<?xml-model href='http://www.tei-c.org/release/xml/tei/custom/schema/relaxng/tei_all.rng' schematypens='http://relaxng.org/ns/structure/1.0'?><TEI xmlns="http://www.tei-c.org/ns/1.0">
	<teiHeader>
		<fileDesc>
			<titleStmt><title level='a'>Modeling User Characteristics Associated with Interdependent Privacy Perceptions on Social Media</title></titleStmt>
			<publicationStmt>
				<publisher></publisher>
				<date>01/02/2023</date>
			</publicationStmt>
			<sourceDesc>
				<bibl> 
					<idno type="par_id">10408862</idno>
					<idno type="doi">10.1145/3577014</idno>
					<title level='j'>ACM Transactions on Computer-Human Interaction</title>
<idno>1073-0516</idno>
<biblScope unit="volume"></biblScope>
<biblScope unit="issue"></biblScope>					

					<author>Mary Jean Amon</author><author>Aaron Necaise</author><author>Nika Kartvelishvili</author><author>Aneka Williams</author><author>Yan Solihin</author><author>Apu Kapadia</author>
				</bibl>
			</sourceDesc>
		</fileDesc>
		<profileDesc>
			<abstract><ab><![CDATA[‘Interdependent’ privacy violations occur when users share private photos and information about other people in social media without permission. This research investigated user characteristics associated with interdependent privacy perceptions, by asking social media users to rate photo-based memes depicting strangers on the degree to which they were too private to share. Users also completed questionnaires measuring social media usage and personality. Separate groups rated the memes on shareability, valence, and entertainment value. Users were less likely to share memes that were rated as private, except when the meme was entertaining or when users exhibited dark triad characteristics. Users with dark triad characteristics demonstrated a heightened awareness of interdependent privacy and increased sharing of others’ photos. A model is introduced that highlights user types and characteristics that correspond to different privacy preferences: privacy preservers, ignorers, and violators. We discuss how interventions to support interdependent privacy must effectively influence diverse users.]]></ab></abstract>
		</profileDesc>
	</teiHeader>
	<text><body xmlns="http://www.tei-c.org/ns/1.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xlink="http://www.w3.org/1999/xlink">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">INTRODUCTION</head><p>Interdependent privacy violations occur when social media users share private photos or information about other people without permission. These violations of other people s privacy occur on a massive scale, as users post others embarrassing moments, identifying information, photos taken without permission, medical and sexual histories, and other sensitive content. Although research has found that people typically want to provide consent before people post information about them <ref type="bibr">[79]</ref>, users often do not ask for such permission before posting about other people <ref type="bibr">[87]</ref>.</p><p>Interdependent privacy violations are a primary threat associated with social media with wide-ranging consequences for victims. Information shared online is both persistent and cumulative, creating a repository of information that can be used by other people, sometimes for nefarious purposes <ref type="bibr">[6,</ref><ref type="bibr">111]</ref>. Victims of interdependent privacy violations experience increased vulnerability and decreased autonomy, which is often accompanied by psychological distress and other personal and professional consequences ranging from extortion, harassment, identity theft, and stalking <ref type="bibr">[78,</ref><ref type="bibr">83]</ref>. Although users can report inappropriate content, information spreads quickly within social media and across platforms, and social media corporations practices for managing flagged material is limited <ref type="bibr">[90,</ref><ref type="bibr">93]</ref>.</p><p>The sources of interdependent privacy violations are numerous. For example, internet trolls direct their efforts toward upsetting or provoking others, often for no other reason than their own entertainment <ref type="bibr">[73]</ref>. However, even well-intentioned users participate in privacy-violating behaviors due to lapses in judgment, insufficient information, inconsistent or underdeveloped standards of privacy, and emotionally driven decision-making <ref type="bibr">[113]</ref>. Nonetheless, some users act in ways intended to preserve the privacy of others. Users may respond to existing privacy violations by flagging the inappropriate content for possible removal, calling out people who post inappropriate content, or purposefully ignoring information to save others from further embarrassment <ref type="bibr">[88]</ref>.</p><p>Interdependent privacy violations are part of the social media status quo and users vary in their propensity for protecting, ignoring, or violating the privacy of others. Despite the scope of interdependent privacy violations, a significant portion of the privacy literature focuses on measures to protect one s own privacy, and less is known about characteristics that drive users to protect versus violate others privacy online. Prior literature examining user characteristics associated with interdependent privacy decisions has been limited to examining a small number of dimensions, for example, humor <ref type="bibr">[40]</ref>, gender, or personal privacy preferences <ref type="bibr">[3]</ref>. Moreover, although prior work gestures at the notion that users display distinct privacy preferences, research in this area typically examines normative or average user attitudes and behaviors <ref type="bibr">[46]</ref>. A more holistic account of interdependent privacy perceptions and user characteristics is critical, as interdependent privacy interventions rest on the ability to effectively identify and influence diverse users. Thus, interdependent privacy research must account for different types of users that vary in their interdependent privacy preferences, as well as their motivation for sharing and re-sharing on social media.</p><p>Accordingly, this research examines the extent to which user personality characteristics, social media behaviors, and demographic factors predict interdependent privacy perceptions, or the degree to which social media content depicting strangers potentially private information is considered too private to share. We asked 245 regular social media users living in the United States to rate 68 real-world photobased memes which included potentially compromising photos of strangers on the degree to which each meme was too private to share on social media. Photo-based memes were systematically categorized and selected for the study using a modified thematic approach ( &#167; 3.1.2 for details). Participants were then surveyed on several personality dimensions, self-reported social media usage, and demographic background. Separate participant groups rated the photo-based memes on shareability, valence, and entertainment value to identify how the memes features interact with user characteristics to predict privacy perceptions. In addition to providing a descriptive overview of users interdependent privacy perceptions on social media, we examine results from a series of statistical models aimed at better understanding user characteristics that predict interdependent privacy perceptions. Lastly, we identify distinct user types who differ based on interdependent privacy preferences, personality dimensions, and social media usage.</p><p>Our research complements previous interdependent privacy literature by examining content specifically about other people that users consider too private to share on social media, representing an important first step in aligning content moderation strategies (i.e., methods for monitoring and managing user-generated content) with users privacy preferences. To be effective, content moderation strategies must accurately reflect the attitudes and behaviors of social media users toward interdependent privacy violations. Alignment between content moderation practices and public privacy perceptions is necessary for both avoiding false positives (e.g., punishment of socially acceptable social media behaviors) and false negatives (e.g., failure to prevent or minimize harmful behavior). Building on prior work that often focuses on normative interdependent privacy perceptions <ref type="bibr">[46]</ref>, we identify distinct user types that vary in their interdependent privacy perceptions and key psychosocial features that differentiate between them. For example, it is possible that research focusing on normative behavior neglects the needs of those most interested in privacy preservation because different types of users hold distinct interdependent privacy preferences.</p><p>Our research focuses on privacy perceptions regarding real-world photo-based memes that depict people. While online privacy violations can take many forms, photo-based memes are especially aligned with the topic of interdependent privacy, as they often include an identifiable image of a stranger, where it is unclear whether the stranger has consented to having their image altered, replicated, and spread publicly, and photos tend to be especially evocative and incriminating <ref type="bibr">[8,</ref><ref type="bibr">55]</ref>. The text captions that often accompany memes provide a shared understanding that enables users to interpret the meme similarly, and the captions support general interest in the stimuli as attention-grabbing and potentially re-shareable on social media (i.e., versus a stand-alone image of a stranger). Thus, memes represent a popular real-world phenomenon that often operate as a vehicle for spreading potentially sensitive content about other people, and they are an appropriate point of reference point for a general audience examining potential interdependent privacy perceptions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">BACKGROUND</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Interdependent Privacy Violations</head><p>Interdependent privacy is an umbrella term used to refer to a broad class of privacy risks that an individual incurs by virtue of other people s sharing decisions and can include the sharing of genetic data, statistical inference of otherwise undisclosed user characteristics based on social connections, and social media corporations having access to individual information due to social connections <ref type="bibr">[46]</ref>. A relatively common form of interdependent privacy violations occurs when social media users share multimedia content including audio recordings, photos, and videos of other people on social media without permission (i.e., multimedia interdependent privacy <ref type="bibr">[46]</ref>). A survey by Henne and colleagues <ref type="bibr">[42]</ref> revealed that 52% of social media users learned by chance about photos of themselves online, including instances where photos were shared by strangers. Threats to interdependent privacy also come from close connections, with research by Besmer and Lipford <ref type="bibr">[8]</ref> indicating that users primary interdependent privacy concerns are regarding family and friends sharing information out-of-context, especially if the information portrays the user in an unflattering light or shows them violating social norms.