Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3313831.3376498acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Towards A Taxonomy of Content Sensitivity and Sharing Preferences for Photos

Published: 23 April 2020 Publication History

Abstract

Determining which photos are sensitive is difficult. Although emerging computer vision systems can label content items, previous attempts to distinguish private or sensitive content fall short. There is no human-centered taxonomy that describes what content is sensitive or how sharing preferences for content differs across recipients. To fill this gap, we introduce a new sensitive content elicitation method which surmounts limitations of previous approaches, and, using this new method, collected sensitive content from 116 participants. We also recorded participants' sharing preferences with 20 recipient groups. Next, we conducted a card sort to surface user-defined categories of sensitive content. Using data from these studies, we generated a taxonomy that identifies 28 categories of sensitive content. We also establish how sharing preferences for content differs across groups of recipients. This taxonomy can serve as a framework for understanding photo privacy, which can, in turn, inform new photo privacy protection mechanisms.

Supplementary Material

ZIP File (pn5610aux.zip)
This Auxiliary material zip file contains the survey questions and the full dendrogram.
SBV File (paper371pvc.sbv)
Preview video captions
MP4 File (paper371pv.mp4)
Preview video
MP4 File (a371-li-presentation.mp4)

References

[1]
James D Abbey and Margaret G Meloy. 2017. Attention by design: Using attention checks to detect inattentive respondents and improve data quality. Journal of Operations Management 53 (2017), 63--70.
[2]
Patricia Sanchez Abril. 2007. A (My) space of one's own: on privacy and online social networks. Nw. J. Tech. & Intell. Prop. 6 (2007), 73.
[3]
Anne Adams, Sally Jo Cunningham, and Masood Masoodian. 2007. Sharing, privacy and trust issues for photo collections. (2007).
[4]
Shane Ahern, Dean Eckles, Nathaniel S Good, Simon King, Mor Naaman, and Rahul Nair. 2007. Over-exposed?: privacy patterns and considerations in online and mobile photo sharing. In Proceedings of the SIGCHI conference on Human factors in computing systems. ACM.
[5]
Rawan Alharbi, Mariam Tolba, Lucia C Petito, Josiah Hester, and Nabil Alshurafa. 2019. To Mask or Not to Mask?: Balancing Privacy with Visual Confirmation Utility in Activity-Oriented Wearable Cameras. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 3 (2019), 72.
[6]
David S Allison and Miriam AM Capretz. 2011. Furthering the growth of cloud computing by providing privacy as a service. In International Conference on Information and Communication on Technology. Springer, 64--78.
[7]
Tuomas Aura, Thomas A Kuhn, and Michael Roe. 2006. Scanning electronic documents for personally identifiable information. In Proceedings of the 5th ACM workshop on Privacy in electronic society. ACM.
[8]
Kathy Baxter, Catherine Courage, and Kelly Caine. 2015. Understanding your users: A practical guide to user research methods. Morgan Kaufmann.
[9]
Sebastian Benthall, Seda Gürses, Helen Nissenbaum, Cornell Tech, and NYU Steinhardt MCC. 2017. Contextual integrity through the lens of computer science. Now Publishers.
[10]
Andrew Besmer and Heather Richter Lipford. 2010. Moving beyond untagging: photo privacy in a tagged world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1563--1572.
[11]
Leyla Bilge, Thorsten Strufe, Davide Balzarotti, and Engin Kirda. 2009. All your contacts are belong to us: automated identity theft attacks on social networks. In Proceedings of the 18th international conference on World wide web. ACM, 551--560.
[12]
