Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

DIPA2: An Image Dataset with Cross-cultural Privacy Perception Annotations

Published: 12 January 2024 Publication History

Abstract

The world today is increasingly visual. Many of the most popular online social networking services are largely powered by images, making image privacy protection a critical research topic in the fields of ubiquitous computing, usable security, and human-computer interaction (HCI). One topical issue is understanding privacy-threatening content in images that are shared online. This dataset article introduces DIPA2, an open-sourced image dataset that offers object-level annotations with high-level reasoning properties to show perceptions of privacy among different cultures. DIPA2 provides 5,897 annotations describing perceived privacy risks of 3,347 objects in 1,304 images. The annotations contain the type of the object and four additional privacy metrics: 1) information type indicating what kind of information may leak if the image containing the object is shared, 2) a 7-point Likert item estimating the perceived severity of privacy leakages, and 3) intended recipient scopes when annotators assume they are either image owners or allowing others to repost the image. Our dataset contains unique data from two cultures: We recruited annotators from both Japan and the U.K. to demonstrate the impact of culture on object-level privacy perceptions. In this paper, we first illustrate how we designed and performed the construction of DIPA2, along with data analysis of the collected annotations. Second, we provide two machine-learning baselines to demonstrate how DIPA2 challenges the current image privacy recognition task. DIPA2 facilitates various types of research on image privacy, including machine learning methods inferring privacy threats in complex scenarios, quantitative analysis of cultural influences on privacy preferences, understanding of image sharing behaviors, and promotion of cyber hygiene for general user populations.

Supplementary Material

xu (xu.zip)
Supplemental movie, appendix, image and software files for, DIPA2: An Image Dataset with Cross-cultural Privacy Perception Annotations

