skip to main content
research-article
Public Access

Effectiveness and Users' Experience of Obfuscation as a Privacy-Enhancing Technology for Sharing Photos

Published: 06 December 2017 Publication History

Abstract

Current collaborative photo privacy protection solutions can be categorized into two approaches: controlling the recipient, which restricts certain viewers' access to the photo, and controlling the content, which protects all or part of the photo from being viewed. Focusing on the latter approach, we introduce privacy-enhancing obfuscations for photos and conduct an online experiment with 271 participants to evaluate their effectiveness against human recognition and how they affect the viewing experience. Results indicate the two most common obfuscations, blurring and pixelating, are ineffective. On the other hand, inpainting, which removes an object or person entirely, and avatar, which replaces content with a graphical representation are effective. From a viewer experience perspective, blurring, pixelating, inpainting, and avatar are preferable. Based on these results, we suggest inpainting and avatar may be useful as privacy-enhancing technologies for photos, because they are both effective at increasing privacy for elements of a photo and provide a good viewer experience.

References

[1]
Prachi Agrawal. 2010. De-Identification for Privacy Protection in Surveillance Videos. Ph.D. Dissertation. International Institute of Information Technology Hyderabad, India.
[2]
Hazim Almuhimedi, Shomir Wilson, Bin Liu, Norman Sadeh, and Alessandro Acquisti. 2013. Tweets are forever: a large-scale quantitative analysis of deleted tweets. In Proceedings of the 2013 conference on Computer supported cooperative work. ACM, 897--908.
[3]
Irwin Altman. 1975. The environment and social behavior. (1975).
[4]
Eric P.S. Baumer, Xiaotong Xu, Christine Chu, Shion Guha, and Geri K. Gay. 2017. When Subjects Interpret the Data: Social Media Non-use As a Case for Adapting the Delphi Method to CSCW. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17). ACM, New York, NY, USA, 1527--1543.
[5]
Gary Bente, Sabine Rüggenberg, Nicole C. Krämer, and Felix Eschenburg. 2008. Avatar-Mediated Networking: Increasing Social Presence and Interpersonal Trust in Net-Based Collaborations. Human communication research 34, 2 (2008), 287--318.
[6]
Andrew Besmer and Heather Lipford. 2009. Tagged photos: concerns, perceptions, and protections. In CHI'09 Extended Abstracts on Human Factors in Computing Systems. ACM, 4585--4590.
[7]
Andrew Besmer and Heather Richter Lipford. 2010. Moving beyond untagging: photo privacy in a tagged world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1563--1572.
[8]
Markus Bindemann, Janice Attard, Amy Leach, and Robert A Johnston. 2013. The Effect of Image Pixelation on Unfamiliar-Face Matching. Applied Cognitive Psychology 27, 6 (2013), 707--717.
[9]
Bitmoji. 2016. Your own personal Emoji. (2016). Retrieved April 23, 2017 from https://www.bitmoji.com/.
[10]
YouTube Official Blog. 2012. Face blurring: when footage requires anonymity. Blog. (18 July 2012). Retrieved April 13, 2017 from https://youtube.googleblog.com/2012/07/face-blurring-when-footage-requires.html.
[11]
Michael Boyle, Christopher Edwards, and Saul Greenberg. 2000. The effects of filtered video on awareness and privacy. In Proceedings of the 2000 ACM conference on Computer supported cooperative work. ACM, 1--10.
[12]
Michael Buhrmester, Tracy Kwang, and Samuel D Gosling. 2011. Amazon's Mechanical Turk: A new source of inexpensive, yet high-quality, data? Perspectives on psychological science 6, 1 (2011), 3--5.
[13]
U.S. Census Bureau. 2010. American FactFinder - Race Results. (2010). https://factfinder.census.gov/faces/tableservices/ jsf/pages/productview.xhtml?pid=DEC_10_DP_DPDP1&src=pt
[14]
United States Census Bureau. 2014. Geography Division. (2014). Retrieved April 21, 2017 from https://www2.census.gov/geo/pdfs/mapsdata/maps/reference/us_regdiv.pdf.
