[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article
Public Access

Decaying Photos for Enhanced Privacy: User Perceptions Towards Temporal Redactions and 'Trusted' Platforms

Published: 11 November 2022 Publication History

Abstract

With the rising popularity of photo sharing in online social media, interpersonal privacy violations, where one person violates the privacy of another, have become an increasing concern. Although applying image obfuscations can be a useful tool for improving privacy when sharing photos, prior studies have found these obfuscation techniques adversely affect viewers' satisfaction. On the other hand, ephemeral photos, popularized by apps such as Snapchat, allow viewers to see the entire photo, which then disappears shortly thereafter to protect privacy. However, people often use workarounds to save these photos before deletion. In this work, we study people's sharing preferences with two proposed 'temporal redactions', which combines ephemerality with redactions to allow viewers to see the entire image, yet make these images safe for longer storage through a gradual or delayed application of redaction on the sensitive portions of the photo. We conducted an online experiment (N=385) to study people's sharing behaviors in different contexts and under different levels of assurance provided by the viewer's platform (e.g., guaranteeing temporal redactions are applied through the use of 'trusted hardware'). Our findings suggest that the proposed temporal redaction mechanisms are often preferred over existing methods. On the other hand, more efforts are needed to convey the benefits of trusted hardware to users, as no significant differences were observed in attitudes towards 'trusted hardware' on viewers' devices.

