ABSTRACT
Determining which photos are sensitive is difficult. Although emerging computer vision systems can label content items, previous attempts to distinguish private or sensitive content fall short. There is no human-centered taxonomy that describes what content is sensitive or how sharing preferences for content differs across recipients. To fill this gap, we introduce a new sensitive content elicitation method which surmounts limitations of previous approaches, and, using this new method, collected sensitive content from 116 participants. We also recorded participants' sharing preferences with 20 recipient groups. Next, we conducted a card sort to surface user-defined categories of sensitive content. Using data from these studies, we generated a taxonomy that identifies 28 categories of sensitive content. We also establish how sharing preferences for content differs across groups of recipients. This taxonomy can serve as a framework for understanding photo privacy, which can, in turn, inform new photo privacy protection mechanisms.
Supplemental Material
Available for Download
This Auxiliary material zip file contains the survey questions and the full dendrogram.
Preview video captions
- James D Abbey and Margaret G Meloy. 2017. Attention by design: Using attention checks to detect inattentive respondents and improve data quality. Journal of Operations Management 53 (2017), 63--70.Google ScholarDigital Library
- Patricia Sanchez Abril. 2007. A (My) space of one's own: on privacy and online social networks. Nw. J. Tech. & Intell. Prop. 6 (2007), 73.Google Scholar
- Anne Adams, Sally Jo Cunningham, and Masood Masoodian. 2007. Sharing, privacy and trust issues for photo collections. (2007).Google Scholar
- Shane Ahern, Dean Eckles, Nathaniel S Good, Simon King, Mor Naaman, and Rahul Nair. 2007. Over-exposed?: privacy patterns and considerations in online and mobile photo sharing. In Proceedings of the SIGCHI conference on Human factors in computing systems. ACM.Google ScholarDigital Library
- Rawan Alharbi, Mariam Tolba, Lucia C Petito, Josiah Hester, and Nabil Alshurafa. 2019. To Mask or Not to Mask?: Balancing Privacy with Visual Confirmation Utility in Activity-Oriented Wearable Cameras. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 3 (2019), 72.Google ScholarDigital Library
- David S Allison and Miriam AM Capretz. 2011. Furthering the growth of cloud computing by providing privacy as a service. In International Conference on Information and Communication on Technology. Springer, 64--78.Google ScholarCross Ref
- Tuomas Aura, Thomas A Kuhn, and Michael Roe. 2006. Scanning electronic documents for personally identifiable information. In Proceedings of the 5th ACM workshop on Privacy in electronic society. ACM.Google ScholarDigital Library
- Kathy Baxter, Catherine Courage, and Kelly Caine. 2015. Understanding your users: A practical guide to user research methods. Morgan Kaufmann.Google Scholar
- Sebastian Benthall, Seda Gürses, Helen Nissenbaum, Cornell Tech, and NYU Steinhardt MCC. 2017. Contextual integrity through the lens of computer science. Now Publishers.Google Scholar
- Andrew Besmer and Heather Richter Lipford. 2010. Moving beyond untagging: photo privacy in a tagged world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1563--1572.Google ScholarDigital Library
- Leyla Bilge, Thorsten Strufe, Davide Balzarotti, and Engin Kirda. 2009. All your contacts are belong to us: automated identity theft attacks on social networks. In Proceedings of the 18th international conference on World wide web. ACM, 551--560.Google ScholarDigital Library
- Jens Binder, Andrew Howes, and Alistair Sutcliffe. 2009. The problem of conflicting social spheres: effects of network structure on experienced tension in social network sites. In Proceedings of the SIGCHI conference on human factors in computing systems. ACM, 965--974.Google ScholarDigital Library
- Jens F Binder, Andrew Howes, and Daniel Smart. 2012. Harmony and tension on social network sites: Side-effects of increasing online interconnectivity. Information, Communication & Society 15, 9 (2012), 1279--1297.Google ScholarCross Ref
- Petter Bae Brandtzæg, Marika Lüders, and Jan Håvard Skjetne. 2010. Too many Facebook "friends"? Content sharing and sociability versus the need for privacy in social network sites. Intl. Journal of Human--Computer Interaction 26, 11--12 (2010), 1006--1030.Google ScholarCross Ref
