[go: up one dir, main page]

Next Article in Journal
Image Encryption Algorithms: A Survey of Design and Evaluation Metrics
Next Article in Special Issue
Mapping Automated Cyber Attack Intelligence to Context-Based Impact on System-Level Goals
Previous Article in Journal
Experiential Transformation in Privacy Behavior: A New Framework for Privacy Behavior Enhancement
Previous Article in Special Issue
Evaluating Cluster-Based Synthetic Data Generation for Blood-Transfusion Analysis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Incidental Data: A Survey towards Awareness on Privacy-Compromising Data Incidentally Shared on Social Media

1
Institute of Software Technology, Graz University of Technology, 8010 Graz, Austria
2
Institute of Software Design and Security, FH JOANNEUM Gesellschaft mbH, 8605 Kapfenberg, Austria
3
Department of Computer Science, UiT The Arctic University of Norway, 9037 Tromsø, Norway
*
Author to whom correspondence should be addressed.
J. Cybersecur. Priv. 2024, 4(1), 105-125; https://doi.org/10.3390/jcp4010006
Submission received: 20 November 2023 / Revised: 6 February 2024 / Accepted: 21 February 2024 / Published: 23 February 2024
(This article belongs to the Special Issue Data Protection and Privacy)
Figure 1
<p>Venn-diagram of the number of enrolled students in the three courses we recruited participants from and how they overlap (<b>left</b>); and the number of responses before and after cleaning (<b>right</b>).</p> ">
Figure 2
<p>Shows the pictures presented to participants in first question Q1 and Q1.1. Subfigures (<b>a</b>–<b>c</b>) show different scenes from the video. (<b>a</b>,<b>b</b>) combined hints the shape of the backyard, whereas (<b>c</b>) depicts a smartphone with a weather app showing an incoming storm and the current position as a blue dot. The pictures were taken from Kutschera [<a href="#B6-jcp-04-00006" class="html-bibr">6</a>] and [<a href="#B34-jcp-04-00006" class="html-bibr">34</a>], respectively.</p> ">
Figure 3
<p>Shows the pictures presented to participants in second question Q2 and Q2.1. Each subfigure (<b>a</b>–<b>c</b>) represents different postings from the same person on Twitter. The posting shown in (<b>a</b>) is a response to a question if the car is still owned, (<b>b</b>) an untriggered comment about how beautiful the day is, (<b>c</b>) depicts a posting that comments on the end of the day where the skyline and a small pool is visible alongside the moon. The pictures were taken from Kutschera [<a href="#B6-jcp-04-00006" class="html-bibr">6</a>] and Twitter [<a href="#B35-jcp-04-00006" class="html-bibr">35</a>,<a href="#B36-jcp-04-00006" class="html-bibr">36</a>,<a href="#B37-jcp-04-00006" class="html-bibr">37</a>], respectively.</p> ">
Figure 4
<p>Depicts the boxplot visualizing the statistical values, such as median and the quantiles of all answers, from Q3.1 to Q3.20.</p> ">
Figure 5
<p>Depicts the workflow a student must undertake in order to receive bonus points, how anonymity is preserved, and how data are kept clean and trustworthy. Blue indicates a student action, whereas green indicates a lecturer or researcher role.</p> ">
Review Reports Versions Notes

Abstract

:
Sharing information with the public is becoming easier than ever before through the usage of the numerous social media platforms readily available today. Once posted online and released to the public, information is almost impossible to withdraw or delete. More alarmingly, postings may carry sensitive information far beyond what was intended to be released, so-called incidental data, which raises various additional security and privacy concerns. To improve our understanding of the awareness of incidental data, we conducted a survey where we asked 192 students for their opinions on publishing selected postings on social media. We found that up to 21.88% of all participants would publish a posting that contained incidental data that two-thirds of them found privacy-compromising. Our results show that continued efforts are needed to increase our awareness of incidental data posted on social media.

1. Introduction

The reckless use of social media and other online services can expose insights into personal affairs beyond what was intentionally meant to be shared. The posted data might reveal significantly more information than first thought, particularly when analyzed and combined with auxiliary databases. For instance, it has been shown that algorithms can estimate a person’s personality effectively from likes [1,2,3]. With regard to the rich multimedia data that are posted in large volumes on social media, one might suspect significant unintended disclosure of personal information amongst the many inconspicuous pictures and videos of family and friends. Such unintended disclosure of personal information can threaten someones privacy. For this reason, this study is of interest to investigate the awareness of a person posting content on social media. In this paper, we study the awareness of unintentionally published data on social media, commonly referred to as incidental data [4]. We conduct a survey that implicitly assesses the participant’s awareness of incidental data without the influence of the question itself through a survey, as the mere assessment of a privacy concern increases its awareness [5]. As a methodology, we used a survey that asked questions regarding postings that contained incidental data. In our previous research [6], we analyzed postings using Open Source Intelligence (OSINT) methods while limited to two hours per target. It was possible to detect data that were not intended to be published within that time limit. The responses from the quantitative survey method are then analyzed using statistical methods. Further, data found within those postings lead to further data that most found privacy-compromising. Our survey provides robust evidence that there exists a significant lack of awareness around incidental data in social media postings as more than one-fifth of participants would share content containing hidden data they find privacy-compromising. We have indicators that suggest awareness of hidden data that can be a threat to privacy; thus, the focus on proper guidelines and education to help prevent the self-publication of incidental data may be a point of improvement. This paper makes the following contributions:
  • Presents a novel survey methodology that indirectly evaluates participants’ awareness of incidental data, avoiding the influence of the question itself;
  • Provides robust empirical evidence of the lack of awareness among social media users regarding the privacy implications of their online content;
  • Highlights the prevalence of incidental data in social media posts and its potential threat to user privacy.
In the first part of this paper, we discuss the current state of the art and summarize the views on the psychological impact of disclosure or nondisclosure of information. Then, we provide insights on our study design and further list the questions of our survey, including answer choices. Next, we show and describe our results in Section 4 before we evaluate and discuss those results in Section 5. We summarize our study with a final conclusion in Section 6.

2. Background

Privacy on social media is often discussed in terms of either privacy-jeopardizing settings or malicious actors [7]. However, Krämer and Schäwel [8] discuss the urge of people to self-disclose personal information on social media. Schneier [4] defined a taxonomy of different data that is in connection with the usage of social media, namely, the following: service, disclosed, entrusted, incidental, behavioral, and derived data. In particular, Schneier [4] argues that incidental data in this context are data posted by other people, over which one has no control.
Definition 1.
Incidental data is what other people post about you: a paragraph about you that someone else writes, a picture of you that someone else takes and posts. Again, it’s basically the same stuff as disclosed data, but the difference is that you don’t have control over it, and you didn’t create it in the first place.” Schneier [4].
In previous work [6], we argue that the term incidental is used in case something unexpected was found that should not be there. For instance, during an X-ray examination meant to assess a potential bone fracture, the discovery of tumorous tissue is termed an incidental finding [9]. Considering this more general meaning, we argue that one’s unawareness of unintentionally publishing problematic data, alongside the primary reason for publishing content on social media, also leads to the uncontrollability of personal data. Fitting the intent behind the definition by Schneier [4], we propose an extended Definition 2.
Definition 2.
Incidental data is data that one has no control over, either due to another person disclosing it or the unawareness of its existence within data disclosed by oneself.

2.1. Privacy from a Psychological Perspective

As argued by Schlosser [10], self-disclosure can be defined as communicating personal information about oneself to another person that is a close representation of oneself. Whereas self-presentation is defined as controlled and directed information that impacts the impressions of people about oneself Schlosser [10]. Barasch [11] discusses intrapersonal as emotions and processes within oneself, whereas interpersonal describes effects on relationships between others and oneself.
Luo and Hancock [12] state that disclosure fulfills basic social needs and thus improves one’s well-being. Krämer and Schäwel [8] continue that privacy is an intrapersonal secondary need for people. Equally important is the view of the intrapersonal and interpersonal cost of not disclosing information. Sharing a problem (privileged information) can help to improve one’s situation by gaining new views on a personal topic or the view of others about oneself [13]. However, the consequences of sharing information are often overestimated [13]. Furthermore, the sharing of secrets can be used in a strategic manner to evade criticism and gain support [14]. Consequently, it can be said that disclosing information can have positive effects and be vital for oneself.
Social media seems to have filled a perfect spot that can fulfill the human motivation for self-disclosure [8]. However, this also entails dangers, as interactions with social media as simple and trivial as giving likes to certain posts can give away personal information [1,15].
Brough and Martin [5] claim that research on privacy is strongly focused on a user’s motivation to protect their personal data from unauthorized usage, which correlates to privacy concerns; however, they focus very little of their research on privacy knowledge. The authors further state that privacy concerns might be artificially increased when they are being assessed.
Automated data collection and the usage of specialized algorithms can reveal sensitive information about one’s life [16,17]. Fast and Jago [16] find that people underestimate the risks of sharing personal data; moreover, people seem unable to take strong actions even after severe privacy violations [18]. Such behavior comes from focusing on benefits and convenience combined with not being an explicitly identifiable victim [19]. Conversely, the benefit and convenience of data collection and usage of algorithms pose a massive threat to one’s privacy; however, this may have created a state of mind where people think it is not realistically possible to stop it.

2.2. Privacy from a Technical Perspective

When people interact with a social network of their choice, it can be assumed that the main goal is to share content and not to tackle a host of privacy settings. This can be problematic as companies have discovered that user data, especially of a large group of people, can be a valuable asset. Even though there are good examples of user-based privacy, there are companies that take advantage of people’s behavior. As discussed by Bösch et al. [20], such methods are referred to as dark privacy strategies or dark privacy patterns. Research in human–computer interaction and user-experience design has found that people are more likely to press a button in a rush if it is green. This led to situations where companies made the accept button for “allow cookies” or “share statistical data” buttons slightly larger and green, whereas the decline button is slightly smaller and gray [21,22].
Al-Charchafchi et al. [23] found in their review that users are threatened in multiple ways. The threat vectors concern information privacy, social engineering, data leakages through unfit privacy settings, or Application Programming Interface (API) weaknesses. A similar line is taken by the work of Johansen et al. [24], with the authors providing an insight into the problems and opportunities of lifelogging systems. In forensics and in court, the analysis of Electric Network Frequency (ENF) becomes used more often in order to verify timestamps or the untampered integrity of audio and video recordings [25,26,27].

2.3. Privacy from an Awareness Perspective

The quantitative study of Amon et al. [28] on interdependent privacy provides valuable insights into aspects of privacy awareness, especially the sharing of private information of other persons. The study analyzed 245 responses on 68 real-world pictures out of 13 categories through a questionnaire about the likelihood of sharing given pictures, entertainment, and its privacy rating. The study assessed the specific personality traits known as the dark triad, which focuses on narcissism, psychopathy, and manipulative personality style. Even though the study gives valuable insights into privacy awareness on social media, it focuses on pictures shared by others. Based on the responses on the pictures and personality traits, the findings from a cluster analysis were the following three interdependent privacy user categories: privacy preservers, privacy ignorers, and privacy violators. The study reveals that privacy ignorers have a low dark triad and low levels of education level but prefer personal privacy. Privacy violators have a high dark triad, high levels of education, and further prefer openness as a key motivation factor for sharing potentially sensitive pictures of other persons.
Padyab et al. [29] conducted two sub-studies regarding privacy awareness on social media based on exploratory focus groups. The first tackles dedicated algorithms on social media; the second explores self-disclosure. These studies show that users were generally unaware of the extent published data can be used to extract private information. Further, it was shown that a user’s awareness could be raised by letting them use an extraction tool on their own social media profile.

3. Implementation

We conducted the following four separate surveys: IDS2301, IDS2301U, IDS2302, and IDS2302U. It is important to mention that the presented study relies only on one survey, namely, IDS2301. Nonetheless, surveys IDS2301U, IDS2302, and IDS2302U were implemented in order to obtain reliable results, as explained in Section 5.4. An overview of each survey, including the motivation, can be found in Table A1. In accordance with the General Data Protection Regulation (EU) 2016/679 (GDPR), an online survey provider was chosen in order to conduct the survey and collect responses. For the social media postings, we decided to use two well-analyzed postings from our previous work [6], while limited to two hours per target, Kutschera [6] found that privacy-compromising data unintentionally posted could be found by using OSINT. For the IDS2301 survey, we ran a test phase where 12 participants were asked to give feedback on the consistency, subjective understandability, and potential typos. The feedback was used to improve the survey. At the end of the survey, a link to the dedicated follow-up survey was presented.

3.1. Recruitment

Participants were recruited from three different courses at Graz University of Technology, Austria: INH.04062UF Agile Software Development (170 students), INP.32600UF Mobile Applications (45 students), and INP.33172UF Software Technology (84 students). Of all 299 students, 198 optionally participated in survey IDS2301, as shown in Figure 1. Students who were signed up for two or more lectures were only allowed to take the IDS2301 survey once.
To motivate participation, students were offered bonus points counting toward their final grade for completing the survey. To claim points, a student had to submit a self-generated random Universal Unique Identifier (UUID) token as part of the follow-up survey and subsequently to the university’s e-learning platform. Submitting the token as part of a separate follow-up study instead of the main study, allowed us to correctly identify students for the purpose of crediting points while at the same time preserving their anonymity in main survey. Section 5.4 discusses this aspect in more detail. The instructions on how to claim points were only revealed at the end of the main survey, which reduced the risk of students going directly to the follow-up study to claim credits, skipping the main survey. It was certainly possible to receive these instructions out-of-band, circumvent the protection mechanism, and claim points without accessing the main survey. However, this was by design, as we found it preferable over the case where students would fast-click through the survey and submit bogus data. Our scheme gives no incentive to complete the survey multiple times, as bonus points will only be received once.

3.2. Assessment Design

In our survey, we judiciously employed 5-point and 6-point Likert scales [30] for distinct sets of questions driven by the nature of the responses we sought to capture. For 23 of our questions, we utilized the 5-point Likert scale, acknowledging its capacity to provide a balanced range of options from “Strongly Disagree” to “Strongly Agree,” along with a neutral midpoint. Including a neutral option in these cases allows for a more accurate representation of respondent attitudes, particularly when they may lack a definitive opinion or possess moderate views [31]. This configuration was especially suitable for questions Q1 and Q2, as depicted in Table 1, and Q3.1 to Q3.21, as seen in Table 2, where neutrality or a middle-ground perspective was a plausible and informative response.
Conversely, for 14 of our sub-questions, we chose the 6-point Likert scale. By compelling respondents to lean towards agreement or disagreement, the 6-point scale aids in delineating clearer, more decisive insights into specific attitudes or opinions, which is particularly valuable in areas where a neutral stance is less informative or relevant to our research objectives [32]. The absence of a neutral midpoint in the 6-point scale is instrumental in scenarios where decisiveness in responses is critical, or neutrality could result in ambiguous data interpretation [31,33]. We intended to compel respondents to take a definitive stance on Q7.1–Q7.14, as shown in Table A4, thereby eliminating the central tendency bias, where participants might gravitate towards a neutral choice.

3.3. Questions

Our main survey consisted of 14 main questions and 72 sub-questions. For the initial questions Q1 and Q2, as seen in Table 1, participants were presented with two example scenarios, one for each question. Each scenario was made up of three pictures, and we asked if they would share the content publicly if it was theirs. The questions consisted of a 5-P Likert scale entry in combination with an open-ended sub-question. Because such reflective questions can be influenced by later questions in the survey [5], we ask these questions first.
For Q1, participants were presented with Example 1 consisting of three images from a video where someone shows the surroundings of a rural area that can be assumed to be their home, as seen in Figure 2. The video title: Wild Oklahoma Weather, indicates that the video is about an upcoming severe storm. The participants were asked to consider if they would share the video if the depicted house was theirs. For Q2, participants were presented with Example 2, consisting of three social media postings, as seen in Figure 3, and we ask them similarly if they would share the images publicly if they depicted their own property and surroundings.
Question Q3, as seen in Table 2, asks the participants about their privacy perceptions on the various data types that are detectable from the social media postings detectable in Example 2 according to the OSINT analysis method proposed by Kutschera [6]. Several other key sensitive data types, like date of birth (Q3.3), blood type (Q3.6), and social security number (Q3.7), are also included.
Questions Q4 and Q5, as seen in Table 3, ask participants about their perception of various privacy guidelines they practice currently (Q4) and in the future (Q5). The questions Q4 and Q5 differ only in their usage, namely, Q4-current and Q5-future. As the guidelines are the same, they are best represented in joined Table 3. The purpose of Q5 is to see to what extent participants had their perceptions influenced by participating in this survey.
Questions Q6 and Q7 are about social media usage (Table A3 and Table A4). Questions Q8–Q14, which are about demographic values, as seen in Table A5, were implemented. We use these demographic data to organize respondents into various sub-group filters. The abbreviations on the filters used for each subgroup are listed and explained in Table 4. Besides these active responses, the survey provider also collected the start and end timestamps for each survey. These start and end times allow us to calculate the time spent on the survey.

4. Results

Table 5 shows the percentage of participants who responded with either agree or strongly agree on questions about the privacy compromise for the various data types listed in questions Q3.1–Q3.20. The percentage of those that disagreed or strongly disagreed is shown in Table A6. The background color in both tables is graded from green to red through yellow based on the cell value. Within both tables, the data type that can be found is shown more visually within rows E.1 and E.2, respectively. Further, the data types correlate to questions Q3.1–Q3.20.
The boxplot in Figure 4 depicts the statistical properties of the responses, with the median at the tapered point with an orange line and supports the results presented in Table 5. The adjoining areas indicate the 25% above and below the median, the whiskers indicate the first and fourth quartile of responses, and outliers are indicated by a circle.
Row E.1 within Table 5 marks the data types extractable from Example 1, as shown in Figure 2. Namely, the state or country (Q3.1), full name (Q3.2), full address (Q3.4), full name of previous owners (Q3.5), information on relatives (Q3.8), parcel number of the property (Q3.12), price of the property (Q3.13), date of purchase of property (Q3.14), size of the property (Q3.16), property tax (Q3.17), and security measures against burglars (Q3.19) as well as the absence thereof (Q3.20).
Row E.2 within Table 5 marks extractable from Example 2, as shown in Figure 3. Namely, the state or country (Q3.1), full name (Q3.2), full address (Q3.4), information on relatives (Q3.8), phone number (Q3.9), parcel number of the property (Q3.12), price of the property (Q3.13), date of purchase of property (Q3.14), size of the property (Q3.16), and security measures against burglars (Q3.19) as well as the absence thereof (Q3.20).
The percentage of positive answers to Q4 towards the current usage of awareness guidelines are shown in Table 6, while the percentage of positive answers to Q5 towards the future usage of awareness guidelines are shown in Table 7. The same filter groups are used as for Q3 in Table 5. Based on the cell value, the background color is graded from green to red through yellow.
In Q6 and Q7 of our survey, participants were asked to optionally answer questions about their social media usage, what social media platforms they use, and to what extent on a 6P-Likert Scale with the following options: no answer (0), never (1), very rarely (2), rarely (3), occasionally (4), frequently (5), and very frequently (6), with 0 as the default value. The results are visualized in Table A2, whereas the questions are listed in Table A3 and Table A4. The background color in Table A2 is determined by the value of the cell from green to red through yellow.
The privacy awareness guidelines proposed by Kutschera [6] are enumerated in Table 3. Table 8 shows how each guideline can prevent the exposure of a certain data type. For instance, enforcing guideline Q4.4 will help minimize the exposure risk of current state or country (Q3.1), date of birth (Q3.3), security measures against burglars (Q3.19), and absence of security measures against burglars (Q3.20). Naturally, OSINT has manifold ways of detecting data types, and some can be obtained by gaining knowledge of another data type first. For example, price of property (Q3.13) or date of property purchase (Q3.14) may become evident through the detection of full address (Q3.4). Those data types are listed in the Indirect column of Table 8.