References

[1]
Mark S Ackerman, Lorrie Faith Cranor, and Joseph Reagle. 1999. Privacy in e-commerce: examining user scenarios and privacy preferences. In Proceedings of the 1st ACM Conference on Electronic Commerce. 1--8.
[2]
Paarijaat Aditya, Rijurekha Sen, Peter Druschel, Seong Joon Oh, Rodrigo Benenson, Mario Fritz, Bernt Schiele, Bobby Bhattacharjee, and Tong Tong Wu. 2016. I-pic: A platform for privacy-compliant image capture. In Proceedings of the 14th annual international conference on mobile systems, applications, and services (MobiSys '16). 235--248.
[3]
Shane Ahern, Dean Eckles, Nathaniel S Good, Simon King, Mor Naaman, and Rahul Nair. 2007. Over-exposed? Privacy patterns and considerations in online and mobile photo sharing. In Proceedings of the SIGCHI conference on Human factors in computing systems. 357--366.
[4]
Tousif Ahmed, Apu Kapadia, Venkatesh Potluri, and Manohar Swaminathan. 2018. Up to a limit? privacy concerns of bystanders and their willingness to share additional information with visually impaired users of assistive technologies. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 3 (2018), 1--27.
[5]
Taslima Akter, Tousif Ahmed, Apu Kapadia, and Manohar Swaminathan. 2022. Shared privacy concerns of the visually impaired and sighted bystanders with camera-based assistive technologies. ACM Transactions on Accessible Computing (TACCESS) 15, 2 (2022), 1--33.
[6]
Mahdi Nasrullah Al-Ameen, Tanjina Tamanna, Swapnil Nandy, MA Manazir Ahsan, Priyank Chandra, and Syed Ishtiaque Ahmed. 2020. We don't give a second thought before providing our information: understanding users' perceptions of information collection by apps in Urban Bangladesh. In Proceedings of the 3rd ACM SIGCAS Conference on Computing and Sustainable Societies. 32--43.
[7]
Rawan Alharbi, Mariam Tolba, Lucia C Petito, Josiah Hester, and Nabil Alshurafa. 2019. To mask or not to mask? balancing privacy with visual confirmation utility in activity-oriented wearable cameras. Proceedings of the ACM on interactive, mobile, wearable and ubiquitous technologies (IMWUT '19) 3, 3 (2019), 1--29.
[8]
Mary Jean Amon, Rakibul Hasan, Kurt Hugenberg, Bennett I Bertenthal, and Apu Kapadia. 2020. Influencing photo sharing decisions on social media: A case of paradoxical findings. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 1350--1366.
[9]
Mary Jean Amon, Aaron Necaise, Nika Kartvelishvili, Aneka Williams, Yan Solihin, and Apu Kapadia. 2023. Modeling User Characteristics Associated with Interdependent Privacy Perceptions on Social Media. ACM Transactions on Computer-Human Interaction (2023).
[10]
Gonul Ayci, Pınar Yolum, Arzucan Özgür, and Murat Şensoy. 2023. Explain to Me: Towards Understanding Privacy Decisions. arXiv preprint arXiv:2301.02079 (2023).
[11]
Kim Bartel Sheehan. 1999. An investigation of gender differences in on-line privacy concerns and resultant behaviors. Journal of interactive marketing 13, 4 (1999), 24--38.
[12]
Steven Bellman, Eric J Johnson, Stephen J Kobrin, and Gerald L Lohse. 2004. International differences in information privacy concerns: A global survey of consumers. The Information Society 20, 5 (2004), 313--324.
[13]
Dmitri Bitouk, Neeraj Kumar, Samreen Dhillon, Peter Belhumeur, and Shree K Nayar. 2008. Face swapping: automatically replacing faces in photographs. In ACM SIGGRAPH 2008 papers. 1--8.
[14]
Laura Brandimarte, Alessandro Acquisti, and George Loewenstein. 2013. Misplaced confidences: Privacy and the control paradox. Social psychological and personality science 4, 3 (2013), 340--347.
[15]
Kieran Browne, Ben Swift, and Terhi Nurmikko-Fuller. 2020. Camera adversaria. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI '20). 1--9.
[16]
Sen-ching Cheung, M. Vijay Venkatesh, Jithendra K Paruchuri, Jian Zhao, and Thinh Nguyen. 2009. Protecting and managing privacy information in video surveillance systems. In Protecting Privacy in Video Surveillance. Springer, 11--33.
[17]