References

[1]
Esther Addley. Photo-sharing is back: how social media has framed the pandemic. https://www.theguardian.com/world/2021/apr/16/photo-sharing-is-back-how-social-media-has-framed-the-pandemic, 2021.
[2]
Michael Adorjan and Rosemary Ricciardelli. A new privacy paradox? youth agentic practices of privacy management despite "nothing to hide" online. Canadian Review of Sociology/Revue canadienne de sociologie, 56(1):8--29, 2019.
[3]
Taslima Akter, Tousif Ahmed, Apu Kapadia, and Manohar Swaminathan. Shared privacy concerns of the visually impaired and sighted bystanders with camera based assistive technologies. ACM Transactions on Accessible Computing (TACCESS), 2021.
[4]
Taslima Akter, Bryan Dosono, Tousif Ahmed, Apu Kapadia, and Bryan Semaan. " i am uncomfortable sharing what i can't see": Privacy concerns of the visually impaired with camera based assistive applications. In 29th {USENIX} Security Symposium ({USENIX} Security 20), pages 1929--1948, 2020.
[5]
Saleem Alhabash and Mengyan Ma. A tale of four platforms: Motivations and uses of facebook, twitter, instagram, and snapchat among college students? Social media society, 3(1):2056305117691544, 2017.
[6]
Maryam S AlOshan. Information privacy violations in ephemeral communications. In Third International Congress on Information and Communication Technology, pages 63--77. Springer, 2019.
[7]
Mary Jean Amon, Rakibul Hasan, Kurt Hugenberg, Bennett I Bertenthal, and Apu Kapadia. Influencing photo sharing decisions on social media: A case of paradoxical findings. In 2020 IEEE Symposium on Security and Privacy (SP), pages 1350--1366. IEEE, 2020.
[8]
Farzaneh Asgharpour, Debin Liu, and L Jean Camp. Mental models of security risks. In International Conference on Financial Cryptography and Data Security. Springer, 2007.
[9]
Oshrat Ayalon and Eran Toch. Retrospective privacy: Managing longitudinal privacy in online social networks. In Proceedings of the Ninth Symposium on Usable Privacy and Security, pages 1--13, 2013.
[10]
Saeideh Bakhshi, David A Shamma, and Eric Gilbert. Faces engage us: Photos with faces attract more likes and comments on instagram. In Proceedings of the SIGCHI conference on human factors in computing systems, pages 965--974, 2014.
[11]
Debjanee Barua, Judy Kay, Bob Kummerfeld, and Cecile Paris. Theoretical foundations for user-controlled forgetting in scrutable long term user models. In Proceedings of the 23rd Australian Computer-Human Interaction Conference, pages 40--49, 2011.
[12]
Lujo Bauer, Lorrie Faith Cranor, Saranga Komanduri, Michelle L Mazurek, Michael K Reiter, Manya Sleeper, and Blase Ur. The post anachronism: The temporal dimension of facebook privacy. In Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society, pages 1--12, 2013.
[13]
Joseph B Bayer, Nicole B Ellison, Sarita Y Schoenebeck, and Emily B Falk. Sharing the small moments: ephemeral social interaction on snapchat. Information, Communication & Society, 19(7):956--977, 2016.
[14]
Michael Bernstein, Andrés Monroy-Hernández, Drew Harry, Paul André, Katrina Panovich, and Greg Vargas. 4chan and/b: An analysis of anonymity and ephemerality in a large online community. In Proceedings of the International AAAI Conference on Web and Social Media, volume 5, 2011.
[15]
Andrew Besmer and Heather Richter Lipford. Moving beyond untagging: photo privacy in a tagged world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 1563--1572, 2010.
[16]
Sruti Bhagavatula, Lujo Bauer, and Apu Kapadia. What breach? Measuring online awareness of security incidents by studying real-world browsing behavior. In 2021 European Symposium on Usable Security. ACM, October 2021.
[17]
Jens F Binder, Andrew Howes, and Daniel Smart. Harmony and tension on social network sites: Side-effects of increasing online interconnectivity. Information, Communication & Society, 15(9):1279--1297, 2012.
[18]
Dmitri Bitouk, Neeraj Kumar, Samreen Dhillon, Peter Belhumeur, and Shree K Nayar. Face swapping: automatically replacing faces in photographs. In ACM SIGGRAPH 2008 papers, pages 1--8. 2008.
[19]
Rebecca Borison. This hack lets people save your snapchats for all of eternity. https://www.businessinsider.com/save-your-snapchats-forever-2014--7, 2014.
[20]
Kelly Caine. Exploring everyday privacy behaviors and misclosures. Georgia Institute of Technology, 2009.
[21]
Tae Rang Choi and Yongjun Sung. Instagram versus snapchat: Self-expression and privacy concern on social media. Telematics and Informatics, 35(8):2289--2298, 2018.
[22]
Amanda Conway. Face blurring: when footage requires anonymity. https://blog.youtube/news-and-events/face-blurring-when-footage-requires/, 2012.
[23]
Eric C Cook and Stephanie D Teasley. Beyond promotion and protection: Creators, audiences and common ground in user-generated media. In Proceedings of the 2011 iConference, pages 41--47. 2011.
[24]
Marciano da Rocha, Dalton Cézane Gomes Valadares, Angelo Perkusich, Kyller Costa Gorgonio, Rodrigo Tomaz Pagno, and Newton Carlos Will. Secure cloud storage with client-side encryption using a trusted execution environment. arXiv preprint arXiv:2003.04163, 2020.
[25]