</p><p>Multi-party privacy (MPP) concerns are one class of interdependent privacy risks posed by the sharing of co-owned images by acquaintances or family members <ref type="bibr">[46,</ref><ref type="bibr">60,</ref><ref type="bibr">104]</ref>. Dealing with MPP concerns can be difficult because the decision to share co-owned or group photos is made by a single individual, even though those depicted can have conflicting privacy preferences or may not participate in social media themselves <ref type="bibr">[104]</ref>. Ideally, users would adopt collaborative strategies for addressing MPP concerns by discussing their preferences, seeking consent, or removing images contributing to the concerns <ref type="bibr">[8,</ref><ref type="bibr">120]</ref>. However, this type of collaborative behavior is not the norm, and social media platforms provide limited tools for addressing MPP issues <ref type="bibr">[46]</ref>. Given that family and friends have greater access to an individual s personal information, MPP concerns generated by close connections may be perceived as a greater threat to contextual integrity , as these individuals can move private information to the public sphere where the information may be shared with unintended audiences or the subject s portrayal may be altered <ref type="bibr">[80]</ref>.</p><p>Interdependent privacy risks extend beyond MPP concerns, as users also share pictures and videos of strangers for entertainment despite not owning that content themselves. A portion of interdependent privacy violations take the form of viral memes, or units of information that are transmitted widely and replicated over time, within social networks <ref type="bibr">[98]</ref>. Photo-based memes often include personally identifying information, such as a photo subject s face, as well as information or comments about the featured individual. Notably, definitions of what constitutes private information in the context of IDP violations vary and can include information about a person s demographic background or relationships <ref type="bibr">[30,</ref><ref type="bibr">100,</ref><ref type="bibr">107]</ref> or even their drug activity, medical history, sexual history, embarrassing moments, or shaming people for non-normative behaviors <ref type="bibr">[113]</ref>. In the case of social media users re-sharing photo-based memes that depict strangers, it is often impossible for the sharer to know if the person depicted consented to having their photo used as a meme, let alone aspects of the subject s privacy preferences. Thus, the resharing of photobased memes that depict strangers can be seen as a potential IDP violation, where the impact of sharing is not immediately ascertainable.</p><p>Privacy violations are rated as more severe based on the degree to which victims lack control over their information <ref type="bibr">[14]</ref>, suggesting that the memeification of an individual s personal information is a particularly significant threat to privacy on social media. Users may change the original photo or information as it spreads, or the meme may be transformed into an image macro as text captions are added to a photo <ref type="bibr">[122]</ref>. Memes can be created or altered to portray people differently, with some memes highlighting people s positive traits and accomplishments and other memes showing people s negative traits or behaviors that violate social norms. In this way, memes serve as a vehicle through which private information about people is spread to unintended audiences and taken out of context <ref type="bibr">[10,</ref><ref type="bibr">11,</ref><ref type="bibr">80]</ref> as a lowtech form of misinformation that influences public opinion <ref type="bibr">[26]</ref>. As memes are shared at a micro-level, their spread contributes to macro-level social perceptions, influencing mindsets and behaviors of social groups <ref type="bibr">[63,</ref><ref type="bibr">98]</ref>. Thus, the sharing and re-sharing of memes online can mean that the person depicted in the meme may have little to no control over how information about them is transmitted or how they are portrayed within large social networks.</p><p>Introduced before the advent of the internet, Westin s <ref type="bibr">[114]</ref> classic theory of the four states of privacy remains relevant to modern-day privacy issues, especially so in the case of interdependent privacy. Put in today s context, Westin s dimension of solitude or being free from others observation is relevant to individuals right to feel unencumbered by the threat of cameras and recording devices. Individuals also have the right to reserve, or protection from unwanted intrusion upheld by the willing discretion of those surrounding the individual. Additional facets of Westin s model of privacy pertain to protection by close connections (i.e., intimacy ) and strangers (i.e., anonymity when in public spaces), highlighting that privacy is part of a communitarian process <ref type="bibr">[62,</ref><ref type="bibr">75]</ref>. However, this shared responsibility for protecting one another s privacy is made more difficult when users vary in their privacy-relevant perceptions and decisions on social media.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Personality and Privacy Management</head><p>Research in self-disclosure on social media indicates that users and content interact to determine photo sharing decisions, where research often examines the effect of either user dispositions or situational factors in driving personal sharing decisions <ref type="bibr">[55]</ref>. For example, people who rate themselves as open (versus private), post photos of other people more frequently, and those who openly admit to posting embarrassing photos of family and friends are more likely to share photo-based memes <ref type="bibr">[3]</ref>. In terms of user personality profiles, research utilizing the Big Five model of personality dimensions has linked low agreeableness, high extraversion, and high neuroticism to deliberate cyberbullying, which often entails commenting to or about others without permission <ref type="bibr">[5,</ref><ref type="bibr">17,</ref><ref type="bibr">28,</ref><ref type="bibr">31]</ref>.</p><p>The Dark Triad (DT) model of personality <ref type="bibr">[61,</ref><ref type="bibr">84]</ref> has also been used to understand social media misbehaviors <ref type="bibr">[5,</ref><ref type="bibr">19,</ref><ref type="bibr">29,</ref><ref type="bibr">34]</ref>. The DT model focuses on the malevolent personality traits of Machiavellianism, narcissism, and psychopathy. Machiavellianism refers to a manipulative personality style, where people act in calculating, deceitful, and self-serving ways to gain power and enhance personal outcomes. People high in subclinical narcissism tend to be self-focused and motivated to improve and enhance their selfesteem with a high degree of dominance, entitlement, and grandiosity. Subclinical psychopathy refers to impulsivity and thrill-seeking combined with low levels of empathy and anxiety. Taken together, individuals high in DT traits are exploitative, apathetic, and willing to harm others for their own benefit <ref type="bibr">[51,</ref><ref type="bibr">84]</ref>.</p><p>DT traits are associated with the use of social media as a means for gossiping, increasing social capital, and monitoring social connections <ref type="bibr">[116]</ref>. Machiavellians and narcissists tend to use social media to improve their image, with Machiavellians being especially calculated and disciplined in their posting behaviors <ref type="bibr">[12,</ref><ref type="bibr">76,</ref><ref type="bibr">92]</ref>. This contrasts the impulsive behavior of more psychopathic users, who are more likely to act out their negative behaviors to harm others. Psychopathy is more strongly associated with trolling behavior than Machiavellianism or narcissism <ref type="bibr">[5,</ref><ref type="bibr">68]</ref>, such that people high in psychopathy are more likely to repeatedly communicate hostile and aggressive messages with the intention of causing distress. In this way, psychopathy is associated with intrusions upon others within their social networks, including with higher rates of unsolicited internet pornography <ref type="bibr">[99]</ref>. Thus, Machiavellianism and narcissism tend to be associated with self-enhancing online behaviors, whereas psychopathy is related to other-harming online behaviors.</p><p>A significantly smaller body of literature examines online activity in terms of the Light Triad (LT) personality dimensions, or personality traits reflecting a beneficent orientation toward others, including faith in humanity (believing in the goodness of others), humanism (valuing the dignity and worth of others), and Kantianism (treating others as ends unto themselves) <ref type="bibr">[57]</ref>. Kaufman and colleagues <ref type="bibr">[57]</ref> respond to the rather extensive literature on the DT model by noting the importance of research that includes measures of both adaptive and maladaptive traits in the same study to represent the full capacities of humanity. Research examining LT personality dimensions in the context of online social connections shows that individuals high in LT traits are less likely to use dating or hookup apps like Tinder (esp. those high in Kantianism) and, when they do, are more likely to seek out long-term relationships <ref type="bibr">[97]</ref>. Additionally, a recent study by <ref type="bibr">March &amp; Marrington [72]</ref> reports that all three dimensions of the LT are associated with self-reported prosocial'' online behaviors (e.g., using the internet to feel closer to others), while Kantianism is associated with decreased antisocial online behaviors (e.g., using the internet to show off).</p><p>Notably, prior research does not elucidate the extent to which individuals high in DT and LT recognize other social media users right to privacy. Given that DT traits are defined, in part, by an apathy toward others <ref type="bibr">[51,</ref><ref type="bibr">112]</ref>, it is possible that high-DT users are relatively insensitive to the potentially private nature of online content and, therefore, rate such content as less private than other users. On the other hand, high-DT individuals are also defined by manipulativeness (i.e., Machiavellianism) and intent to harm (i.e., psychopathy), suggesting that high-DT users may be acutely aware of information that can be used against other people. Given the comparatively small body of literature on LT dimensions, more research is needed to understand how LT dimensions correspond to social media attitudes and behaviors in general, including interdependent privacy perceptions and related behaviors.</p><p>We anticipate that DT and LT will support a new understanding of distinct types of interdependent privacy perceptions among social media users. Revisiting Westin s <ref type="bibr">[114]</ref> model of privacy ( &#167; 2.1), Westin expressed an uncertainty of individuals desire for privacy, which he referred to as a privacy paradox. He managed the conflict between individuals need for privacy and privacy-violating behaviors by categorizing individuals as privacy pragmatists, fundamentalists, or unconcerned. Whereas the privacy unconcerned group tends to focus on the benefits of information sharing, and the privacy fundamentalists focus on the drawbacks of information sharing, pragmatists rationally negotiate their privacy within the context of a marketplace <ref type="bibr">[75,</ref><ref type="bibr">115]</ref>. Westin s model has been criticized for identifying consumers as rational in their decision-making, with opposing work highlighting consumers as generally unaware of privacy practices and rules in the marketplace with overly-optimistic and flawed rationale for privacy decisions <ref type="bibr">[109]</ref>. Despite its limitations, Westin s model remains influential in the privacy literature and suggests that social media users are likely to demonstrate diverse interdependent privacy preferences to date, this connection remains untested.