Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Open access

Image DePO: Towards Gradual Decentralization of Online Social Networks using Decentralized Privacy Overlays

Published: 07 April 2022 Publication History

Abstract

Centralized online social networks --- e.g., Facebook, Twitter and TikTok --- help drive social connection on the Internet, but have nigh unfettered access to monitor and monetize the personal data of their users. This centralization can especially undermine the use of the social internet by minority populations, who disproportionately bear the costs of institutional surveillance. We introduce a new class of privacy-enhancing technology --- decentralized privacy overlays (DePOs) --- that helps cOSN users regain some control over their personal data by allowing them to selectively share secret content on cOSNs through decentralized content distribution networks. As a first step, we present an implementation and user evaluation of Image DePO, a proof-of-concept design probe that allows users to upload and share secret photos on Facebook through the Interplanetary File System peer-to-peer protocol. We qualitatively evaluated Image DePO in a controlled, test environment with 19 queer and Black, Indigenous, (and) Person of Color (BIPOC) participants. We found that while Image DePO could help address the institutional threats with which our participants expressed concern, interpersonal threats were the more salient concern in their decisions to share content. Accordingly, we argue that in order to see widespread use, DePOs must align protection against abstract institutional threats with protection against the more salient interpersonal threats users consider when making specific sharing decisions.

