skip to main content
10.1145/2207676.2207728acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Tag, you can see it!: using tags for access control in photo sharing

Authors Info & Claims
Published:05 May 2012Publication History

ABSTRACT

Users often have rich and complex photo-sharing preferences, but properly configuring access control can be difficult and time-consuming. In an 18-participant laboratory study, we explore whether the keywords and captions with which users tag their photos can be used to help users more intuitively create and maintain access-control policies. We find that (a) tags created for organizational purposes can be repurposed to create efficient and reasonably accurate access-control rules; (b) users tagging with access control in mind develop coherent strategies that lead to significantly more accurate rules than those associated with organizational tags alone; and (c) participants can understand and actively engage with the concept of tag-based access control.

References

  1. Ahern, S., Eckles, D., Good, N. S., King, S., Naaman, M., and Nair, R. Over-exposed?: privacy patterns and considerations in online and mobile photo sharing. In Proc. CHI, 2007 (2007), 357--366. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Ames, M., and Naaman, M. Why we tag: motivations for annotation in mobile and online media. In Proc. CHI (2007), 971--980. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Au Yeung, C., Kagal, L., Gibbins, N., and Shadbolt, N. Providing access control to online photo albums based on tags and linked data. In Social Semantic Web (2009).Google ScholarGoogle Scholar
  4. Besmer, A., and Richter Lipford, H. Moving beyond untagging: photo privacy in a tagged world. In Proc. CHI (2010), 1563--1572. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Gupta, M., Li, R., Yin, Z., and Han, J. Survey on social tagging techniques. SIGKDD Explor. Newsl. 12 (November 2010), 58--72. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Hart, M., Castille, C., Johnson, R., and Stent, A. Usable privacy controls for blogs. In Proc. ICCSE (2009), 401--408. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Kirk, D., Sellen, A., Rother, C., and Wood, K. Understanding photowork. In Proc. CHI (2006), 761--770. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Maxion, R. A., and Reeder, R. W. Improving user-interface dependability through mitigation of human error. Int. J. Hum.-Comput. Stud. 63 (July 2005), 25--50. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Mazurek, M. L., Arsenault, J. P., Bresee, J., Gupta, N., Ion, I., Johns, C., Lee, D., Liang, Y., Olsen, J., Salmon, B., Shay, R., Vaniea, K., Bauer, L., Cranor, L. F., Ganger, G. R., and Reiter, M. K. Access control for home data sharing: Attitudes, needs and practices. In Proc. CHI, 2010 (2010), 645--654. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Mazurek, M. L., Klemperer, P. F., Shay, R., Takabi, H., Bauer, L., and Cranor, L. F. Exploring reactive access control. In Proc. CHI (2011), 2085--2094. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Miller, A. D., and Edwards, W. K. Give and take: a study of consumer photo-sharing culture and practice. In Proc. CHI (2007), 347--356. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Mitchell, T. Machine Learning. McGraw-Hill, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Nov, O., Naaman, M., and Ye, C. What drives content tagging: the case of photos on Flickr. In Proc. CHI (2008), 1097--1100. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Olson, J. S., Grudin, J., and Horvitz, E. A study of preferences for sharing and privacy. CHI EA (2005), 1985--1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Ramasubramanian, V., Rodeheffer, T. L., Terry, D. B., Walraed-Sullivan, M., Wobber, T., Marshall, C. C., and Vahdat, A. Cimbiosys: a platform for content-based partial replication. In Proc. NSDI (2009), 261--276. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Razavi, M. N., and Iverson, L. A grounded theory of information sharing behavior in a personal learning space. In Proc. CSCW (2006), 459--468. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Reeder, R., Bauer, L., Cranor, L., Reiter, M., Bacon, K., How, K., and Strong, H. Expandable grids for visualizing and authoring computer security policies. In Proc. CHI (2008), 1473--1482. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Riva, O., Yin, Q., Juric, D., Ucan, E., and Roscoe, T. Policy expressivity in the anzere personal cloud. In Proc. SOCC (2011), 14:1--14:14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Salmon, B., Schlosser, S. W., Cranor, L. F., and Ganger, G. R. Perspective: semantic data management for the home. In Proc. FAST (2009), 167--182. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Seltzer, M., and Murphy, N. Hierarchical file systems are dead. In Proc. HotOS (2009), 1--1. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Sigurbjörnsson, B., and van Zwol, R. Flickr tag recommendation based on collective knowledge. In Proc. WWW (2008), 327--336. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Smetters, D. K., and Good, N. How users use access control. In Proc. SOUPS (2009), 15:1--15:12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Squicciarini, A. C., Sundareswaran, S., Lin, D., and Wede, J. A3p: adaptive policy prediction for shared images over popular content sharing sites. In Proc. Hypertext and Hypermedia (2011), 261--270. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Voida, S., Edwards, W. K., Newman, M. W., Grinter, R. E., and Ducheneaut, N. Share and share alike: exploring the user interface affordances of file sharing. In Proc. CHI (2006), 221--230. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Vyas, N., Squicciarini, A. C., Chang, C.-C., and Yao, D. Towards automatic privacy management in Web 2.0 with semantic analysis on annotations. In Proc. CollaboateCom (2009), 1--10.Google ScholarGoogle ScholarCross RefCross Ref
  26. Zubiaga, A., Körner, C., and Strohmaier, M. Tags vs shelves: from social tagging to social classification. In Proc. Hypertext and Hypermedia (2011), 93--102. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Tag, you can see it!: using tags for access control in photo sharing

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CHI '12: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
          May 2012
          3276 pages
          ISBN:9781450310154
          DOI:10.1145/2207676

          Copyright © 2012 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 5 May 2012

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate6,199of26,314submissions,24%

          Upcoming Conference

          CHI '24
          CHI Conference on Human Factors in Computing Systems
          May 11 - 16, 2024
          Honolulu , HI , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader