{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:53:16Z","timestamp":1742928796986,"version":"3.40.3"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030827854"},{"type":"electronic","value":"9783030827861"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100006498","name":"Clemson University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006498","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This chapter examines privacy as a multilevel concept. While current conceptualizations of privacy tend to focus on the individual level, technological advancements are making<jats:italic>group privacy<\/jats:italic>increasingly important to understand. This chapter offers a typology of both groups and group privacy to establish a framework for conceptualizing how privacy operates beyond the individual level. The chapter describes several contemporary practices that influence the privacy of multiple actors and considers the dynamics of multi-stakeholder privacy decision-making. Potential tensions that exist between the rights and preferences of individual group members or between individuals and the group as a whole are also examined. Finally, recommendations for tools and other mechanisms to support collaborative privacy management and group privacy protection are provided.<\/jats:p>","DOI":"10.1007\/978-3-030-82786-1_6","type":"book-chapter","created":{"date-parts":[[2022,2,9]],"date-time":"2022-02-09T14:02:49Z","timestamp":1644415369000},"page":"91-109","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Privacy Beyond the Individual Level"],"prefix":"10.1007","author":[{"given":"Jennifer Jiyoung","family":"Suh","sequence":"first","affiliation":[]},{"given":"Miriam J.","family":"Metzger","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,9]]},"reference":[{"key":"6_CR1","volume-title":"Privacy and Freedom","author":"A Westin","year":"1967","unstructured":"Westin, A. 1967. Privacy and Freedom. New York: Atheneum."},{"key":"6_CR2","volume-title":"The Environment and Social Behavior: Privacy, Personal Space, Territory, Crowding","author":"I Altman","year":"1975","unstructured":"Altman, I. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, Crowding. Monterey, CA: Brooks\/Cole Publishing Company."},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Alsarkal, Y., N. Zhang, and H. Xu. 2018. Your privacy is your friend\u2019s privacy: Examining interdependent information disclosure on online social networks. In Proceedings of the 51st Hawaii International Conference on System Sciences, pp 1\u201310.","DOI":"10.24251\/HICSS.2018.111"},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-46608-8","volume-title":"Group Privacy: New Challenges of Data Technologies","author":"L Taylor","year":"2017","unstructured":"Taylor, L., L. Floridi, and B. Van Der Sloot. 2017. Introduction: A new perspective on privacy. In Group Privacy: New Challenges of Data Technologies, ed. L. Taylor, L. Floridi, and B. van der Sloot, 1\u201312. Cham: Springer."},{"key":"6_CR5","volume-title":"Configuring the Networked Self: Law, Code, and the Play of Everyday Practice","author":"JE Cohen","year":"2012","unstructured":"Cohen, J.E. 2012. Configuring the Networked Self: Law, Code, and the Play of Everyday Practice. New Haven, CT: Yale University Press."},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"B\u00e9langer, F., and R.E. Crossler. 2011. Privacy in the digital age: A review of information privacy research in information systems. Management Information Systems Quarterly.","DOI":"10.2307\/41409971"},{"key":"6_CR7","doi-asserted-by":"publisher","unstructured":"B\u00e9langer, F., and T.L. James. 2020. A theory of multilevel information privacy management for the digital era. Information Systems Research. https:\/\/doi.org\/10.1287\/isre.2019.0900.","DOI":"10.1287\/isre.2019.0900"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.chb.2016.12.008","volume":"69","author":"J Birnholtz","year":"2017","unstructured":"Birnholtz, J., M. Burke, and A. Steele. 