References

[1]
Nathaniel D Amsden and Lei Chen. 2015. Analysis of Facebook steganographic capabilities. In 2015 International Conference on Computing, Networking and Communications (ICNC). 67--71. https://doi.org/10.1109/ICCNC.2015.7069317
[2]
Mark Andrejevic. 2011. Exploitation in the Data Mine. In Internet and Surveillance. Routledge. Num Pages: 18.
[3]
Randy Baden, Adam Bender, Neil Spring, Bobby Bhattacharjee, and Daniel Starin. 2009. Persona: an online social network with user-defined privacy. In Proceedings of the ACM SIGCOMM 2009 conference on Data communication (SIGCOMM '09). Association for Computing Machinery, New York, NY, USA, 135--146. https://doi.org/10.1145/1592568.1592585
[4]
Lujo Bauer, Lorrie Faith Cranor, Saranga Komanduri, Michelle L. Mazurek, Michael K. Reiter, Manya Sleeper, and Blase Ur. 2013. The post anachronism: the temporal dimension of facebook privacy. In Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society (WPES '13). Association for Computing Machinery, New York, NY, USA, 1--12. https://doi.org/10.1145/2517840.2517859
[5]
E. Baumer. 2007. Questioning the Technological Panacea: Three Reflective Questions for Designers. undefined (2007). https://www.semanticscholar.org/paper/Questioning-the-Technological-Panacea%3A-Three-for-Baumer/344139846c86e96c4854477d35e5d0ee519af9f3
[6]
Eric P.S. Baumer, Phil Adams, Vera D. Khovanskaya, Tony C. Liao, Madeline E. Smith, Victoria Schwanda Sosik, and Kaiton Williams. 2013. Limiting, leaving, and (re)lapsing: an exploration of facebook non-use practices and experiences. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13). Association for Computing Machinery, New York, NY, USA, 3257--3266. https://doi.org/10.1145/2470654.2466446
[7]
Eric P.S. Baumer and M. Six Silberman. 2011. When the implication is not to design (technology). In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '11). Association for Computing Machinery, New York, NY, USA, 2271--2274. https://doi.org/10.1145/1978942.1979275
[8]
Eric P. S. Baumer, Shion Guha, Patrick Skeba, and Geraldine Gay. 2019. All Users are (Not) Created Equal: Predictors Vary for Different Forms of Facebook Non/use. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (Nov. 2019), 80:1--80:28. https://doi.org/10.1145/3359182
[9]
Nancy Baym, Danah Boyd, Kate Crawford, Tarleton Gillespie, and Mary Gray. 2011. "If you don't like it, don't use it. It's that simple." ORLY? https://socialmediacollective.org/2011/08/11/if-you-dont-like-it-dont-use-it-its-that-simple-orly/
[10]
Filipe Beato, Iulia Ion, Srdjan Capkun, Bart Preneel, and Marc Langheinrich. 2013. For some eyes only: protecting online information sharing. In Proceedings of the third ACM conference on Data and application security and privacy (CODASPY '13). Association for Computing Machinery, New York, NY, USA, 1--12. https://doi.org/10.1145/2435349.2435351
[11]
Juan Benet. 2014. IPFS - Content Addressed, Versioned, P2P File System. arXiv:1407.3561 [cs] (July 2014). http://arxiv.org/abs/1407.3561 arXiv: 1407.3561.
[12]
Ruha Benjamin. 2020. Race After Technology: Abolitionist Tools for the New Jim Code. Social Forces, Vol. 98, 4 (June 2020), 1--3. https://doi.org/10.1093/sf/soz162
[13]
Lauren Berlant and Michael Warner. 1998. Sex in public. Critical inquiry, Vol. 24, 2 (1998), 547--566. Publisher: University of Chicago Press.
[14]
Sam Biddle. 2020. Police Surveilled George Floyd Protests With Help From Twitter-Affiliated Startup Dataminr. https://theintercept.com/2020/07/09/twitter-dataminr-police-spy-surveillance-black-lives-matter-protests/
[15]
Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, and Frank Stajano. 2012. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes. In 2012 IEEE Symposium on Security and Privacy. IEEE, San Francisco, CA, USA, 553--567. https://doi.org/10.1109/SP.2012.44
[16]
Russell Brandom. 2016. Facebook, Twitter, and Instagram surveillance tool was used to arrest Baltimore protestors. https://www.theverge.com/2016/10/11/13243890/facebook-twitter-instagram-police-surveillance-geofeedia-api
[17]
Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative Research in Psychology, Vol. 3, 2 (Jan. 2006), 77--101. https://doi.org/10.1191/1478088706qp063oa
[18]
Cristian Bravo-Lillo, Saranga Komanduri, Lorrie Faith Cranor, Robert W. Reeder, Manya Sleeper, Julie Downs, and Stuart Schechter. 2013. Your attention please: designing security-decision UIs to make genuine risks harder to ignore. In Proceedings of the Ninth Symposium on Usable Privacy and Security (SOUPS '13). Association for Computing Machinery, Newcastle, United Kingdom, 1--12. https://doi.org/10.1145/2501604.2501610