5. Discussions

We found that a two-thirds supermajority of the participants have privacy concerns about data types Q3.2, Q3.4, Q3.7, Q3.8, Q3.9, Q3.12, Q3.15, Q3.19, and Q3.20. For each of these data types, Table 9 shows the percentage of respondents in various subgroups who agree or strongly agree to post either or both Example 1 and Example 2, matched with the privacy concerns of the group. Rows E.1 and E.2 indicate whether or not the data type can actually be found in the examples. Cell color corresponding to the filtered groups (ALP, E1P, and E2P) illustrates the distribution of majority levels in cases where the data type can be revealed. Cells that reach a simple majority (50%) are highlighted in yellow, while the ones reaching a two-thirds majority (66.67%) are highlighted in orange.

5.1. Evaluation and Interpretation of Survey Results

Our study aims to detect privacy awareness on social media implicitly. Alongside the methodology used, this study never asked or measured direct awareness about incidental data as a direct question, as this might have influenced the participant and thus rendered this study invalid. Moreover, we used well-analyzed postings from our previous research, of which we knew exactly what data types could be discovered in a strict time frame of up to two hours. In the first step, the participants had to answer whether they would have posted the content shown, see Table 1. In the second step, the participants had to answer which data type would compromise their privacy if shared, see Table 2. By combining the results of both questions and the data types found in each example, we gained implicit knowledge about whether the participants would have shared a certain data type and also had concerns about this data type, as shown in Table 5. Below, we split the evaluation into topical sections to evaluate and interpret the present survey results from this study.

5.1.1. Implicit Incidental Data Awareness

Upon taking a closer look, it becomes evident that in certain cases, a supermajority of people concerned about their privacy with regard to a specific data type are willing to share content that can be used to reveal those specific data types.
For example, according to the definition, all 27 individuals in subgroup E1P would publish Example 1 as seen in Figure 2. This example includes, among others, extractable data types full name (Q3.2), full address (Q3.4), information on relatives (Q3.8), and absence of security measures (Q3.20). Although, more than two-thirds of subgroup E1P express concern about these same data types as follows: Q3.2 (77.78%), Q3.4 (81.48%), Q3.8 (77.78%), and Q3.20 (66.67%).
Furthermore, more than two-thirds of subgroup E2P, who are likely to publish corresponding posting as shown in Figure 3, are concerned about the following data types Q3.2 (73.81%), Q3.4 (85.71%), Q3.8 (83.33%), Q3.9 (85.71%), Q3.19 (69.05%), and Q3.20 (73.81%).
Data type parcel number (Q3.12) was included, but it did only reach a single majority of 62.96% (E1P) and 64.29% (E2P), respectively. The discussed details are visible in Table 9, which is an excerpt of Table 5.
In summary, the participants of E1P and E2P are concerned about data types Q3.2, Q3.4, Q3.8, and Q3.20, but are also very likely to share a post containing those data types. This allows us to draw an implicit conclusion that these individuals are unaware of incidental data contained in certain postings. Together these results provide important insights into the awareness of sharing privacy concerning incidental data.

5.1.2. Notable Results from Opposite Filter Groups

Overall, the privacy concern in group ALL with regard to data types Q3.2 (74.48%), Q3.4 (87.5%), Q3.8 (77.08%), and Q3.20 (73.96%) is high, as Table 5 shows. At the same time, a look at Table A6 reveals that between 18.75% and 6.25% disagree that the data types Q3.2 (18.75%), Q3.4 (6.25%), Q3.8 (14.58%), and Q3.20 (17.19%) are privacy-compromising, which further confirms our findings.
Furthermore, interesting is that 93.75% of those in subgroup LOB are concerned about the car license number (Q3.15), but only 76.04% of the overall group ALL and 66.28% of subgroup LRS, respectively, are concerned about the same data type. The reason for this could either be that people who lived on their own property are more aware of what can be revealed or what harm can be performed through a car license number, or the meaning of car license number was misunderstood for something other than a license plate.
As for data type full name of previous owners (Q3.5), 62.5% of those in the LOB and LOS groups are concerned, whereas in the ALL group 47.92% are concerned. Even significantly lower is the concern in subgroup ALP with 25.0%, and 40.7% for the LRS subgroup. An indication of a decrease in concern could be that property owners are more aware of potential risks that the name of previous owners can pose in comparison with people who live in rented accommodation.
Another subgroup of interest is LRB where 83.67% are concerned about Q3.19 (security measures against burglars) but only 62.5% of LOB are concerned whereas in the overall group ALL 71.88% are concerned. A possible explanation for this is that people who live on their own property have full power over installation and can also choose on their own to implement concealed and potentially strong measures against burglars, whereas people who live in rented accommodation need the approval of the landlord and will not get compensated in case they move to different housing. This reasoning could lead to a decision for a cheaper movable, and thus non-concealed measures against burglars.
The results that surprised us the most were that subgroup SUC has fewer concerns in each of the most concerned data types. Moreover, compared with group ALL, the concern is lowered on each data type except for current state or country (Q3.1) 47.62%, blood type (Q3.6) 23.81%, size of property (Q3.16) 42.86%, and property tax (Q3.17) 42.86%. A supermajority within the group SUC is concerned about full address (Q3.4) 66.67%, social security number (Q3.7) 66.67%, information on relatives (Q3.8) 71.43%, phone number (Q3.9) 71.43%, and the car license number (Q3.15) 71.43%.

5.1.3. Usage of Guidelines

From Table 6, we observe that a two-thirds supermajority of participants (i.e., subgroup ALL) currently use guidelines Q4.1, Q4.6, Q4.7, and Q4.8, whereas Q4.5, Q4.10, Q4.11, and Q4.12 are currently only used by one-third of the same group. In contrast, the answers regarding future usage of the guidelines, Table 7 shows the highest response on Q5.2 (Avoiding reflections on surfaces and mirrors), and the least response with regard to future usage on Q5.10 (Close curtains or avoid windows). The most feedback received was on Q5.0 (None other than those before) with 42.71%. Merely asking questions about privacy concerns is influencing participants [5]. These results and the overall low rate of response on future usage of the mentioned guidelines suggest that the survey design did not greatly influence the participants.
From subgroup ALP’s responses on Q4.9–Q4.11 and Q5.9–Q5.11, as seen in Table 3, we see that few countermeasures are in place today and that this situation will likely be the same in the future. This is interesting as Table 5 shows that 81.25% of the same subgroup ALP “Agree” and “Strongly Agree” that data type full address (Q3.4) can compromise their privacy. Moreover, it can be assumed that full address (Q3.4) can be discovered very quickly when map material (Q4.9 and Q5.9) is included in a post, which the subgroup ALP would publish as per the definition in Table 4.
As discussed in Section 5.1.1, subgroups E1P and E2P are willing to post data that a majority of the group has privacy concerns about. Furthermore, the usage of the guidelines in Table 8 reveals that the measures stated in the guidelines, which may well have prevented the publication of incidental data, are not used. For example, in order to avoid data type Q3.4 incidental data, one can focus on guidelines Q4.1, Q4.2, Q4.5, Q4.6, and Q4.8–13. Only two to three guidelines are used by a supermajority in groups E1P and E2P, as shown in Table 6.

5.2. Similar Studies

There is a notable gap in the existing literature regarding the implicit analysis of individuals’ awareness when sharing postings on social media potentially containing incidental data. To the best of our knowledge, there exists no study we can compare with, while not directly addressing this specific aspect, the research conducted by Padyab et al. [29] and Amon et al. [28] are interesting to approximate with. The study by Amon et al. [28] focuses on the psychological motivations behind users posting pictures of others, whereas the research by Padyab et al. [29] confronts participants with data extraction tools on their own social media profiles.

5.3. Statistical Significance

This study uses a confidence interval of 95%. The confidence interval reflects an estimated range of values. Furthermore, the confidence interval indicates the accuracy of the estimate. The margin of error is also used for statistical evaluation. In our study, the margin of error is 7.07%. This indicates the accuracy of the estimate in relation to an entire group. Altogether, the results of the study of 192 students reflect the opinions and awareness of Austrian students. Equation (1) represents the formula used for the margin of error E with Standard Error of the Proportion (SEP) and Finite Population Correction (FPC).
E = Z × p × ( 1 p ) n × N n N 1 = 7.07
Here, E is the margin of error, Z is the Z-score associated with the desired confidence level, p as the estimated proportion of the population is set to 50%, n is the sample size, and N is the population size. The Z-score was set at 1.96. The target population are Austrian students, with a population of 288,381 as of February 2022 [38,39]. The population size is negligible because the FPC is 0.9999.