Jens Binder, Andrew Howes, and Alistair Sutcliffe. 2009. The problem of conflicting social spheres: effects of network structure on experienced tension in social network sites. In Proceedings of the SIGCHI conference on human factors in computing systems. ACM, 965--974.
[13]
Jens F Binder, Andrew Howes, and Daniel Smart. 2012. Harmony and tension on social network sites: Side-effects of increasing online interconnectivity. Information, Communication & Society 15, 9 (2012), 1279--1297.
[14]
Petter Bae Brandtzæg, Marika Lüders, and Jan Håvard Skjetne. 2010. Too many Facebook "friends"? Content sharing and sociability versus the need for privacy in social network sites. Intl. Journal of Human--Computer Interaction 26, 11--12 (2010), 1006--1030.
[15]
Michael Buhrmester, Tracy Kwang, and Samuel D Gosling. 2011. Amazon's Mechanical Turk: A new source of inexpensive, yet high-quality, data? Perspectives on psychological science 6, 1 (2011), 3--5.
[16]
Daniel Buschek, Moritz Bader, Emanuel von Zezschwitz, and Alexander De Luca. 2015. Automatic privacy classification of personal photos. In Human-Computer Interaction. Springer, 428--435.
[17]
Kelly Caine. 2008. Linking studies of privacy in HCI to psychological theories of privacy. (2008).
[18]
Kelly Erinn Caine. 2009. Exploring everyday privacy behaviors and misclosures. Ph.D. Dissertation. Georgia Institute of Technology.
[19]
Krista Casler, Lydia Bickel, and Elizabeth Hackett. 2013. Separate but equal? A comparison of participants and data gathered via Amazon's MTurk, social media, and face-to-face behavioral testing. Computers in Human Behavior 29, 6 (2013), 2156--2160.
[20]
Eun Kyoung Choe, Jaeyeon Jung, Bongshin Lee, and Kristie Fisher. 2013. Nudging people away from privacy-invasive mobile apps through visual framing. In IFIP Conference on Human-Computer Interaction. Springer, 74--91.
[21]
Edward J Clarke, Mar Preston, Jo Raksin, and Vern L Bengtson. 1999. Types of conflicts and tensions between older parents and adult children. The Gerontologist 39, 3 (1999), 261--270.
[22]
Sunny Consolvo, Ian E Smith, Tara Matthews, Anthony LaMarca, Jason Tabert, and Pauline Powledge. 2005. Location disclosure to social relations: why, when, & what people want to share. In Proceedings of the SIGCHI conference on Human factors in computing systems. ACM.
[23]
Eric C Cook and Stephanie D Teasley. 2011. Beyond promotion and protection: creators, audiences and common ground in user-generated media. In Proceedings of the 2011 iConference. ACM, 41--47.
[24]
Patricia C de Souza and Cristiano Maciel. 2015. Legal Issues and User Experience in Ubiquitous Systems from a Privacy Perspective. In International Conference on Human Aspects of Information Security, Privacy, and Trust. Springer, 449--460.
[25]
Marcie D Dorethy, Martin S Fiebert, and Christopher R Warren. 2014. Examining social networking site behaviors: Photo sharing and impression management on Facebook. International Review of Social Sciences and Humanities 6, 2 (2014), 111--116.
[26]
Malin Eiband, Mohamed Khamis, Emanuel Von Zezschwitz, Heinrich Hussmann, and Florian Alt. 2017. Understanding shoulder surfing in the wild: Stories from users and observers. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 4254--4265.
[27]
Facebook. 2017. How do I edit the privacy settings for my photo albums? (2017). Retrieved January 2, 2018 from https://www.facebook.com/help/215496745135618? helpref=about_content.
[28]
Simone Fischer-Hubner, Chris Hoofnagle, Ioannis Krontiris, Kai Rannenberg, and Michael Waidner. 2011. Online Privacy: Towards Informational Self-Determination on the Internet. (2011).
[29]
Liqiang Geng, Larry Korba, Xin Wang, Yunli Wang, Hongyu Liu, and Yonghua You. 2008. Using data mining methods to predict personally identifiable information in emails. In International Conference on Advanced Data Mining and Applications. Springer, 272--281.
[30]