[19]
André Brock. 2012. From the Blackhand Side: Twitter as a Cultural Conversation. Journal of Broadcasting & Electronic Media, Vol. 56, 4 (Oct. 2012), 529--549. https://doi.org/10.1080/08838151.2012.732147 Publisher: Routledge _eprint: https://doi.org/10.1080/08838151.2012.732147.
[20]
Simone Browne. 2015. Dark Matters: On the Surveillance of Blackness. Duke University Press. Google-Books-ID: snmJCgAAQBAJ.
[21]
Axel Bruns, Tim Highfield, and Jean Burgess. 2013. The Arab Spring and Social Media Audiences: English and Arabic Twitter Users and Their Networks. American Behavioral Scientist, Vol. 57, 7 (July 2013), 871--898. https://doi.org/10.1177/0002764213479374 Publisher: SAGE Publications Inc.
[22]
Finn Brunton and Helen Fay Nissenbaum. 2015. Obfuscation: a user's guide for privacy and protest. MIT Press, Cambridge, Massachusetts.
[23]
Jan Butora and Jessica Fridrich. 2019. Effect of JPEG Quality on Steganographic Security. In Proceedings of the ACM Workshop on Information Hiding and Multimedia Security - IH&MMSec'19. ACM Press, Paris, France, 47--56. https://doi.org/10.1145/3335203.3335714
[24]
Nathalie Casemajor, Stéphane Couture, Mauricio Delfin, Matthew Goerzen, and Alessandro Delfanti. 2015. Non-participation in digital media: toward a framework of mediated political action. Media, Culture & Society, Vol. 37, 6 (Sept. 2015), 850--866. https://doi.org/10.1177/0163443715584098 Publisher: SAGE Publications Ltd.
[25]
A. Castiglione, G. Cattaneo, and A. De Santis. 2011. A Forensic Analysis of Images on Online Social Networks. In 2011 Third International Conference on Intelligent Networking and Collaborative Systems. 679--684. https://doi.org/10.1109/INCoS.2011.17
[26]
Rajarathnam Chandramouli, Mehdi Kharrazi, and Nasir Memon. 2003. Image steganography and steganalysis: Concepts and practice. In International Workshop on Digital Watermarking. Springer, 35--49.
[27]
Chun-Chih Chang and Thung-Hong Lin. 2020. Autocracy login: internet censorship and civil society in the digital age. Democratization, Vol. 27, 5 (July 2020), 874--895. https://doi.org/10.1080/13510347.2020.1747051 Publisher: Routledge _eprint: https://doi.org/10.1080/13510347.2020.1747051.
[28]
Marc Chaumont. 2020. 14 - Deep learning in steganography and steganalysis. In Digital Media Steganography, Mahmoud Hassaballah (Ed.). Academic Press, 321--349. https://doi.org/10.1016/B978-0--12--819438--6.00022-0
[29]
Jeffrey T. Child, Angela R. Duck, Laura A. Andrews, Maria Butauski, and Sandra Petronio. 2015. Young Adults' Management of Privacy on Facebook with Multiple Generations of Family Members. Journal of Family Communication, Vol. 15, 4 (Oct. 2015), 349--367. https://doi.org/10.1080/15267431.2015.1076425 Publisher: Routledge _eprint: https://doi.org/10.1080/15267431.2015.1076425.
[30]
Alexander Cho. 2018. Default publicness: Queer youth of color, social media, and being outed by the machine. New Media & Society, Vol. 20, 9 (Sept. 2018), 3183--3200. https://doi.org/10.1177/1461444817744784 Publisher: SAGE Publications.
[31]
Isobel Cockerell. 2019. Inside China's Massive Surveillance Operation. Wired (May 2019). https://www.wired.com/story/inside-chinas-massive-surveillance-operation/
[32]
E. D. Cristofaro, C. Soriente, G. Tsudik, and A. Williams. 2012. Hummingbird: Privacy at the Time of Twitter. In 2012 IEEE Symposium on Security and Privacy. 285--299. https://doi.org/10.1109/SP.2012.26 ISSN: 2375--1207.
[33]
L. A. Cutillo, R. Molva, and T. Strufe. 2009. Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network. In 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks Workshops. 1--6. https://doi.org/10.1109/WOWMOM.2009.5282446
[34]
Sauvik Das and Adam Kramer. 2013. Self-Censorship on Facebook. Proceedings of the International AAAI Conference on Web and Social Media, Vol. 7, 1 (June 2013). https://ojs.aaai.org/index.php/ICWSM/article/view/14412 Number: 1.
[35]
Jenny L. Davis and Nathan Jurgenson. 2014. Context collapse: theorizing context collusions and collisions. Information, Communication & Society, Vol. 17, 4 (April 2014), 476--485. https://doi.org/10.1080/1369118X.2014.888458 Publisher: Routledge _eprint: https://doi.org/10.1080/1369118X.2014.888458.
[36]
Thiago Dias Oliva, Dennys Marcelo Antonialli, and Alessandra Gomes. 2020. Fighting Hate Speech, Silencing Drag Queens? Artificial Intelligence in Content Moderation and Risks to LGBTQ Voices Online. Sexuality & Culture (Nov. 2020). https://doi.org/10.1007/s12119-020-09790-w
[37]