[15]
Kelly Caine and Rima Hanania. 2013. Patients want granular privacy control over health information in electronic medical records. Journal of the American Medical Informatics Association 20, 1 (2013), 7--15.
[16]
Kelly Erinn Caine. 2009. Exploring everyday privacy behaviors and misclosures. Ph.D. Dissertation. Georgia Institute of Technology.
[17]
Kelly E Caine, Wendy A Rogers, and Arthur D Fisk. 2005. Privacy perceptions of an aware home with visual sensing devices. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol. 49. SAGE Publications, 1856--1858.
[18]
L Elisa Celis, Sai Praneeth Reddy, Ishaan Preet Singh, and Shailesh Vaya. 2016. Assignment Techniques for Crowdsourcing Sensitive Tasks. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. ACM, 836--847.
[19]
Datong Chen, Yi Chang, Rong Yan, and Jie Yang. 2009. Protecting personal identification in video. In Protecting Privacy in Video Surveillance. Springer, 115--128.
[20]
Hichang Cho and Anna Filippova. 2016. Networked Privacy Management in Facebook: A Mixed-Methods and Multinational Study. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. ACM, 503--514.
[21]
David Crandall and Noah Snavely. 2012. Modeling people and places with internet photo collections. Commun. ACM 55, 6 (2012), 52--60.
[22]
Dianne Cyr, Milena Head, Hector Larios, and Bing Pan. 2009. Exploring human images inwebsite design: a multi-method approach. MIS quarterly (2009), 539--566.
[23]
Bernhard Debatin, Jennette P Lovejoy, Ann-Kathrin Horn, and Brittany N Hughes. 2009. Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication 15, 1 (2009), 83--108.
[24]
Jelle Demanet, Kristof Dhont, Lies Notebaert, Sven Pattyn, and André Vandierendonck. 2007. Pixelating Familiar People in the Media: Should Masking Be Taken at Face Value? Psychologica belgica 47, 4 (2007).
[25]
Martha Farah, GW Humphreys, and HR Rodman. 1999. Object and face recognition. Fundamental neuroscience, ed. MJ Zigmond, FE Bloom, SC Landis, JL Roberts & LR Squire. Academic Press.{aFVDV} (1999).
[26]
Kraig Finstad. 2010. Response interpolation and scale sensitivity: Evidence against 5-point scales. Journal of Usability Studies 5, 3 (2010), 104--110.
[27]
Michael Fire, Roy Goldschmidt, and Yuval Elovici. 2014. Online social networks: threats and solutions. IEEE Communications Surveys & Tutorials 16, 4 (2014), 2019--2036.
[28]
Andrew J Flanagin and Miriam J Metzger. 2001. Internet use in the contemporary media environment. Human communication research 27, 1 (2001), 153--181.
[29]
Andrea Frome, German Cheung, Ahmad Abdulkader, Marco Zennaro, Bo Wu, Alessandro Bissacco, Hartwig Adam, Hartmut Neven, and Luc Vincent. 2009. Large-scale privacy protection in google street view. In Computer Vision, 2009 IEEE 12th International Conference on. IEEE, 2373--2380.
[30]
Pulkit Goyal, Sapan Diwakar, et al. 2010. Fast and enhanced algorithm for exemplar based image inpainting. In Image and Video Technology (PSIVT), 2010 Fourth Pacific-Rim Symposium on. IEEE, 325--330.
[31]
Amelia Heathman. 2017. Fabook's Snapchat-style stories and effects are live. Here's how to use them. (28 March 2017). Retrieved April 23, 2017 from http://www.wired.co.uk/article/facebook-filters-like-snapchat.
