. In COSN '13: Proceedings of the first ACM conference on Online social networks, Boston, Massachusetts, USA, 7 October - 8 October, 2013, New York: ACM Press, pp. 75–88.

  • Triandis, Harry C. (1989). The self and social behavior in differing cultural contexts. Psychological Review, vol. 96, no. 3, pp. 506–520.

    Article  Google Scholar 

  • Triandis, Harry C. (1995). Individualism & collectivism. Boulder, CO, Westview Press.

    Google Scholar 

  • Vitak, Jessica, and Jinyoung Kim (2014). “You Can’T Block People Offline”: Examining How Facebook’s Affordances Shape the Disclosure Process. In CSCW’14: Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing, Baltimore, Maryland, USA, 15 February - 19 February, 2014, New York: ACM Press, pp. 461–474.

  • Wang, Yang; Huichuan Xia; Yaxing Yao; and Yun Huang (2016). Flying Eyes and Hidden Controllers: A Qualitative Study of People’s Privacy Perceptions of Civilian Drones in The US. Proceedings on Privacy Enhancing Technologies, vol. 2016, no. 3, pp. 172–190.

    Article  Google Scholar 

  • Wisniewski, Pamela; AKM Najmul Islam; Heather Richter Lipford; and David C. Wilson (2016). Framing and Measuring Multi-dimensional Interpersonal Privacy Preferences of Social Networking Site Users. Communications of the Association for Information Systems, vol. 38, no. 10, pp. 235–258.

    Article  Google Scholar 

  • Wisniewski, Pamela; Heather Lipford; and David Wilson (2012). Fighting for My Space: Coping Mechanisms for Sns Boundary Regulation. In CHI’12: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Austin, Texas, USA, 5 May - 10 May, 2012, New York: ACM Press, pp. 609–618.

  • Wisniewski, Pamela; Heng Xu; Heather Lipford; and Emmanuel Bello-Ogunu (2015). Facebook apps and tagging: The trade-off between personal privacy and engaging with friends. Journal of the Association for Information Science and Technology, vol. 66, no. 9, pp.1883–1896.

    Article  Google Scholar 

  • Xu Kaihe; Yuanxiong Guo; Linke Guo; Yuguang Fang; and Xiaolin Li (2017). My Privacy My Decision: Control of Photo Sharing on Online Social Networks. IEEE Transactions on Dependable and Secure Computing, vol. 14, no. 2, pp. 199–210.

    Article  Google Scholar 

  • Yao-Huai, Lü (2005). Privacy and Data Privacy Issues in Contemporary China. Ethics and Information Technology, vol. 7, no. 1, pp. 7–15.

    Article  Google Scholar 

  • Zhu, Zong-yi, and Hyeon-Cheol Kim (2020). Determinants of SNS Photo Sharing Behavior of Teenagers at an Outdoor Music Festival in China. International Journal of Advanced Smart Convergence, vol. 9, no. 2, pp. 129–139.

    Google Scholar 

  • Zuur, Alain; Elena N. Ieno; Neil Walker; Anatoly A. Saveliev; and Graham M. Smith (2009). Mixed Effects Models and Extensions in Ecology with R. New York, NY, Springer Science & Business Media.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yao Li.

Ethics declarations

Conflicts of interests/Competing interests

There is no conflict of interests or competing interests for this manuscript.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendices

Appendix

Table 6

Table 6 Demographics of interviewees.

Table 7

Table 7 Demographics of survey participants.

Scenario-based survey questions

A close friend [acquaintance] shares a photo on WeChat that involves you. The photo will have a negative influence on your self-presentation (i.e., you looked awful or you were doing something inappropriate in the photo).

A close friend [acquaintance] shares a photo on WeChat that involves you. The photo will have a negative influence on your social relationships (i.e., you were doing something in the photo that might hurt some of your social relations).

A close friend [acquaintance] shares a photo on WeChat that involves you. The photo contains your sensitive personal information (i.e., your address, your family member’s information, etc.).

A close friend [acquaintance] shares a photo on WeChat that involves you. The photo includes you and a crowd of other people.

  1. 1.

    Who do you feel is OK to see this photo?

    • No one can see it

    • Only you and the person who shares this photo

    • Your mutual Facebook friend with this person

    • This person’s Facebook friends that you do not know

    • Your employer

    • Your teacher

    • Public

  1. 2.

    Please select how you feel about the photo sharing:

    • Extremely acceptable

    • Somewhat acceptable

    • Neither acceptable nor unacceptable

    • Somewhat unacceptable

    • Extremely unacceptable

Fig. 2
figure 2

DHARMa residual diagnostics for GLMM model

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, Y., Gui, X. Examining Co-Owners’ Privacy Consideration in Collaborative Photo Sharing. Comput Supported Coop Work 31, 79–109 (2022). https://doi.org/10.1007/s10606-021-09421-4

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10606-021-09421-4

Keywords

Navigation