2017. Untagging on social media: Who untags, what do they untag, and why? Computers in Human Behavior 69: 166\u2013173. https:\/\/doi.org\/10.1016\/j.chb.2016.12.008.","journal-title":"Computers in Human Behavior"},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-319-46608-8_2","volume-title":"Group Privacy: New Challenges of Data Technologies","author":"L Taylor","year":"2017","unstructured":"Taylor, L. 2017. Safety in numbers? Group privacy and big data analytics in the developing world. In Group Privacy: New Challenges of Data Technologies, ed. L. Taylor, L. Floridi, and B. van der Sloot, 13\u201336. Cham: Springer."},{"key":"6_CR10","unstructured":"Tufekci, Z. 2018. The latest data privacy debacle. New York Times."},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1017\/CBO9781107590205.004","volume-title":"Privacy, Big Data and the Public Good: Frameworks for Engagement","author":"S Barocas","year":"2014","unstructured":"Barocas, S., and H. Nissenbaum. 2014. Big data\u2019s end run around anonymity and consent. In Privacy, Big Data and the Public Good: Frameworks for Engagement, ed. J. Lane, V. Stodden, S. Bender, and H. Nissenbaum, 44\u201375. New York, NY: Cambridge University Press."},{"key":"6_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46608-8","volume-title":"Group Privacy: New Challenges of Data Technologies","author":"L Taylor","year":"2017","unstructured":"Taylor, L., L. Floridi, and B. van der Sloot. 2017. Group Privacy: New Challenges of Data Technologies. Cham: Springer."},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Floridi, L. 2017. Group privacy: A defence and an interpretation. In Group Privacy.","DOI":"10.2139\/ssrn.3854483"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Taylor, L., B. van der Sloot, and L. Floridi. 2017. Conclusion: What do we know about group privacy? In Group Privacy.","DOI":"10.1007\/978-3-319-46608-8"},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-319-46608-8_3","volume-title":"Group Privacy: New Challenges of Data Technologies","author":"L Kammourieh","year":"2017","unstructured":"Kammourieh, L., T. Baar, J. Berens, E. Letouz\u00e9, J. Manske, J. Palmer, D. Sangokoya, and P. Vinck. 2017. Group privacy in the age of big data. In Group Privacy: New Challenges of Data Technologies, ed. L. Taylor, L. Floridi, and B. van der Sloot, 37\u201366. Cham: Springer International Publishing."},{"key":"6_CR16","doi-asserted-by":"publisher","first-page":"1859","DOI":"10.1016\/j.chb.2012.05.004","volume":"28","author":"JT Child","year":"2012","unstructured":"Child, J.T., P.M. Haridakis, and S. Petronio. 2012. Blogging privacy rule orientations, privacy management, and content deletion practices: The variability of online privacy management activity at different stages of social media use. Computers in Human Behavior 28: 1859\u20131872.","journal-title":"Computers in Human Behavior"},{"key":"6_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3274437","volume":"2","author":"JJ Suh","year":"2018","unstructured":"Suh, J.J., M.J. Metzger, S.A. Reid, and A. El Abbadi. 2018. Distinguishing group privacy from personal privacy: The effect of group inference technologies on privacy perceptions and behaviors. Proceedings of the ACM on Human Computer Interaction 2: 1\u201322. https:\/\/doi.org\/10.1145\/3274437.","journal-title":"Proceedings of the ACM on Human Computer Interaction"},{"key":"6_CR18","first-page":"93","volume-title":"Proceedings of the 23rd ACM Symposium on Access Control Models & Technologies (SACMAT)","author":"L Yu","year":"2018","unstructured":"Yu, L., S.M. Motipalli, D. Lee, P. Liu, H. Xu, Q. Liu, J. Tan, and B. Luo. 2018. My friend leaks my privacy. In Proceedings of the 23rd ACM Symposium on Access Control Models & Technologies (SACMAT), 93\u2013104. New York, NY: ACM."},{"key":"6_CR19","unstructured":"Microsoft. 2020. Manage discovery of private teams in Microsoft Teams. In Microsoft Docs. https:\/\/docs.microsoft.com\/en-us\/microsoftteams\/manage-discovery-of-private-teams. Accessed 11 Aug 2020."},{"key":"6_CR20","volume-title":"The workplace-surveillance technology boom","author":"N Chyi","year":"2020","unstructured":"Chyi, N. 2020. The workplace-surveillance technology boom. Slate."},{"key":"6_CR21","unstructured":"Roberts, J.J. 2020. Workplace privacy and surveillance software: What the law says | Fortune. Fortune."},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Laufer, R.S., and M. Wolfe. 