Eric Gilbert and Karrie Karahalios. 2009. Predicting tie strength with social media. In Proceedings of the SIGCHI conference on human factors in computing systems. ACM, 211--220.
[31]
Google Street View. 2018. Image Acceptance and Privacy Policies. (2018). Retrieved May 7, 2018 from https://www.google.com/streetview/privacy/.
[32]
Steven Greenhouse and Michael Barbaro. 2005. Wal-Mart Memo Suggests Ways to Cut Employee Benefit Costs. (2005). Retrieved September 8, 2018 from https://www.nytimes.com/2005/10/26/business/ walmart-memo-suggests-ways-to-cut-employee -benefit-costs.html.
[33]
Rakibul Hasan, Eman Hassan, Yifang Li, Kelly Caine, David J Crandall, Roberto Hoyle, and Apu Kapadia. 2018. Viewer experience of obscuring scene elements in photos to enhance privacy. In ACM CHI Conference on Human Factors in Computing Systems (CHI).
[34]
Jianping He, Bin Liu, Deguang Kong, Xuan Bao, Na Wang, Hongxia Jin, and George Kesidis. 2016. Puppies: Transformation-supported personalized privacy preserving partial image sharing. In 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 359--370.
[35]
E Tory Higgins. 1987. Self-discrepancy: a theory relating self and affect. Psychological review 94, 3 (1987), 319.
[36]
Roberto Hoyle, Robert Templeman, Denise Anthony, David Crandall, and Apu Kapadia. 2015. Sensitive lifelogs: A privacy analysis of photos from wearable cameras. In Proceedings of the 33rd Annual ACM conference on human factors in computing systems. ACM, 1645--1648.
[37]
Hongxin Hu, Gail-Joon Ahn, and Jan Jorgensen. 2013. Multiparty access control for online social networks: model and mechanisms. ieee transactions on knowledge and data engineering 25, 7 (2013), 1614--1627.
[38]
Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, and Sotiris Ioannidis. 2015. Face/off: Preventing privacy leakage from photos in social networks. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 781--792.
[39]
Aleksandra Kacperczyk. 2011. Social isolation in the workplace: A cross-national and longitudinal analysis. (2011).
[40]
Sanjay Kairam, Mike Brzozowski, David Huffaker, and Ed Chi. 2012. Talking in circles: selective sharing in google+. In Proceedings of the SIGCHI conference on human factors in computing systems. ACM, 1065--1074.
[41]
Sanjay Kairam, Joseph Kaye, John Alexis Guerra-Gomez, and David A Shamma. 2016. Snap Decisions?: How Users, Content, and Aesthetics Interact to Shape Photo Sharing Behaviors. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM.
[42]
Bart P Knijnenburg. 2017. Privacy? I Can't Even! making a case for user-tailored privacy. IEEE Security & Privacy 15, 4 (2017), 62--67.
[43]
Bart Piet Knijnenburg and Alfred Kobsa. 2014. Increasing sharing tendency without reducing satisfaction: finding the best privacy-settings user interface for social networks. (2014).
[44]
William Kruskal and Frederick Mosteller. 1979. Representative sampling, II: Scientific literature, excluding statistics. International Statistical Review/Revue Internationale de Statistique (1979), 111--127.
[45]
Priya Kumar and Sarita Schoenebeck. 2015. The modern day baby book: Enacting good mothering and stewarding privacy on Facebook. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing. ACM, 1302--1312.
[46]
Yao Li, Alfred Kobsa, Bart P Knijnenburg, and MH Carolyn Nguyen. 2017a. Cross-cultural privacy prediction. Proceedings on Privacy Enhancing Technologies 2017, 2 (2017), 113--132.
[47]
Yifang Li, Nishant Vishwamitra, Hongxin Hu, Bart P Knijnenburg, and Kelly Caine. 2017b. Effectiveness and users' experience of face blurring as a privacy protection for sharing photos via online social networks. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol. 61. SAGE Publications Sage CA: Los Angeles, CA, 803--807.
[48]
Yifang Li, Nishant Vishwamitra, Bart P Knijnenburg, Hongxin Hu, and Kelly Caine. 2017c. Blur vs. block: Investigating the effectiveness of privacy-enhancing obfuscation for images. In 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). IEEE, 1343--1351.