- Michael Buhrmester, Tracy Kwang, and Samuel D Gosling. 2011. Amazon's Mechanical Turk: A new source of inexpensive, yet high-quality, data? Perspectives on psychological science 6, 1 (2011), 3--5.Google Scholar
- Daniel Buschek, Moritz Bader, Emanuel von Zezschwitz, and Alexander De Luca. 2015. Automatic privacy classification of personal photos. In Human-Computer Interaction. Springer, 428--435.Google Scholar
- Kelly Caine. 2008. Linking studies of privacy in HCI to psychological theories of privacy. (2008).Google Scholar
- Kelly Erinn Caine. 2009. Exploring everyday privacy behaviors and misclosures. Ph.D. Dissertation. Georgia Institute of Technology.Google Scholar
- Krista Casler, Lydia Bickel, and Elizabeth Hackett. 2013. Separate but equal? A comparison of participants and data gathered via Amazon's MTurk, social media, and face-to-face behavioral testing. Computers in Human Behavior 29, 6 (2013), 2156--2160.Google ScholarDigital Library
- Eun Kyoung Choe, Jaeyeon Jung, Bongshin Lee, and Kristie Fisher. 2013. Nudging people away from privacy-invasive mobile apps through visual framing. In IFIP Conference on Human-Computer Interaction. Springer, 74--91.Google ScholarCross Ref
- Edward J Clarke, Mar Preston, Jo Raksin, and Vern L Bengtson. 1999. Types of conflicts and tensions between older parents and adult children. The Gerontologist 39, 3 (1999), 261--270.Google ScholarCross Ref
- Sunny Consolvo, Ian E Smith, Tara Matthews, Anthony LaMarca, Jason Tabert, and Pauline Powledge. 2005. Location disclosure to social relations: why, when, & what people want to share. In Proceedings of the SIGCHI conference on Human factors in computing systems. ACM.Google ScholarDigital Library
- Eric C Cook and Stephanie D Teasley. 2011. Beyond promotion and protection: creators, audiences and common ground in user-generated media. In Proceedings of the 2011 iConference. ACM, 41--47.Google ScholarDigital Library
- Patricia C de Souza and Cristiano Maciel. 2015. Legal Issues and User Experience in Ubiquitous Systems from a Privacy Perspective. In International Conference on Human Aspects of Information Security, Privacy, and Trust. Springer, 449--460.Google ScholarDigital Library
- Marcie D Dorethy, Martin S Fiebert, and Christopher R Warren. 2014. Examining social networking site behaviors: Photo sharing and impression management on Facebook. International Review of Social Sciences and Humanities 6, 2 (2014), 111--116.Google Scholar
- Malin Eiband, Mohamed Khamis, Emanuel Von Zezschwitz, Heinrich Hussmann, and Florian Alt. 2017. Understanding shoulder surfing in the wild: Stories from users and observers. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 4254--4265.Google ScholarDigital Library
- Facebook. 2017. How do I edit the privacy settings for my photo albums? (2017). Retrieved January 2, 2018 from https://www.facebook.com/help/215496745135618? helpref=about_content.Google Scholar
- Simone Fischer-Hubner, Chris Hoofnagle, Ioannis Krontiris, Kai Rannenberg, and Michael Waidner. 2011. Online Privacy: Towards Informational Self-Determination on the Internet. (2011).Google Scholar
- Liqiang Geng, Larry Korba, Xin Wang, Yunli Wang, Hongyu Liu, and Yonghua You. 2008. Using data mining methods to predict personally identifiable information in emails. In International Conference on Advanced Data Mining and Applications. Springer, 272--281.Google ScholarDigital Library
- Eric Gilbert and Karrie Karahalios. 2009. Predicting tie strength with social media. In Proceedings of the SIGCHI conference on human factors in computing systems. ACM, 211--220.Google ScholarDigital Library
- Google Street View. 2018. Image Acceptance and Privacy Policies. (2018). Retrieved May 7, 2018 from https://www.google.com/streetview/privacy/.Google Scholar
- Steven Greenhouse and Michael Barbaro. 2005. Wal-Mart Memo Suggests Ways to Cut Employee Benefit Costs. (2005). Retrieved September 8, 2018 from https://www.nytimes.com/2005/10/26/business/ walmart-memo-suggests-ways-to-cut-employee -benefit-costs.html.Google Scholar
- Rakibul Hasan, Eman Hassan, Yifang Li, Kelly Caine, David J Crandall, Roberto Hoyle, and Apu Kapadia. 2018. Viewer experience of obscuring scene elements in photos to enhance privacy. In ACM CHI Conference on Human Factors in Computing Systems (CHI).Google ScholarDigital Library