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Study Overview</head><p>The current paper focuses on identifying user characteristics that are associated with different interdependent privacy perceptions and behaviors on social media. In Study 1, we assessed 245 regular social media users from the United States on the degree to which they considered real-world photo-based memes as too private to share on social media, with the memes depicting strangers in more-or-less privacy-compromising circumstances. We used a modified thematic approach to categorize and select memes to ensure that the memes depicted a range of potentially sensitive issues. Memes ranged from showing people who were apparently unaware their photo was being taken, illicit drug activity, shaming images of people behaving against social norms, and sensitive documents that were posted on social media (e.g., licenses and passports). Additional memes included images of strangers that do not appear to be derogatory, embarrassing, or sensitive, though it remains an open question as to the extent to which users find it acceptable to share any photos of strangers without permission. Participants also completed questionnaires assessing personality traits, social media usage behaviors, and demographic characteristics. Finally, in a follow-up study (referred to as Study 2 below), additional independent groups of participants rated the perceived entertainment value, shareability, and valence (i.e., how positively or negatively the photo target was portrayed) of the same set of memes presented in Study 1. These participant ratings were averaged such that each meme in the dataset had a single value for perceived entertainment, shareability, and valence. This allowed us to assess how subjective meme features (e.g., their entertainment value) interacted with user characteristics to predict the degree to which a meme was perceived as private. In addition to characterizing normative or average interdependent privacy perceptions, we utilized cluster analysis to identify distinct user types that vary in their perceptions. Thus, we examine key features of social media posts that modulate privacy perceptions, user characteristics associated with interdependent privacy perceptions, and variability in users interdependent privacy perceptions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>H1:</head><p>Because prior research suggests that shareability and privacy saliency can be anticorrelated <ref type="bibr">[3]</ref>, we hypothesized that privacy perceptions and sharing likelihood ratings of photo-based memes would not be strongly related. Furthermore, we expected that an anticorrelation between sharing likelihood and privacy would be lessened when accounting for meme entertainment value and valence.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>H2:</head><p>We hypothesized that high-DT users would report sharing more photos of themselves and other people online, a finding that would be in line with prior work indicating increased self-disclosure and intrusive acts toward others by DT personality types <ref type="bibr">[74,</ref><ref type="bibr">95,</ref><ref type="bibr">96]</ref>.</p><p>H3: Given that DT characteristics are associated with a willingness to exploit and harm others for one s own benefit <ref type="bibr">[51,</ref><ref type="bibr">84]</ref>, we hypothesized that high-DT users would rate photo-based memes as less private than other users.</p><p>H4: Lastly, consistent with Westin s <ref type="bibr">[115]</ref> model of privacy, we hypothesized that three user types would vary in their interdependent privacy perceptions and behaviors. However, the validity of Westin s privacy pragmatist group has been questioned, and we expected there would be a group of high-DT privacy violators instead.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">METHOD</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Stimuli</head><p>The photo-based memes were identified from a large number of memes that depicted people, which were visually scanned and downloaded by multiple researchers from popular social media sites, including Twitter, Reddit, and Pinterest by searching generally for memes in each site. This initial set of memes was narrowed to include only photos that clearly portrayed at least one person and contained a text caption of 50 words or less to provide context understandable to a general audience. The combination of image and text caption reflects photo-based memes commonly circulated on social media, which often contain photos and information about strangers. Given that this study does not focus on prejudice, we excluded memes that involved sexist, racist, or otherwise bigoted themes. We also excluded well-known celebrities to ensure our participants focused on privacy violations of ordinary individuals. In addition, we attempted to include individuals from apparently diverse ages, genders, and racial and ethnic backgrounds in our sample of memes. The memes differed in the type of potential privacy violation they represented, such that each meme represented one of 13 categories (see Table <ref type="table">1</ref>). For example, a meme depicting an inebriated person with a liquor bottle in their hand was included in the drug use category, as this aspect of the meme appeared particularly salient and sensitive to the independent coders. Another meme showed a person s license with an entertaining caption, which was included in the personal information category, due to a license being considered a sensitive personal document. Meme categories were generated using a modified thematic approach, which provides a framework for qualitative analysis of themes within data. After gathering hundreds of photo-based memes that fit the criteria (e.g., portrayal of a person with text caption; no celebrities), two coders engaged in a constant comparative method whereby memes were assigned to categories based on content and then compared with other memes included in the same category. New categories were generated if identified memes needed to be further differentiated or if categories could be combined. This method allowed us to uncover a range of categories representing potentially sensitive information about others contained within photo-based memes. The iterative process and final categories were picked when saturation was reached, and no new themes emerged. The two independent coders compared their coding and agreed to the final framework via consensual validation <ref type="bibr">[2]</ref>. We also referred to resources such as articles from Li and colleagues <ref type="bibr">[66]</ref> and to Mao and colleagues <ref type="bibr">[71]</ref> throughout the process to ensure that our conceptualization of potentially sensitive information aligned with prior work.</p><p>Finally, we narrowed down the number of memes in each category to between three and six exemplar stimuli, with a total of 68 memes. The final number of memes per category was selected for two key reasons: 1) Anticipating that groups of participants would be rating each meme in addition to completing questionnaires, we kept in mind the potential for rating fatigue should too many memes be included. 2) Although some categories (e.g., insulting) had many memes, other categories (e.g., personal information) had fewer memes or the memes were highly similar to one another. We opted to have a similar number of memes per group, thus reducing the size of the stimuli set. The final memes retained for each category were selected based on the degree to which they clearly aligned with the category theme and depicted diverse photo subjects. Table <ref type="table">1</ref> provides detailed information about the categories. For example, some photo subjects appear unaware they were being photographed, let alone made into a meme for social media; we refer to these memes as Candid. One such meme from this category portrayed a man sitting in a subway train with his chest and stomach exposed with the caption, My main goal in life is to be as comfortable as this man is on the subway. The control category consisted of images that do not appear to violate the subject s privacy. Thus, while all memes contained information about strangers, it was assumed that they would vary in the degree to which they would be considered private.</p><p>Table <ref type="table">1</ref>: Types of photo-based memes depicted during the meme rating tasks. Average and standard deviation of privacy ratings from participants in Study 1 are included for each category, where higher ratings indicated the meme was perceived as more private. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Questionnaires</head><p>In Study 1 (coding for perceived privacy of memes) and Study 2 (coding for perceived entertainment, shareability, and valence), participants completed a series of questionnaires collecting data about their demographic background, social media usage, and personality traits. These questionnaires are described in detail below.</p><p>Social Media Usage Questionnaire. The Social Media Usage Questionnaire consists of seven questions targeting participants online photo sharing behaviors. Participants used an eight-point Likert scale to rate the frequency with which they share or re-share photos on social media, including the frequency with which they share or re-share pictures taken by them, their friends, or their family versus the frequency with which they share or re-share pictures that they find on the internet (1=Never; 8=Multiple times in a day). In addition, participants indicated their typical target audience (i.e., friends/connections, general viewers/public, or both), the social media platforms to which they share most often (see &#167; 3.1), and if they share their own photos more or re-share other people s photos more often (including the option I share and re-share equally ).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Social Media Disorder Scale (SMD)</head><p>. This version of the Social Media Disorder Scale consists of nine items pertaining to disordered social media use <ref type="bibr">[23]</ref>. Participants used Likert scales to indicate the frequency with which they experience potentially problematic attitudes and behaviors pertaining to social media (1 = never, 5 = always), such as trying to spend less time on social media but failing or frequently using social media to escape from negative feelings. It should be noted that the original nine-item SMD scale <ref type="bibr">[23]</ref> asked participants to respond to each statement with a yes or no. The scale was altered for the current study to have Likert-like responses to maintain consistency with other measures in the study.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>A Brief Version of the Big Five Personality Inventory (BFI-10). This version of the Big Five Personality</head><p>Inventory is a ten-item scale that describes participants personality across dimensions of extraversion, agreeableness, conscientiousness, neuroticism, and openness. The BFI-10 demonstrated acceptable levels of reliability and validity compared to the full 44-item scale <ref type="bibr">[86]</ref>. Each subscale includes one standard-scored and one reverse-scored item, such as I see myself as someone who is outgoing, sociable (extraversion, standard-scored) and I see myself as someone who is reserved (extraversion, reverse-scored). Participants were asked to rate their extent of agreement with each statement using a five-point Likert scale (1 = Strongly Disagree; 5 = Strongly Agree).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Short Dark Triad Scale (SD3).