Decaying Photos for Enhanced Privacy: User Perceptions Towards Temporal Redactions and 'Trusted' Platforms
Abstract
References
Index Terms
- Decaying Photos for Enhanced Privacy: User Perceptions Towards Temporal Redactions and 'Trusted' Platforms
Recommendations
Viewer Experience of Obscuring Scene Elements in Photos to Enhance Privacy
CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing SystemsWith the rise of digital photography and social networking, people are sharing personal photos online at an unprecedented rate. In addition to their main subject matter, photographs often capture various incidental information that could harm people's ...
Effectiveness and Users' Experience of Obfuscation as a Privacy-Enhancing Technology for Sharing Photos
Current collaborative photo privacy protection solutions can be categorized into two approaches: controlling the recipient, which restricts certain viewers' access to the photo, and controlling the content, which protects all or part of the photo from ...
Photo Privacy Protection on Online Social Networks
CSCW '18 Companion: Companion of the 2018 ACM Conference on Computer Supported Cooperative Work and Social ComputingThrough my doctoral research, I aim to provide a better online photo privacy protection strategy than existing approaches such as photo self-censorship and recipient control on Online Social Networks (OSNs). To inform the building for an effective and ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- Grang Thornton
- National Science Foundation
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 298Total Downloads
- Downloads (Last 12 months)218
- Downloads (Last 6 weeks)29
Other Metrics
Citations
Cited By
View allView Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in