Angel Diaz. 2019. New York City Police Department Surveillance Technology. Technical Report. Brennan Center for Justice. https://www.brennancenter.org/our-work/research-reports/new-york-city-police-department-surveillance-technology
[38]
Paul Dourish, Rebecca E. Grinter, Jessica Delgado de la Flor, and Melissa Joseph. 2004. Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing, Vol. 8, 6 (Nov. 2004), 391--401. https://doi.org/10.1007/s00779-004-0308--5
[39]
Stefanie Duguay. 2016. "He has a way gayer Facebook than I do": Investigating sexual identity disclosure and context collapse on a social networking site. New Media & Society, Vol. 18, 6 (June 2016), 891--907. https://doi.org/10.1177/1461444814549930 Publisher: SAGE Publications.
[40]
Serge Egelman and Eyal Peer. 2015. Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS). In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 2873--2882. https://doi.org/10.1145/2702123.2702249
[41]
Lisa Jo Elliott and Vera Polyakova. 2014. Beyond Facebook: The generalization of social networking site measures. Computers in Human Behavior, Vol. 33 (April 2014), 163--170. https://doi.org/10.1016/j.chb.2014.01.023
[42]
Nicole B. Ellison, Charles Steinfield, and Cliff Lampe. 2007. The Benefits of Facebook "Friends:" Social Capital and College Students' Use of Online Social Network Sites. Journal of Computer-Mediated Communication, Vol. 12, 4 (July 2007), 1143--1168. https://doi.org/10.1111/j.1083--6101.2007.00367.x
[43]
S. M. Furnell, A. Jusoh, and D. Katsabas. 2006. The challenges of understanding and using security: A survey of end-users. Computers & Security, Vol. 25, 1 (Feb. 2006), 27--35. https://doi.org/10.1016/j.cose.2005.12.004
[44]
Urs Gasser, Jack Goldsmith, Susan Landau, Joseph Nye, David O'Brien, Matt Olsen, Bruce Schneier, and Jonathan Zittrain. 2016. Don't Panic: Making Progress on the "Going Dark" Debate textbar Berkman Klein Center. Technical Report. Harvard University, Berkman Klein Center for Internet & Society. https://cyber.harvard.edu/publications/2016/Cybersecurity/Dont_Panic
[45]
Ben Gilbert. 2018. How Facebook makes money from your data, in Mark Zuckerberg's words. Business Insider (April 2018). https://www.businessinsider.com/how-facebook-makes-money-according-to-mark-zuckerberg-2018--4
[46]
Anita R Gohdes. 2015. Pulling the plug: Network disruptions and violence in civil conflict. Journal of Peace Research, Vol. 52, 3 (May 2015), 352--367. https://doi.org/10.1177/0022343314551398 Publisher: SAGE Publications Ltd.
[47]
Saikat Guha, Kevin Tang, and Paul Francis. 2008. NOYB: privacy in online social networks. In Proceedings of the first workshop on Online social networks (WOSN '08). Association for Computing Machinery, New York, NY, USA, 49--54. https://doi.org/10.1145/1397735.1397747
[48]
Jean Hardy and Stefani Vargas. 2019. Participatory Design and the Future of Rural LGBTQ Communities. In Companion Publication of the 2019 on Designing Interactive Systems Conference 2019 Companion (DIS '19 Companion ). Association for Computing Machinery, New York, NY, USA, 195--199. https://doi.org/10.1145/3301019.3323894
[49]
Rakibul Hasan, Eman Hassan, Yifang Li, Kelly Caine, David J. Crandall, Roberto Hoyle, and Apu Kapadia. 2018. Viewer Experience of Obscuring Scene Elements in Photos to Enhance Privacy. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). Association for Computing Machinery, New York, NY, USA, 1--13. https://doi.org/10.1145/3173574.3173621
[50]
Hassan, Rakibul Hasan, Patrick Shaffer, David Crandall, and Eman T. Apu Kapadia. 2017. Cartooning for Enhanced Privacy in Lifelogging and Streaming Videos. 29--38. https://openaccess.thecvf.com/content_cvpr_2017_workshops/w16/html/Kapadia_Cartooning_for_Enhanced_CVPR_2017_paper.html
[51]
J. He, B. Liu, D. Kong, X. Bao, N. Wang, H. Jin, and G. Kesidis. 2016. PUPPIES: Transformation-Supported Personalized Privacy Preserving Partial Image Sharing. In 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). 359--370. https://doi.org/10.1109/DSN.2016.40 ISSN: 2158--3927.
[52]
Sebastian Hellmeier. 2016. The Dictator's Digital Toolkit: Explaining Variation in Internet Filtering in Authoritarian Regimes. Politics & Policy, Vol. 44, 6 (2016), 1158--1191. https://doi.org/10.1111/polp.12189 _eprint: https://onlinelibrary.wiley.com/doi/pdf/10.1111/polp.12189.
[53]
Kashmir Hill. 2019. I Cut Google Out Of My Life. It Screwed Up Everything. https://gizmodo.com/i-cut-google-out-of-my-life-it-screwed-up-everything-1830565500
[54]