</head><p>The Short Dark Triad Scale was used to measure participants expression of three closely related dimensions of personality referred to as the dark triad (due to their malevolent nature). The brief version has shown satisfactory levels of reliability and validity compared to longer measures <ref type="bibr">[53]</ref>. Participants were asked to rate via Likert scales their extent of agreement with 27 statements associated with the Machiavellianism, narcissism, and psychopathy personality traits (1 = Strongly Disagree; 5 = Strongly Agree). The Machiavellianism subscale includes statements pertaining to manipulative behaviors, such as I like to use clever manipulation to get my way and You should wait for the right time to get back at people. The narcissism subscale includes statements such as I hate being the center of attention (reverse-scored) and I know that I am special because everyone keeps telling me so.</p><p>Finally, the psychopathy subscale includes statements related to anti-social and emotionally callous behaviors such as I like to get revenge on authorities and payback needs to be quick and nasty.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Light Triad Scale (LTS)</head><p>. This questionnaire consists of twelve items and measures participants LT personality traits (i.e., faith in humanity, humanism, and Kantianism) <ref type="bibr">[57]</ref>. The traits measured by the LTS are in many ways opposite to those measured by the SD3 and reflect the benevolent, authentic, and hopeful aspects of human nature. The faith in humanity subscale includes items such as I tend to see the best in people and I think people are mostly good. The humanism subscale includes items such as I tend to admire others and I tend to treat others as valuable. Finally, the Kantianism subscale consists of items such as I prefer honesty over charm and I don t feel comfortable overtly manipulating people to do something I want. Participants were asked to rate their extent of agreement with each statement in the questionnaire (1 = Strongly Disagree; 5 = Strongly Agree).</p><p>Privacy Preference Question. This measure consisted of a single question: Are you a private person who keeps to yourself, or an open person who enjoys sharing with others? <ref type="bibr">[43]</ref> Participants were asked to answer using a seven-point Likert scale (1=Very Private; 7=Very Open).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">Study 1: Perceived privacy of photo-based memes</head><p>Study 1 participants completed a task assessing their interdependent privacy perceptions, or the extent to which they perceived photo-based memes depicting strangers as private, in addition to completing questionnaires. We elaborate on this method next.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.1">Participants</head><p>Participants were recruited via Amazon s Mechanical Turk online recruitment system. To be eligible for our study, participants had to be living in the United States, fluent in English, between the ages of 18 and 60, and regular social media users (i.e., have an active social media account that they visit at least once per week). To improve the quality of data collection on MTurk, we required that respondents have completed at least 100 tasks on the website with at least 98% success rate prior to signing up for the survey, meaning that participants had a history of providing reliable responses. Several additional steps were then taken to ensure participants completed the survey attentively and honestly. We excluded participants who provided nonsensical responses to open-ended questions (i.e., providing incoherent responses that did not address the question or answers that were copied from the internet), and excluded those who selected the same response item across multiple forms (e.g.., selecting only B to multiple questionnaires). As an added attention check, we also presented two duplicate questions regarding the participant s age and the social media platforms they used, and participants were excluded if they provided contradictory responses to either item (i.e., by reporting their age inconsistently or by indicating they did not use social media in one instance while selecting multiple platforms in the other). Finally, we removed participants who completed the survey in under 10 minutes, which was determined to be unreasonably fast based on pilot data. Two participants were removed due to non-completion, 28 for non-sensical responses, four for providing overly uniform responses, nine for failing the in-survey attention checks, and 16 for unreasonably fast completion times. An additional 11 participants were excluded for violating multiple of the above conditions. Our final sample consisted of 245 respondents after applying our exclusion criteria, with an average age of 34.21 years (SD = 9.40). The majority of participants identified as male (61.63%), while 38.37% identified as female. In terms of racial composition, 53.06% of participants identified as White, 21.22% as Asian, 11.02% as Hispanic/Latinx, 6.53% as biracial or multiracial, 5.71% as Black or African-American, 2.04% as American Indian or Alaska Native, and 0.41% as Other . Most participants held a bachelor s degree (44.90%), followed by 24.49% with a graduate degree, 15.92% with a high school diploma or equivalent, 14.29% having earned an associate degree, and 0.41% having completed some college. Participants had an average of 4.21 social media accounts (SD = 1.69) and reported sharing photos on an average of 2.14 accounts (SD = 1.23). Table <ref type="table">2</ref> provides a summary of social media platforms used by participants. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.2">Procedure</head><p>All study procedures were approved by our Institutional Review Board for the conduct of human subject research. After providing informed consent, participants were asked to complete the Social Media Usage Questionnaire. Next, participants completed the privacy perception task where they provided privacy ratings of the 68 memes described above in random order. Prior to viewing the memes, participants were provided with the following instructions: Next you will view a series of memes modified from real social media posts. As you view the memes, please imagine that you are navigating your own social media account and indicate how likely you would be to share or re-share the meme on social media. They were then presented with each image separately and rated their level of agreement with the following statement: It is too private to share on social media. Responses were recorded using a five-point Likert scale (1 = Strongly Disagree; 5 = Strongly Agree). Some of the memes rated by participants contained content that may be considered offensive, and participants were warned about this content during consent and prior to completing the task so that they had multiple opportunities to opt out. Finally, participants completed the remaining self-report questionnaires ( &#167; 3.2) and provided demographic information.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4">Study 2: Coding of perceived meme entertainment, shareability, and valence</head><p>We conducted Study 2 as a follow-up to our initial data collection to code for the perceived valence, likelihood of sharing on social media, and entertainment value of the 68 images presented during the privacy perception task in Study 1. This allowed us to investigate the relationship between perceived privacy and sharing likelihood, as well as potential moderating factors such as entertainment value and valence. Taken together, Studies 1 and 2 also allowed us to investigate the interplay between meme and user characteristics in determining privacy perceptions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4.1">Participants</head><p>Participants were recruited from Amazon s Mechanical Turk platform using the same eligibility requirements described previously and were randomly assigned to one of three rating conditions (i.e., rating either the sharing likelihood, valence, or entertainment value of each image). After screening for ineligible responses, 29 participants were removed for providing nonsensical response to open-ended questions, two for providing overly uniform responses (i.e., one-lining ), 45 for failing the in-survey attention checks, and 12 for unreasonably fast completion times. An additional 16 were excluded for violating multiple of the above conditions. The final sample included 111 participants in the sharing likelihood condition, 104 in the valence condition, and 145 in the entertainment condition. The average age of participants was 35.37 (SD = 9.60), 35.49 (SD = 9.60), and 37.49 (SD = 9.82) respectively. There were also more male than female participants in each of the three conditions (61.26% vs. 37.84% who rated sharing likelihood, 60.58% vs. 38.46% who rated valence, and 62.76% vs. 35.86% who rated entertainment). In addition, 0.90% of participants in the sharing likelihood condition and 0.69% in the entertainment condition identified as non-binary/third gender, while 0.96% of participants in the valence condition and another 0.69% in the entertainment condition chose not to disclose their gender.</p><p>In terms of racial composition, most participants in the sharing likelihood condition identified as White (72.97%), while 9.01% identified as Asian, 5.41% as Black or African-American, 3.60% as American Indian or Alaska Native, 2.70% as Hispanic/Latinx, and 6.31% as biracial or multiracial. Similarly, participants who completed the valence rating task were also majority White (60.58%), followed by Asian (18.27%), Black or African American (6.73%), American Indian or Alaska Native (6.73%), Hispanic/Latinx (1.92%), and biracial or multiracial (5.77%). Finally, participants who completed the entertainment ratings were mostly White (70.24%), followed by Asian (10.34%), Hispanic/Latinx (6.90%), Black or African-American (4.83%), American Indian or Alaska Native (2.76%), and biracial/multiracial (4.83%). The educational level of participants ranged from graduate degrees to high school diploma or equivalency, with the largest group across all three studies consisting of college graduates with a bachelor s degree (54.95%, 55.77%, and 48.97% in the sharing likelihood, valence, and entertainment value conditions respectively).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4.2">Stimuli and experimental manipulation</head><p>Participants rated the same 68 social media images presented during the privacy perception task in Study 1. These images were presented in random order at the top-center of the participant s screen. In the sharing likelihood condition, participants responded to the question How likely are you to share or reshare this post on social media? on a five-point Likert scale from 1 (Extremely Unlikely) to 5 (Extremely Likely). Likewise, participants in the valence condition rated the valence of each meme ( To what extent does this post portray the person in the photo negatively or positively? ) on a Likert scale from 1 (Very Negatively) to 5 (Very Positively). Finally, participants in the entertainment condition rated the entertainment value of each meme by responding to the question How funny or entertaining do you find this post? on a scale from 1 (Not at all funny/entertaining") to 5 (Very funny/entertaining"). After rating the stimuli, participants provided the same demographics information as collected in Study 1.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">RESULTS</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Preliminaries</head><p>Study 1 participants completed a privacy perception task where they viewed a series of social media memes and rated the degree of private content presented in each. The average privacy rating across memes was 2.90 (SD = .50) out of 5, with higher ratings indicating that the meme was perceived as more private. Study 2 participants who rated the memes on additional characteristics indicated an average entertainment value of 3.18 (SD = .45), sharing likelihood of 2.72 (SD = .38), and valence of 3.06 (SD = .86).