Hichang Cho, Milagros Rivera-Sánchez, and Sun Sun Lim. 2009. A multinational study on online privacy: global concerns and local responses. New media & society 11, 3 (2009), 395--416.
[18]
Kovila PL Coopamootoo. 2020. Usage patterns of privacy-enhancing technologies. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. 1371--1390.
[19]
CrowdWorks. 2022. https://crowdworks.jp. Accessed: 2023-5-15.
[20]
Ali Dehghantanha and Katrin Franke. 2014. Privacy-respecting digital investigation. In 2014 Twelfth Annual International Conference on Privacy, Security and Trust. IEEE, 129--138.
[21]
Mariella Dimiccoli, Juan Marín, and Edison Thomaz. 2018. Mitigating bystander privacy concerns in egocentric activity recognition with deep learning and intentional image degradation. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT '18) 1, 4 (2018), 1--18.
[22]
Agrim Gupta, Piotr Dollar, and Ross Girshick. 2019. Lvis: A dataset for large vocabulary instance segmentation. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 5356--5364.
[23]
Danna Gurari, Qing Li, Chi Lin, Yinan Zhao, Anhong Guo, Abigale Stangl, and Jeffrey P Bigham. 2019. Vizwiz-priv: A dataset for recognizing the presence and purpose of private visual information in images taken by blind people. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 939--948.
[24]
Rakibul Hasan, Bennett I Bertenthal, Kurt Hugenberg, and Apu Kapadia. 2021. Your photo is so funny that i don't mind violating your privacy by sharing it: effects of individual humor styles on online photo-sharing behaviors. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1--14.
[25]
Jianping He, Bin Liu, Deguang Kong, Xuan Bao, Na Wang, Hongxia Jin, and George Kesidis. 2016. Puppies: Transformation-supported personalized privacy preserving partial image sharing. In 46th annual IEEE/IFIP international conference on dependable systems and networks (DSN '16). IEEE, 359--370.
[26]
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition. 770--778.
[27]
Mariea Grubbs Hoy and George Milne. 2010. Gender differences in privacy-related measures for young adult Facebook users. Journal of interactive advertising 10, 2 (2010), 28--45.
[28]
Roberto Hoyle, Luke Stark, Qatrunnada Ismail, David Crandall, Apu Kapadia, and Denise Anthony. 2020. Privacy norms and preferences for photos posted online. ACM Transactions on Computer-Human Interaction (TOCHI) 27, 4 (2020), 1--27.
[29]
Daniel Scot Hunt and Eric Langstedt. 2014. The influence of personality factors and motives on photographic communication. The Journal of Social Media in Society 3, 2 (2014).
[30]
Daniel S Hunt, Carolyn A Lin, and David J Atkin. 2014. Communicating social relationships via the use of photo-messaging. Journal of Broadcasting & Electronic Media 58, 2(2014), 234--252.
[31]
Mohammed Khwaja, Sumer S Vaid, Sara Zannone, Gabriella M Harari, A Aldo Faisal, and Aleksandar Matic. 2019. Modeling personality vs. modeling personalidad: In-the-wild mobile data analysis in five countries suggests cultural impact on personality models. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 3 (2019), 1--24.
[32]
Mohammed Korayem, Robert Templeman, Dennis Chen, David Crandall, and Apu Kapadia. 2016. Enhancing lifelogging privacy by detecting screens. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). 4309--4314.
[33]
Abhishek Kumar, Tristan Braud, Young D Kwon, and Pan Hui. 2020. Aquilis: Using contextual integrity for privacy protection on mobile devices. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4, 4 (2020), 1--28.
[34]
Alina Kuznetsova, Hassan Rom, Neil Alldrin, Jasper Uijlings, Ivan Krasin, Jordi Pont-Tuset, Shahab Kamali, Stefan Popov, Matteo Malloci, Alexander Kolesnikov, et al. 2020. The open images dataset v4. International Journal of Computer Vision 128, 7 (2020), 1956--1981.
[35]
Caroline Lang and Hannah Barton. 2015. Just untag it: Exploring the management of undesirable Facebook photos. Computers in Human Behavior 43 (2015), 147--155.
[36]