Sanchari Das, Tousif Ahmed, Apu Kapadia, and Sameer Patil. Does this photo make me look good? how social media feedback on photos impacts posters, outsiders, and friends. Proceedings of the ACM on Human-Computer Interaction, 5(CSCW1):1--32, 2021.
[26]
Nicola Davinson and Elizabeth Sillence. It won't happen to me: Promoting secure behaviour among internet users. Computers in Human Behavior, 26(6):1739--1747, 2010.
[27]
Bernhard Debatin, Jennette P Lovejoy, Ann-Kathrin Horn, and Brittany N Hughes. Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of computer-mediated communication, 15(1):83--108, 2009.
[28]
Mariella Dimiccoli, Juan Marín, and Edison Thomaz. Mitigating bystander privacy concerns in egocentric activity recognition with deep learning and intentional image degradation. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 1(4):1--18, 2018.
[29]
Judicael B Djoko, Jack Lange, and Adam J Lee. Nexus: Practical and secure access control on untrusted storage platforms using client-side sgx. In 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pages 401--413. IEEE, 2019.
[30]
R. A. Fisher. Xv.-the correlation between relatives on the supposition of mendelian inheritance. Transactions of the Royal Society of Edinburgh, 52(2):399--433, 1919.
[31]
Ronald Aylmer Fisher. Statistical methods for research workers. In Breakthroughs in statistics, pages 66--70. Springer, 1992.
[32]
Arturo Flores and Serge Belongie. Removing pedestrians from google street view images. In 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition-Workshops, pages 53--58. IEEE, 2010.
[33]
Julia Grenberg. Photobucket breach floods web with racy images. https://www.cnn.com/2012/08/09/tech/photobucket-privacy-breach, 2012.
[34]
Rebecca Gulotta, William Odom, Jodi Forlizzi, and Haakon Faste. Digital artifacts as legacy: exploring the lifespan and value of digital data. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 1813--1822, 2013.
[35]
Seda Gürses and Claudia Diaz. Two tales of privacy in online social networks. IEEE Security & Privacy, 11(3):29--37, 2013.
[36]
Rakibul Hasan, Eman Hassan, Yifang Li, Kelly Caine, David J Crandall, Roberto Hoyle, and Apu Kapadia. Viewer experience of obscuring scene elements in photos to enhance privacy. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pages 1--13, 2018.
[37]
Rakibul Hasan, Yifang Li, Eman Hassan, Kelly Caine, David J Crandall, Roberto Hoyle, and Apu Kapadia. Can privacy be satisfying? on improving viewer satisfaction for privacy-enhanced photos using aesthetic transforms. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, pages 1--13, 2019.
[38]
Rakibul Hasan, Patrick Shaffer, David Crandall, Eman T Apu Kapadia, et al. Cartooning for enhanced privacy in lifelogging and streaming videos. In Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pages 29--38, 2017.
[39]
Jianping He, Bin Liu, Deguang Kong, Xuan Bao, Na Wang, Hongxia Jin, and George Kesidis. Puppies: Transformation-supported personalized privacy preserving partial image sharing. In 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pages 359--370, 2016.
[40]
Donell Holloway and Lelia Green. Mediated memory making: The virtual family photograph album. Communications, 42(3):351--368, 2017.
[41]
Roberto Hoyle. Privacy considerations in the context of wearable cameras. PhD thesis, Indiana University, 2016.
[42]
Roberto Hoyle, Luke Stark, Qatrunnada Ismail, David Crandall, Apu Kapadia, and Denise Anthony. Privacy norms and preferences for photos posted online. ACM Transactions on Computer-Human Interaction (ACM TOCHI), 27(4), August 2020.
[43]
Roberto Hoyle, Robert Templeman, Denise Anthony, David Crandall, and Apu Kapadia. Sensitive lifelogs: A privacy analysis of photos from wearable cameras. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI '15, page 1645--1648, New York, NY, USA, 2015. Association for Computing Machinery.
[44]
Roberto Hoyle, Robert Templeman, Steven Armes, Denise Anthony, David Crandall, and Apu Kapadia. Privacy behaviors of lifeloggers using wearable cameras. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp '14, page 571--582, New York, NY, USA, 2014. Association for Computing Machinery.
[45]
Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, and Sotiris Ioannidis. Face/off: Preventing privacy leakage from photos in social networks. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pages 781--792, 2015.
[46]
Nicolas Jacquemet, Alexander G James, Stéphane Luchini, James J Murphy, and Jason F Shogren. Do truth-telling oaths improve honesty in crowd-working? PloS one, 16(1):e0244958, 2021.
[47]
Yousra Javed, Mohamed Shehab, and Emmanuel Bello-Ogunu. Investigating user comprehension and risk perception of apple's touch id technology. In Proceedings of the 12th International Conference on Availability, Reliability and Security, pages 1--6, 2017.
[48]
Lukasz Jedrzejczyk, Blaine A Price, Arosha K Bandara, and Bashar Nuseibeh. On the impact of real-time feedback on users' behaviour in mobile location-sharing applications. In Proceedings of the Sixth Symposium on Usable Privacy and Security, pages 1--12, 2010.
[49]
Nathan Jurgenson. Temporary social media. https://newsroom.snap.com/temporary-social-media/, 2013.
[50]