[49]
Yifang Li, Nishant Vishwamitra, Bart P. Knijnenburg, Hongxin Hu, and Kelly Caine. 2017d. Effectiveness and users' experience of obfuscation as a privacy-enhancing technology for sharing photos. Proceedings of the ACM on Human-Computer Interaction 1, 2 (2017).
[50]
Tsung-Yi Lin, Michael Maire, Serge Belongie, James Hays, Pietro Perona, Deva Ramanan, Piotr Dollár, and C Lawrence Zitnick. 2014. Microsoft coco: Common objects in context. In European conference on computer vision. Springer, 740--755.
[51]
Kimberly J Mitchell, David Finkelhor, and Janis Wolak. 2001. Risk factors for and impact of online sexual solicitation of youth. Jama 285, 23 (2001), 3011--3014.
[52]
Adam D Moore. 2007. Toward informational privacy rights. San Diego L. Rev. 44 (2007), 809.
[53]
Tyler Moore, Richard Clayton, and Ross Anderson. 2009. The economics of online crime. Journal of Economic Perspectives 23, 3 (2009).
[54]
Glen J Nowak and Joseph Phelps. 1992. Understanding privacy concerns. An assessment of consumers' information-related knowledge and beliefs. Journal of Direct Marketing 6, 4 (1992), 28--39.
[55]
Judith S Olson, Jonathan Grudin, and Eric Horvitz. 2005. A study of preferences for sharing and privacy. In CHI'05 extended abstracts on Human factors in computing systems. ACM, 1985--1988.
[56]
Tribhuvanesh Orekondy, Bernt Schiele, and Mario Fritz. 2017. Towards a visual privacy advisor: Understanding and predicting privacy risks in images. In 2017 IEEE International Conference on Computer Vision (ICCV). IEEE, 3706--3715.
[57]
Sinno Jialin Pan and Qiang Yang. 2009. A survey on transfer learning. IEEE Transactions on knowledge and data engineering 22, 10 (2009), 1345--1359.
[58]
Eyal Peer, Joachim Vosgerau, and Alessandro Acquisti. 2014. Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods 46, 4 (2014), 1023--1031.
[59]
Tiffany A Pempek, Yevdokiya A Yermolayeva, and Sandra L Calvert. 2009. College students' social networking experiences on Facebook. Journal of applied developmental psychology 30, 3 (2009), 227--238.
[60]
Andrew Perrin and Jingjing Jiang. 2018. About a quarter of U.S. adults say they are "almost constantly' online. (2018). Retrieved February, 2019 from http://www.pewresearch.org/fact-tank/2018/03/14/ about-a-quarter-of-americans-report-goingonline-almost-constantly/.
[61]
Pew Research Center. 2018. Internet/Broadband Fact Sheet. (2018). Retrieved February, 2019 from http://www.pewinternet.org/fact-sheet/internet-broadband/.
[62]
Elissa M Redmiles, Sean Kross, Alisha Pradhan, and Michelle L Mazurek. 2017. How well do my results generalize? Comparing security and privacy survey results from MTurk and web panels to the US. Technical Report.
[63]
Jessica Ringrose, Laura Harvey, Rosalind Gill, and Sonia Livingstone. 2013. Teen girls, sexual double standards and "sexting': Gendered value in digital image exchange. Feminist theory 14, 3 (2013), 305--323.
[64]
Joel Ross, Andrew Zaldivar, Lilly Irani, and Bill Tomlinson. 2009. Who are the turkers? worker demographics in amazon mechanical turk. Department of Informatics, University of California, Irvine, USA, Tech. Rep (2009).
[65]
Olga Russakovsky, Jia Deng, Hao Su, Jonathan Krause, Sanjeev Satheesh, Sean Ma, Zhiheng Huang, Andrej Karpathy, Aditya Khosla, Michael Bernstein, Alexander Berg, and Fei-Fei Li. 2015. Imagenet large scale visual recognition challenge. International Journal of Computer Vision 115, 3 (2015).
[66]
Robert Sheridan. 2014. Malingering: Yes, it May Get You Fired. (2014). Retrieved September 19, 2018 from https://www.mintz.com/insights- center/viewpoints/ 2014-05-malingering-yes-it-may-get-you-fired.
[67]