Fenghua Li, Zhe Sun, Ang Li, Ben Niu, Hui Li, and Guohong Cao. 2019. Hideme: Privacy-preserving photo sharing on social networks. In IEEE Conference on Computer Communications (IEEE INFOCOM '19). IEEE, 154--162.
[37]
Yifang Li and Kelly Caine. 2022. Obfuscation Remedies Harms Arising from Content Flagging of Photos. In CHI Conference on Human Factors in Computing Systems. 1--25.
[38]
Yao Li and Xinning Gui. 2022. Examining co-owners' privacy consideration in collaborative photo sharing. Computer Supported Cooperative Work (CSCW) 31, 1 (2022), 79--109.
[39]
Yifang Li, Nishant Vishwamitra, Hongxin Hu, and Kelly Caine. 2020. Towards a taxonomy of content sensitivity and sharing preferences for photos. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI '20). 1--14.
[40]
Chi Liu, Tianqing Zhu, Jun Zhang, and Wanlei Zhou. 2022. Privacy intelligence: A survey on image privacy in online social networks. Comput. Surveys 55, 8 (2022), 1--35.
[41]
Paul Benjamin Lowry, Jinwei Cao, and Andrea Everard. 2011. Privacy concerns versus desire for interpersonal awareness in driving the use of self-disclosure technologies: The case of instant messaging in two cultures. Journal of Management Information Systems 27, 4 (2011), 163--200.
[42]
Karola Marky, Alexandra Voit, Alina Stöver, Kai Kunze, Svenja Schröder, and Max Mühlhäuser. 2020. "I don't know how to protect myself": Understanding Privacy Perceptions Resulting from the Presence of Bystanders in Smart Environments. In Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society. 1--11.
[43]
Bryan A Marshall, Peter W Cardon, Daniel T Norris, Natalya Goreva, and Ryan D'Souza. 2008. Social networking websites in India and the United States: A cross-national comparison of online privacy and communication. Issues in Information Systems 9, 2 (2008), 87--94.
[44]
Kelly Moore and James C McElroy. 2012. The influence of personality on Facebook usage, wall postings, and regret. Computers in human behavior 28, 1 (2012), 267--274.
[45]
John A Naslund, Ameya Bondre, John Torous, and Kelly A Aschbrenner. 2020. Social media and mental health: benefits, risks, and opportunities for research and practice. Journal of technology in behavioral science 5 (2020), 245--257.
[46]
Alex Nichol, Prafulla Dhariwal, Aditya Ramesh, Pranav Shyam, Pamela Mishkin, Bob McGrew, Ilya Sutskever, and Mark Chen. 2021. Glide: Towards photorealistic image generation and editing with text-guided diffusion models. arXiv preprint arXiv:2112.10741 (2021).
[47]
Austin Lee Nichols and Jon K Maner. 2008. The good-subject effect: Investigating participant demand characteristics. The Journal of general psychology 135, 2 (2008), 151--166.
[48]
Peter Nielsen. 2019. Japanese pop singer was nearly killed because of her selfies. https://twiftnews.com/lifestyle/japanese-pop-singer-was-nearly-killed-because-of-her-selfies/. Accessed: 2023-5-15.
[49]
Joseph O'Hagan, Pejman Saeghe, Jan Gugenheimer, Daniel Medeiros, Karola Marky, Mohamed Khamis, and Mark McGill. 2023. Privacy-Enhancing Technology and Everyday Augmented Reality: Understanding Bystanders' Varying Needs for Awareness and Consent. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, 4 (2023), 1--35.
[50]
Kieron O'Hara. 2016. The seven veils of privacy. IEEE Internet Computing 20, 2 (2016), 86--91.
[51]
Judith S Olson, Jonathan Grudin, and Eric Horvitz. 2005. A study of preferences for sharing and privacy. In CHI'05 extended abstracts on Human factors in computing systems. 1985--1988.
[52]
OpenAI. 2023. GPT-4 Technical Report. ArXiv abs/2303.08774 (2023).
[53]
Tribhuvanesh Orekondy, Mario Fritz, and Bernt Schiele. 2018. Connecting pixels to privacy and utility: Automatic redaction of private information in images. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 8466--8475.
[54]
Tribhuvanesh Orekondy, Bernt Schiele, and Mario Fritz. 2017. Towards a visual privacy advisor: Understanding and predicting privacy risks in images. In Proceedings of the IEEE international conference on computer vision. 3686--3695.
[55]
