ABSTRACT
Users often have rich and complex photo-sharing preferences, but properly configuring access control can be difficult and time-consuming. In an 18-participant laboratory study, we explore whether the keywords and captions with which users tag their photos can be used to help users more intuitively create and maintain access-control policies. We find that (a) tags created for organizational purposes can be repurposed to create efficient and reasonably accurate access-control rules; (b) users tagging with access control in mind develop coherent strategies that lead to significantly more accurate rules than those associated with organizational tags alone; and (c) participants can understand and actively engage with the concept of tag-based access control.
- Ahern, S., Eckles, D., Good, N. S., King, S., Naaman, M., and Nair, R. Over-exposed?: privacy patterns and considerations in online and mobile photo sharing. In Proc. CHI, 2007 (2007), 357--366. Google ScholarDigital Library
- Ames, M., and Naaman, M. Why we tag: motivations for annotation in mobile and online media. In Proc. CHI (2007), 971--980. Google ScholarDigital Library
- Au Yeung, C., Kagal, L., Gibbins, N., and Shadbolt, N. Providing access control to online photo albums based on tags and linked data. In Social Semantic Web (2009).Google Scholar
- Besmer, A., and Richter Lipford, H. Moving beyond untagging: photo privacy in a tagged world. In Proc. CHI (2010), 1563--1572. Google ScholarDigital Library
- Gupta, M., Li, R., Yin, Z., and Han, J. Survey on social tagging techniques. SIGKDD Explor. Newsl. 12 (November 2010), 58--72. Google ScholarDigital Library
- Hart, M., Castille, C., Johnson, R., and Stent, A. Usable privacy controls for blogs. In Proc. ICCSE (2009), 401--408. Google ScholarDigital Library
- Kirk, D., Sellen, A., Rother, C., and Wood, K. Understanding photowork. In Proc. CHI (2006), 761--770. Google ScholarDigital Library
- Maxion, R. A., and Reeder, R. W. Improving user-interface dependability through mitigation of human error. Int. J. Hum.-Comput. Stud. 63 (July 2005), 25--50. Google ScholarDigital Library
- Mazurek, M. L., Arsenault, J. P., Bresee, J., Gupta, N., Ion, I., Johns, C., Lee, D., Liang, Y., Olsen, J., Salmon, B., Shay, R., Vaniea, K., Bauer, L., Cranor, L. F., Ganger, G. R., and Reiter, M. K. Access control for home data sharing: Attitudes, needs and practices. In Proc. CHI, 2010 (2010), 645--654. Google ScholarDigital Library
- Mazurek, M. L., Klemperer, P. F., Shay, R., Takabi, H., Bauer, L., and Cranor, L. F. Exploring reactive access control. In Proc. CHI (2011), 2085--2094. Google ScholarDigital Library
- Miller, A. D., and Edwards, W. K. Give and take: a study of consumer photo-sharing culture and practice. In Proc. CHI (2007), 347--356. Google ScholarDigital Library
- Mitchell, T. Machine Learning. McGraw-Hill, 1997. Google ScholarDigital Library
- Nov, O., Naaman, M., and Ye, C. What drives content tagging: the case of photos on Flickr. In Proc. CHI (2008), 1097--1100. Google ScholarDigital Library
- Olson, J. S., Grudin, J., and Horvitz, E. A study of preferences for sharing and privacy. CHI EA (2005), 1985--1988. Google ScholarDigital Library
- Ramasubramanian, V., Rodeheffer, T. L., Terry, D. B., Walraed-Sullivan, M., Wobber, T., Marshall, C. C., and Vahdat, A. Cimbiosys: a platform for content-based partial replication. In Proc. NSDI (2009), 261--276. Google ScholarDigital Library
- Razavi, M. N., and Iverson, L. A grounded theory of information sharing behavior in a personal learning space. In Proc. CSCW (2006), 459--468. Google ScholarDigital Library
- Reeder, R., Bauer, L., Cranor, L., Reiter, M., Bacon, K., How, K., and Strong, H. Expandable grids for visualizing and authoring computer security policies. In Proc. CHI (2008), 1473--1482. Google ScholarDigital Library
- Riva, O., Yin, Q., Juric, D., Ucan, E., and Roscoe, T. Policy expressivity in the anzere personal cloud. In Proc. SOCC (2011), 14:1--14:14. Google ScholarDigital Library
- Salmon, B., Schlosser, S. W., Cranor, L. F., and Ganger, G. R. Perspective: semantic data management for the home. In Proc. FAST (2009), 167--182. Google ScholarDigital Library
- Seltzer, M., and Murphy, N. Hierarchical file systems are dead. In Proc. HotOS (2009), 1--1. Google ScholarDigital Library
- Sigurbjörnsson, B., and van Zwol, R. Flickr tag recommendation based on collective knowledge. In Proc. WWW (2008), 327--336. Google ScholarDigital Library
- Smetters, D. K., and Good, N. How users use access control. In Proc. SOUPS (2009), 15:1--15:12. Google ScholarDigital Library
- Squicciarini, A. C., Sundareswaran, S., Lin, D., and Wede, J. A3p: adaptive policy prediction for shared images over popular content sharing sites. In Proc. Hypertext and Hypermedia (2011), 261--270. Google ScholarDigital Library
- Voida, S., Edwards, W. K., Newman, M. W., Grinter, R. E., and Ducheneaut, N. Share and share alike: exploring the user interface affordances of file sharing. In Proc. CHI (2006), 221--230. Google ScholarDigital Library
- Vyas, N., Squicciarini, A. C., Chang, C.-C., and Yao, D. Towards automatic privacy management in Web 2.0 with semantic analysis on annotations. In Proc. CollaboateCom (2009), 1--10.Google ScholarCross Ref
- Zubiaga, A., Körner, C., and Strohmaier, M. Tags vs shelves: from social tagging to social classification. In Proc. Hypertext and Hypermedia (2011), 93--102. Google ScholarDigital Library
Index Terms
- Tag, you can see it!: using tags for access control in photo sharing
Recommendations
Tag navigation
SoSEA '09: Proceedings of the 2nd international workshop on Social software engineering and applicationsThe amount of information available on the world wide web keeps growing at an exponential pace. Social tagging is a feature of various online social networks to organize information elements by letting people label these with free-form text, called ...
Automatic tag expansion using visual similarity for photo sharing websites
In this paper we present an automatic photo tag expansion method designed for photo sharing websites. The purpose of the method is to suggest tags that are relevant to the visual content of a given photo at upload time. Both textual and visual cues are ...
Why we tag: motivations for annotation in mobile and online media
CHI '07: Proceedings of the SIGCHI Conference on Human Factors in Computing SystemsWhy do people tag? Users have mostly avoided annotating media such as photos -- both in desktop and mobile environments -- despite the many potential uses for annotations, including recall and retrieval. We investigate the incentives for annotation in ...
Comments