</p><p>Because this project focuses on factors influencing interdependent privacy perceptions, the analyses presented hereon refer to participants who rated memes on perceived privacy, unless stated otherwise. Average meme ratings of entertainment, sharing likelihood, and valence obtained from participant groups are included as independent variables in several statistical models below.</p><p>Most participants indicated that they shared online photos multiple times a week (31%), followed by multiple times a month (22%), once a week (14%), multiple times per day (11%), less than once per month (9%), and never (3%). The most frequent target audience for photo sharing was friends (47%), followed by friends and public viewers (40%), and public viewers (11%), while 2% of participants indicated they did not share photos. Finally, the average score on the SMD was 2.32 (SD = 1.13) out of five, with higher scores representing a greater degree of problematic social media behaviors. Scores on the SMD were highly correlated with age (r (243) = -.51, p &lt; .001), socioeconomic status (r (243) = .69, p &lt;.001), and scores on the SD3 (r (243) = .74, p &lt; .001). Given that DT and LT dimensions of the SD3 questionnaire were of primary interest, SMD was excluded from further analysis.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.1">Education, race, and socioeconomic status predict interdependent privacy perceptions</head><p>We used a series of linear regression and mixed-effects models to compare perceived meme privacy to user characteristics including demographics, personality traits, and social media usage behaviors. For the following linear regression models, the privacy ratings of the 68 memes presented during the image rating task were averaged into a single continuous score per participant and included as the dependent variable in each analysis. There is debate over the application of parametric models to Likert scale data; however, our approach is consistent with recent recommendations in the literature <ref type="bibr">[38]</ref>. Finally, a variance inflation factor (VIF) of 4 was included as a cutoff when evaluating fit <ref type="bibr">[1]</ref>.</p><p>As a part of our preliminary analysis, we investigated how user demographics and social media usage contributed to interdependent privacy perceptions. First, we fit a linear regression model with each participant s average privacy rating as the outcome variable and demographic information as predictors (see Table <ref type="table">3</ref>). The reference levels for the race and gender variables were set to the categories with the highest number of observations. We found several significant effects of demographics on privacy perceptions (R 2 = .52, F (11, 233) = 22.45, p &lt; .001). Participants who identified as White rated the memes as less private on average than participants who identified as Asian (&#946; = .46, p &lt; .001) or Hispanic (&#946; = .57, p = .001). Education was also a significant predictor of privacy ratings, and users with an associate (&#946; = .77, p &lt; .001), bachelor (&#946; = .47, p = .001), or graduate degree (&#946; = .63, p &lt; .001) rated the memes as more private on average than participants whose highest degree earned was high school or equivalent. Lastly, socioeconomic status (SES) was positively related to privacy ratings (&#946; = .42, p &lt; .001), such that participants identifying as higher SES also rated memes as relatively private, but the effects of age (p = .09) and gender (p = .77) were not statistically significant. We discuss these relationships further in &#167; 5. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.2">Interdependent privacy perceptions are associated with higher frequency and variety of social media usage</head><p>The last of the preliminary analyses included a linear regression to examine the relationship between interdependent privacy perceptions and self-reported social media usage behaviors. Participants average privacy ratings were included as the outcome variable with total number of social media accounts, photosharing frequency, social media visit frequency, and photo sharing preference (i.e., whether they share their own photos more compared to photos of other people) as predictors (see Table <ref type="table">4</ref>). Participants who reported sharing photos more frequently (&#946; = .36, p &lt; .001) and those who reported sharing their own photos more often than they shared other people s photos (&#946; = .42, p = .001) rated the memes as more private. However, there was a significant negative relationship between social media visit frequency (&#946; = -.35, p &lt; .001) and total number of accounts (&#946; = -.17, p = .004) with privacy ratings. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Relationship between interdependent privacy perception and sharing likelihood is moderated by meme entertainment value</head><p>To investigate how user perceptions of privacy were related to other subjective qualities of the memes, we averaged participants ratings by meme so that each meme in the dataset (n = 68) had an aggregated value for privacy, valence, entertainment value, and sharing likelihood, as rated by independent participant groups. We then fit a linear regression model with average privacy rating as the outcome variable and average valence, entertainment value, and sharing likelihood as predictors (see Table <ref type="table">5</ref>). We also included a three-way interaction term to assess how the affective qualities of the meme (i.e., entertainment value and valence) interacted with users willingness to share the meme on social media. We found a significant negative relationship between sharing likelihood and privacy (&#946; = -.58, p &lt; .001), indicating that memes perceived as more private were rated by social media users as less shareable. However, this relationship was moderated by entertainment value (&#946; = .29, p = .01), such that the relationship between sharing likelihood and privacy was significantly diminished when the memes were perceived as entertaining (see Figure <ref type="figure">1</ref>). Taken together, entertainment value, sharing likelihood, and valence explained 51% of the variance in average privacy ratings (F (7, 60) = 8.94, p &lt; .001), constituting a medium to large effect size <ref type="bibr">[27]</ref>. Figure <ref type="figure">1</ref>: Interaction effect of meme shareability and entertainment value on average privacy ratings. Sharing likelihood is higher when memes are rated as less private, assuming the meme has low entertainment value (red line). However, when the meme is highly entertaining (blue line), the relationship between sharing likelihood and privacy ratings is eliminated.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3">Big five, DT, and LT personality traits are associated with heightened interdependent privacy perceptions</head><p>In order to examine the relationship between personality traits and privacy perceptions, we entered participants average privacy ratings into a linear regression model as the outcome variable with subscales from the BFI-10, LTS, and SD3 as predictors, along with self-reported personal privacy preference (see Table <ref type="table">6</ref>). We found that the agreeableness (&#946; = -.14, p = .04) and openness (&#946; = -.19, p &lt; .001) subscales of the BFI-10 were negatively related to privacy ratings, while the conscientiousness, extraversion, and neuroticism subscales were not significantly related (ps &gt; .05). In addition, we found that faith in humanity (&#946; = .31, p &lt; .001) and psychopathy (&#946; = .31, p &lt; .001) personality traits of the LT and DT scales were associated with heightened interdependent privacy ratings. Overall, individual differences in personality traits provided a strong prediction of interdependent privacy perceptions, explaining 56% of the variance (R 2 = .56, F (12, 232) = 24.73, p &lt; .001).</p><p>The finding that both faith in humanity and psychopathy were positively related to privacy perceptions was somewhat surprising considering that the DT and LT were developed to measure opposing personality traits (i.e., maladaptive versus adaptive traits) <ref type="bibr">[57]</ref>. However, a follow-up exploratory correlation analysis revealed that overall DT scores did not significantly correlate with LT scores, r (243) = -.09, p = .166. In fact, Kantianism was the only LT trait negatively correlated with the DT, r (243) = -.38, p &lt; .001, while narcissism was positively correlated with both faith in humanity, r (243) = .25, p &lt; .001, and humanism, r (243) = .23, p &lt; .001. Thus, we found evidence that DT and LT personality traits do not represent mutually opposing characteristics, aligning with previous LT research <ref type="bibr">[69]</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.4">Psychopathic personality is associated with increased privacy ratings and photo sharing of strangers</head><p>Given that the psychopathy subscale of the DT is associated with impulsivity and a lack of empathy <ref type="bibr">[18,</ref><ref type="bibr">52,</ref><ref type="bibr">70]</ref>, the positive relationship between psychopathy and interdependent privacy ratings was contrary to our hypothesis that DT users would rate photo-based memes as less private than others. Based on the DT findings in the previous model, we developed a hypothesis that narcissism and psychopathy taken together would provide additional insights into the paradoxical finding that high-DT users exhibited heightened interdependent privacy perceptions. Specifically, because previous research indicates that narcissism is associated with the maintenance of positive self-image on social media <ref type="bibr">[29,</ref><ref type="bibr">74,</ref><ref type="bibr">95]</ref>, we hypothesized that users high in psychopathy and narcissism would be motivated to express a type of moral superiority by reporting memes as private despite sharing such content online themselves. Thus, we repeated the previous model with an additional term to describe the interaction between narcissism and psychopathy. We found that narcissism moderated the effect between psychopathy and privacy perception (&#946; = .12, p = .03), such that the relationship between psychopathy and privacy ratings was significantly diminished when participants scored low on narcissism (see Figure <ref type="figure">2</ref>). Next, following the finding that high-DT users rated memes as more private, we sought to confirm our hypothesis that high-DT users would report sharing more photos of themselves and other people online a finding that would be in line with prior work indicating increased self-disclosure and selfie sharing by DT personality types <ref type="bibr">[74,</ref><ref type="bibr">95,</ref><ref type="bibr">96]</ref>. We regressed the frequency of two types of photo sharing (i.e., photo sharing of friends or family versus photo sharing of strangers) on the three DT subscales. We also included total photo sharing frequency as a covariate in these models to control for differences in overall sharing behaviors. We found that psychopathy positively predicted photo sharing of strangers (&#946; = .16, p = .008), whereas narcissism positively predicted photo sharing of friends, family, or self (&#946; = .17, p &lt; .001). We found no other significant relationships between DT traits and photo sharing frequency, p &gt; .05.