James E Katz and Elizabeth Thomas Crocker. Selfies| selfies and photo messaging as visual conversation: Reports from the united states, united kingdom and china. International Journal of Communication, 9:12, 2015.
[51]
Zubeida Casmod Khan, Thulani Mashiane, and Nobubele A Shozi. Snapchat media retrieval for novice device users. In Proceedings of the 10th International Conference on Cyber Warfare and Security, pages 162--169, 2015.
[52]
Bart Piet Knijnenburg and Alfred Kobsa. Increasing sharing tendency without reducing satisfaction: Finding the best privacy-settings user interface for social networks. In ICIS, 2014.
[53]
Iryna Korshunova, Wenzhe Shi, Joni Dambre, and Lucas Theis. Fast face-swap using convolutional neural networks. In Proceedings of the IEEE international conference on computer vision, pages 3677--3685, 2017.
[54]
Balachander Krishnamurthy and Craig E Wills. On the leakage of personally identifiable information via online social networks. In Proceedings of the 2nd ACM workshop on Online social networks, pages 7--12, 2009.
[55]
Oksana Kulyk, Kristina Milanovic, and Jeremy Pitt. Does my smart device provider care about my privacy? investigating trust factors and user attitudes in iot systems. In Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society, pages 1--12, 2020.
[56]
Daniel Lakens. Calculating and reporting effect sizes to facilitate cumulative science: a practical primer for t-tests and anovas. Frontiers in Psychology, 4:863, 2013.
[57]
Alex Leavitt. "this is a throwaway account": Temporary technical identities and perceptions of anonymity in a massive online community. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work amp; Social Computing, CSCW '15, page 317--327, New York, NY, USA, 2015. Association for Computing Machinery.
[58]
Wenjie Li, Rongrong Ni, and Yao Zhao. Jpeg photo privacy-preserving algorithm based on sparse representation and data hiding. In International Conference on Image and Graphics, pages 575--586. Springer, 2017.
[59]
Yifang Li, Nishant Vishwamitra, Hongxin Hu, and Kelly Caine. Towards a taxonomy of content sensitivity and sharing preferences for photos. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pages 1--14, 2020.
[60]
Yifang Li, Nishant Vishwamitra, Bart P Knijnenburg, Hongxin Hu, and Kelly Caine. Effectiveness and users' experience of obfuscation as a privacy-enhancing technology for sharing photos. Proceedings of the ACM on Human-Computer Interaction, 1(CSCW):1--24, 2017.
[61]
Yabing Liu, Krishna P Gummadi, Balachander Krishnamurthy, and Alan Mislove. Analyzing facebook privacy settings: user expectations vs. reality. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, pages 61--70, 2011.
[62]
Stine Lomborg and Anja Bechmann. Using apis for data collection on social media. The Information Society, 30(4):256--265, 2014.
[63]
Andrés Lucero, Jussi Holopainen, and Tero Jokela. Pass-them-around: collaborative use of mobile phones for photo sharing. In Proceedings of the SIGCHI conference on human factors in computing systems, pages 1787--1796, 2011.
[64]
Michelle Madejski, Maritza Johnson, and Steven M Bellovin. A study of privacy settings errors in an online social network. In 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, pages 340--345. IEEE, 2012.
[65]
Aqdas Malik, Amandeep Dhir, and Marko Nieminen. Uses and gratifications of digital photo sharing on facebook. Telematics and Informatics, 33(1):129--138, 2016.
[66]
Richard McPherson, Reza Shokri, and Vitaly Shmatikov. Defeating image obfuscation with deep learning. arXiv preprint arXiv:1609.00408, 2016.
[67]
Reham Ebada Mohamed and Sonia Chiasson. Online privacy and aging of digital artifacts. In Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018), pages 177--195, 2018.
[68]
Vivian Genaro Motti and Kelly Caine. Users' privacy concerns about wearables. In International Conference on Financial Cryptography and Data Security, pages 231--244. Springer, 2015.
[69]
Alexios Mylonas, Dimitris Gritzalis, Bill Tsoumas, and Theodore Apostolopoulos. A qualitative metrics vector for the awareness of smartphone security users. In International Conference on Trust, Privacy and Security in Digital Business, pages 173--184. Springer, 2013.
[70]
Angelo Nodari, Marco Vanetti, and Ignazio Gallo. Digital privacy: Replacing pedestrians from google street view images. In Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012), pages 2889--2893. IEEE, 2012.
[71]
Anne Oeldorf-Hirsch and S Shyam Sundar. Social and technological motivations for online photo sharing. Journal of Broadcasting & Electronic Media, 60(4):624--642, 2016.
[72]
Seong Joon Oh, Rodrigo Benenson, Mario Fritz, and Bernt Schiele. Faceless person recognition: Privacy implications in social media. In European Conference on Computer Vision, pages 19--35. Springer, 2016.
[73]
Fernando Kaway Carvalho Ota, Jorge Augusto Meira, Cyril Renaud Cassagnes, and Radu State. Mobile app to sgx enclave secure channel. In 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), pages 258--263. IEEE, 2019.
[74]
Global Platform. ?tee system architecture. Global Platform technical overview, 2011.
[75]
Moo-Ryong Ra, Ramesh Govindan, and Antonio Ortega. P3: Toward privacy-preserving photo sharing. In 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13), pages 515--528, Lombard, IL, April 2013. USENIX Association.