Sangkeun Park, Joohyun Kim, Rabeb Mizouni, and Uichin Lee. 2016. Motives and concerns of dashcam video sharing. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. 4758--4769.
[56]
Blaine A Price, Avelie Stuart, Gul Calikli, Ciaran Mccormick, Vikram Mehta, Luke Hutton, Arosha K Bandara, Mark Levine, and Bashar Nuseibeh. 2017. Logging you, logging me: A replicable study of privacy and sharing behaviour in groups of visual lifeloggers. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, 2 (2017), 1--18.
[57]
Prolific. 2022. https://www.prolific.co/. Accessed: 2023-5-15.
[58]
Moo-Ryong Ra, Seungjoon Lee, Emiliano Miluzzo, and Eric Zavesky. 2017. Do not capture: Automated obscurity for pervasive imaging. IEEE Internet Computing 21, 3 (2017), 82--87.
[59]
Beatrice Rammstedt and Oliver P John. 2007. Measuring personality in one minute or less: A 10-item short version of the Big Five Inventory in English and German. Journal of research in Personality 41, 1 (2007), 203--212.
[60]
Champika Ranasinghe, Jakub Krukar, and Christian Kray. 2018. Visualizing location uncertainty on mobile devices: cross-cultural differences in perceptions and preferences. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 1 (2018), 1--22.
[61]
Philip J Reed, Emma S Spiro, and Carter T Butts. 2016. Thumbs up for privacy?: Differences in online self-disclosure behavior across national cultures. Social science research 59 (2016), 155--170.
[62]
Mukesh Saini, Pradeep K Atrey, Sharad Mehrotra, and Mohan Kankanhalli. 2014. W3-privacy: understanding what, when, and where inference channels in multi-camera surveillance video. Multimedia Tools and Applications 68, 1 (2014), 135--158.
[63]
Tanusree Sharma, Abigale Stangl, Lotus Zhang, Yu-Yun Tseng, Inan Xu, Leah Findlater, Danna Gurari, and Yang Wang. 2023. Disability-First Design and Creation of A Dataset Showing Private Visual Information Collected With People Who Are Blind. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems. 1--15.
[64]
Jiayu Shu, Rui Zheng, and Pan Hui. 2018. Cardea: Context-aware visual privacy protection for photo taking and sharing. In Proceedings of the 9th ACM Multimedia Systems Conference. 304--315.
[65]
Eleftherios Spyromitros-Xioufis, Symeon Papadopoulos, Adrian Popescu, and Yiannis Kompatsiaris. 2016. Personalized privacy-aware image classification. In Proceedings of the 2016 ACM on international conference on multimedia retrieval. 71--78.
[66]
Abigale Stangl, Kristina Shiroma, Nathan Davis, Bo Xie, Kenneth R Fleischmann, Leah Findlater, and Danna Gurari. 2022. Privacy concerns for visual assistance technologies. ACM Transactions on Accessible Computing (TACCESS) 15, 2 (2022), 1--43.
[67]
Julian Steil, Marion Koelle, Wilko Heuten, Susanne Boll, and Andreas Bulling. 2019. Privaceye: privacy-preserving head-mounted eye tracking using egocentric scene image and eye movement features. In Proceedings of the 11th ACM symposium on eye tracking research & applications. 1--10.
[68]
Jose M Such, Joel Porter, Sören Preibusch, and Adam Joinson. 2017. Photo privacy conflicts in social media: A large-scale empirical study. In Proceedings of the 2017 CHI conference on human factors in computing systems. 3821--3832.
[69]
Kimberly Tee, AJ Bernheim Brush, and Kori M Inkpen. 2009. Exploring communication and sharing between extended families. International Journal of Human-Computer Studies 67, 2 (2009), 128--138.
[70]
Mike Thelwall and Farida Vis. 2017. Gender and image sharing on Facebook, Twitter, Instagram, Snapchat and WhatsApp in the UK: Hobbying alone or filtering for friends? Aslib Journal of Information Management 69, 6 (2017), 702--720.
[71]
Robert Thomson, Masaki Yuki, and Naoya Ito. 2015. A socio-ecological approach to national differences in online privacy concern: The role of relational mobility and trust. Computers in Human Behavior 51 (2015), 285--292.
[72]
Sigal Tifferet. 2019. Gender differences in privacy tendencies on social network sites: A meta-analysis. Computers in Human Behavior 93 (2019), 1--12.
[73]