[32]
Anne Hewitt and Andrea Forte. 2006. Crossing boundaries: Identity management and student/faculty relationships on the Facebook. Poster presented at CSCW, Banff, Alberta (2006), 1--2.
[33]
Roberto Hoyle, Robert Templeman, Steven Armes, Denise Anthony, David Crandall, and Apu Kapadia. 2014. Privacy behaviors of lifeloggers using wearable cameras. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 571--582.
[34]
Hongxin Hu, Gail-Joon Ahn, and Jan Jorgensen. 2011. Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. In Proceedings of the 27th Annual Computer Security Applications Conference. ACM, 103--112.
[35]
Panagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, and Sotiris Ioannidis. 2015. Face/off: Preventing privacy leakage from photos in social networks. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 781--792.
[36]
Rob Johns. 2010. Likert items and scales. Survey Question Bank: Methods Fact Sheet 1 (2010), 1--11.
[37]
Holy Juan. 2010. Facebook redacting. (2010). Retrieved April 23, 2017 from http://www.holyjuan.com/2010/12/facebook-redacting.html.
[38]
Mohammed Korayem, Robert Templeman, Dennis Chen, David Crandall, and Apu Kapadia. 2016. Enhancing lifelogging privacy by detecting screens. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 4309--4314.
[39]
Pavel Korshunov, Claudia Araimo, Francesca De Simone, Carmelo Velardo, J-L Dugelay, and Touradj Ebrahimi. 2012. Subjective study of privacy filters in video surveillance. In Multimedia Signal Processing (MMSP), 2012 IEEE 14th International Workshop on. Ieee, 378--382.
[40]
Pavel Korshunov, Andrea Melle, Jean-Luc Dugelay, and Touradj Ebrahimi. 2013. Framework for objective evaluation of privacy filters. In SPIE Optical Engineering+ Applications. International Society for Optics and Photonics, 88560T--88560T.
[41]
Takashi Koshimizu, Tomoji Toriyama, and Noboru Babaguchi. 2006. Factors on the sense of privacy in video surveillance. In Proceedings of the 3rd ACM workshop on Continuous archival and retrival of personal experences. ACM, 35--44.
[42]
Sokol Kosta, Andrius Aucinas, Pan Hui, Richard Mortier, and Xinwen Zhang. 2012. Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading. In Infocom, 2012 Proceedings IEEE. IEEE, 945--953.
[43]
Hanna Krasnova, Oliver Günther, Sarah Spiekermann, and Ksenia Koroleva. 2009. Privacy concerns and identity in online social networks. Identity in the Information Society 2, 1 (2009), 39--63.
[44]
Nanda Kumar and Izak Benbasat. 2006. Research note: the influence of recommendations and consumer reviews on evaluations of websites. Information Systems Research 17, 4 (2006), 425--439.
[45]
Karen Lander, Vicki Bruce, and Harry Hill. 2001. Evaluating the effectiveness of pixelation and blurring on masking the identity of familiar faces. Applied Cognitive Psychology 15, 1 (2001), 101--116.
[46]
Christian Ledig, Lucas Theis, Ferenc Huszár, Jose Caballero, Andrew Cunningham, Alejandro Acosta, Andrew Aitken, Alykhan Tejani, Johannes Totz, Zehan Wang, et al. 2016. Photo-realistic single image super-resolution using a generative adversarial network. arXiv preprint arXiv:1609.04802 (2016).
[47]
Jerry W Lee, Patricia S Jones, Yoshimitsu Mineyama, and Xinwei Esther Zhang. 2002. Cultural differences in responses to a Likert scale. Research in nursing & health 25, 4 (2002), 295--306.
[48]
Congcong Li, Alexander C Loui, and Tsuhan Chen. 2010. Towards aesthetics: A photo quality assessment and photo selection system. In Proceedings of the 18th ACM international conference on Multimedia. ACM, 827--830.
