Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2207676.2207728acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Tag, you can see it!: using tags for access control in photo sharing

Published: 05 May 2012 Publication History
  • Get Citation Alerts
  • Abstract

    Users often have rich and complex photo-sharing preferences, but properly configuring access control can be difficult and time-consuming. In an 18-participant laboratory study, we explore whether the keywords and captions with which users tag their photos can be used to help users more intuitively create and maintain access-control policies. We find that (a) tags created for organizational purposes can be repurposed to create efficient and reasonably accurate access-control rules; (b) users tagging with access control in mind develop coherent strategies that lead to significantly more accurate rules than those associated with organizational tags alone; and (c) participants can understand and actively engage with the concept of tag-based access control.

    References

    [1]
    Ahern, S., Eckles, D., Good, N. S., King, S., Naaman, M., and Nair, R. Over-exposed?: privacy patterns and considerations in online and mobile photo sharing. In Proc. CHI, 2007 (2007), 357--366.
    [2]
    Ames, M., and Naaman, M. Why we tag: motivations for annotation in mobile and online media. In Proc. CHI (2007), 971--980.
    [3]
    Au Yeung, C., Kagal, L., Gibbins, N., and Shadbolt, N. Providing access control to online photo albums based on tags and linked data. In Social Semantic Web (2009).
    [4]
    Besmer, A., and Richter Lipford, H. Moving beyond untagging: photo privacy in a tagged world. In Proc. CHI (2010), 1563--1572.
    [5]
    Gupta, M., Li, R., Yin, Z., and Han, J. Survey on social tagging techniques. SIGKDD Explor. Newsl. 12 (November 2010), 58--72.
    [6]
    Hart, M., Castille, C., Johnson, R., and Stent, A. Usable privacy controls for blogs. In Proc. ICCSE (2009), 401--408.
    [7]
    Kirk, D., Sellen, A., Rother, C., and Wood, K. Understanding photowork. In Proc. CHI (2006), 761--770.
    [8]
    Maxion, R. A., and Reeder, R. W. Improving user-interface dependability through mitigation of human error. Int. J. Hum.-Comput. Stud. 63 (July 2005), 25--50.
    [9]
    Mazurek, M. L., Arsenault, J. P., Bresee, J., Gupta, N., Ion, I., Johns, C., Lee, D., Liang, Y., Olsen, J., Salmon, B., Shay, R., Vaniea, K., Bauer, L., Cranor, L. F., Ganger, G. R., and Reiter, M. K. Access control for home data sharing: Attitudes, needs and practices. In Proc. CHI, 2010 (2010), 645--654.
    [10]
    Mazurek, M. L., Klemperer, P. F., Shay, R., Takabi, H., Bauer, L., and Cranor, L. F. Exploring reactive access control. In Proc. CHI (2011), 2085--2094.
    [11]
    Miller, A. D., and Edwards, W. K. Give and take: a study of consumer photo-sharing culture and practice. In Proc. CHI (2007), 347--356.
    [12]
    Mitchell, T. Machine Learning. McGraw-Hill, 1997.
    [13]
    Nov, O., Naaman, M., and Ye, C. What drives content tagging: the case of photos on Flickr. In Proc. CHI (2008), 1097--1100.
    [14]
    Olson, J. S., Grudin, J., and Horvitz, E. A study of preferences for sharing and privacy. CHI EA (2005), 1985--1988.
    [15]
    Ramasubramanian, V., Rodeheffer, T. L., Terry, D. B., Walraed-Sullivan, M., Wobber, T., Marshall, C. C., and Vahdat, A. Cimbiosys: a platform for content-based partial replication. In Proc. NSDI (2009), 261--276.
    [16]
    Razavi, M. N., and Iverson, L. A grounded theory of information sharing behavior in a personal learning space. In Proc. CSCW (2006), 459--468.
    [17]
    Reeder, R., Bauer, L., Cranor, L., Reiter, M., Bacon, K., How, K., and Strong, H. Expandable grids for visualizing and authoring computer security policies. In Proc. CHI (2008), 1473--1482.
    [18]
    Riva, O., Yin, Q., Juric, D., Ucan, E., and Roscoe, T. Policy expressivity in the anzere personal cloud. In Proc. SOCC (2011), 14:1--14:14.
    [19]
    Salmon, B., Schlosser, S. W., Cranor, L. F., and Ganger, G. R. Perspective: semantic data management for the home. In Proc. FAST (2009), 167--182.
    [20]
    Seltzer, M., and Murphy, N. Hierarchical file systems are dead. In Proc. HotOS (2009), 1--1.
    [21]
    Sigurbjörnsson, B., and van Zwol, R. Flickr tag recommendation based on collective knowledge. In Proc. WWW (2008), 327--336.
    [22]
    Smetters, D. K., and Good, N. How users use access control. In Proc. SOUPS (2009), 15:1--15:12.
    [23]
    Squicciarini, A. C., Sundareswaran, S., Lin, D., and Wede, J. A3p: adaptive policy prediction for shared images over popular content sharing sites. In Proc. Hypertext and Hypermedia (2011), 261--270.
    [24]
    Voida, S., Edwards, W. K., Newman, M. W., Grinter, R. E., and Ducheneaut, N. Share and share alike: exploring the user interface affordances of file sharing. In Proc. CHI (2006), 221--230.
    [25]
    Vyas, N., Squicciarini, A. C., Chang, C.-C., and Yao, D. Towards automatic privacy management in Web 2.0 with semantic analysis on annotations. In Proc. CollaboateCom (2009), 1--10.
    [26]
    Zubiaga, A., Körner, C., and Strohmaier, M. Tags vs shelves: from social tagging to social classification. In Proc. Hypertext and Hypermedia (2011), 93--102.