Lam Tran, Deguang Kong, Hongxia Jin, and Ji Liu. 2016. Privacy-cnh: A framework to detect photo privacy with convolutional neural network using hierarchical features. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 30.
[74]
Ho Keung Tsoi and Li Chen. 2011. From privacy concern to uses of social network sites: A cultural comparison via user survey. In 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing. IEEE, 457--464.
[75]
Robyn Vanherle, Hanneke Hendriks, and Kathleen Beullens. 2023. Only for friends, definitely not for parents: Adolescents' sharing of alcohol references on social media features. Mass Communication and Society 26, 1 (2023), 47--73.
[76]
Nishant Vishwamitra, Yifang Li, Hongxin Hu, Kelly Caine, Long Cheng, Ziming Zhao, and Gail-Joon Ahn. 2022. Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks. In Proceedings of the Twelveth ACM Conference on Data and Application Security and Privacy. 65--76.
[77]
Zhuo Wei, Yongdong Wu, Yanjiang Yang, Zheng Yan, Qingqi Pei, Yajuan Xie, and Jian Weng. 2018. AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo. Computers & Security 76 (2018), 341--353.
[78]
Zhenyu Wu, Haotao Wang, Zhaowen Wang, Hailin Jin, and Zhangyang Wang. 2020. Privacy-preserving deep action recognition: An adversarial learning framework and a new dataset. IEEE Transactions on Pattern Analysis and Machine Intelligence 44, 4 (2020), 2126--2139.
[79]
Anran Xu, Zhongyi Zhou, Kakeru Miyazaki, Ryo Yoshikawa, Simo Hosio, and Koji Yatani. 2023. DIPA: An Image Dataset with Cross-cultural Privacy Concern Annotations. In Companion Proceedings of the 28th International Conference on Intelligent User Interfaces. 259--266.
[80]
Kaihe Xu, Yuanxiong Guo, Linke Guo, Yuguang Fang, and Xiaolin Li. 2015. My privacy my decision: Control of photo sharing on online social networks. IEEE Transactions on Dependable and Secure Computing 14, 2 (2015), 199--210.
[81]
Jun Yu, Zhenzhong Kuang, Baopeng Zhang, Wei Zhang, Dan Lin, and Jianping Fan. 2018. Leveraging content sensitiveness and user trustworthiness to recommend fine-grained privacy settings for social image sharing. IEEE transactions on information forensics and security (IEEE TIFS '18) 13, 5 (2018), 1317--1332.
[82]
Jinao Yu, Hanyu Xue, Bo Liu, Yu Wang, Shibing Zhu, and Ming Ding. 2020. Gan-based differential private image privacy protection framework for the internet of multimedia things. Sensors 21, 1 (2020), 58.
[83]
Sergej Zerr, Stefan Siersdorfer, Jonathon Hare, and Elena Demidova. 2012. Privacy-aware image classification and search. In Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrieval. 35--44.
[84]
Lan Zhang, Kebin Liu, Xiang-Yang Li, Cihang Liu, Xuan Ding, and Yunhao Liu. 2016. Privacy-friendly photo capturing and sharing system. In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '16). 524--534.
[85]
Chenye Zhao, Jasmine Mangat, Sujay Koujalgi, Anna Squicciarini, and Cornelia Caragea. 2022. PrivacyAlert: a dataset for image privacy prediction. In Proceedings of the International AAAI Conference on Web and Social Media, Vol. 16. 1352--1361.

Index Terms

  1. DIPA2: An Image Dataset with Cross-cultural Privacy Perception Annotations

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
      Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 7, Issue 4
      December 2023
      1613 pages
      EISSN:2474-9567
      DOI:10.1145/3640795
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 12 January 2024
      Published in IMWUT Volume 7, Issue 4

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Dataset
      2. cross-cultural study
      3. image privacy
      4. usable security

      Qualifiers

      • Research-article
      • Research
      • Refereed

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 219
        Total Downloads
      • Downloads (Last 12 months)219
      • Downloads (Last 6 weeks)38
      Reflects downloads up to 18 Aug 2024

      Other Metrics

      Citations

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media