- Jianping He, Bin Liu, Deguang Kong, Xuan Bao, Na Wang, Hongxia Jin, and George Kesidis. 2016. Puppies: Transformation-supported personalized privacy preserving partial image sharing. In 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 359--370.Google ScholarCross Ref
- E Tory Higgins. 1987. Self-discrepancy: a theory relating self and affect. Psychological review 94, 3 (1987), 319.Google Scholar
- Roberto Hoyle, Robert Templeman, Denise Anthony, David Crandall, and Apu Kapadia. 2015. Sensitive lifelogs: A privacy analysis of photos from wearable cameras. In Proceedings of the 33rd Annual ACM conference on human factors in computing systems. ACM, 1645--1648.Google ScholarDigital Library
- Hongxin Hu, Gail-Joon Ahn, and Jan Jorgensen. 2013. Multiparty access control for online social networks: model and mechanisms. ieee transactions on knowledge and data engineering 25, 7 (2013), 1614--1627.Google Scholar
- Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, and Sotiris Ioannidis. 2015. Face/off: Preventing privacy leakage from photos in social networks. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 781--792.Google ScholarDigital Library
- Aleksandra Kacperczyk. 2011. Social isolation in the workplace: A cross-national and longitudinal analysis. (2011).Google Scholar
- Sanjay Kairam, Mike Brzozowski, David Huffaker, and Ed Chi. 2012. Talking in circles: selective sharing in google+. In Proceedings of the SIGCHI conference on human factors in computing systems. ACM, 1065--1074.Google ScholarDigital Library
- Sanjay Kairam, Joseph Kaye, John Alexis Guerra-Gomez, and David A Shamma. 2016. Snap Decisions?: How Users, Content, and Aesthetics Interact to Shape Photo Sharing Behaviors. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM.Google ScholarDigital Library
- Bart P Knijnenburg. 2017. Privacy? I Can't Even! making a case for user-tailored privacy. IEEE Security & Privacy 15, 4 (2017), 62--67.Google ScholarDigital Library
- Bart Piet Knijnenburg and Alfred Kobsa. 2014. Increasing sharing tendency without reducing satisfaction: finding the best privacy-settings user interface for social networks. (2014).Google Scholar
- William Kruskal and Frederick Mosteller. 1979. Representative sampling, II: Scientific literature, excluding statistics. International Statistical Review/Revue Internationale de Statistique (1979), 111--127.Google ScholarCross Ref
- Priya Kumar and Sarita Schoenebeck. 2015. The modern day baby book: Enacting good mothering and stewarding privacy on Facebook. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing. ACM, 1302--1312.Google ScholarDigital Library
- Yao Li, Alfred Kobsa, Bart P Knijnenburg, and MH Carolyn Nguyen. 2017a. Cross-cultural privacy prediction. Proceedings on Privacy Enhancing Technologies 2017, 2 (2017), 113--132.Google ScholarCross Ref
- Yifang Li, Nishant Vishwamitra, Hongxin Hu, Bart P Knijnenburg, and Kelly Caine. 2017b. Effectiveness and users' experience of face blurring as a privacy protection for sharing photos via online social networks. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol. 61. SAGE Publications Sage CA: Los Angeles, CA, 803--807.Google ScholarCross Ref
- Yifang Li, Nishant Vishwamitra, Bart P Knijnenburg, Hongxin Hu, and Kelly Caine. 2017c. Blur vs. block: Investigating the effectiveness of privacy-enhancing obfuscation for images. In 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). IEEE, 1343--1351.Google ScholarCross Ref
- Yifang Li, Nishant Vishwamitra, Bart P. Knijnenburg, Hongxin Hu, and Kelly Caine. 2017d. Effectiveness and users' experience of obfuscation as a privacy-enhancing technology for sharing photos. Proceedings of the ACM on Human-Computer Interaction 1, 2 (2017).Google ScholarDigital Library
- Tsung-Yi Lin, Michael Maire, Serge Belongie, James Hays, Pietro Perona, Deva Ramanan, Piotr Dollár, and C Lawrence Zitnick. 2014. Microsoft coco: Common objects in context. In European conference on computer vision. Springer, 740--755.Google ScholarCross Ref
- Kimberly J Mitchell, David Finkelhor, and Janis Wolak. 2001. Risk factors for and impact of online sexual solicitation of youth. Jama 285, 23 (2001), 3011--3014.Google ScholarCross Ref
- Adam D Moore. 2007. Toward informational privacy rights. San Diego L. Rev. 44 (2007), 809.Google Scholar