Kashmir Hill. 2020. Another Arrest, and Jail Time, Due to a Bad Facial Recognition Match. The New York Times (Dec. 2020). https://www.nytimes.com/2020/12/29/technology/facial-recognition-misidentify-jail.html
[55]
Jason Hiney, Tejas Dakve, Krzysztof Szczypiorski, and Kris Gaj. 2015. Using Facebook for Image Steganography. In 2015 10th International Conference on Availability, Reliability and Security. IEEE, Toulouse, France, 442--447. https://doi.org/10.1109/ARES.2015.20
[56]
Micah Hodosh, Peter Young, and Julia Hockenmaier. [n.d.]. Flickr8k Dataset. ( [n.,d.]).
[57]
S. Jahid, S. Nilizadeh, P. Mittal, N. Borisov, and A. Kapadia. 2012. DECENT: A decentralized architecture for enforcing privacy in online social networks. In 2012 IEEE International Conference on Pervasive Computing and Communications Workshops. 326--332. https://doi.org/10.1109/PerComW.2012.6197504
[58]
Yury Kabanov and Mikhail Karyagin. 2018. Data-Driven Authoritarianism: Non-democracies and Big Data. In Digital Transformation and Global Society (Communications in Computer and Information Science ), Daniel A. Alexandrov, Alexander V. Boukhanovsky, Andrei V. Chugunov, Yury Kabanov, and Olessia Koltsova (Eds.). Springer International Publishing, Cham, 144--155. https://doi.org/10.1007/978--3-030-02843--5_12
[59]
Jan Kodovský, Tomá Pevný, and Jessica Fridrich. 2010. Modern steganalysis can detect YASS, Nasir D. Memon, Jana Dittmann, Adnan M. Alattar, and Edward J. Delp III (Eds.). San Jose, California, 754102. https://doi.org/10.1117/12.838768
[60]
Ada Lerner, Helen Yuxun He, Anna Kawakami, Silvia Catherine Zeamer, and Roberto Hoyle. 2020. Privacy and Activism in the Transgender Community. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. ACM, Honolulu HI USA, 1--13. https://doi.org/10.1145/3313831.3376339
[61]
Sam Levin. 2016. ACLU finds social media sites gave data to company tracking black protesters. http://www.theguardian.com/technology/2016/oct/11/aclu-geofeedia-facebook-twitter-instagram-black-lives-matter Section: Technology.
[62]
Bin Li, Junhui He, Jiwu Huang, and Yun Qing Shi. 2011. A Survey on Image Steganography and Steganalysis. Journal of Information Hiding and Multimedia Signal Processing, Vol. 2, 2 (April 2011), 31.
[63]
B. Light. 2014. Disconnecting with Social Networking Sites. Springer. Google-Books-ID: RlSoBAAAQBAJ.
[64]
Eden Litt and Eszter Hargittai. 2016. The Imagined Audience on Social Network Sites. Social Media
[65]
Society, Vol. 2, 1 (Jan. 2016), 2056305116633482. https://doi.org/10.1177/2056305116633482 Publisher: SAGE Publications Ltd.
[66]
Matthew M. Lucas and Nikita Borisov. 2008. FlyByNight: mitigating the privacy risks of social networking. In Proceedings of the 7th ACM workshop on Privacy in the electronic society (WPES '08). Association for Computing Machinery, New York, NY, USA, 1--8. https://doi.org/10.1145/1456403.1456405
[67]
W. Luo, Q. Xie, and U. Hengartner. 2009. FaceCloak: An Architecture for User Privacy on Social Networking Sites. In 2009 International Conference on Computational Science and Engineering, Vol. 3. 26--33. https://doi.org/10.1109/CSE.2009.387
[68]
Aida E Manduley, Andrea Mertens, Iradele Plante, and Anjum Sultana. 2018. The role of social media in sex education: Dispatches from queer, trans, and racialized communities. Feminism & Psychology, Vol. 28, 1 (Feb. 2018), 152--170. https://doi.org/10.1177/0959353517717751 Publisher: SAGE Publications Ltd.
[69]
Ryan A. Miller. 2017. "My Voice Is Definitely Strongest in Online Communities": Students Using Social Media for Queer and Disability Identity-Making. Journal of College Student Development, Vol. 58, 4 (2017), 509--525. https://doi.org/10.1353/csd.2017.0040 Publisher: Johns Hopkins University Press.
[70]
Sacha Molitorisz. 2020. Net Privacy: How We Can Be Free in an Age of Surveillance. McGill-Queen's Press - MQUP. Google-Books-ID: CWzeDwAAQBAJ.
[71]
Marcia Mundt, Karen Ross, and Charla M Burnett. 2018. Scaling Social Movements Through Social Media: The Case of Black Lives Matter. Social Media+Society, Vol. 4, 4 (Oct. 2018), 2056305118807911. https://doi.org/10.1177/2056305118807911 Publisher: SAGE Publications Ltd.
[72]
Moses Namara, Daricia Wilkinson, Kelly Caine, and Bart P. Knijnenburg. 2020. Emotional and Practical Considerations Towards the Adoption and Abandonment of VPNs as a Privacy-Enhancing Technology. Proceedings on Privacy Enhancing Technologies, Vol. 2020, 1 (Jan. 2020), 83--102. https://doi.org/10.2478/popets-2020-0006
[73]
Arvind Narayanan, Vincent Toubiana, Solon Barocas, Helen Nissenbaum, and Dan Boneh. 2012. A Critical Look at Decentralized Personal Data Architectures. (Feb. 2012). https://arxiv.org/abs/1202.4503v1