5.4. Trustability of Survey Results

All responses were received from students who received bonus points towards their grades. Due to data protection and ethics, the survey was designed to be 100% anonymous. Within the course, students had to enter one or multiple UUID tokens into the university submission system in order to receive offered bonus points. This token also had to be entered into the token collection surveys IDS2301U or IDS2302U. As a student, it was not allowed to have multiple tokens in the IDS2301U survey. However, IDS2302U received multiple entries since this was also the token submission survey for students who attended three courses. Further, we are able to analyze the data of the token collection survey IDS2301U, IDS2302U, and the university submission system.
In order to understand why we are highly certain students did not take a survey twice, we need to describe the process in more detail. The survey and bonus point granting workflow is also visualized within Figure 5. Emails with the link to the survey IDS2301 were sent out alongside with emails to students who attended one or more classes. Students had to go through the survey to find the link for the token collection survey IDS2301U. Students had to generate the UUID token by themself and enter it into IDS2301U. Since IDS2301U was a two-question survey (email for updates and token) it would have been easier for students to ask their peers and simply enter their UUID, hence claiming that they had done the survey (IDS2301) rather than actually going through the survey (IDS2301). An analysis of the university data and the token collection survey showed that zero students claimed bonus points for multiple courses in IDS2301U. It is important to mention that not all enrolled students were graded and that not all graded students needed bonus points since the link to the survey was sent out close to the end of the course. Hence, students could estimate if an excellent grade was already reached or not, thus rendering bonus points useless.
Students who enrolled to two or more courses received, alongside the IDS2301 survey link, the information and link to the secondary IDS2302 survey. The IDS2302 survey shows the same postings but asks what data and information they find in an open question. At the end a link to the dedicated token collection survey IDS2302U was revealed.

6. Conclusions

Disclosure of private information is crucial to social interactions, yet the awareness of privacy-compromising data hidden within in a self-disclosed posting needs more attention. This study extends the previous study of Kutschera [6] and using the comprehensively analyzed postings as seen in Figure 2 and Figure 3. The implicit design of survey questions allowed us to gain inside information on the awareness of people about private data. Furthermore, our study shows that awareness about incidental data is very low, and this constitutes a privacy and security concern. Our survey shows clear privacy concerns on data types full name (Q3.2), full address (Q3.4), information on relatives (Q3.8), phone number (Q3.9), parcel number of the property (Q3.12), security measures against burglars (Q3.19), as well as the absence thereof (Q3.20). Though participants were not forced to a decision by responding neutral on the 5-P Likert scale, 14.06% to 21.88% responded that, despite their privacy concerns, they were surprisingly willing to publish a posting, knowingly or not, that contains information considered privacy-compromising, thus incidental data.
Even though our survey achieved a confidence interval of 95%, the margin of error of 7.07% is still above the standard of 5% with 192 responses. Further, the results of our survey are limited with regard to interpretation, as the survey only asked Austrian students. With that in mind, we recommend a more widespread survey on the privacy and security issues of incidental data. Policymakers should also be made aware of these issues so that they can implement guidelines or other mechanisms that are latent to either raise awareness among the general public or alert persons before posting potentially harmful postings.

Author Contributions

Conceptualization, S.K., W.S. and H.D.; data curation, S.K. and P.R.; formal analysis, S.K.; investigation, S.K.; methodology, S.K. and H.D.; project administration, S.K.; resources, W.S.; software, S.K. and P.R.; supervision, W.S. and H.D.; validation, P.R., S.G. and P.D.; visualization, S.K. and P.R.; writing—original draft, S.K., P.R., S.G. and P.D.; writing—review and editing, S.K., W.S., P.R., S.G., P.D. and H.D. All authors have read and agreed to the published version of the manuscript.

Funding

The article processing charges (APC) was funded by Open Access Funding of Graz University of Technology.

Institutional Review Board Statement

Ethical review and approval were waived for this study due to Article 6 and Article 89 General Data Protection Regulation (EU) 2016/679 (GDPR) and further Section 7 Datenschutzgesetz (DSG) BGBl. I Nr. 165/1999 as amended BGBl. I Nr. 120/2017.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

The data presented in this study are available upon reasonable request from the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest. The sponsors had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.

Abbreviations

The following abbreviations are used in this manuscript:
APIApplication Programming Interface
ENFElectric Network Frequency
FPCFinite Population Correction
GDPRGeneral Data Protection Regulation (EU) 2016/679
MDPIMultidisciplinary Digital Publishing Institute
OSINTOpen Source Intelligence
SEPStandard Error of the Proportion
UUIDUniversal Unique Identifier

Appendix A. Survey Consent and Information

In order to inform participants and allow them to give their consent, an email (shown in the quote below) was sent out to all participants.

Appendix A.1. Email to All 299 Enrolled Students

Dear students,
We’re excited to finally present you the opportunity to earn 10% bonus points for your current coursework.
Our research will investigate privacy on social media through a survey. As per the study design, the survey shall only be taken once**. The survey is anonymous and single responses cannot be traced back. The collected data will be analyzed, and results may be published in a journal or at a conference.
“IDS2301”: https://…
Your feedback is valuable to our research, and we want to reward your time and effort. In order to gain the extra 10%, you need to drop a token into TeachCenter. This token is a randomly generated UUID and submitted to us in two ways. (This token concept won’t affect the anonymity).
**For those attending two or more lectures: You will get an additional email with information on how to gain 10% for each of your courses. Hint: Follow-up surveys.
Thank you in advance for your participation and valuable feedback.
Kind Regards,
Stefan

Appendix A.2. Email to Students Who Are Enrolled in Multiple Courses

Dear students, you receive this email because you are enrolled in more than 1 course (ASD/ST or MA). Wwe’re excited to finally present you the opportunity to earn 10% bonus points for another course with us. Our research will investigate privacy on social media through a survey. As per the study design, the survey shall only be taken once. The survey is anonymous and single responses cannot be traced back. The collected data will be analyzed, and results may be published in a journal or at a conference. It is important for the study design that the first survey with the ID “IDS2301” is filled out first (previous email), as they rely on each other.
“IDS2302”: https://…
Your feedback is valuable to our research, and we want to reward your time and effort. In order to gain the extra 10%, you need to drop a token into TeachCenter. This token is a randomly generated UUID and submitted to us in two ways. (This token concept won’t affect the anonymity).
Thank you in advance for your participation and valuable feedback.
Kind Regards,
Stefan
Table A1. Overview of surveys used in this study.
Table A1. Overview of surveys used in this study.
IDMotivation
IDS2301Main survey with 14 questions. First presentation of pictures to students.
IDS2301UIn case IDS2301 was answered: update survey for bonus point token and optionally the possibility to stay informed about this study.
IDS2302In case students needed to earn bonus points for more than one lecture, another survey that has open-ended questions regarding the pictures already seen from IDS202301. This survey has the sole purpose of preventing students from multi-answering IDS202301 and, therefore, not influencing the results as a whole.
IDS2302UIn case IDS2302 was answered: update survey for bonus point token and optionally the possibility to stay informed about this study.