- Tyler Moore, Richard Clayton, and Ross Anderson. 2009. The economics of online crime. Journal of Economic Perspectives 23, 3 (2009).Google ScholarCross Ref
- Glen J Nowak and Joseph Phelps. 1992. Understanding privacy concerns. An assessment of consumers' information-related knowledge and beliefs. Journal of Direct Marketing 6, 4 (1992), 28--39.Google ScholarCross Ref
- Judith S Olson, Jonathan Grudin, and Eric Horvitz. 2005. A study of preferences for sharing and privacy. In CHI'05 extended abstracts on Human factors in computing systems. ACM, 1985--1988.Google ScholarDigital Library
- Tribhuvanesh Orekondy, Bernt Schiele, and Mario Fritz. 2017. Towards a visual privacy advisor: Understanding and predicting privacy risks in images. In 2017 IEEE International Conference on Computer Vision (ICCV). IEEE, 3706--3715.Google ScholarCross Ref
- Sinno Jialin Pan and Qiang Yang. 2009. A survey on transfer learning. IEEE Transactions on knowledge and data engineering 22, 10 (2009), 1345--1359.Google ScholarDigital Library
- Eyal Peer, Joachim Vosgerau, and Alessandro Acquisti. 2014. Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods 46, 4 (2014), 1023--1031.Google Scholar
- Tiffany A Pempek, Yevdokiya A Yermolayeva, and Sandra L Calvert. 2009. College students' social networking experiences on Facebook. Journal of applied developmental psychology 30, 3 (2009), 227--238.Google ScholarCross Ref
- Andrew Perrin and Jingjing Jiang. 2018. About a quarter of U.S. adults say they are "almost constantly' online. (2018). Retrieved February, 2019 from http://www.pewresearch.org/fact-tank/2018/03/14/ about-a-quarter-of-americans-report-goingonline-almost-constantly/.Google Scholar
- Pew Research Center. 2018. Internet/Broadband Fact Sheet. (2018). Retrieved February, 2019 from http://www.pewinternet.org/fact-sheet/internet-broadband/.Google Scholar
- Elissa M Redmiles, Sean Kross, Alisha Pradhan, and Michelle L Mazurek. 2017. How well do my results generalize? Comparing security and privacy survey results from MTurk and web panels to the US. Technical Report.Google Scholar
- Jessica Ringrose, Laura Harvey, Rosalind Gill, and Sonia Livingstone. 2013. Teen girls, sexual double standards and "sexting': Gendered value in digital image exchange. Feminist theory 14, 3 (2013), 305--323.Google Scholar
- Joel Ross, Andrew Zaldivar, Lilly Irani, and Bill Tomlinson. 2009. Who are the turkers? worker demographics in amazon mechanical turk. Department of Informatics, University of California, Irvine, USA, Tech. Rep (2009).Google Scholar
- Olga Russakovsky, Jia Deng, Hao Su, Jonathan Krause, Sanjeev Satheesh, Sean Ma, Zhiheng Huang, Andrej Karpathy, Aditya Khosla, Michael Bernstein, Alexander Berg, and Fei-Fei Li. 2015. Imagenet large scale visual recognition challenge. International Journal of Computer Vision 115, 3 (2015).Google ScholarDigital Library
- Robert Sheridan. 2014. Malingering: Yes, it May Get You Fired. (2014). Retrieved September 19, 2018 from https://www.mintz.com/insights- center/viewpoints/ 2014-05-malingering-yes-it-may-get-you-fired.Google Scholar
- Yoshinari Shirai, Yasue Kishino, Takayuki Suyama, and Shin Mizutani. 2019. PASNIC: a thermal based privacy-aware sensor node for image capturing. In Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers. ACM, 202--205.Google ScholarDigital Library
- M Six Silberman, Bill Tomlinson, Rochelle LaPlante, Joel Ross, Lilly Irani, and Andrew Zaldivar. 2018. Responsible research with crowds: pay crowdworkers at least minimum wage. Commun. ACM 61, 3 (2018), 39--41.Google ScholarDigital Library
- Meredith M Skeels and Jonathan Grudin. 2009. When social networks cross boundaries: a case study of workplace use of facebook and linkedin. In Proceedings of the ACM 2009 international conference on Supporting group work. ACM, 95--104.Google ScholarDigital Library
- Manya Sleeper, Rebecca Balebako, Sauvik Das, Amber Lynn McConahy, Jason Wiese, and Lorrie Faith Cranor. 2013. The post that wasn't: exploring self-censorship on facebook. In Proceedings of the 2013 conference on Computer supported cooperative work. ACM, 793--802.Google ScholarDigital Library
- Donna Spencer. 2009. Card sorting: Designing usable categories. Rosenfeld Media.Google Scholar
- Donna Spencer and Todd Warfel. 2004. Card sorting: a definitive guide. Boxes and Arrows 2 (2004).Google Scholar
- Qianru Sun, Liqian Ma, Seong Joon Oh, Luc Van Gool, Bernt Schiele, and Mario Fritz. 2017. Natural and Effective Obfuscation by Head Inpainting. arXiv preprint arXiv:1711.09001 (2017).Google Scholar
- Kurt Thomas, Chris Grier, and David M Nicol. 2010. unfriendly: Multi-party privacy risks in social networks. In International Symposium on Privacy Enhancing Technologies Symposium. Springer, 236--252.Google ScholarDigital Library
- Sara E Thomas. 2018. "What Should I Do?": Young Women's Reported Dilemmas with Nude Photographs. Sexuality Research and Social Policy 15, 2 (2018), 192--207.Google ScholarCross Ref
- Lisa Torrey and Jude Shavlik. 2010. Transfer learning. In Handbook of research on machine learning applications and trends: algorithms, methods, and techniques. IGI Global, 242--264.Google Scholar
- Lam Tran, Deguang Kong, Hongxia Jin, and Ji Liu. 2016. Privacy-CNH: A Framework to Detect Photo Privacy with Convolutional Neural Network using Hierarchical Features.. In AAAI. 1317--1323.Google Scholar
- Tom Tullis and Larry Wood. 2004. How many users are enough for a card-sorting study. In Proceedings UPA, Vol. 2004.Google Scholar
- Jessica Vitak and Jinyoung Kim. 2014. You can't block people offline: Examining how Facebook's affordances shape the disclosure process. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing. ACM, 461--474.Google ScholarDigital Library
- Tim Wafa. 2009. How the lack of prescriptive technical granularity in HIPAA has compromised patient privacy. N. Ill. UL Rev. 30 (2009), 531.Google Scholar
- Wenbo Wang, Hean Tat Keh, and Lisa E Bolton. 2009. Lay theories of medicine and a healthy lifestyle. Journal of Consumer Research 37, 1 (2009), 80--97.Google ScholarCross Ref
- Yang Wang, Gregory Norice, and Lorrie Faith Cranor. 2011. Who is concerned about what? A study of American, Chinese and Indian users' privacy concerns on social network sites. In International Conference on Trust and Trustworthy Computing. Springer, 146--153.Google ScholarDigital Library
- Heng Xu, Na Wang, and Jens Grossklags. 2012. Privacy by redesign: Alleviating privacy concerns for third-party apps. (2012).Google Scholar
- George Yee and Larry Korba. 2005. Comparing and matching privacy policies using community consensus. In Proceedings, 16th IRMA International Conference, San Diego, California. Citeseer.Google Scholar
- Alyson Leigh Young and Anabel Quan-Haase. 2013. Privacy protection strategies on Facebook: The Internet privacy paradox revisited. Information, Communication & Society 16, 4 (2013), 479--500.Google ScholarCross Ref
- Jun Yu, Zhenzhong Kuang, Zhou Yu, Dan Lin, and Jianping Fan. 2017. Privacy Setting Recommendation for Image Sharing. In Machine Learning and Applications (ICMLA), 2017 16th IEEE International Conference on. IEEE, 726--730.Google ScholarCross Ref
- Jun Yu, Zhenzhong Kuang, Baopeng Zhang, Wei Zhang, Dan Lin, and Jianping Fan. 2018. Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing. IEEE Transactions on Information Forensics and Security 13, 5 (2018), 1317--1332.Google ScholarDigital Library
Index Terms
- Towards A Taxonomy of Content Sensitivity and Sharing Preferences for Photos
Recommendations
Obfuscation Remedies Harms Arising from Content Flagging of Photos
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsPeople share photos on Social Networks Sites, but at the same time want to keep some photo content private. This tension between sharing and privacy has led researchers to try to solve this problem, but without considering users’ needs. To fill this gap, ...
Privacy Norms and Preferences for Photos Posted Online
Special Issue on HCI and the Body:?Reimagining Women's Health and Regular PapersWe are surrounded by digital images of personal lives posted online. Changes in information and communications technology have enabled widespread sharing of personal photos, increasing access to aspects of private life previously less observable. Most ...
Effectiveness and Users' Experience of Obfuscation as a Privacy-Enhancing Technology for Sharing Photos
Current collaborative photo privacy protection solutions can be categorized into two approaches: controlling the recipient, which restricts certain viewers' access to the photo, and controlling the content, which protects all or part of the photo from ...
Comments