Perspectives for sharing photos of children online
Keywords:Information sharing, interviews, online social networks, photos
The goal of this study was to gather the thoughts people have about sharing photos of children online. The work was done by gathering a literature review, studying 29 Internet forum discussions (in English and Finnish), and by personal interviews of 50 people (from Asia and Europe). Eight main viewpoints for sharing photos of children online were discovered that also supported the findings of earlier studies. Also, it was found that compared to the male users, the female users are more active in sharing information about other people online and also feel freer to share the information without asking for permission.
Barker, V. (2009) “Older Adolescents’ Motivations for Social Network Site Use: The Influence of Gender, Group Identity, and Collective Self-esteem” Cyberpsychology Behavior and Social Networking, volume 12, number 2, pp. 209-213.
Campisi, P., Maiorana, E., and Neri, A. (2009) "Privacy Protection in Social Media Networks a Dream That Can Come True?" Proceedings of International Conference on Digital Signal Processing, 5p
Chan C.K. and Virkki, J. (2014) “Perspectives for Sharing Personal Information on Online Social Networks” Social Networking, volume 3, number 1, pp. 41-49.
Chen, L. and Tsoi, H.K. (2011) “Privacy Concern and Trust in Using Social Network Sites: A Comparison between French and Chinese Users” Proceedings of International Conference on Human-Computer Interaction, pp. 234-241.
Determann, L. (2012) “Social Media Privacy: A Dozen Myths and Facts” Stanford Technology Law Review, at
http://stlr.stanford.edu/pdf/determann-socialmediaprivacy.pdf , accessed 1 January 2014.
Duggan, M. (2013) “Photo and Video Sharing Grow Online” Pew Internet & American Life Project, at http://www.pewinternet.org/Reports/2013/Photos-and-videos.aspx , accessed 8 December 2013
Dwyer, C., Hiltz, S.R. and Passerini, K. (2007) “Trust and Privacy Concern within Social Networking Sites: A Comparison of Facebook and MySpace” Proceedings of Americas' Conference on Information Systems, 10p.
ENISA, European Network and Information Security Agency, 2007. "Security Issues and Recommendations for Online Social Networks" at http://www.enisa.europa.eu/publications/archive/security-issues-and-recommendations-for-online-social-networks , accessed 8 February 2014.
Kirschner P.A. and Karpinski, A.C. (2010) “Facebook and Academic Performance” Computers in Human Behavior, volume 26, pp. 1237-1245.
Krishnamurthy, B. (2013) "Privacy and Online Social Networks: Can Colorless Green Ideas Sleep Furiously?" IEEE Security & Privacy, volume 11, number 3, pp.14-20.
Kuss D.J. and Griffiths, M.D. (2011) “Online Social Networking and Addiction—A Review of the Psychological Literature” International Journal of Environmental Research and Public Health, volume 8, number 9, pp. 3528-3552.
Lewis, K., Kaufman, J., and Christakis, N. (2008) “The Taste for Privacy: An Analysis of College Student Privacy Settings in an Online Social Network” Journal of Computer-Mediated Communication, volume 14, number 1, pp. 79-100.
M. Madden, et al. (2013) “Teens, Social Media, and Privacy,” Pew Internet & American Life Project, at http://www.pewinternet.org/Reports/2013/Teens-Social-Media-And-Privacy.aspx , accessed 10 November 2013.
M. Madden, et al. (2012) “Parents, Teens, and Online Privacy,” Pew Internet & American Life Project, at http://pewinternet.org/Reports/2012/Teens-and-Privacy.aspx , accessed 13 October 2013.
Madden M. and Smith, A. (2010) “Reputation Management and Social Media”, Pew Internet & American Life Project, at http://pewinternet.org/Reports/2010/Reputation-Management.aspx , accessed 7 January 2014.
Madden, M. (2012) “Privacy Management on Social Media Sites,” Pew Internet & American Life Project, at http://pewinternet.org/Reports/2012/Privacy-management-on-social-media.aspx , accessed 5 October 2013.
A. Malhotra, et al. (2012) "Studying User Footprints in Different Online Social Networks" Proceedings of International Conference on Advances in Social Networks Analysis and Mining, pp. 1065-1070.
Michalopoulos D. and Mavridis, I. (2010) "Surveying Privacy Leaks through Online Social Network" Proceedings of Panhellenic Conference on Informatics, pp.184-187.
Miller K.W. and Voas, J. (2012) "Who Owns What? The Social Media Quagmire" IT Professional, volume 14, number 6, pp. 4-5.
Oboler, A., Welsh, K., and Cruz, L. (2012) “The Danger of Big Data: Social Media as Computational Social Science” First Monday, volume 17, number 7- 2.
Smith, T. (2008) "Power to the People, Wave.3," at http://www.universalmccann.com/Assets/wave-3-20080403093750.pdf , accessed 5 Novermber 2013.
Solove, D.J. (2006) “A Taxonomy of Privacy” University of Pennsylvania Law Review, volume 154, number 3, GWU Law School Public Law Research Paper No. 129.
Solove, D.J. (2007) “'I've Got Nothing to Hide' and Other Misunderstandings of Privacy” San Diego Law Review, volume 44, GWU Law School Public Law Research Paper No. 289.
Virkki J. and Chen, L. (2013) "Personal Perspectives: Individual Privacy in the IOT," Advances in Internet of Things, volume 3, number 2, pp. 21-26.
Wang, Y., Norcie, G., and Cranor, L.F. (2011) “Who Is Concerned about What? A Study of American, Chinese and Indian Users Privacy Concerns on Social Network Sites” Proceedings of International Conference on Trust & Trustworthy Computing, 8p.
Wilson, K., Fornasier, S., and White, K.M. (2010) “Psychological Predictors of Young Adults’ Use of Social Networking Sites” Cyberpsychology Behavior and Social Networking, volume 13, number 2, pp. 173-177.