Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 2012
DOI: 10.1145/2207676.2207728
|View full text |Cite
|
Sign up to set email alerts
|

Tag, you can see it!

Abstract: Users often have rich and complex photo-sharing preferences, but properly configuring access control can be difficult and time-consuming. In an 18-participant laboratory study, we explore whether the keywords and captions with which users tag their photos can be used to help users more intuitively create and maintain access-control policies. We find that (a) tags created for organizational purposes can be repurposed to create efficient and reasonably accurate access-control rules; (b) users tagging with access… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 74 publications
(5 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…As an extension to the relationship-based access control mechanism, Klemperer et al [22] propose using photo tags for defining privacy policies. The main goal of this work is to reduce the complexity of relationship-based policies and take advantage of contextual properties of photo tags.…”
Section: Related Workmentioning
confidence: 99%
“…As an extension to the relationship-based access control mechanism, Klemperer et al [22] propose using photo tags for defining privacy policies. The main goal of this work is to reduce the complexity of relationship-based policies and take advantage of contextual properties of photo tags.…”
Section: Related Workmentioning
confidence: 99%
“…To that end, the photo-posting user experience can be augmented with computational techniques that warn users when they try to post photos that Friends, Followers, and outsiders might view less favorably. For example, prior research has looked into predicting access control policies for photos based on their tags [35].…”
Section: Photo Posts Vs Text Postsmentioning
confidence: 99%
“…Psychological acceptability of protection mechanisms has been largely recognized as a main challenge in the security research community since the seminal work of Saltzer and Schroeder [1975]. For instance, policy specification has been recognized as a difficult and costly task for end-users [Fang and LeFevre 2010;Klemperer et al 2012;Squicciarini et al 2017]. This is even more challenging in community-centered systems mainly due to the multi-party nature of these systems, wherein the members of the community should collaboratively specify protection requirements for shared resources.…”
Section: Community-centered Collaborative Systemsmentioning
confidence: 99%
“…Existing approaches vary significantly with respect to the features used to generate privacy preferences; see Table VI for an overview. Some approaches derive privacy settings from image metadata (e.g., tags) [Klemperer et al 2012;Squicciarini et al 2010], other from personal traits (e.g., location, age) and/or social context (e.g., friend list) [Fang and LeFevre 2010]. Squicciarini et al [2010] discuss two alternative approaches to assist users in the automated generation of privacy settings, thus, freeing them from the burden of specifying a privacy policy for co-owned images.…”
Section: Usability and Transparencymentioning
confidence: 99%