[74]
Shirin Nilizadeh, Sonia Jahid, Prateek Mittal, Nikita Borisov, and Apu Kapadia. 2012. Cachet: A Decentralized Architecture for Privacy Preserving Social Networking with Caching. In Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies (CoNEXT '12). ACM, New York, NY, USA, 337--348. https://doi.org/10.1145/2413176.2413215 event-place: Nice, France.
[75]
Safiya Umoja Noble. 2018. Algorithms of oppression. New York University Press.
[76]
Theresa Senft and Sa ya Umoja Noble. 2013. Race and Social Media. In The Social Media Handbook. Routledge. Num Pages: 19.
[77]
Ihudiya Finda Ogbonnaya-Ogburu, Angela D.R. Smith, Alexandra To, and Kentaro Toyama. 2020. Critical Race Theory for HCI. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 1--16. https://doi.org/10.1145/3313831.3376392
[78]
Leysia Palen and Paul Dourish. 2003. Unpacking "privacy" for a networked world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '03). Association for Computing Machinery, Ft. Lauderdale, Florida, USA, 129--136. https://doi.org/10.1145/642611.642635
[79]
Thomas Paul, Antonino Famulari, and Thorsten Strufe. 2014. A survey on decentralized Online Social Networks. Computer Networks, Vol. 75 (Dec. 2014), 437--452. https://doi.org/10.1016/j.comnet.2014.10.005
[80]
Laura Portwood-Stacer. 2013. Media refusal and conspicuous non-consumption: The performative and political dimensions of Facebook abstention. New Media & Society, Vol. 15, 7 (Nov. 2013), 1041--1057. https://doi.org/10.1177/1461444812465139 Publisher: SAGE Publications.
[81]
Paulina Pospieszna and Aleksandra Galus. 2019. "Liberation Technology' or "Net Delusion'? Civic Activists' Perceptions of Social Media as a Platform for Civic Activism in Belarus and Ukraine. Europe-Asia Studies, Vol. 71, 10 (Nov. 2019), 1664--1684. https://doi.org/10.1080/09668136.2019.1623176 Publisher: Routledge _eprint: https://doi.org/10.1080/09668136.2019.1623176.
[82]
John Postill. 2014. Democracy in an age of viral reality: A media epidemiography of Spain's indignados movement. Ethnography, Vol. 15, 1 (March 2014), 51--69. https://doi.org/10.1177/1466138113502513 Publisher: SAGE Publications.
[83]
Jeffrey G. Proudfoot, David Wilson, Joseph S. Valacich, and Michael D. Byrd. 2018. Saving face on Facebook: privacy concerns, social benefits, and impression management. Behaviour & Information Technology, Vol. 37, 1 (Jan. 2018), 16--37. https://doi.org/10.1080/0144929X.2017.1389988 Publisher: Taylor & Francis _eprint: https://doi.org/10.1080/0144929X.2017.1389988.
[84]
Moo-Ryong Ra, Ramesh Govindan, and Antonio Ortega. 2013. P3: Toward Privacy-Preserving Photo Sharing. 515--528. https://www.usenix.org/conference/nsdi13/technical-sessions/presentation/ra
[85]
Jeff John Roberts. 2011. Facebook Search Warrants, A New Tool For U. S. Law Enforcement. https://www.huffpost.com/entry/facebook-search-warrant_n_896328
[86]
Espen Geelmuyden Rød and Nils B Weidmann. 2015. Empowering activists or autocrats? The Internet in authoritarian regimes. Journal of Peace Research, Vol. 52, 3 (May 2015), 338--351. https://doi.org/10.1177/0022343314555782 Publisher: SAGE Publications Ltd.
[87]
M Angela Sasse. 2003. Computer Security: Anatomy of a Usability Disaster, and a Plan for Recovery. (April 2003), 5.
[88]
Morgan Klaus Scheuerman, Stacy M. Branham, and Foad Hamidi. 2018. Safe Spaces and Safe Places: Unpacking Technology-Mediated Experiences of Safety and Harm with Transgender People. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, CSCW (Nov. 2018), 155:1--155:27. https://doi.org/10.1145/3274424
[89]
Morgan Klaus Scheuerman, Kandrea Wade, Caitlin Lustig, and Jed R. Brubaker. 2020. How We've Taught Algorithms to See Identity: Constructing Race and Gender in Image Databases for Facial Analysis. Proceedings of the ACM on Human-Computer Interaction, Vol. 4, CSCW1 (May 2020), 058:1--058:35. https://doi.org/10.1145/3392866
[90]
Amre Shakimov, Harold Lim, Ramón Cáceres, Landon P. Cox, Kevin Li, Dongtao Liu, and Alexander Varshavsky. 2011. Vis-à-Vis: Privacy-preserving online social networking via Virtual Individual Servers. In 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011). 1--10. https://doi.org/10.1109/COMSNETS.2011.5716497
[91]
Manya Sleeper, Rebecca Balebako, Sauvik Das, Amber Lynn McConahy, Jason Wiese, and Lorrie Faith Cranor. 2013. The post that wasn't: exploring self-censorship on facebook. In Proceedings of the 2013 conference on Computer supported cooperative work (CSCW '13). Association for Computing Machinery, New York, NY, USA, 793--802. https://doi.org/10.1145/2441776.2441865