Appendix B. IDS2301 Survey Questions & Results

Table A2. Shows the different social media platforms usages and the respective behavior of uploading content (UC) and consuming content (CC). Cell background is based on the value of the cell.
Table A2. Shows the different social media platforms usages and the respective behavior of uploading content (UC) and consuming content (CC). Cell background is based on the value of the cell.
N UCCCFacebookYouTubeRedditTwitter4ChanMastodonTumblrInstagramTikTokSnapchatDiscordPinterestLinkedInXing
192ALL2.104.712.064.842.752.101.071.171.114.252.862.804.301.622.201.28
16ALP2.565.192.155.123.001.911.291.001.004.192.913.004.941.502.231.17
88ANP1.844.471.894.652.751.891.001.041.083.822.432.594.281.492.001.21
27E1P2.195.042.194.933.101.941.201.001.004.382.412.944.811.382.651.40
42E2P2.575.142.194.932.842.171.241.271.204.853.143.184.501.772.301.33
73BY2.154.642.074.582.821.831.001.101.164.462.742.564.261.332.261.19
119BN2.074.762.054.992.712.251.111.211.094.142.922.924.321.812.161.32
136LR2.164.742.144.782.712.031.111.221.144.343.062.834.271.712.251.33
50LO1.924.601.624.982.792.381.001.061.063.972.462.844.491.191.961.17
119AS2.214.872.044.782.732.211.121.211.154.442.973.114.421.771.891.20
67AB1.914.402.024.892.851.971.001.111.063.862.772.264.111.232.671.43
29BYS2.525.002.094.632.941.691.001.001.254.742.933.354.301.671.811.11
90BNS2.114.822.024.832.672.371.161.281.124.342.983.044.461.811.921.23
86LRS2.274.852.134.722.751.941.151.241.214.442.933.024.401.921.831.20
32LOS2.064.881.644.942.553.061.001.121.004.563.063.404.411.272.061.20
41BYB1.934.342.004.492.882.061.001.181.104.272.642.004.171.122.541.27
26BNB1.884.502.055.502.831.881.001.001.003.292.922.604.001.402.931.60
49LRB1.984.532.084.872.682.241.001.181.004.183.532.384.061.293.001.62
16LOB1.693.941.605.003.251.331.001.001.122.401.332.004.501.111.821.12
52S2502.024.621.684.842.712.181.001.061.003.982.852.894.501.481.901.22
134B2502.124.722.144.822.762.101.111.221.184.372.942.824.251.622.281.32
161SCC2.235.112.074.962.802.221.041.071.074.443.042.944.271.692.201.26
21SUC4.525.382.584.453.002.431.331.802.005.384.473.943.902.642.871.83
156M1.944.561.964.962.742.161.081.191.094.082.482.714.401.342.191.28
32F2.945.442.504.302.671.821.001.001.255.144.393.223.802.562.221.25
Table A3. Survey IDS2301 Questions 6; social media usage.
Table A3. Survey IDS2301 Questions 6; social media usage.
ReferenceQuestionResponse Type
Q6Reflecting on your social media behavior. How often do you…
Q6.1… upload content on social media?6-P Likert Scale
Q6.2… consume content on social media?6-P Likert Scale
Table A4. Survey IDS2301 Questions 7; social media platforms.
Table A4. Survey IDS2301 Questions 7; social media platforms.
ReferenceQuestionResponse Type
Q7What social media platforms do you use? 0 [No answer], 1 [Never] to 6 [Very Frequently]
Q7.1Facebook6-P Likert Scale
Q7.2YouTube6-P Likert Scale
Q7.3Reddit6-P Likert Scale
Q7.4Twitter6-P Likert Scale
Q7.54Chan6-P Likert Scale
Q7.6Mastodon6-P Likert Scale
Q7.7Tumblr6-P Likert Scale
Q7.8Instagram6-P Likert Scale
Q7.9TikTok6-P Likert Scale
Q7.10Snapchat6-P Likert Scale
Q7.11Discord6-P Likert Scale
Q7.12Pinterest6-P Likert Scale
Q7.13LinkedIn6-P Likert Scale
Q7.14Xing6-P Likert Scale
Table A5. Survey IDS2301 Questions 8–14; Demographic.
Table A5. Survey IDS2301 Questions 8–14; Demographic.
ReferenceQuestionResponse Type
Q8Your genderSingle choice
Q9Your ageNumber field
Q10What describes your current main study the most?Single choice
Q11Are you holding a bachelor’s degree?Boolean
Q12Do you currently live in
Q12.1a rented house or flat?Boolean
Q12.2an owned house or flat?Boolean
Q13How many people live in your town/city?Single choice
Q14Anything else you want to tell me?open-ended
Table A6. Shows the data types from Question 3 (Q3.1–Q3.20). In rows Example 1 (E.1) and Example 2 (E.2) the data types found are marked with Yes (X) and No (O). Column N states the number of participants in each row. Column Abbr. lists all subgroups using their filter identifier as explained in Table 4. The cells represent the percentage of participants of the said subgroup who responded with either disagree or strongly disagree on questions about the privacy compromise regarding data types Q3.1–Q3.20.
Table A6. Shows the data types from Question 3 (Q3.1–Q3.20). In rows Example 1 (E.1) and Example 2 (E.2) the data types found are marked with Yes (X) and No (O). Column N states the number of participants in each row. Column Abbr. lists all subgroups using their filter identifier as explained in Table 4. The cells represent the percentage of participants of the said subgroup who responded with either disagree or strongly disagree on questions about the privacy compromise regarding data types Q3.1–Q3.20.
NAbbr.1234567891011121314151617181920
E.1XXOXXOOXOOOXXXOXXOXX
E.2XXOXOOOXXOOXXXOXOOXX
192ALL52.0818.7541.676.2544.2748.967.8114.588.8534.3827.6021.8853.6553.1219.2757.2951.5635.4219.2717.19
16ALP56.250.0018.7512.5056.2556.256.250.006.2531.2531.2518.7537.5062.5018.7550.0043.7556.2537.5031.25
88ANP51.1417.0537.504.5539.7752.277.9518.189.0932.9525.0020.4546.5937.5015.9150.0053.4127.2715.9118.18
27E1P48.1511.1133.3311.1148.1548.153.703.7011.1129.6325.9318.5244.4466.6714.8148.1537.0451.8529.6318.52
42E2P54.7614.2935.719.5252.3847.627.149.527.1430.9528.5721.4357.1461.9016.6766.6750.0050.0023.8116.67
73BY57.5320.5539.734.1147.9546.588.2210.966.8538.3634.2521.9252.0552.0519.1849.3245.2141.1020.5520.55
119BN48.7417.6542.867.5642.0250.427.5616.8110.0831.9323.5321.8554.6253.7819.3362.1855.4631.9318.4915.13
136LR48.5319.8541.186.6251.4744.127.3516.9110.2936.7628.6823.5355.1552.2123.5356.6253.6841.1816.9119.12
50LO58.0014.0046.006.0030.0060.0010.0010.006.0032.0028.0018.0048.0054.0010.0056.0046.0024.0026.0014.00
119AS52.9419.3345.387.5642.8650.428.4013.457.5638.6623.5322.6953.7849.5823.5359.6652.9434.4518.4919.33
67AB50.7517.9134.334.4847.7644.787.4616.4210.4526.8732.8420.9053.7359.7013.4355.2249.2537.3116.4211.94
29BYS58.6224.1448.286.9048.2844.8310.346.906.9048.2827.5920.6948.2834.4824.1455.1751.7241.3820.6924.14
90BNS51.1117.7844.447.7841.1152.227.7815.567.7835.5622.2223.3355.5654.4423.3361.1153.3332.2217.7817.78
86LRS50.0022.0944.196.9850.0046.516.9816.288.1441.8626.7424.4256.9848.8427.9158.1453.4938.3718.6023.26
32LOS59.3812.5050.009.3825.0059.3812.506.256.2531.2515.6218.7546.8850.0012.5062.5053.1225.0018.759.38
41BYB58.5419.5129.272.4446.3446.347.3212.204.8829.2734.1521.9556.1063.4117.0748.7841.4639.0214.6314.63
26BNB38.4615.3842.317.6950.0042.317.6923.0819.2323.0830.7719.2350.0053.857.6965.3861.5434.6219.237.69
49LRB46.9416.3334.696.1253.0638.788.1616.3312.2426.5330.6120.4151.0257.1416.3355.1053.0644.9012.2410.20
16LOB56.2518.7531.250.0037.5062.506.2518.756.2531.2543.7518.7556.2562.506.2550.0037.5018.7531.2518.75
52S25046.1519.2348.083.8548.0861.549.629.623.8530.7723.0823.0848.0851.9223.0855.7763.4640.3825.0017.31
134B25053.7317.9139.557.4644.0343.287.4616.4210.4536.5729.8521.6455.2252.9918.6657.4646.2734.3316.4217.16
161SCC55.2819.2542.865.5944.7247.836.8313.048.0735.4025.4721.1255.9055.2821.7457.1452.8037.8920.5017.39
21SUC42.8642.8647.6214.2966.6742.8619.054.769.5233.3333.3338.1057.1452.3823.8147.6242.8628.5723.8128.57
156M47.4417.9543.596.4143.5948.728.9717.319.6235.2630.1323.0853.2155.7722.4456.4151.9236.5420.5117.31
32F75.0025.0037.506.2550.0043.753.123.126.2531.2518.7515.6256.2537.506.2562.5053.1231.2512.5015.62