</p><p>Finally, the finding that high-DT users rated memes as private and shared photos of other people frequently appeared to contradict our first model, which showed a strong negative correlation between meme privacy and shareability ratings. We sought to untangle this relationship further by conducting a follow-up mixed-effects model to examine how DT scores interacted with each meme s shareability and entertainment value. We included users individual privacy ratings of the 68 social media memes as the outcome, total SD3 score as the predictor to reflect overall DT characteristics, and participant ID as the random intercept (see Table <ref type="table">7</ref>). We also included terms describing the interactions between users overall DT characteristics and each meme s average entertainment value and sharing likelihood. As suspected, we found a significant three-way interaction between scores on the SD3, entertainment value, and sharing likelihood (&#946; = -.43, p &lt; .001). There was a noticeable dissociation between sharing likelihood and privacy ratings when memes were rated by high-DT users (see Figure <ref type="figure">3</ref>), and this interaction was further moderated by the entertainment value of the meme. Although this does not include a direct measurement of intentional privacy violations, the disconnect between privacy ratings and shareability suggest that users high in DT personality traits shared memes despite understanding the sensitivity of their content, and this effect was particularly strong for highly entertaining memes. In other words, high-DT users were more likely to disregard interdependent privacy when memes were entertaining.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.5">Interdependent privacy perceptions vary among distinct user types</head><p>In addition to examining user characteristics associated with interdependent privacy perceptions, a second primary objective of the study was to identify clusters of users with distinct interdependent privacy attitudes and behaviors. We used k-prototypes clustering <ref type="bibr">[45,</ref><ref type="bibr">106]</ref> to partition users based on the variables that were identified above as relevant to interdependent privacy, including education, SES, social media usage, personality traits, and privacy preference, with lower scores representing a stronger preference for privacy. The k-prototypes algorithm was developed as an extension to k-means to allow for the use of mixed-type data <ref type="bibr">[45]</ref>. Based on a silhouette approach <ref type="bibr">[56]</ref>, the optimal number of clusters was determined to be three, and the algorithm was configured with 25 random initializations.</p><p>Examining descriptive statistics to characterize the traits of users in each cluster (see Table <ref type="table">8</ref>), we found that cluster 3 participants were the youngest (M = 29.63, SD = 8.08), reported the highest SES (M = 7.89, SD = .89), and were the most frequent sharers of photos containing friends and family (M = 4.51, SD = 1.57) as well as photos of strangers (M = 4.22, SD = 1.86). Cluster 3 participants also reported the highest average Machiavellianism (M = 3.86, SD = .65), narcissism (M = 3.38, SD = .49), and psychopathy (M = 3.26, SD = .66) personality traits. Considering cluster 3 participants had both the highest average privacy ratings (M = 3.66, SD = .72) and DT personality scores, this partitioning was consistent with the previously reported positive relationship between DT personality and privacy perceptions. Taken together, we theorized that this group of users was composed of privacy violators. In other words, these participants demonstrated an awareness of interdependent privacy, frequently shared photos of other people despite having that awareness and had personality traits consistent with impulsivity and a lack of empathy.</p><p>Similarly, we characterized cluster 2 participants as privacy ignorers. Although these users frequently shared photos on social media (M = 4.72, SD = 1.30), they rated the memes as less private (M = 2.43, SD = .59) than those in cluster 3. We suspected that cluster 2 was composed of participants who shared images of other people but had an overall lack of awareness of interdependent privacy. Finally, participants in cluster 1 were considered privacy preservers as they were relatively infrequent image sharers (M = 2.09, SD = 1.24) and reported a strong preference for maintaining personal privacy (M = 3.02, SD = 1.46). Cluster 1 users appeared to be older (M = 37.05, SD = 10.00), scored low on DT personality traits, and perceived memes as less private than those in cluster 3. Table <ref type="table">8</ref>: Average privacy ratings, demographics features, social media usage, and personality traits per cluster. Bolded items were included in the k-prototype algorithm when identifying clusters. Un-bolded items are included for additional description of the user clusters. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">DISCUSSION</head><p>Social media has given rise to large-scale interdependent privacy issues, but little is known about how individual differences in user characteristics contribute to sharing decisions. In order to effectively influence users, interventions promoting privacy preservation require greater precision in targeting users based on their underlying motivations and privacy preferences. The objective of the present study was to identify key user characteristics associated with interdependent privacy perceptions, including user demographics, personality dimensions, and social media activity. We also examined how additional perceptions of the photo-based memes entertainment value, shareability, and valence covaried with privacy perceptions. In doing so, we identified strong predictors of interdependent privacy perceptions and established three primary user types who differ in their interdependent privacy preferences.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1">Linkages between interdependent privacy perceptions and sharing on social media</head><p>An important question in the interdependent privacy literature concerns how privacy perceptions relate to sharing decisions, as well as how this relationship is moderated by social motivations for sharing decisions, including: 1) entertainment value (i.e., potential for entertaining social media connections); and 2) valence (i.e., potential for damaging the photo subject s reputation). A series of studies by Amon and colleagues <ref type="bibr">[3]</ref> demonstrated that, in general, negatively valenced photo-based memes were shared less by users, but prompts reminding users to consider the meme subject s privacy consistently backfired to increase the sharing of other people s photos. Because the latter finding suggests that shareability and privacy saliency can be anticorrelated, we hypothesized that privacy perceptions and sharing likelihood ratings of photo-based memes would not be strongly related.</p><p>Inconsistent with this hypothesis, we found that memes perceived as more private were also rated as less shareable, suggesting participants generally believed it would be inappropriate to share private content of other people. However, this relationship depended significantly on the perceived entertainment value of the meme, such that there was a marked dissociation between privacy perceptions and sharing likelihood when the meme was highly entertaining. This finding suggests that users balance the benefits of sharing socially desirable memes against the costs of violating user privacy. When memes are highly entertaining, users seem to suppress their privacy concerns, possibly because the motivation to share has overtaken the concern for privacy. Conversely, when entertainment value is low, there is little motivation to share memes that could be received poorly by other users due to their sensitive content.</p><p>Memes are generally shared with the intention of being entertaining, and our findings are consistent with literature reporting that humor is related to the willingness to share private photos on social media <ref type="bibr">[40]</ref>. Furthermore, while we focus on entertainment and valence due to the nature of viral memes, research on multiparty privacy suggests there are several additional image characteristics relevant to sharing decisions. Specifically, when investigating privacy concerns regarding co-owned images (i.e., group photos), perceived image privacy appears to depend on the number of people in the photo <ref type="bibr">[43]</ref>, the intended audience <ref type="bibr">[105,</ref><ref type="bibr">118]</ref>, and the sensitivity of disclosed information <ref type="bibr">[66]</ref>. Together, our findings lend further support to the privacy calculus model <ref type="bibr">[65]</ref> by demonstrating how users weigh out the pros and cons of sharing an image to their social media profile, sometimes to the detriment of interdependent privacy.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2">Contribution of Dark Triad personality traits to interdependent privacy literature</head><p>When analyzing the relationship between dark triad personality and privacy preferences, we found mixed support for our hypotheses. The results of our linear regression models and cluster analysis support our initial prediction that high-DT users would report more frequently sharing photos of themselves and strangers. However, we also uncovered a somewhat counterintuitive finding that those high in psychopathy rated photo-based memes as more private than other users. That is, it might be assumed that those with an interest in privacy preservation (i.e., those who share less than others online and are low in DT) would perceive potentially sensitive photo-based memes of strangers as relatively private. However, our finding that psychopathy is positively related to privacy ratings conflicts with this assumption, especially because psychopathy was tied to self-reports of higher photo sharing online of strangers. Thus, our results did not support our third hypothesis predicting reduced privacy perceptions by high-DT users.</p><p>There are three primary explanations for the finding that high-DT users rate photo-based memes as more private than others. First, given that high-DT users are more likely to engage in trolling, cyberbullying, and other intrusive acts toward others (esp. psychopathic users; see &#167; 2.2) <ref type="bibr">[5,</ref><ref type="bibr">32,</ref><ref type="bibr">34,</ref><ref type="bibr">94]</ref>, high-DT users may be particularly motivated to attune to others privacy as they actively seek to manipulate others. Second, high-DT users may also have more experience in posting and viewing potentially sensitive content than other users, providing them with opportunities to learn what people consider private. In addition to sharing more photos of close connections and strangers, high-DT users report problematically high social media usage <ref type="bibr">[16,</ref><ref type="bibr">19,</ref><ref type="bibr">58]</ref>, meaning that these users may be exceptionally familiar with viewing people s reactions to private material online. Third, it is possible that participants with dark triad personality rated the memes as too private to share to present a positive image of their attitudes even though those attitudes were not reflected by their actual social media behaviors. That is, high-DT users have been shown to carefully curate their online presence in an effort to present a more positive image of themselves and are motivated by a need for self-enhancement (esp. narcissistic users) <ref type="bibr">[12,</ref><ref type="bibr">29,</ref><ref type="bibr">74,</ref><ref type="bibr">76,</ref><ref type="bibr">92,</ref><ref type="bibr">95]</ref>. The definition of self-enhancement as an unrealistically positive self-view <ref type="bibr">[22]</ref> is consistent with high-DT users attempting to express a type of moral superiority by identifying memes as private while also reporting they often share such content online.