[92]
Manya Sleeper, William Melicher, Hana Habib, Lujo Bauer, Lorrie Faith Cranor, and Michelle L. Mazurek. 2016. Sharing Personal Content Online: Exploring Channel Choice and Multi-Channel Behaviors. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 101--112. https://doi.org/10.1145/2858036.2858170
[93]
Kaushal Solanki, Anindya Sarkar, and B. S. Manjunath. 2007. YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis. In Information Hiding, Teddy Furon, François Cayre, Gwenaël Doërr, and Patrick Bas (Eds.). Vol. 4567. Springer Berlin Heidelberg, Berlin, Heidelberg, 16--31. https://doi.org/10.1007/978--3--540--77370--2_2
[94]
Olivia Solon. 2017. 'It's digital colonialism': how Facebook's free internet service has failed its users. the Guardian (July 2017). http://www.theguardian.com/technology/2017/jul/27/facebook-free-basics-developing-markets Section: Technology.
[95]
Katta Spiel, Os Keyes, Ashley Marie Walker, Michael A. DeVito, Jeremy Birnholtz, Emeline Brulé, Ann Light, P?nar Barlas, Jean Hardy, Alex Ahmed, Jennifer A. Rode, Jed R. Brubaker, and Gopinaath Kannabiran. 2019. Queer(ing) HCI: Moving Forward in Theory and Practice. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems (CHI EA '19). Association for Computing Machinery, New York, NY, USA, 1--4. https://doi.org/10.1145/3290607.3311750
[96]
Charles Steinfield, Nicole B. Ellison, and Cliff Lampe. 2008. Social capital, self-esteem, and use of online social network sites: A longitudinal analysis. Journal of Applied Developmental Psychology, Vol. 29, 6 (Nov. 2008), 434--445. https://doi.org/10.1016/j.appdev.2008.07.002
[97]
Elizabeth Stoycheff, G. Scott Burgess, and Maria Clara Martucci. 2020. Online censorship and digital surveillance: the relationship between suppression technologies and democratization across countries. Information, Communication & Society, Vol. 23, 4 (March 2020), 474--490. https://doi.org/10.1080/1369118X.2018.1518472 Publisher: Routledge _eprint: https://doi.org/10.1080/1369118X.2018.1518472.
[98]
Frederic Stutzman and Woodrow Hartzog. 2012. Boundary regulation in social media. In Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work (CSCW '12). Association for Computing Machinery, New York, NY, USA, 769--778. https://doi.org/10.1145/2145204.2145320
[99]
Peter Swire and Kenesa Ahmad. 2011. 'Going Dark' Versus a "Golden Age for Surveillance. '. Center for Democracy and Technology (2011).
[100]
Alexandra Tereshonkova. 2016. Protection Vs. Empowerment: the State of the LGBT Child in Russia. Ph.D. Dissertation. Columbia University. https://doi.org/10.7916/D8FJ2H84
[101]
The ImageMagick Development Team. 2021. ImageMagick. https://imagemagick.org
[102]
Yannis Theocharis, Will Lowe, Jan W. van Deth, and Gema García-Albacete. 2015. Using Twitter to mobilize protest action: online mobilization patterns and action repertoires in the Occupy Wall Street, Indignados, and Aganaktismenoi movements. Information, Communication & Society, Vol. 18, 2 (Feb. 2015), 202--220. https://doi.org/10.1080/1369118X.2014.948035 Publisher: Routledge _eprint: https://doi.org/10.1080/1369118X.2014.948035.
[103]
Maria Vasilyeva. 2020. Russian LGBT activist fined for 'gay propaganda' family drawings. Reuters (July 2020). https://www.reuters.com/article/us-russia-activist-court-idUSKBN24B2IY
[104]
Andreas Westfeld. 2001. F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis. In Information Hiding, Gerhard Goos, Juris Hartmanis, Jan van Leeuwen, and Ira S. Moskowitz (Eds.). Vol. 2137. Springer Berlin Heidelberg, Berlin, Heidelberg, 289--302. https://doi.org/10.1007/3--540--45496--9_21 Series Title: Lecture Notes in Computer Science.
[105]
Alma Whitten and J Doug Tygar. 1999. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. In USENIX Security Symposium, Vol. 348. 169--184.
[106]
Tim Wu. 2010. The master switch: The rise and fall of information empires .Vintage.
[107]
Ching-man Au Yeung, Ilaria Liccardi, Kanghao Lu, Oshani Seneviratne, and Tim Berners-lee. 2009. Decentralization: The future of online social networking. In In W3C Workshop on the Future of Social Networking Position Papers.
[108]
John Zimmerman, Jodi Forlizzi, and Shelley Evenson. 2007. Research through design as a method for interaction design research in HCI. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 493--502. https://doi.org/10.1145/1240624.1240704
[109]
Shoshana Zuboff. 2019. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. PublicAffairs. Google-Books-ID: lRqrDQAAQBAJ.

