Abstract
A photo or a video could contain sensitive information coded as tacit information, which makes it difficult gauge, the loss of privacy, if such photo or a video were shared. Social media applications like Facebook, Twitter, WhatsApp and many more such applications are becoming popular. The instant sharing of information via photos and videos is making the management of issues which rise out of loss of privacy more difficult. Many users of social media trust that their content will not be misused other than purposes that were originally intended. This paper discusses not only about how much of that trust is real and how much of it was forced, but demonstrates the reasoning behind forced trust. These interferences were made after data collection via interviews and data analysis using Grounded Theory.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abdul-Rahman, A.: A framework for decentralized trust reasoning. Ph.D. thesis, University of London (2005). http://discovery.ucl.ac.uk/1444477
Braynov, S., Sandholm, T.: Contracting with uncertain level of trust. Comput. Intell. 18, 501–514 (2002)
Chen, S., Williams, M.-A.: Privacy in social networks: a comparative study. In: PACIS 2009 Proceedings, vol. 81 (2009). http://aisel.aisnet.org/pacis2009/81/
Castelfranchi, C., Falcone, R.: Trust and control: a dialectic link. Appl. Artif. Intell. 14(8), 799–823 (2000)
Corbin, J., Strauss, J.: Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory. Thousand Oaks, CA (2008)
Chen, S., Williams, M.-A.: Towards a comprehensive requirements architecture for privacy-aware social recommender systems. Proceedings of the 7th Asia-Pacific Conference on Conceptual Modelling, vol. 110, pp. 33–42 (2010)
Charmaz, K.: Constructing Grounded Theory: A Practical Guide Through Qualitative Analysis. Sage, London (2006)
Facebook 2011, Facebook principles, viewed 17 February 2014. http://www.facebook.com/principles.php
Fukuyama, F.: Trust: The Social Virtues and the Creation of Prosperity. Touchstone, New York (1996)
Govani, T., Pashley, H.: Student awareness of the privacy implications when using Facebook, viewed 11 January 2015
Glaser, B.G., Strauss, A.L.: The Discovery of Grounded Theory: Strategies for Qualitative Research. Aldine Publishing Company, Chicago (1967)
Gregor, S.: Design theory in information systems. Australas. J. Inf. Syst. 10(1) (2002)
Goffman, E.: The Presentation of Self in Everyday Life. Doubleday, New York (1959)
Habermas, J.: The theory of communicative action vol. 1: Reason and the Rationalization of Society, Polity Press, Cambridge (1986)
Huey, L.: A social movement for privacy/against surveillance? some difficulties in engendering mass resistance in a land of twitter and tweets. Case Western Reserv. J. Int. Law 42(3), 699–710 (2010)
Kipnis, D.: Trust and technology. In: Kramer, R.M., Tyler, T.R. (eds.) Trust in Organizations. Sage, London (1996)
Luhmann, N.: Trust and Power. Wiley, Chichester (1979)
Liamputtong, P.: Qualitative Research Methods, 3rd edn. Oxford University Press (2009)
Lewicki, R.J., Bunker, B.B.: Developing and Maintaining Trust in Work Relationships. Sage Publication, London (1996)
Miles, M.B., Huberman, A.M.: Qualitative Data Analysis: A Sourcebook of New Methods, 2nd edn. Sage, Newbury Park (1994)
Marshall, C., Rossman, G.B.: Designing Qualitative Research, 3rd edn. Sage, London (1999)
McKnight, D.H., Cummings, L.L., Chervany, N.L.: The meaning of trust. J. Manag. Inf. Syst. 28(2), 269–304 (1996)
Palen, L., Dourish, P.: Unpacking “privacy” for a networked world. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 129–136 (2003)
Petronio, S., Durham, W.: Understanding and applying communication privacy management theory. In: Baxter, L.A., Braithwaite, D.O. (eds.) Engaging Theories in Interpersonal Communication, pp. 309–322. Sage, Thousand Oaks (2008)
Pearson, S.: Trusted Computing Platforms: TPCA Technology in Context. Prentice-Hall, Upper Saddle River (2002)
Resnick, P.: The value of reputation on eBay: A controlled experiment. Exp. Econ. 9(2), 79–101 (2006). https://link.springer.com/article/10.1007/s10683-006-4309-2
Riegelsberger, J.: The mechanics of trust: a framework of research and design. Int. J. Hum. Comput. Stud. 62(3), 381–422 (2005)
Ormerod, P.: Why Most Things Fail: Evolution, Extinction and Economics. Faber & Faber, London (2005)
Westin, A.: Privacy and Freedom. Atheneum, New York (1967)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Madhisetty, S., Williams, MA. (2019). The Role of Trust and Control in Managing Privacy When Photos and Videos Are Stored or Shared. In: Arai, K., Bhatia, R., Kapoor, S. (eds) Proceedings of the Future Technologies Conference (FTC) 2018. FTC 2018. Advances in Intelligent Systems and Computing, vol 881. Springer, Cham. https://doi.org/10.1007/978-3-030-02683-7_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-02683-7_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02682-0
Online ISBN: 978-3-030-02683-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)