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.3">Dark Triad subdimensions associated with interdependent privacy perceptions</head><p>Our findings that high-DT users shared more memes and rated them as more private than others appeared to contradict our first model that highlighted a strong negative relationship between privacy perceptions and shareability ratings. Thus, we conducted follow-up analyses examining the relationships between narcissism, psychopathy, and photo sharing frequency. We show that narcissism significantly interacts with psychopathy to predict privacy perceptions, such that privacy ratings of memes were highest when rated by individuals with both narcissism and psychopathy personality traits. However, the relationship between privacy ratings and psychopathy was diminished when participants reported low trait narcissism. This supports the idea that users with a psychopathic personality, driven by co-occurring narcissism, rate memes as private to present an inflated representation of their beliefs. Furthermore, we show that the underlying behaviors of users with psychopathy personality are in direct conflict with their inflated privacy ratings. Not only do users high in psychopathy more frequently share photos of strangers, but high-DT users are more likely to disregard privacy in favor of entertainment. The follow-up analyses clarify the relationship between dark triad personality and privacy perceptions, indicating that DT personality types may intentionally violate interdependent privacy despite their acute understanding of privacy norms. Finally, we also show that narcissism is uniquely associated with increased sharing of photos containing family, friends, or self, confirming previous literature linking narcissism to increased self-disclosure behaviors <ref type="bibr">[29,</ref><ref type="bibr">74,</ref><ref type="bibr">95,</ref><ref type="bibr">96</ref>]. There appears to be a complex relationship between personality and sharing behaviors, and our analyses highlight how attention seeking and antisocial personality traits interact and contribute to maladapted interdependent privacy attitudes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.4">Light Triad and Big Five dimensions associated with interdependent privacy perceptions</head><p>In addition to exploring the contributions of maladaptive DT personality traits, we also investigated the influence of adaptive LT personality traits, finding that faith in humanity was associated with heightened interdependent privacy perceptions. Higher scores on the faith in humanity subscale represent a general belief in the goodness of other people, and LT personality is more broadly related to compassion and empathy <ref type="bibr">[57]</ref>. Limited research has linked LT personality to prosocial online behaviors <ref type="bibr">[72]</ref>, but our work is the first to investigate the relationship between LT personality and online privacy behaviors. Given the linkage between LT personality and empathy <ref type="bibr">[57]</ref>, perhaps individuals who have high regard for others also have a greater empathic concern for their interdependent privacy.</p><p>In terms of the Big Five personality dimensions, higher levels of user agreeableness and openness predicted reduced privacy perceptions. These traits are associated with increased trust <ref type="bibr">[25,</ref><ref type="bibr">33]</ref> and openmindedness <ref type="bibr">[35]</ref>, which may, in turn, make people less cautious and more trusting of other users, including in the context of social media sharing. Junglas and colleagues <ref type="bibr">[54]</ref> support this hypothesis by showing reduced concern for personal privacy in individuals who are agreeable and open; however, research on the topic is inconsistent <ref type="bibr">[81,</ref><ref type="bibr">101]</ref>. In this case, higher agreeableness and open-mindedness may encourage users to view the frequency of photo-based memes on social media with acceptance, versus questioning the status quo. Notably, our findings do not intersect with literature linking low agreeableness, high extraversion, and high neuroticism to cyberbullying <ref type="bibr">[5,</ref><ref type="bibr">17,</ref><ref type="bibr">28,</ref><ref type="bibr">31]</ref>. Our findings support the notion that photo-based memes are shared primarily for reasons of entertainment, which may not be the motivation behind cyberbullying. For this reason, the user characteristics that drive cyberbullying versus sharing of photo-based memes may differ to some degree.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.5">Interdependent privacy user categories</head><p>Leveraging key insights from our regression models, we entered variables significantly associated with interdependent privacy perceptions into a cluster analysis, which yielded three distinct interdependent privacy user categories (IPUC) that we label as privacy preservers , privacy ignorers , and privacy violators (see Figure <ref type="figure">4</ref>). Privacy preservers included those who refrained from sharing photos on social media regardless of their privacy perceptions. Individuals belonging to this user type reported the lowest frequency of photo sharing across all photo types (friends, family, or strangers) and the strongest preference for maintaining personal privacy. Their infrequent photo sharing and strong preference for privacy suggests that they are acting to preserve privacy (their own and that of others) by limiting information disclosure. On the other hand, privacy ignorers included those who shared photos at a high rate but did not perceive photo-based memes depicting strangers as too private for social media. These users tended to be older, low-DT personalities with lower levels of education and SES. Given their high rate of photo sharing and reduced privacy perceptions, these users may be unaware of interdependent privacy when making sharing decisions, perhaps due to a lack of privacy literacy. This was in direct contrast to privacy violators, who both reported sharing photos of strangers frequently and acknowledged that photos depicting strangers were too private to share. These "privacy violators may have been strongly motivated by their DT personality traits, as these users scored highest across all three DT subscales. This user type was also the youngest with noticeably higher levels of SES, education, and photosharing frequency. Considering the relationships between personality and photo sharing discussed above, we suspect that these users have a large amount of experience with photo sharing and that they are knowingly violating interdependent privacy in favor of sharing entertaining memes.</p><p>Our IPUC model overlaps to some degree with Westin s [115] characterization of consumers as privacy fundamentalists, privacy unconcerned, and privacy pragmatists. The overlap is notable given that Westin s model centers on consumer preferences for one s own privacy, whereas our model focuses on attitudes and behaviors towards other people s privacy on social media. Westin s privacy fundamentalists and the present category privacy preservers appear to recognize privacy risks and err on the side of caution by sharing less information. Both Westin s privacy unconcerned and our privacy ignorers emphasize the benefits of sharing over the risks. The models deviate when it comes to comparing Westin s privacy pragmatists to our privacy violators. Westin identifies privacy pragmatists as those who make informed and rational decisions as they negotiate their privacy within the marketplace. Similarly, our privacy violators are informed in reporting a relatively high degree of interdependent privacy awareness and consider the entertainment value of content when making privacy decisions weighing the pros and cons of sharing to make privacy decisions. However, our model highlights user motivations behind potentially harmful behaviors toward others. In the case of privacy violators, they cannot be characterized as especially rational. In fact, their recognition of negative sharing consequences (i.e., harm toward others) is inconsistent with their sharing behaviors.</p><p>Overall, the IPUC model findings of three distinct user types that vary in interdependent privacy attitudes and behaviors suggests the need for more targeted intervention strategies. That is, our model suggests that interdependent privacy literacy or educational strategies are unlikely to be effective in reducing breaches from privacy violators, or those who are high in dark triad characteristics and regularly share others information despite exhibiting heightened awareness of others privacy. Instead, privacy violators may be more influenced by disincentives, for example, where their ability to interact with others is limited based on their participating in harmful activities. On the other hand, privacy literacy interventions may be especially valuable for users in the privacy ignorer category who appear to share others information without exhibiting awareness of the potential for interdependent privacy violations.</p><p>Figure <ref type="figure">4</ref>: Key characteristics of interdependent privacy user categories detected using cluster analysis.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.6">Demographic differences in interdependent privacy perceptions</head><p>In addition to uncovering several significant linkages between user personality and interdependent privacy perceptions, we examined individual differences pertaining to demographic background. When examining participant demographics, we found that higher levels of education and SES were associated with increased privacy ratings. However, despite widely reported generational differences in social media behaviors <ref type="bibr">[9,</ref><ref type="bibr">50,</ref><ref type="bibr">77]</ref>, user age was not significantly related to interdependent privacy perceptions.