about what is sensitive in a photo or a video, I have
asked my participants why they share content and
what are their concerns. This enabled me to deduce
what was sensitive according to them. This enabled
me to develop a conceptual framework which assists
in the effective management of privacy particularly
in photos and videos when shared through social
media.
The main problem is that, after initial publication of
the content using social media, its subsequent
persistence makes the content not ephemeral.
Technology enables the content to be available, such
loss of privacy can be attributed to the lack of
control about the content published using this
relatively new technology. It will have a significant
impact on individual privacy. The ephemeral nature
of information is important to be able to have
desirable levels of privacy. For example, when
people move on from and into relationships and
other major life events, an individual should be able
to exercise the right to be left alone. With others able
to republish photos and videos using social media
the individual’s privacy is breached significantly.
“People should have the freedom to share whatever
information they want, in any medium and any
format”, the freedom to access all of the information
made available to them by others” and “the freedom
to build trust and reputation through their identity
and connections” (Facebook 2011).
2 THE PRIVACY PROBLEM
Privacy is not well defined; contextualising privacy
is very difficult as the term privacy is subjective.
Privacy means different things to different people.
The concept of how well privacy is managed is often
debatable. Managing privacy becomes more difficult
when it comes to photos because photos contain tacit
information which is very difficult to contextualise.
The two main artefacts that were diagnosed from
conducting this research were that there was
inadequate information about privacy and its
consequences after users publishing their content
such as a photo or a video. A mismatch of
expectations of what was the intent to publish the
photo versus how may be perceived and viewed over
a period of time. There is a dire need for
understanding of the subject in the photo and the
context of the photo about what it represents needs
to be established. It is an almost an impossible task
to contextualise all photos, unless one has access to
petabytes of data like most social media
applications. Therefore a deductive method for
analysing photos for privacy was not chosen. To
understand how sensitive information in a photo or
video is shared and stored in a particular manner
does not affect the privacy of the photo, is the
objective of this research. This research was
conducted by asking people why they like to or has
shared their photos or videos using social media. By
understanding their expectations for publishing
content, this research could arrive at a clearer picture
about the subjective opinion on why participants
consider their privacy has been breached. Questions
about the metadata of the photo or video, were asked
to understand the tacit properties of the photo or a
video. This may not give the exact contextual
properties, but have given a clear indication under
which circumstances the photo or video was taken.
The information captured was about the shutter
speed, ISO, aperture, type of lens being used, etc.
Through this tacit information tagged in a photo it is
easy to make inferences about the circumstances the
photo was taken at that time. Big Data could be used
to process this metadata in post that it could build a
significant profile about the individual, which could
be a direct breach of privacy.
2.1 Research Question
How can sensitive information be stored, retrieved
and managed in a photo or a video? To answer that
question, first it is essential to determine what
sensitive information people believe exists in a
photo in a particular category, i.e. Family photo,
holiday photo, profile pictures, etc. Second, it is
important to associate these findings to assist in
developing a framework which will assist the
general public to manage their privacy effectively.
It is also equally important to understand the
underlying motivations in sharing the photo and to
be able to understand its context. The critical
features which will allow information in a photo to
pass through without affecting its privacy need to be
understood and investigated. This understanding of
expectations versus their consequences will give rise
to the determinants of privacy. These determinants
will manage how the information in a photo will be
stored and retrieved.
For example, in the United States’ the Internal
Revenue Service searches Facebook and MySpace
for evidence of tax evaders’ income and
whereabouts, and the Citizenship and Immigration
Services have been known to scrutinise photos and
posts to confirm family relationships or weed out
sham marriages. Employers sometimes decide