{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:34:32Z","timestamp":1776116072040,"version":"3.50.1"},"reference-count":57,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW2","license":[{"start":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T00:00:00Z","timestamp":1730937600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2024,11,7]]},"abstract":"<jats:p>The pervasive influence of online activities in our lives, encompassing personal connections, professional engagements, and e-commerce, has amplified concerns about privacy. However, existing privacy research has predominantly concentrated on the individual level, paying less attention to the privacy practices and strategies adopted by online social groups. This research gap calls for a renewed focus on understanding and addressing privacy challenges specific to online group settings.<\/jats:p>\n          <jats:p>In this paper we explore the privacy needs of online groups through the lens of Contextual Integrity. We perform two complementary studies: semi-structured qualitative interviews of Facebook Groups users (n=17), and a large-scale survey of individuals organizing in groups on Facebook, Discord, and Reddit (n=4486). We investigate the privacy needs of different contextual groups, and locate the presence of contextual norms, contextual member roles, explicit and implicit rules, and privacy concerns. We trace how this complex interplay informs privacy expectations, needs, and negotiations across groups. We find that technical systems provide limited tools to effectively enforce group privacy, allowing individuals to compromise privacy norms. Based on these findings, we offer recommendations to support the design of privacy controls for online groups.<\/jats:p>","DOI":"10.1145\/3686945","type":"journal-article","created":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T15:52:40Z","timestamp":1731081160000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Privacy for Groups Online: Context Matters"],"prefix":"10.1145","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-4752-7164","authenticated-orcid":false,"given":"Madiha Zahrah","family":"Choksi","sequence":"first","affiliation":[{"name":"Cornell Tech, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3864-420X","authenticated-orcid":false,"given":"Ero","family":"Balso","sequence":"additional","affiliation":[{"name":"Cornell Tech, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7339-2645","authenticated-orcid":false,"given":"Frauke","family":"Kreuter","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6485-6997","authenticated-orcid":false,"given":"Helen","family":"Nissenbaum","sequence":"additional","affiliation":[{"name":"Cornell Tech, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,11,8]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"The inhibition effect: Privacy concerns disrupt the positive effects of social media use on online political participation","author":"Ahmed Saifuddin","year":"2023","unstructured":"Saifuddin Ahmed and Sangwon Lee. 2023. The inhibition effect: Privacy concerns disrupt the positive effects of social media use on online political participation. New Media & Society (2023), 14614448231173328."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1108\/13673270310463626"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12106"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1177\/0261927X12456384"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9760.2006.00235.x"},{"key":"e_1_2_1_6_1","volume-title":"The logic of connective action: Digital media and the personalization of contentious politics. Information, communication & society","author":"Lance Bennett W","year":"2012","unstructured":"W Lance Bennett and Alexandra Segerberg. 2012. The logic of connective action: Digital media and the personalization of contentious politics. Information, communication & society, Vol. 15, 5 (2012), 739--768."},{"key":"e_1_2_1_7_1","volume-title":"Individual and group privacy","author":"Bloustein Edward J","unstructured":"Edward J Bloustein and Nathaniel J Pallone. 2018. Individual and group privacy. Routledge."},{"key":"e_1_2_1_8_1","unstructured":"Laura Ceci. 2023. Discord global registered users 2023 | Statista. https:\/\/www.statista.com\/statistics\/1367922\/discord-registered-users-worldwide\/"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858516"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274301"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441837"},{"key":"e_1_2_1_12_1","article-title":"Group privacy management strategies and challenges in Facebook: A focus group study among Flemish youth organizations","volume":"10","author":"Wolf Ralf De","year":"2016","unstructured":"Ralf De Wolf. 2016. Group privacy management strategies and challenges in Facebook: A focus group study among Flemish youth organizations. Cyberpsychology-Journal of Psychosocial Research on Cyberspace, Vol. 10, 1 (2016).","journal-title":"Cyberpsychology-Journal of Psychosocial Research on Cyberspace"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.03.010"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.2307\/258231"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998223"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v12i1.15033"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819931"},{"key":"e_1_2_1_18_1","volume-title":"Group privacy: A defence and an interpretation","author":"Floridi Luciano","year":"2017","unstructured":"Luciano Floridi. 2017. Group privacy: A defence and an interpretation. Group privacy: New challenges of data technologies (2017), 83--100."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998273"},{"key":"e_1_2_1_20_1","volume-title":"The ties that bind: Social network principles in online communities. Decision support systems","author":"Ganley Dale","year":"2009","unstructured":"Dale Ganley and Cliff Lampe. 2009. The ties that bind: Social network principles in online communities. Decision support systems, Vol. 47, 3 (2009), 266--274."},{"key":"e_1_2_1_21_1","volume-title":"Constructing and enforcing\" authentic\" identity online: Facebook, real names, and non-normative identities. First Monday","author":"Haimson Oliver L","year":"2016","unstructured":"Oliver L Haimson and Anna Lauren Hoffmann. 2016. Constructing and enforcing\" authentic\" identity online: Facebook, real names, and non-normative identities. First Monday (2016)."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1177\/0270467610385893"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998288"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102169"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531674"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359157"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compcom.2022.102729"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v11i1.14899"},{"key":"e_1_2_1_29_1","unstructured":"Mansee Khurana. 2022. The Only Good Thing Left About Facebook. https:\/\/www.theatlantic.com\/culture\/archive\/2022\/04\/how-facebook-groups-create-community\/629698\/"},{"key":"e_1_2_1_30_1","volume-title":"Building successful online communities: Evidence-based social design","author":"Kraut Robert E","unstructured":"Robert E Kraut and Paul Resnick. 2012. Building successful online communities: Evidence-based social design. Mit Press."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2013.11.005"},{"key":"e_1_2_1_32_1","unstructured":"Karen Locke. 2002. The grounded theory approach to qualitative research. (2002)."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479504"},{"key":"e_1_2_1_34_1","volume-title":"Networked privacy: How teenagers negotiate context in social media. New media & society","author":"Marwick Alice E","year":"2014","unstructured":"Alice E Marwick and Danah Boyd. 2014. Networked privacy: How teenagers negotiate context in social media. New media & society, Vol. 16, 7 (2014), 1051--1067."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858391"},{"key":"e_1_2_1_36_1","volume-title":"internet, and mobility: The rise of telework, telehealth, e-learning, and e-shopping. Sustainable cities and society","author":"Mouratidis Kostas","year":"2021","unstructured":"Kostas Mouratidis and Apostolos Papagiannakis. 2021. COVID-19, internet, and mobility: The rise of telework, telehealth, e-learning, and e-shopping. Sustainable cities and society, Vol. 74 (2021), 103182."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531643"},{"key":"e_1_2_1_38_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev., Vol. 79 (2004), 119.","journal-title":"Wash. L. Rev."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1162\/DAED_a_00113"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1515\/til-2019-0008"},{"key":"e_1_2_1_41_1","volume-title":"History of online communities. Encyclopedia of community","author":"Preece Jenny","year":"2003","unstructured":"Jenny Preece, Diane Maloney-Krichmar, and Chadia Abras. 2003. History of online communities. Encyclopedia of community, Vol. 3, 1023--1027 (2003), 86."},{"key":"e_1_2_1_42_1","volume-title":"The top five reasons for lurking: improving community experiences for everyone. Computers in human behavior","author":"Preece Jenny","year":"2004","unstructured":"Jenny Preece, Blair Nonnecke, and Dorine Andrews. 2004. The top five reasons for lurking: improving community experiences for everyone. Computers in human behavior, Vol. 20, 2 (2004), 201--223."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1177\/20563051211019004"},{"key":"e_1_2_1_44_1","volume-title":"Visualizing Discord Servers. In 2021 Working Conference on Software Visualization (VISSOFT). IEEE, 150--154","author":"Raglianti Marco","year":"2021","unstructured":"Marco Raglianti, Roberto Minelli, Csaba Nagy, and Michele Lanza. 2021. Visualizing Discord Servers. In 2021 Working Conference on Software Visualization (VISSOFT). IEEE, 150--154."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998277"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675215"},{"key":"e_1_2_1_47_1","volume-title":"Basics of qualitative research","author":"Strauss Anselm","unstructured":"Anselm Strauss and Juliet Corbin. 1990. Basics of qualitative research. Sage publications."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145320"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3378393.3402235"},{"key":"e_1_2_1_50_1","volume-title":"Group privacy: New challenges of data technologies","author":"Taylor Linnet","unstructured":"Linnet Taylor, Luciano Floridi, and Bart Van der Sloot. 2016. Group privacy: New challenges of data technologies. Vol. 126. Springer, Cham."},{"key":"e_1_2_1_51_1","first-page":"20","article-title":"Balancing audience and privacy tensions on social network sites: Strategies of highly engaged users","volume":"9","author":"Vitak Jessica","year":"2015","unstructured":"Jessica Vitak, Stacy Blasiola, Sameer Patil, and Eden Litt. 2015. Balancing audience and privacy tensions on social network sites: Strategies of highly engaged users. International Journal of Communication, Vol. 9 (2015), 20.","journal-title":"International Journal of Communication"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3610036"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820010"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/289444.289500"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675256"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0263-2373(00)00036-0"},{"key":"e_1_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Shoshana Zuboff. 2019. The Age of Surveillance Capitalism. PublicAffairs.","DOI":"10.1177\/0049085719872928"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3686945","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3686945","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T09:24:17Z","timestamp":1755768257000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3686945"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,7]]},"references-count":57,"journal-issue":{"issue":"CSCW2","published-print":{"date-parts":[[2024,11,7]]}},"alternative-id":["10.1145\/3686945"],"URL":"https:\/\/doi.org\/10.1145\/3686945","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,7]]},"assertion":[{"value":"2024-11-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}