“…Part of the contribution made by this article is the collection of relevant literature, which otherwise stands in isolated clusters and refers to a similar phenomenon using different concepts, such as: joint controllership, and privacy infringements (Helberger and van Hoboken, 2010;van Alsenoy, 2015;Edwards et al, 2019) or infringements of data protection law and networked services (Mahieu et al, 2019); collective privacy (Squicciarini et al, 2009) and collective action problems in privacy law (Strahilevitz, 2010); multi-party privacy (Thomas et al, 2010); collateral damage and spillover (Hull et al, 2011;Symeonidis et al, 2016); interpersonal management of disclosure (Lampinen et al, 2011); networked privacy (boyd, 2011;Lampinen, 2015;Marwick and boyd, 2014); interdependent privacy (Biczók and Chia, 2013;Symeonidis et al, 2016;Pu and Grossklags, 2017;Kamleitner and Mitchell, 2019); peer privacy (Chen et al, 2015;Ozdemir et al, 2017); multiple subjects personal data (Gnesi et al, 2014); privacy leak factor, shadow profiles and online privacy as a collective phenomenon (Sarigol et al, 2014); privacy externalities (Laudon, 1996, pp. 14-6;MacCarthy, 2011;Humbert et al, 2015Humbert et al, , 2020Symeonidis et al, 2016;Choi et al, 2019), especially as compared to externalities in the context of environmental pollution (Hirsch, 2006(Hirsch, , 2014Hirsch and King, 2016;Froomkin, 2015;Nehf, 2003;Ben-Shahar, 2019); 1 genetic groups…”