[76]
Yasmeen Rashidi, Tousif Ahmed, Felicia Patel, Emily Fath, Apu Kapadia, Christena Nippert-Eng, and Norman Makoto Su. " you don't want to be the next meme": College students' workarounds to manage privacy in the era of pervasive photography. In Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018), pages 143--157, 2018.
[77]
Mohamed Sabt, Mohammed Achemlal, and Abdelmadjid Bouabdallah. Trusted execution environment: what it is, and what it is not. In 2015 IEEE Trustcom/BigDataSE/ISPA, volume 1, pages 57--64. IEEE, 2015.
[78]
Lynsay A Shepherd, Jacqueline Archibald, and Robert Ian Ferguson. Assessing the impact of affective feedback on end-user security awareness. In International Conference on Human Aspects of Information Security, Privacy, and Trust, pages 143--159. Springer, 2017.
[79]
Jiayu Shu, Rui Zheng, and Pan Hui. Cardea: Context-aware visual privacy protection for photo taking and sharing. In Proceedings of the 9th ACM Multimedia Systems Conference, pages 304--315, 2018.
[80]
M Six Silberman, Bill Tomlinson, Rochelle LaPlante, Joel Ross, Lilly Irani, and Andrew Zaldivar. Responsible research with crowds: pay crowdworkers at least minimum wage. Communications of the ACM, 61(3):39--41, 2018.
[81]
Kit Smith. 53 incredible facebook statistics and facts. https://www.brandwatch.com/blog/facebook-statistics/, 2019.
[82]
Vidi Sukmayadi and Azizul Halim Yahya. Impression management within a phenomenological study. The Open Psychology Journal, 12(1), 2019.
[83]
Qianru Sun, Liqian Ma, Seong Joon Oh, Luc Van Gool, Bernt Schiele, and Mario Fritz. Natural and effective obfuscation by head inpainting. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 5050--5059, 2018.
[84]
Leman Pinar Tosun. Motives for facebook use and expressing "true self" on the internet. Computers in human behavior, 28(4):1510--1517, 2012.
[85]
Lam Tran, Deguang Kong, Hongxia Jin, and Ji Liu. Privacy-cnh: A framework to detect photo privacy with convolutional neural network using hierarchical features. In Proceedings of the AAAI Conference on Artificial Intelligence, volume 30, 2016.
[86]
Sonja Utz, Nicole Muscanell, and Cameran Khalid. Snapchat elicits more jealousy than facebook: A comparison of snapchat and facebook use. Cyberpsychology, Behavior, and Social Networking, 18(3):141--146, 2015.
[87]
T Franklin Waddell. The allure of privacy or the desire for self-expression? identifying users' gratifications for ephemeral, photograph-based communication. Cyberpsychology, Behavior, and Social Networking, 19(7):441--445, 2016.
[88]
Wenbo Wang, Hean Tat Keh, and Lisa E Bolton. Lay theories of medicine and a healthy lifestyle. Journal of Consumer Research, 37(1):80--97, 2010.
[89]
Valerie SL Williams, Lyle V Jones, and John W Tukey. Controlling error in multiple comparisons, with examples from state-to-state differences in educational achievement. Journal of educational and behavioral statistics, 24(1):42--69, 1999.
[90]
Pamela Wisniewski, AKM Islam, Heather Richter Lipford, and David C Wilson. Framing and measuring multi- dimensional interpersonal privacy preferences of social networking site users. Communications of the Association for information systems, 38(1):10, 2016.
[91]
Kaihe Xu, Yuanxiong Guo, Linke Guo, Yuguang Fang, and Xiaolin Li. My privacy my decision: Control of photo sharing on online social networks. IEEE Transactions on Dependable and Secure Computing, 14(2):199--210, 2015.
[92]
Toshio Yamagishi. The provision of a sanctioning system as a public good. Journal of Personality and social Psychology, 51(1):110, 1986.
[93]
Toshio Yamagishi and Midori Yamagishi. Trust and commitment in the united states and japan. Motivation and emotion, 18(2):129--166, 1994.
[94]
Sen-Chi Yu and Hong-Ren Chen. Ephemeral but influential? the correlation between facebook stories usage, addiction, narcissism, and positive affect. In Healthcare, volume 8, page 435. Multidisciplinary Digital Publishing Institute, 2020.
[95]
Lin Yuan, Pavel Korshunov, and Touradj Ebrahimi. Secure jpeg scrambling enabling privacy in photo sharing. In 2015 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), volume 4, pages 1--6. IEEE, 2015.

Cited By

View all

Index Terms

  1. Decaying Photos for Enhanced Privacy: User Perceptions Towards Temporal Redactions and 'Trusted' Platforms

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Proceedings of the ACM on Human-Computer Interaction
    Proceedings of the ACM on Human-Computer Interaction  Volume 6, Issue CSCW2
    CSCW
    November 2022
    8205 pages
    EISSN:2573-0142
    DOI:10.1145/3571154
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 November 2022
    Published in PACMHCI Volume 6, Issue CSCW2

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. image obfuscation
    2. photo sharing
    3. privacy
    4. trusted hardware

    Qualifiers

    • Research-article

    Funding Sources

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 298
      Total Downloads
    • Downloads (Last 12 months)218
    • Downloads (Last 6 weeks)29
    Reflects downloads up to 16 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media