References

  1. Kosinski, M.; Stillwell, D.; Graepel, T. Private traits and attributes are predictable from digital records of human behavior. Proc. Natl. Acad. Sci. USA 2013, 110, 5802–5805. [Google Scholar] [CrossRef]
  2. Youyou, W.; Kosinski, M.; Stillwell, D. Computer-based personality judgments are more accurate than those made by humans. Proc. Natl. Acad. Sci. USA 2015, 112, 1036–1040. [Google Scholar] [CrossRef]
  3. Fry, H. Hello World—How to Be Human in the Age of the Machine; Doubleday: London, UK; New York, NY, USA; Toronto, ON, Canada; Sidney, Australia; Auckland, New Zealand, 2018. [Google Scholar]
  4. Schneier, B. A Taxonomy of Social Networking Data. IEEE Secur. Priv. Mag. 2010, 8, 88. [Google Scholar] [CrossRef]
  5. Brough, A.R.; Martin, K.D. Critical roles of knowledge and motivation in privacy research. Curr. Opin. Psychol. 2020, 31, 11–15. [Google Scholar] [CrossRef]
  6. Kutschera, S. Incidental data: Observation of privacy compromising data on social media platforms. Int. Cybersecur. Law Rev. 2022, 4, 91–114. [Google Scholar] [CrossRef]
  7. Kumar, N.S.; Saravanakumar, K.; Deepa, K. On Privacy and Security in Social Media—A Comprehensive Study. Procedia Comput. Sci. 2016, 78, 114–119. [Google Scholar] [CrossRef]
  8. Krämer, N.C.; Schäwel, J. Mastering the challenge of balancing self-disclosure and privacy in social media. Curr. Opin. Psychol. 2020, 31, 67–71. [Google Scholar] [CrossRef] [PubMed]
  9. Wolf, S.M.; Lawrenz, F.P.; Nelson, C.A.; Kahn, J.P.; Cho, M.K.; Clayton, E.W.; Fletcher, J.G.; Georgieff, M.K.; Hammerschmidt, D.; Hudson, K.; et al. Managing Incidental Findings in Human Subjects Research: Analysis and Recommendations. J. Law Med. Ethics 2008, 36, 219–248. [Google Scholar] [CrossRef] [PubMed]
  10. Schlosser, A.E. Self-disclosure versus self-presentation on social media. Curr. Opin. Psychol. 2020, 31, 1–6. [Google Scholar] [CrossRef] [PubMed]
  11. Barasch, A. The consequences of sharing. Curr. Opin. Psychol. 2020, 31, 61–66. [Google Scholar] [CrossRef] [PubMed]
  12. Luo, M.; Hancock, J.T. Self-disclosure and social media: Motivations, mechanisms and psychological well-being. Curr. Opin. Psychol. 2020, 31, 110–115. [Google Scholar] [CrossRef]
  13. Baum, S.M.; Critcher, C.R. The costs of not disclosing. Curr. Opin. Psychol. 2020, 31, 72–75. [Google Scholar] [CrossRef]
  14. Cowan, S.K. Secrets and social networks. Curr. Opin. Psychol. 2020, 31, 99–104. [Google Scholar] [CrossRef] [PubMed]
  15. Nave, G.; Minxha, J.; Greenberg, D.M.; Kosinski, M.; Stillwell, D.; Rentfrow, J. Musical Preferences Predict Personality: Evidence From Active Listening and Facebook Likes. Psychol. Sci. 2018, 29, 1145–1158. [Google Scholar] [CrossRef]
  16. Fast, N.J.; Jago, A.S. Privacy matters… or does It? Algorithms, rationalization, and the erosion of concern for privacy. Curr. Opin. Psychol. 2020, 31, 44–48. [Google Scholar] [CrossRef] [PubMed]
  17. Wang, Y.; Kosinski, M. Deep neural networks are more accurate than humans at detecting sexual orientation from facial images. J. Personal. Soc. Psychol. 2018, 114, 246–257. [Google Scholar] [CrossRef] [PubMed]
  18. Acquisti, A.; John, L.K.; Loewenstein, G. What Is Privacy Worth? J. Leg. Stud. 2013, 42, 249–274. [Google Scholar] [CrossRef]
  19. Jenni, K.; Loewenstein, G. Explaining the identifiable victim effect. J. Risk Uncertain. 1997, 14, 235–257. [Google Scholar] [CrossRef]
  20. Bösch, C.; Erb, B.; Kargl, F.; Kopp, H.; Pfattheicher, S. Tales from the dark side: Privacy dark strategies and privacy dark patterns. Proc. Priv. Enhancing Technol. 2016, 2016, 237–254. [Google Scholar] [CrossRef]
  21. Nouwens, M.; Liccardi, I.; Veale, M.; Karger, D.; Kagal, L. Dark Patterns after the GDPR: Scraping Consent Pop-Ups and Demonstrating Their Influence. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI ’20), Honolulu, HI, USA, 25–30 April 2020; Association for Computing Machinery: New York, NY, USA, 2020; pp. 1–13. [Google Scholar] [CrossRef]
  22. Mildner, T.; Freye, M.; Savino, G.L.; Doyle, P.R.; Cowan, B.R.; Malaka, R. Defending Against the Dark Arts: Recognising Dark Patterns in Social Media. In Proceedings of the 2023 ACM Designing Interactive Systems Conference (DIS ’23), Pittsburgh, PA, USA, 10–14 July 2023; Association for Computing Machinery: New York, NY, USA, 2023; pp. 2362–2374. [Google Scholar] [CrossRef]
  23. Al-Charchafchi, A.; Manickam, S.; Alqattan, Z.N.M. Threats Against Information Privacy and Security in Social Networks: A Review. In Advances in Cyber Security; Anbar, M., Abdullah, N., Manickam, S., Eds.; Springer: Singapore, 2020; pp. 358–372. [Google Scholar]
  24. Johansen, H.; Gurrin, C.; Johansen, D. Towards Consent-Based Lifelogging in Sport Analytic. In MultiMedia Modeling; He, X., Luo, S., Tao, D., Xu, C., Yang, J., Hasan, M.A., Eds.; Springer: Cham, Switzerland, 2015; pp. 335–344. [Google Scholar]
  25. Garg, R.; Varna, A.L.; Wu, M. “Seeing” ENF: Natural Time Stamp for Digital Video via Optical Sensing and Signal Processing. In Proceedings of the 19th ACM International Conference on Multimedia (MM ’11), Scottsdale, AZ, USA, 28 November–1 December 2011; Association for Computing Machinery: New York, NY, USA, 2011; pp. 23–32. [Google Scholar] [CrossRef]
  26. Huijbregtse, M.; Geradts, Z. Using the ENF Criterion for Determining the Time of Recording of Short Digital Audio Recordings. In Computational Forensics; Geradts, Z.J.M.H., Franke, K.Y., Veenman, C.J., Eds.; Springer: Berlin/Heidelberg, Germany, 2009; pp. 116–124. [Google Scholar]
  27. Grigoras, C. Applications of ENF criterion in forensic audio, video, computer and telecommunication analysis. Forensic Sci. Int. 2007, 167, 136–145. [Google Scholar] [CrossRef]
  28. Amon, M.J.; Necaise, A.; Kartvelishvili, N.; Williams, A.; Solihin, Y.; Kapadia, A. Modeling User Characteristics Associated with Interdependent Privacy Perceptions on Social Media. ACM Trans. Comput.-Hum. Interact. 2023, 30, 1–32. [Google Scholar] [CrossRef]
  29. Padyab, A.; Päivärinta, T.; Ståhlbröst, A.; Bergvall-Kåreborn, B. Awareness of Indirect Information Disclosure on Social Network Sites. Soc. Media Soc. 2019, 5, 2056305118824199. [Google Scholar] [CrossRef]
  30. Likert, R. A technique for the measurement of attitudes. Arch. Psychol. 1932, 140, 1–55. [Google Scholar]
  31. Weijters, B.; Cabooter, E.; Schillewaert, N. The effect of rating scale format on response styles: The number of response categories and response category labels. Int. J. Res. Mark. 2010, 27, 236–247. [Google Scholar] [CrossRef]
  32. Weijters, B.; Baumgartner, H.; Schillewaert, N. Reversed item bias: An integrative model. Psychol. Methods 2013, 18, 320–334. [Google Scholar] [CrossRef] [PubMed]
  33. Garland, R. The Mid-Point on a Rating Scale: Is it Desirable? Mark. Bull. 1991, 2, 66–70. [Google Scholar]
  34. LiveEachDay. Wild Oklahoma Weather. Available online: https://youtu.be/fRdfxtZDXwE?t=317 (accessed on 5 July 2023).
  35. Hunt, T. Yep, and the E63S. Available online: https://twitter.com/troyhunt/status/1246587017661538304 (accessed on 5 July 2023).
  36. Hunt, T. Book-Ending the Day Moon Swane. Available online: https://twitter.com/troyhunt/status/1246713081419288576 (accessed on 5 July 2023).
  37. Hunt, T. So Beautiful Here Today, However, So Quiet…. Available online: https://twitter.com/troyhunt/status/1246561442871914496 (accessed on 5 July 2023).
  38. Unidata—Datawarehouse Hochschulbereich. Statistisches Taschenbuch 2022—Bundesministerium für Bildung, Wissenschaft und Forschung. 2022. Available online: https://unidata.gv.at/SitePages/Publikationen.aspx (accessed on 20 September 2023).
  39. Unidata—Datawarehouse Hochschulbereich. Tabelle 2.4; Studierende nach Universitäten. Available online: https://unidata.gv.at/auswertungen/iatb/2022/tab2.4 (accessed on 20 September 2023).
Figure 1. Venn-diagram of the number of enrolled students in the three courses we recruited participants from and how they overlap (left); and the number of responses before and after cleaning (right).
Figure 1. Venn-diagram of the number of enrolled students in the three courses we recruited participants from and how they overlap (left); and the number of responses before and after cleaning (right).
Jcp 04 00006 g001
Figure 2. Shows the pictures presented to participants in first question Q1 and Q1.1. Subfigures (ac) show different scenes from the video. (a,b) combined hints the shape of the backyard, whereas (c) depicts a smartphone with a weather app showing an incoming storm and the current position as a blue dot. The pictures were taken from Kutschera [6] and [34], respectively.
Figure 2. Shows the pictures presented to participants in first question Q1 and Q1.1. Subfigures (ac) show different scenes from the video. (a,b) combined hints the shape of the backyard, whereas (c) depicts a smartphone with a weather app showing an incoming storm and the current position as a blue dot. The pictures were taken from Kutschera [6] and [34], respectively.
Jcp 04 00006 g002
Figure 3. Shows the pictures presented to participants in second question Q2 and Q2.1. Each subfigure (ac) represents different postings from the same person on Twitter. The posting shown in (a) is a response to a question if the car is still owned, (b) an untriggered comment about how beautiful the day is, (c) depicts a posting that comments on the end of the day where the skyline and a small pool is visible alongside the moon. The pictures were taken from Kutschera [6] and Twitter [35,36,37], respectively.