Yoshinari Shirai, Yasue Kishino, Takayuki Suyama, and Shin Mizutani. 2019. PASNIC: a thermal based privacy-aware sensor node for image capturing. In Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers. ACM, 202--205.
[68]
M Six Silberman, Bill Tomlinson, Rochelle LaPlante, Joel Ross, Lilly Irani, and Andrew Zaldivar. 2018. Responsible research with crowds: pay crowdworkers at least minimum wage. Commun. ACM 61, 3 (2018), 39--41.
[69]
Meredith M Skeels and Jonathan Grudin. 2009. When social networks cross boundaries: a case study of workplace use of facebook and linkedin. In Proceedings of the ACM 2009 international conference on Supporting group work. ACM, 95--104.
[70]
Manya Sleeper, Rebecca Balebako, Sauvik Das, Amber Lynn McConahy, Jason Wiese, and Lorrie Faith Cranor. 2013. The post that wasn't: exploring self-censorship on facebook. In Proceedings of the 2013 conference on Computer supported cooperative work. ACM, 793--802.
[71]
Donna Spencer. 2009. Card sorting: Designing usable categories. Rosenfeld Media.
[72]
Donna Spencer and Todd Warfel. 2004. Card sorting: a definitive guide. Boxes and Arrows 2 (2004).
[73]
Qianru Sun, Liqian Ma, Seong Joon Oh, Luc Van Gool, Bernt Schiele, and Mario Fritz. 2017. Natural and Effective Obfuscation by Head Inpainting. arXiv preprint arXiv:1711.09001 (2017).
[74]
Kurt Thomas, Chris Grier, and David M Nicol. 2010. unfriendly: Multi-party privacy risks in social networks. In International Symposium on Privacy Enhancing Technologies Symposium. Springer, 236--252.
[75]
Sara E Thomas. 2018. "What Should I Do?": Young Women's Reported Dilemmas with Nude Photographs. Sexuality Research and Social Policy 15, 2 (2018), 192--207.
[76]
Lisa Torrey and Jude Shavlik. 2010. Transfer learning. In Handbook of research on machine learning applications and trends: algorithms, methods, and techniques. IGI Global, 242--264.
[77]
Lam Tran, Deguang Kong, Hongxia Jin, and Ji Liu. 2016. Privacy-CNH: A Framework to Detect Photo Privacy with Convolutional Neural Network using Hierarchical Features. In AAAI. 1317--1323.
[78]
Tom Tullis and Larry Wood. 2004. How many users are enough for a card-sorting study. In Proceedings UPA, Vol. 2004.
[79]
Jessica Vitak and Jinyoung Kim. 2014. You can't block people offline: Examining how Facebook's affordances shape the disclosure process. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing. ACM, 461--474.
[80]
Tim Wafa. 2009. How the lack of prescriptive technical granularity in HIPAA has compromised patient privacy. N. Ill. UL Rev. 30 (2009), 531.
[81]
Wenbo Wang, Hean Tat Keh, and Lisa E Bolton. 2009. Lay theories of medicine and a healthy lifestyle. Journal of Consumer Research 37, 1 (2009), 80--97.
[82]
Yang Wang, Gregory Norice, and Lorrie Faith Cranor. 2011. Who is concerned about what? A study of American, Chinese and Indian users' privacy concerns on social network sites. In International Conference on Trust and Trustworthy Computing. Springer, 146--153.
[83]
Heng Xu, Na Wang, and Jens Grossklags. 2012. Privacy by redesign: Alleviating privacy concerns for third-party apps. (2012).
[84]
George Yee and Larry Korba. 2005. Comparing and matching privacy policies using community consensus. In Proceedings, 16th IRMA International Conference, San Diego, California. Citeseer.
[85]
Alyson Leigh Young and Anabel Quan-Haase. 2013. Privacy protection strategies on Facebook: The Internet privacy paradox revisited. Information, Communication & Society 16, 4 (2013), 479--500.
[86]
Jun Yu, Zhenzhong Kuang, Zhou Yu, Dan Lin, and Jianping Fan. 2017. Privacy Setting Recommendation for Image Sharing. In Machine Learning and Applications (ICMLA), 2017 16th IEEE International Conference on. IEEE, 726--730.
[87]
Jun Yu, Zhenzhong Kuang, Baopeng Zhang, Wei Zhang, Dan Lin, and Jianping Fan. 2018. Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing. IEEE Transactions on Information Forensics and Security 13, 5 (2018), 1317--1332.