Cited By

View all
  • (2024)Você decide quem POD: empoderando a/o estudante de computação quanto à propriedade de seus dadosAnais do IV Simpósio Brasileiro de Educação em Computação (EDUCOMP 2024)10.5753/educomp.2024.237559(367-374)Online publication date: 22-Apr-2024
  • (2024)Analyzing e-government agencies’ Twitter/X engagement: A case study of NevadaOnline Journal of Communication and Media Technologies10.30935/ojcmt/1501514:4(e202450)Online publication date: 2024
  • (2024)Cruising Queer HCI on the DL: A Literature Review of LGBTQ+ People in HCIProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642494(1-21)Online publication date: 11-May-2024
  • Show More Cited By

Index Terms

  1. Image DePO: Towards Gradual Decentralization of Online Social Networks using Decentralized Privacy Overlays

                      Recommendations

                      Comments

                      Information & Contributors

                      Information

                      Published In

                      cover image Proceedings of the ACM on Human-Computer Interaction
                      Proceedings of the ACM on Human-Computer Interaction  Volume 6, Issue CSCW1
                      CSCW1
                      April 2022
                      2511 pages
                      EISSN:2573-0142
                      DOI:10.1145/3530837
                      Issue’s Table of Contents
                      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

                      Publisher

                      Association for Computing Machinery

                      New York, NY, United States

                      Publication History

                      Published: 07 April 2022
                      Published in PACMHCI Volume 6, Issue CSCW1

                      Permissions

                      Request permissions for this article.

                      Check for updates

                      Author Tags

                      1. BIPOC
                      2. LGBTQ
                      3. decentralized
                      4. online social network
                      5. privacy
                      6. queer
                      7. steganography

                      Qualifiers

                      • Research-article

                      Contributors

                      Other Metrics

                      Bibliometrics & Citations

                      Bibliometrics

                      Article Metrics

                      • Downloads (Last 12 months)333
                      • Downloads (Last 6 weeks)59
                      Reflects downloads up to 28 Feb 2025

                      Other Metrics

                      Citations

                      Cited By

                      View all
                      • (2024)Você decide quem POD: empoderando a/o estudante de computação quanto à propriedade de seus dadosAnais do IV Simpósio Brasileiro de Educação em Computação (EDUCOMP 2024)10.5753/educomp.2024.237559(367-374)Online publication date: 22-Apr-2024
                      • (2024)Analyzing e-government agencies’ Twitter/X engagement: A case study of NevadaOnline Journal of Communication and Media Technologies10.30935/ojcmt/1501514:4(e202450)Online publication date: 2024
                      • (2024)Cruising Queer HCI on the DL: A Literature Review of LGBTQ+ People in HCIProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642494(1-21)Online publication date: 11-May-2024
                      • (2024)Advancing Trust in the Internet: Blockchain-driven Decentralized VPNs Leveraging Smart Contracts and PoS as Trust Factor Calculators2024 International Conference on Intelligent Systems for Cybersecurity (ISCS)10.1109/ISCS61804.2024.10581118(01-07)Online publication date: 3-May-2024
                      • (2022)Black Box Models for eXplainable Artificial IntelligenceExplainable AI: Foundations, Methodologies and Applications10.1007/978-3-031-12807-3_1(1-24)Online publication date: 20-Oct-2022

                      View Options

                      View options

                      PDF

                      View or Download as a PDF file.

                      PDF

                      eReader

                      View online with eReader.

                      eReader

                      Login options

                      Full Access

                      Figures

                      Tables

                      Media

                      Share

                      Share

                      Share this Publication link

                      Share on social media