Figure 3. Shows the pictures presented to participants in second question Q2 and Q2.1. Each subfigure (ac) represents different postings from the same person on Twitter. The posting shown in (a) is a response to a question if the car is still owned, (b) an untriggered comment about how beautiful the day is, (c) depicts a posting that comments on the end of the day where the skyline and a small pool is visible alongside the moon. The pictures were taken from Kutschera [6] and Twitter [35,36,37], respectively.
Jcp 04 00006 g003
Figure 4. Depicts the boxplot visualizing the statistical values, such as median and the quantiles of all answers, from Q3.1 to Q3.20.
Figure 4. Depicts the boxplot visualizing the statistical values, such as median and the quantiles of all answers, from Q3.1 to Q3.20.
Jcp 04 00006 g004
Figure 5. Depicts the workflow a student must undertake in order to receive bonus points, how anonymity is preserved, and how data are kept clean and trustworthy. Blue indicates a student action, whereas green indicates a lecturer or researcher role.
Figure 5. Depicts the workflow a student must undertake in order to receive bonus points, how anonymity is preserved, and how data are kept clean and trustworthy. Blue indicates a student action, whereas green indicates a lecturer or researcher role.
Jcp 04 00006 g005
Table 1. Survey IDS2301 Questions 1–2.
Table 1. Survey IDS2301 Questions 1–2.
ReferenceQuestionResponse Type
Q1If this was a video from your house, would you share it publicly?5-P Likert Scale
Q1.1Explain your decision (optional)open-ended
Q2If these were pictures from your house or surroundings, would you share them publicly?5-P Likert Scale
Q2.1Explain your decision (optional)open-ended
Table 2. Survey IDS2301 Question 3.
Table 2. Survey IDS2301 Question 3.
ReferenceQuestionResponse Type
Q3Do you agree or disagree that the following data can compromise your privacy if shared incidentally on social media?
Q3.1State or country you currently live5-P Likert Scale
Q3.2Your full name5-P Likert Scale
Q3.3Your date of birth5-P Likert Scale
Q3.4Your full address5-P Likert Scale
Q3.5Full name(s) of previous owner(s)5-P Likert Scale
Q3.6Your blood type5-P Likert Scale
Q3.7Your social security number5-P Likert Scale
Q3.8Information on relatives (name, date of birth or phone number)5-P Likert Scale
Q3.9Your phone number5-P Likert Scale
Q3.10Your email address5-P Likert Scale
Q3.11Your postal tracking number5-P Likert Scale
Q3.12Your parcel number (property ID)5-P Likert Scale
Q3.13Price of your property5-P Likert Scale
Q3.14Date of property purchase5-P Likert Scale
Q3.15Your car license number5-P Likert Scale
Q3.16Size of your property5-P Likert Scale
Q3.17Your property tax5-P Likert Scale
Q3.18Your floor plan5-P Likert Scale
Q3.19Security Measures (against burglars) on your property5-P Likert Scale
Q3.20Absence of security measures (against burglars) on your property5-P Likert Scale
Q3.21Any other piece of data that may compromise your privacy if shared incidentally? (optional)5-P Likert Scale
Table 3. Survey IDS2301 Questions 4; current guideline usage and Questions 5; future guideline usage. The numbering of awareness guidelines is aligned through Q4.n and Q5.n.
Table 3. Survey IDS2301 Questions 4; current guideline usage and Questions 5; future guideline usage. The numbering of awareness guidelines is aligned through Q4.n and Q5.n.
Ref.QuestionType
Q4What measures against the accidental posting of private information do you currently use actively when posting on social media
Q5 What measures against the accidental posting of private information will you additionally use in the future? (optional)
Q5.0 None other than those before.Boolean
Q5.1Q4.1Avoid posting content that includes house numbers or street names.Boolean
Q5.2Q4.2Be on the lookout for reflections in mirrors as well as on surfaces such as cars, windows, vitrines, glasses, sunglasses, or watches.Boolean
Q5.3Q4.3Post content of vacations—if at all—only after the vacation has ended.Boolean
Q5.4Q4.4Avoid repetition of vacations or periods of absence, such as “during New Years Eve I am—always—on a one-week trip”.Boolean
Q5.5Q4.5Posts should be in accordance with a single time zone irrespective of a current and temporary time zone.Boolean
Q5.6Q4.6Avoid posting any information from parcels or letters, such as tracking number, full address, names, or QR codes.Boolean
Q5.7Q4.7Do not post IDs such as driver’s license, personal ID, credit or debit card, et cetera.Boolean
Q5.8Q4.8When posting letters, make sure that the address or sensitive information on the back of the letterhead does not show through.Boolean
Q5.9Q4.9Avoid posting scenes that include location-based map materials, such as navigation maps, weather or fitness apps, et cetera.Boolean
Q5.10Q4.10Close all curtains or post content where no windows are visible.Boolean
Q5.11Q4.11Try tilting the camera angle as low as possible when showing your own property.Boolean
Q5.12Q4.12Be aware that shadows or the sun’s position can also hint at additional information about the location.Boolean
Q5.13Q4.13Do not share fitness routes that start or end at your home location.Boolean
Q5.14Q4.14Do not share information about your own or surrounding WLAN/WiFi SSIDsBoolean
Q4.15None of the aboveBoolean
Q5.15Q4.16Otheropen-ended
Table 4. Lists the abbreviations and their filtered participants of the analysed subsets of the survey. The letters of the abbreviation’s origin are underlined within the description.
Table 4. Lists the abbreviations and their filtered participants of the analysed subsets of the survey. The letters of the abbreviation’s origin are underlined within the description.
AbbreviationDescription
ALLALL survey participants, unfiltered
ANPAll Not likely to Publish example #1 and #2
ALPAll Likely to Publish example #1 and #2
E1PExample #1 likely to Publish
E2PExample #2 likely to Publish
BYBachelor’s degree Yes
BNBachelor’s degree No
LRLives in a Rented property
LOLives in an Owned property
ASAge is Smaller or equal to 24
ABAge is Bigger than 24
BYSBachelor’s degree Yes and age Smaller or equal to 24
BNSBachelor’s degree No and age Smaller or equal to 24
LRSLives in a Rented property and age Smaller or equal to 24
LOSLives in an Owned property and age Smaller or equal to 24
BYBBachelor’s degree Yes and age Bigger than 24
BNBBachelor’s degree No and age Bigger than 24
LRBLives in a Rented property and age Bigger than 24
LOBLives in an Owned property and age Bigger than 24
S250Lives in city with population Smaller than 250,000 people
B250Lives in city with population Bigger than 250,000 people
SCCSocial media filter, Consume Content response greater or equal to 4.
SUCSocial media filter, Uploads Content response greater or equal to 4.
MMale
FFemale
SDStandard Deviation
MOEMargin of Error
Table 5. Shows the data types from Question 3 (Q3.1–Q3.20). In rows Example 1 (E.1) and Example 2 (E.2) the data types found are marked with Yes (X) and No (O). Column N states the number of participants in each row. Column Abbr. lists all subgroups using their filter identifier as explained in Table 4. The cells represent the percentage of participants of the said subgroup who responded with either agree or strongly agree on questions about the privacy compromise regarding data types Q3.1–Q3.20. Based on the cell value, the background color is graded from green to red through yellow.
Table 5. Shows the data types from Question 3 (Q3.1–Q3.20). In rows Example 1 (E.1) and Example 2 (E.2) the data types found are marked with Yes (X) and No (O). Column N states the number of participants in each row. Column Abbr. lists all subgroups using their filter identifier as explained in Table 4. The cells represent the percentage of participants of the said subgroup who responded with either agree or strongly agree on questions about the privacy compromise regarding data types Q3.1–Q3.20. Based on the cell value, the background color is graded from green to red through yellow.
NAbbr.Q3.n
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
E.1XXOXXOOXOOOXXXOXXOXX
E.2XXOXOOOXXOOXXXOXOOXX
192ALL33.3374.4851.0487.5047.9221.3580.7377.0883.3357.8164.5867.7133.8534.3876.0429.6935.4253.6571.8873.96
16ALP25.0081.2550.0081.2525.0012.5081.2587.5081.2550.0050.0056.2531.2518.7575.0025.0037.5031.2550.0050.00
88ANP37.5079.5556.8290.9154.5522.7380.6877.2782.9560.2367.0569.3245.4554.5580.6842.0537.5064.7778.4176.14
27E1P37.0477.7844.4481.4837.0418.5277.7877.7877.7851.8562.9662.9633.3314.8177.7833.3348.1537.0459.2666.67
42E2P28.5773.8150.0085.7138.1021.4385.7183.3385.7161.9061.9064.2928.5728.5778.5714.2935.7138.1069.0573.81
73BY31.5172.6053.4287.6746.5824.6682.1982.1987.6757.5361.6468.4934.2534.2576.7134.2539.7347.9571.2372.60
119BN34.4575.6349.5887.3948.7419.3379.8373.9580.6757.9866.3967.2333.6134.4575.6326.8932.7757.1472.2774.79
136LR33.8272.7949.2686.7641.1824.2680.1575.0081.6253.6862.5064.7132.3535.2972.0629.4133.8248.5374.2672.06
50LO34.0080.0052.0088.0060.0014.0080.0080.0086.0064.0066.0074.0038.0032.0084.0032.0038.0064.0066.0076.00
119AS31.9374.7947.0684.0347.0621.0180.6775.6384.0355.4666.3965.5531.0936.1370.5927.7333.6152.1070.5969.75