Cited By

View all
  • (2024)Manipulate to Obfuscate: A Privacy-Focused Intelligent Image Manipulation Tool for End-UsersAdjunct Proceedings of the 37th Annual ACM Symposium on User Interface Software and Technology10.1145/3672539.3686778(1-3)Online publication date: 13-Oct-2024
  • (2024)DIPA2Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36314397:4(1-30)Online publication date: 12-Jan-2024
  • (2024)Designing Accessible Obfuscation Support for Blind Individuals’ Visual Privacy ManagementProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642713(1-19)Online publication date: 11-May-2024
  • Show More Cited By

Index Terms

  1. Towards A Taxonomy of Content Sensitivity and Sharing Preferences for Photos

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems
    April 2020
    10688 pages
    ISBN:9781450367080
    DOI:10.1145/3313831
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 23 April 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. photo privacy
    2. privacy
    3. security
    4. sensitive content

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CHI '20
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

    Upcoming Conference

    CHI '25
    CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2025
    Yokohama , Japan

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)166
    • Downloads (Last 6 weeks)21
    Reflects downloads up to 10 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Manipulate to Obfuscate: A Privacy-Focused Intelligent Image Manipulation Tool for End-UsersAdjunct Proceedings of the 37th Annual ACM Symposium on User Interface Software and Technology10.1145/3672539.3686778(1-3)Online publication date: 13-Oct-2024
    • (2024)DIPA2Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36314397:4(1-30)Online publication date: 12-Jan-2024
    • (2024)Designing Accessible Obfuscation Support for Blind Individuals’ Visual Privacy ManagementProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642713(1-19)Online publication date: 11-May-2024
    • (2024)Examining Human Perception of Generative Content Replacement in Image Privacy ProtectionProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642103(1-16)Online publication date: 11-May-2024
    • (2023)The writing on the wall and 3D digital twinsProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620359(2169-2186)Online publication date: 9-Aug-2023
    • (2023)Analyzing the Use of Large Language Models for Content Moderation with ChatGPT ExamplesProceedings of the 3rd International Workshop on Open Challenges in Online Social Networks10.1145/3599696.3612895(1-8)Online publication date: 4-Sep-2023
    • (2023)“Dump it, Destroy it, Send it to Data Heaven”: Blind People’s Expectations for Visual Privacy in Visual Assistance TechnologiesProceedings of the 20th International Web for All Conference10.1145/3587281.3587296(134-147)Online publication date: 30-Apr-2023
    • (2023)DIPA : An Image Dataset with Cross-cultural Privacy Concern AnnotationsCompanion Proceedings of the 28th International Conference on Intelligent User Interfaces10.1145/3581754.3584176(259-266)Online publication date: 27-Mar-2023
    • (2023)On the Potential of Mediation Chatbots for Mitigating Multiparty Privacy Conflicts - A Wizard-of-Oz StudyProceedings of the ACM on Human-Computer Interaction10.1145/35796187:CSCW1(1-33)Online publication date: 16-Apr-2023
    • (2023)Modeling User Characteristics Associated with Interdependent Privacy Perceptions on Social MediaACM Transactions on Computer-Human Interaction10.1145/357701430:3(1-32)Online publication date: 10-Jun-2023
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media