    Cited By

    View all
    • (2024)Securing synthetic faces: A GAN-blockchain approach to privacy-enhanced facial recognitionJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2024.10203636:4(102036)Online publication date: Apr-2024
    • (2024)Overview of Usable Privacy Research: Major Themes and Research DirectionsThe Curious Case of Usable Privacy10.1007/978-3-031-54158-2_3(43-102)Online publication date: 20-Mar-2024
    • (2023)Go-Sharing: A Blockchain-Based Privacy-Preserving Framework for Cross-Social Network Photo SharingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.320893420:5(3572-3587)Online publication date: 1-Sep-2023
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI '12: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
    May 2012
    3276 pages
    ISBN:9781450310154
    DOI:10.1145/2207676
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 05 May 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. access control
    2. human factors
    3. privacy
    4. tagging

    Qualifiers

    • Research-article

    Conference

    CHI '12
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)20
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 27 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Securing synthetic faces: A GAN-blockchain approach to privacy-enhanced facial recognitionJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2024.10203636:4(102036)Online publication date: Apr-2024
    • (2024)Overview of Usable Privacy Research: Major Themes and Research DirectionsThe Curious Case of Usable Privacy10.1007/978-3-031-54158-2_3(43-102)Online publication date: 20-Mar-2024
    • (2023)Go-Sharing: A Blockchain-Based Privacy-Preserving Framework for Cross-Social Network Photo SharingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.320893420:5(3572-3587)Online publication date: 1-Sep-2023
    • (2023)Minimum Noticeable Difference-Based Adversarial Privacy Preserving Image GenerationIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2022.321001033:3(1069-1081)Online publication date: Mar-2023
    • (2023)Characterizing Everyday Misuse of Smart Home Devices2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179476(2835-2849)Online publication date: May-2023
    • (2022)Privacy Intelligence: A Survey on Image Privacy in Online Social NetworksACM Computing Surveys10.1145/354729955:8(1-35)Online publication date: 23-Dec-2022
    • (2022)A Review of Privacy Decision-making Mechanisms in Online Social NetworksACM Computing Surveys10.1145/349406755:2(1-32)Online publication date: 18-Jan-2022
    • (2022)Obfuscation Remedies Harms Arising from Content Flagging of PhotosProceedings of the 2022 CHI Conference on Human Factors in Computing Systems10.1145/3491102.3517520(1-25)Online publication date: 29-Apr-2022
    • (2022)A blockchain-based Privacy-Preserving Framework for Cross-Social Network Photo SharingIEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)10.1109/INFOCOMWKSHPS54753.2022.9798330(1-6)Online publication date: 2-May-2022
    • (2022)A Recommendation System Based on Big Data: Separation of Preference and SimilarityIntelligent Systems and Applications10.1007/978-3-031-16078-3_26(390-398)Online publication date: 1-Sep-2022
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media