1977. Privacy as a social issue: A multidimensional development theory. Journal of Social Issues.","DOI":"10.1111\/j.1540-4560.1977.tb01880.x"},{"key":"6_CR23","doi-asserted-by":"crossref","DOI":"10.1353\/book4588","volume-title":"Boundaries of Privacy: Dialectics of Disclosure","author":"S Petronio","year":"2002","unstructured":"Petronio, S. 2002. Boundaries of Privacy: Dialectics of Disclosure. Albany, NY: State University of New York Press."},{"key":"6_CR24","volume-title":"Proceedings of the 17th ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW\u201914)","author":"E Litt","year":"2014","unstructured":"Litt, E., E. Spottswood, J. Birnholtz, J. Hancock, M.E. Smith, and L. Reynolds. 2014. Awkward encounters of an \u201cother\u201d kind: Collective self-presentation and face threat on facebook. In Proceedings of the 17th ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW\u201914). Baltimore, MD: ACM."},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Jia, H., and H. Xu. 2016. Autonomous and interdependent: Collaborative privacy management on social network sites. In Conference on Human Factors in Computing Systems \u2013 Proceedings.","DOI":"10.1145\/2858036.2858415"},{"key":"6_CR26","doi-asserted-by":"publisher","unstructured":"Lampinen, A., V. Lehtinen, A. Lehmuskallio, and S. Tamminen. 2011. We\u2019re in it together: Interpersonal management of disclosure in social network services. In Annual Conference on Human Factors in Computing Systems, 3217\u20133226. https:\/\/doi.org\/10.1145\/1978942.1979420.","DOI":"10.1145\/1978942.1979420"},{"key":"6_CR27","first-page":"503","volume-title":"Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW \u201916)","author":"H Cho","year":"2016","unstructured":"Cho, H., and A. Filippova. 2016. Networked privacy management in Facebook: A mixed-methods and multinational study. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW \u201916), 503\u2013514. San Francisco, CA: ACM."},{"key":"6_CR28","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1016\/j.chb.2014.03.010","volume":"35","author":"R De Wolf","year":"2014","unstructured":"De Wolf, R., K. Willaert, and J. Pierson. 2014. Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook. Computers in Human Behavior 35: 444\u2013454. https:\/\/doi.org\/10.1016\/j.chb.2014.03.010.","journal-title":"Computers in Human Behavior"},{"key":"6_CR29","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.chb.2015.12.021","volume":"57","author":"DY Wohn","year":"2016","unstructured":"Wohn, D.Y., and E.L. Spottswood. 2016. Reactions to other-generated face threats on Facebook and their relational consequences. Computers in Human Behavior 57: 187\u2013194. https:\/\/doi.org\/10.1016\/j.chb.2015.12.021.","journal-title":"Computers in Human Behavior"},{"key":"6_CR30","doi-asserted-by":"publisher","unstructured":"Aloia, L.S. 2018. The emotional, behavioral, and cognitive experience of boundary turbulence. Communication Studies. https:\/\/doi.org\/10.1080\/10510974.2018.1426617.","DOI":"10.1080\/10510974.2018.1426617"},{"key":"6_CR31","doi-asserted-by":"publisher","unstructured":"Steuber, K.R., and R.M. McLaren. 2015. Privacy recalibration in personal relationships: Rule usage before and after an incident of privacy turbulence. Communication Quarterly. https:\/\/doi.org\/10.1080\/01463373.2015.1039717.","DOI":"10.1080\/01463373.2015.1039717"},{"key":"6_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13347-014-0157-8","volume":"27","author":"L Floridi","year":"2014","unstructured":"Floridi, L. 2014. Open data, data protection, and group privacy. Philosophy and Technology 27: 1\u20133. https:\/\/doi.org\/10.1007\/s13347-014-0157-8.","journal-title":"Philosophy and Technology"},{"key":"6_CR33","doi-asserted-by":"publisher","unstructured":"Mittelstadt, B. 2017. From Individual to group privacy in big data analytics. Philosophy and Technology. https:\/\/doi.org\/10.1007\/s13347-017-0253-7.","DOI":"10.1007\/s13347-017-0253-7"},{"key":"6_CR34","first-page":"219","volume":"8","author":"EJ Bloustein","year":"1976","unstructured":"Bloustein, E.J. 1976. Group privacy: The right to huddle. Rutgers-Camden Law Journal 8: 219.","journal-title":"Rutgers-Camden Law Journal"},{"key":"6_CR35","doi-asserted-by":"crossref","unstructured":"Campbell, D.T. 1960. Common fate, similarity and other indices of the status of aggregates of persons as social entities. In Decisions, Values and Groups.","DOI":"10.1016\/B978-0-08-009237-9.50017-2"},{"key":"6_CR36","doi-asserted-by":"publisher","unstructured":"Loi, M., and M. Christen. 