67AB35.8274.6358.2194.0349.2522.3982.0980.6083.5861.1962.6971.6440.3031.3485.0732.8440.3056.7277.6183.58
29BYS34.4872.4141.3879.3141.3827.5982.7682.7689.6651.7265.5265.5227.5941.3868.9731.0334.4841.3868.9768.97
90BNS31.1175.5648.8985.5648.8918.8980.0073.3382.2256.6766.6765.5632.2234.4471.1126.6733.3355.5671.1170.00
86LRS32.5672.0946.5182.5640.7025.5881.4072.0982.5652.3362.7962.7927.9138.3766.2829.0734.8847.6769.7765.12
32LOS31.2581.2546.8887.5062.509.3878.1284.3887.5062.5075.0071.8837.5031.2581.2525.0028.1262.5071.8881.25
41BYB29.2773.1765.8595.1253.6624.3985.3785.3790.2463.4163.4173.1741.4631.7182.9336.5946.3456.1078.0580.49
26BNB46.1576.9246.1592.3142.3119.2376.9273.0873.0857.6961.5469.2338.4630.7788.4626.9230.7757.6976.9288.46
49LRB34.6973.4755.1093.8842.8622.4579.5981.6381.6357.1463.2769.3940.8230.6181.6328.5732.6551.0283.6785.71
16LOB43.7581.2568.7593.7562.5025.0087.5075.0087.5068.7556.2581.2543.7537.5093.7550.0062.5075.0062.5075.00
52S25032.6975.0046.1590.3844.239.6280.7784.6290.3861.5469.2369.2342.3138.4673.0832.6928.8551.9267.3175.00
134B25033.5874.6352.2485.8247.7626.1280.6073.8880.6055.2261.9466.4230.6032.8476.1228.3638.0653.7373.8873.13
161SCC31.0674.5350.9386.9646.5821.7480.7577.6483.2356.5266.4667.7030.4330.4372.6727.9532.9250.3169.5772.67
21SUC47.6252.3847.6266.6733.3323.8166.6771.4371.4357.1457.1442.8628.5733.3371.4342.8642.8652.3857.1457.14
156M35.9075.6448.7286.5448.0819.8778.2173.0882.0556.4161.5466.6733.3332.6972.4429.4933.3351.9269.2372.44
32F18.7565.6256.2590.6243.7531.2590.6293.7587.5062.5075.0071.8834.3843.7590.6228.1240.6259.3884.3881.25
192SD1.261.161.231.091.231.321.401.271.221.251.231.321.211.231.171.221.301.351.311.30
192MOE2.472.282.412.142.422.592.742.482.392.442.412.592.372.422.292.392.552.652.572.55
Table 6. Shows the percentage of positive answers towards current usage of guidelines from Q4. Based on the cell value, the background color is graded from green to red through yellow.
Table 6. Shows the percentage of positive answers towards current usage of guidelines from Q4. Based on the cell value, the background color is graded from green to red through yellow.
NAbbr.Q4.n
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
192ALL78.6542.7136.9833.8511.4680.2186.4672.4046.3515.1019.798.3344.2765.103.65
16ALP62.5018.7512.5012.506.2575.0087.5062.5025.006.256.250.0012.5056.256.25
88ANP82.9543.1843.1837.5010.2378.4181.8265.9148.8621.5926.149.0954.5563.643.41
27E1P70.3737.0425.9325.9314.8170.3781.4859.2625.9314.8114.817.4122.2259.267.41
42E2P66.6726.1926.1916.674.7680.9592.8680.9538.104.767.142.3830.9569.052.38
73BY75.3441.1030.1430.1410.9686.3087.6772.6035.6213.7017.819.5943.8465.752.74
119BN80.6743.7041.1836.1311.7676.4785.7172.2752.9415.9721.017.5644.5464.714.20
136LR73.5339.7136.0332.3513.2477.2184.5669.8543.3815.4422.068.8240.4460.295.15
50LO90.0052.0036.0036.006.0086.0090.0078.0054.0014.0014.008.0054.0076.000.00
119AS79.8345.3837.8233.6112.6177.3185.7171.4344.5415.9719.339.2442.8662.183.36
67AB74.6337.3135.8234.3310.4583.5886.5771.6447.7611.9419.407.4646.2768.664.48
29BYS68.9744.8334.4827.5910.3479.3182.7668.9720.6917.2410.3410.3434.4848.283.45
90BNS83.3345.5638.8935.5613.3376.6786.6772.2252.2215.5622.228.8945.5666.673.33
86LRS75.5840.7036.0530.2313.9574.4282.5668.6040.7017.4423.269.3037.2155.814.65
32LOS90.6256.2540.6240.629.3884.3893.7578.1253.1212.509.389.3856.2578.120.00
41BYB78.0536.5929.2731.7112.2090.2490.2473.1743.909.7621.959.7648.7875.612.44
26BNB69.2338.4646.1538.467.6973.0880.7769.2353.8515.3815.383.8542.3157.697.69
49LRB69.3938.7836.7334.6912.2481.6387.7671.4346.9412.2420.418.1644.9067.356.12
16LOB87.5037.5031.2531.250.0087.5081.2575.0056.2512.5018.756.2550.0068.750.00
52S25078.8542.3136.5430.7711.5473.0880.7773.0842.317.6913.463.8538.4663.461.92
134B25077.6143.2836.5734.3311.9482.0988.0670.9047.0117.9122.3910.4545.5264.934.48
161SCC80.7544.1034.7832.9210.5681.9990.0675.7847.2014.9118.635.5943.4865.843.73
21SUC80.9528.5719.0514.299.5280.9590.4890.4833.339.529.524.7661.9066.674.76
156M80.7746.7938.4635.2613.4678.2184.6269.2346.7916.0321.1510.2644.8767.954.49
32F68.7518.7528.1228.123.1290.6296.8887.5040.629.3815.620.0043.7556.250.00
Table 7. Shows the percentage of positive answers towards future usage of guidelines from Q5.
Table 7. Shows the percentage of positive answers towards future usage of guidelines from Q5.
NAbbr.Q5.n
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14
192ALL42.719.9016.1514.5811.466.7710.9411.4611.4614.065.2113.0211.4614.0612.50
16ALP62.5012.506.256.256.250.0012.5012.5012.506.250.000.000.0012.506.25
88ANP31.827.9513.6418.1811.369.0910.2312.5010.2317.056.8214.7714.7714.7715.91
27E1P55.5614.8111.1111.1111.117.4114.8114.8114.8111.1111.1114.8111.1114.817.41
42E2P52.389.5219.057.1411.902.3811.9011.9011.909.522.389.5211.9016.679.52
73BY45.218.2215.079.5913.702.7410.9612.3313.7016.444.1110.968.229.5913.70
119BN41.1810.9216.8117.6510.089.2410.9210.9210.0812.615.8814.2913.4516.8111.76
136LR41.9111.0317.6513.9712.507.3511.7611.7612.5015.444.4113.2411.7614.7113.24
50LO44.006.0010.0016.008.004.008.0010.008.0010.006.0012.0010.0012.0010.00
119AS40.3410.9215.1316.8112.617.5613.4512.6113.4515.975.8815.139.2416.8115.13
67AB46.277.4616.4210.458.964.485.978.967.4610.452.998.9614.938.967.46
29BYS41.3810.3417.2410.3420.696.9020.6920.6927.5927.596.9017.246.9013.7920.69
90BNS40.0011.1114.4418.8910.007.7811.1110.008.8912.225.5614.4410.0017.7813.33
86LRS39.5311.6316.2816.2812.798.1413.9512.7913.9517.445.8115.129.3016.2815.12
32LOS43.759.3812.5018.7512.506.2512.5012.5012.5012.506.2515.629.3818.7515.62
41BYB46.347.3214.639.769.760.004.887.324.889.762.447.329.767.329.76
26BNB46.157.6919.2311.547.6911.547.6911.5411.5411.543.8511.5423.0811.543.85
49LRB46.9410.2020.4110.2012.246.128.1610.2010.2012.242.0410.2016.3312.2410.20
16LOB37.500.006.2512.500.000.000.006.250.006.256.256.2512.500.000.00
52S25032.6911.5417.3121.1513.469.6211.5413.469.6211.545.7715.389.6217.3111.54
134B25047.018.9614.9311.9410.455.2210.4510.4511.9414.934.4811.9411.9412.6912.69
161SCC44.109.9415.5314.2912.425.5911.1810.5611.1813.045.5913.6612.4215.5313.04
21SUC33.334.7614.299.5219.050.009.524.7614.2928.574.769.529.524.769.52
156M45.517.6913.4613.467.695.778.978.977.6910.265.1313.4610.2611.549.62
32F31.2518.7528.1218.7528.129.3818.7521.8828.1231.253.129.3815.6225.0025.00
Table 8. Mapping of data types to guidelines.
Table 8. Mapping of data types to guidelines.
DirectIndirectQ4–5.n
1 2 3 4 5 6 7 8 9 10 11 12 13 14
Q3.1 XXXXXXXXXXXXXX
Q3.2 XXX
Q3.3 X XXXXXXXXX
Q3.4 XX XX XXXXXX
Q3.5(Q3.4)XX X X
Q3.6 X
Q3.7 X
Q3.8(Q3.2) XXX
Q3.9(Q3.2) X
Q3.10(Q3.2) X
Q3.11 X X X
Q3.12 XX X XXXXXXX
Q3.13(Q3.4)XX X XXXXXXX
Q3.14(Q3.4)XX X XXXXXXX
Q3.15 X X XX
Q3.16(Q3.4)XX X XXXXXXX
Q3.17(Q3.4)XX X XXXXXXX
Q3.18(Q3.4)XX X XXXXXXX
Q3.19 XXX X X XX
Q3.20 XXX XX
Table 9. Shows excerpt of data types from Question 3 (Q3.n) (Table 5). It displays the presence (X) or absence (O) of specific data types in ‘Example 1’ (E.1) and ‘Example 2’ (E.2). The ‘Abbr.’ column lists subgroups using filter identifiers (see Table 4). Cells indicate the percentage of subgroup participants agreeing or strongly agreeing to publish the posting. Cell highlighting denotes extractable data types with a simple majority in yellow and a supermajority in orange.
Table 9. Shows excerpt of data types from Question 3 (Q3.n) (Table 5). It displays the presence (X) or absence (O) of specific data types in ‘Example 1’ (E.1) and ‘Example 2’ (E.2). The ‘Abbr.’ column lists subgroups using filter identifiers (see Table 4). Cells indicate the percentage of subgroup participants agreeing or strongly agreeing to publish the posting. Cell highlighting denotes extractable data types with a simple majority in yellow and a supermajority in orange.
NN%Abbr. **Q3.n *
2 4 7 8 9 12 15 19 20
E.1XXOXOXOXX
E.2XXOXXXOXX
192100.00ALL74.4887.580.7377.0883.3367.7176.0471.8873.96
168.33ALP81.2581.2581.2587.581.2556.2575.050.050.0
2714.06E1P77.7881.4877.7877.7877.7862.9677.7859.2666.67
4221.88E2P73.8185.7185.7183.3385.7164.2978.5769.0573.81
* Q3.2—“Full name”; Q3.4—“Full address”; Q3.7—“Social security number”; Q3.8—“Information on relatives”; Q3.9—“Phone number”; Q3.12—“Parcel number (property ID)”; Q3.15—“Car license number”; Q3.19—“Security measures”; Q3.20—“Absence of security measures”. ** ALL—“ALL survey participants, unfiltered”; ALP—“All Likely to Publish example #1 and #2”; E1P—“Example #1 likely to Publish”; E2P—“Example #2 likely to Publish”.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kutschera, S.; Slany, W.; Ratschiller, P.; Gursch, S.; Deininger, P.; Dagenborg, H. Incidental Data: A Survey towards Awareness on Privacy-Compromising Data Incidentally Shared on Social Media. J. Cybersecur. Priv. 2024, 4, 105-125. https://doi.org/10.3390/jcp4010006

AMA Style

Kutschera S, Slany W, Ratschiller P, Gursch S, Deininger P, Dagenborg H. Incidental Data: A Survey towards Awareness on Privacy-Compromising Data Incidentally Shared on Social Media. Journal of Cybersecurity and Privacy. 2024; 4(1):105-125. https://doi.org/10.3390/jcp4010006

Chicago/Turabian Style

Kutschera, Stefan, Wolfgang Slany, Patrick Ratschiller, Sarina Gursch, Patrick Deininger, and Håvard Dagenborg. 2024. "Incidental Data: A Survey towards Awareness on Privacy-Compromising Data Incidentally Shared on Social Media" Journal of Cybersecurity and Privacy 4, no. 1: 105-125. https://doi.org/10.3390/jcp4010006

Article Metrics

Back to TopTop