</p><p>Examining the effect as one of marginal statistical significance (p = .09) <ref type="foot">1</ref> , higher age was associated with lower privacy ratings. Taken together, associations between education, SES, and interdependent privacy beliefs may be understood in the context of digital literacy <ref type="bibr">[24]</ref>. Although the exact definition of digital literacy varies, it generally describes the knowledge and skills needed for effective online communication <ref type="bibr">[64]</ref>. Previous research reports the existence of a digital divide with significant demographic disparities in digital literacy and online skills <ref type="bibr">[20,</ref><ref type="bibr">21,</ref><ref type="bibr">24,</ref><ref type="bibr">37,</ref><ref type="bibr">91]</ref>, which are necessary for effective maintenance of personal privacy <ref type="bibr">[24,</ref><ref type="bibr">36,</ref><ref type="bibr">82]</ref>. Our findings indicate that disparities in personal privacy and digital literacy may extend to interdependent privacy behaviors as well, where people with greater educational access and presumably exposure to social media at earlier ages indicate higher awareness of interdependent privacy. Furthermore, our results align with earlier research on interdependent privacy reporting that user demographics were strong predictors of privacy preferences <ref type="bibr">[15]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.7">Interdependent privacy as a function of social media usage</head><p>Finally, we examined social media usage and photo sharing behaviors, showing that social media usage is a key predictor of privacy perceptions. For example, we found that users who frequently visit social media perceive memes as less private, while users who share a greater number of photos perceive them as more private. We suspect that user perceptions of privacy correspond to the user s level of experience with different types of online activities. That is, users who more frequently visit social media may have diminished privacy perceptions because of their continual exposure to photos and information about others. Comparatively, users that share more photos themselves gain experience evaluating the appropriateness of the images they share, perhaps leading to an increased awareness of interdependent privacy issues. This conclusion is supported by a recent five-year analysis of privacy perceptions on Facebook which concluded that users who were more active on Facebook perceived the internet as less of a privacy threat <ref type="bibr">[108]</ref>. In addition to contributing to privacy perceptions, there is also evidence that user preferences regarding privacy interventions is associated with sharing frequency, with more frequent sharers preferring methods that do not interfere with ease of sharing <ref type="bibr">[15]</ref>. While there are some studies examining the relationship between social media usage and privacy preferences <ref type="bibr">[47]</ref>, more research is needed to determine how privacy attitudes evolve over time corresponding to user experience.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.8">Design implications</head><p>The current research identifies user characteristics relevant to interdependent privacy evaluations, with the aim of informing interventions that are sensitive to individual differences in privacy perceptions. Identifying user types with distinct privacy perceptions and social media behaviors is an important first step in developing targeted intervention strategies. Next, we discuss how these findings can be used to inform the design of interdependent privacy interventions.</p><p>Our findings suggest that certain user types might benefit from privacy literacy, or education about interdependent privacy on social media more than others. This is supported by several observations: The average privacy perception of participants in the current study was relatively low considering that our stimuli contained several images of social security cards, sexual information, and photos depicting children negatively (i.e., a vulnerable population). Next, our cluster analysis identified a group of users (i.e., privacy ignorers ) who frequently share images of strangers but do not appear to evaluate photo-based memes of strangers in compromising situations as too private to share. Third, we observed demographic differences in interdependent privacy perceptions that were consistent with a digital divide in privacy literacy <ref type="bibr">[91]</ref>. Thus, interventions that focus on educating users about interdependent privacy and photo sharing are likely important for supporting interdependent privacy preservation on social media. These approaches may also help reduce disparities in privacy literacy by increasing access to educational resources for users who are less familiar with various privacy issues.</p><p>In addition, identifying user characteristics that influence sharing behaviors can help with the design of targeted nudge-based interventions. Privacy nudges, or reminders aimed at discouraging privacy violations <ref type="bibr">[49]</ref>, are put forth as a method of limiting self-disclosures on social media, but evidence supporting their effectiveness for interdependent privacy issues has been mixed <ref type="bibr">[3,</ref><ref type="bibr">7,</ref><ref type="bibr">49,</ref><ref type="bibr">110,</ref><ref type="bibr">123]</ref>. One explanation as to why some researchers have failed to influence sharing behaviors via nudging is that their effectiveness depends on user characteristics and framing <ref type="bibr">[49]</ref>. Earlier work reports large increases in nudging effectiveness when messages were tailored to fit user demographics <ref type="bibr">[59]</ref> and decision making styles <ref type="bibr">[85]</ref>. As such, we identified a group of users with notably elevated sensitivity towards potential privacy issues and frequent disclosures on social media. Nudges may not be as effective if providing redundant information or targeting strong personal preferences <ref type="bibr">[110,</ref><ref type="bibr">119]</ref>. Thus, we suspect these users could be less receptive to nudging depending on their familiarity or experience level. An alternative for dissuading users with high privacy literacy could involve the use of concrete incentives and disincentives, such as the warning system proposed by Cherubini et al. <ref type="bibr">[15]</ref> which notifies the users of the consequences for sharing inappropriate private content during the upload process. Finally, while numerous other methods for limiting interdependent privacy have been proposed in the MPP literature, such as negotiation tools <ref type="bibr">[13,</ref><ref type="bibr">102,</ref><ref type="bibr">103]</ref>, voting mechanisms <ref type="bibr">[44]</ref>, and automatic notification systems <ref type="bibr">[121]</ref>, these collaborative approaches are not as applicable to viral memes. Technical approaches that automatically hide private information in photos by blurring or obfuscation <ref type="bibr">[48]</ref> may be a more appropriate solution to privacy concerns related to widely re-shared content. Consistent with previous reports <ref type="bibr">[117]</ref>, our findings suggest perceived privacy risks can be a barrier to sharing on social media, particularly when the content has limited entertainment value. Thus, research on obfuscation attempting to limit the impact of image alteration on user satisfaction, e.g., <ref type="bibr">[39,</ref><ref type="bibr">41,</ref><ref type="bibr">67]</ref>, is well positioned to minimize privacy concerns while maximizing social connectedness.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">LIMITATIONS AND FUTURE DIRECTIONS</head><p>Although we used real-world memes collected from social media, a limitation of the study was that we relied on self-report data to assess how often users shared memes and other types of photos on their own social media accounts. It is possible that participants mischaracterized or misremembered their own social media behaviors; thus, an important next step is to analyze how real social media activity corresponds to self-reported personality and user traits. Further, it would be helpful to compare self-reported privacy perceptions to real-world sharing behaviors related to privacy preservation. Relatedly, we are specific in analyzing privacy perceptions of memes, however, users participate in many types of interdependent privacy violations. For example, users often re-share private posts of other users in more public context, i.e., re-posting someone s private Facebook post to a public page on Reddit. Memes can also be formatted in a variety of ways themselves, including as photos with captions, drawings, or videos. The memes we analyzed represented a specific class of privacy violation involving the re-sharing of a stranger s personal information for entertainment purposes, but more research is needed to understand how our findings on interdependent privacy perceptions translate to different content.</p><p>In addition, because we do not collect data from social media, we do not consider how user sharing behavior varies by social media platform. Certain platforms, like Reddit or Twitter, are more anonymous than those requiring stricter verification, and the behavior of anonymous users likely differs from that displayed by Facebook users who are connected to friends and family. It is also possible that the threshold for what is considered too private to share differs by website depending on community preferences or website guidelines. Follow-up studies may want to consider how the privacy attitudes reported are platform specific. Similarly, our research was restricted to active social media users, but future research may expand to consider how privacy and sharing preferences vary between active social media users and those who opt out of online posting. Our research is also limited in relying on responses collected from Amazon Mechanical Turk, where these respondents may differ from the general population. However, research by Redmiles and colleagues <ref type="bibr">[89]</ref> supports the notion security and privacy research carried out on Amazon Mechanical Turk yields sufficient generalizability.</p><p>Finally, we should note clustering was used to identify the distinct user privacy types presented in the IPUC model as we believed this approach would be more objective than qualitative descriptions alone. Cluster analysis with k-prototyping is a relatively simple approach that is susceptible to biases in the data, and it may be difficult to replicate the exact clusters we found in different samples or populations. Despite, these inherent limitations, the results of our analysis are consistent with the literature on dark triad personality types, Westin s conceptualizations <ref type="bibr">[115]</ref>, and our other statistical results. Thus, we believe the IPUC model provides a helpful framework for future researchers investigating the relationship between user characteristics and privacy preferences, particularly when investigating personality or privacy literacy.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">CONCLUSIONS</head><p>This project expands on previous interdependent privacy literature in the following ways: First, we focus on privacy perceptions and sharing standards for real-world photo-based memes that included potentially compromising photos of people to understand user characteristics (esp. personality) associated with the spread of other people s information on social media. In particular, users high in dark triad characteristics rated photo-based memes as more private and were also more likely to share information about other people. Second, we identify key motivating factors for sharing potentially sensitive photos of strangers on social media. The likelihood of sharing an image-based meme was influenced by the degree to which that meme was perceived as private; however, this relationship depended on the entertainment value of the image. Third, in addition to establishing normative or average user characteristics, we are the first to identify distinct user types that vary in their interdependent privacy perceptions and behaviors, including privacy preservers, ignorers, and violators. Lastly, we uncover findings with significant implications for interventions aimed to decrease interdependent privacy violations on social media. Our results that identify distinct user types that vary in interdependent privacy preferences suggest the need for targeted intervention strategies, versus a one-size-fits-all approach.</p></div><note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_0"><p>ACM Trans. Comput.-Hum. Interact.</p></note>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_1"><p>We opt to acknowledge marginal effects in our results. This is consistent with arguments that p-values and effect sizes should be interpreted as a continuous variable, where interpretations of confidence in rejecting the null hypothesis should lie along a continuum[4].ACM Trans. Comput.-Hum. Interact.</p></note>
		</body>
		</text>
</TEI>