2020. Two concepts of group privacy. Philosophy and Technology. https:\/\/doi.org\/10.1007\/s13347-019-00351-0.","DOI":"10.1007\/s13347-019-00351-0"},{"key":"6_CR37","doi-asserted-by":"publisher","unstructured":"Tajfel, H. 1970. Experiments in intergroup discrimination. Scientific American. https:\/\/doi.org\/10.1038\/scientificamerican1170-96.","DOI":"10.1038\/scientificamerican1170-96"},{"key":"6_CR38","doi-asserted-by":"publisher","unstructured":"Hu, H., Ahn, G.-J., and Jorgensen, J. 2011. Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. In Proceedings of the 27th Annual Computer Security Applications Conference \u2013 ACSAC \u201911, 103. https:\/\/doi.org\/10.1145\/2076732.2076747","DOI":"10.1145\/2076732.2076747"},{"key":"6_CR39","doi-asserted-by":"publisher","unstructured":"Squicciarini, A.C., M. Shehab, and F. Paci. 2009. Collective privacy management in social networks. In Proceedings of the 18th International Conference on World Wide Web \u2013 WWW \u201909 521. https:\/\/doi.org\/10.1145\/1526709.1526780.","DOI":"10.1145\/1526709.1526780"},{"key":"6_CR40","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1002\/asi.21473","volume":"63","author":"AC Squicciarini","year":"2011","unstructured":"Squicciarini, A.C., H. Xu, and X. Zhang. 2011. CoPE: Enabling collaborative privacy management in online social networks. Journal of the American Society for Information Science and Technology 63: 521\u2013534. https:\/\/doi.org\/10.1002\/asi.21473.","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"6_CR41","doi-asserted-by":"publisher","unstructured":"Acquisti, A., I. Adjerid, R. Balebako, L. Brandimarte, L.F. Cranor, S. Komanduri, P.G. Leon, N. Sadeh, F. Schaub, M. Sleeper, Y. Wang, and S. Wilson. 2017. Nudges for privacy and security: Understanding and assisting users\u2019 choices online. ACM Computing Surveys 50. https:\/\/doi.org\/10.1145\/3054926.","DOI":"10.1145\/3054926"},{"key":"6_CR42","doi-asserted-by":"publisher","first-page":"1080","DOI":"10.1080\/1369118X.2017.1403642","volume":"22","author":"L Dogruel","year":"2019","unstructured":"Dogruel, L. 2019. Privacy nudges as policy interventions: Comparing US and German media users\u2019 evaluation of information privacy nudges. Information, Communication & Society 22: 1080\u20131095. https:\/\/doi.org\/10.1080\/1369118X.2017.1403642.","journal-title":"Information, Communication & Society"},{"key":"6_CR43","first-page":"1880","volume":"126","author":"DJ Solove","year":"2013","unstructured":"Solove, D.J. 2013. Introduction: Privacy self-management and the consent dilemma. Harvard Law Review 126: 1880\u20131903.","journal-title":"Harvard Law Review"},{"key":"6_CR44","doi-asserted-by":"crossref","unstructured":"Zakhary, V., C. Sahin, T. Georgiou, and A.E. Abbadi. 2017. LocBorg: Hiding social media user location while maintaining online persona (vision paper). In 25th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL 2017).","DOI":"10.1145\/3139958.3140057"},{"key":"6_CR45","doi-asserted-by":"crossref","unstructured":"Zook, M., S. Barocas, D. Boyd, K. Crawford, E. Keller, S.P. Gangadharan, A. Goodman, R.\u00a0Hollander, B.A. Koenig, J. Metcalf, A. Narayanan, A. Nelson, and F. Pasquale. 2017. Ten simple rules for responsible big data research. PLoS Computational Biology.","DOI":"10.1371\/journal.pcbi.1005399"},{"key":"6_CR46","volume-title":"Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps","author":"MJ Metzger","year":"2021","unstructured":"Metzger, M.J., J.J. Suh, S.A. Reid, and A. El Abbadi. 2021. What can fitness apps teach us about group privacy? In Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps, ed. D. Sen and R. Ahmed. IGI Global."}],"container-title":["Modern Socio-Technical Perspectives on Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-82786-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T06:51:19Z","timestamp":1700203879000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-82786-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030827854","9783030827861"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-82786-1_6","relation":{},"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"9 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}