[49]
Yifang Li, Nishant Vishwamitra, Hongxin Hu, Bart P Knijnenburg, and Kelly Caine. 2017. Effectiveness and users' experience of face blurring as a privacy protection for sharing photos via online social networks. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol. 61. SAGE.
[50]
Yifang Li, Nishant Vishwamitra, Bart P Knijnenburg, Hongxin Hu, and Kelly Caine. 2017. Blur vs. Block: Investigating the Effectiveness of Privacy-Enhancing Obfuscation for Images. In Computer Vision and Pattern Recognition Workshops (CVPRW), 2017 IEEE Conference on. IEEE, 1343--1351.
[51]
Heather Richter Lipford, Pamela J Wisniewski, Cliff Lampe, Lorraine Kisselburgh, and Kelly Caine. 2012. Reconciling privacy with social media. In Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work Companion. ACM, 19--20.
[52]
Banu Manav. 2007. Color-emotion associations and color preferences: A case study for residences. Color Research & Application 32, 2 (2007), 144--150.
[53]
Alice E Marwick and Danah Boyd. 2014. Networked privacy: How teenagers negotiate context in social media. New Media & Society 16, 7 (2014), 1051--1067.
[54]
Winter Mason and Duncan J Watts. 2010. Financial incentives and the performance of crowds. ACM SigKDD Explorations Newsletter 11, 2 (2010), 100--108.
[55]
Richard McPherson, Reza Shokri, and Vitaly Shmatikov. 2016. Defeating Image Obfuscation with Deep Learning. arXiv preprint arXiv:1609.00408 (2016).
[56]
Kyle B Murray and Gerald Häubl. 2010. Freedom of choice, ease of use, and the formation of interface preferences. (2010).
[57]
Helen Nissenbaum. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press.
[58]
Helen Nissenbaum. 2011. A contextual approach to privacy online. Daedalus 140, 4 (2011), 32--48.
[59]
Seong Joon Oh, Rodrigo Benenson, Mario Fritz, and Bernt Schiele. 2016. Faceless person recognition: Privacy implications in social media. In European Conference on Computer Vision. Springer, 19--35.
[60]
José Ramón Padilla-López, Alexandros Andre Chaaraoui, Feng Gu, and Francisco Flórez-Revuelta. 2015. Visual privacy by context: proposal and evaluation of a level-based visualisation scheme. Sensors 15, 6 (2015), 12959--12982.
[61]
Omkar M Parkhi, Andrea Vedaldi, and Andrew Zisserman. 2015. Deep Face Recognition. In BMVC, Vol. 1. 6.
[62]
Eyal Peer, Joachim Vosgerau, and Alessandro Acquisti. 2014. Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods 46, 4 (2014), 1023--1031.
[63]
Mark R Phillips, Bradley D McAuliff, Margaret Bull Kovera, and Brian L Cutler. 1999. Double-blind photoarray administration as a safeguard against investigator bias. Journal of Applied Psychology 84, 6 (1999), 940.
[64]
Joseph P Redden. 2008. Reducing satiation: The role of categorization level. Journal of Consumer Research 34, 5 (2008), 624--634.
[65]
Chi-Hyoung Rhee and C LEE. 2013. Cartoon-like avatar generation using facial component matching. Int. J. of Multimedia and Ubiquitous Engineering 8, 4 (2013), 69--78.
[66]
Joel Ross, Lilly Irani, M Silberman, Andrew Zaldivar, and Bill Tomlinson. 2010. Who are the crowdworkers?: shifting demographics in mechanical turk. In CHI'10 extended abstracts on Human factors in computing systems. ACM, 2863--2872.
[67]
Mukesh Saini, Pradeep K Atrey, Sharad Mehrotra, and Mohan Kankanhalli. 2014. W3-privacy: understanding what, when, and where inference channels in multi camera surveillance video. Multimedia Tools and Applications 68, 1 (2014), 135--158.
[68]
Peter Seddon and Min-Yen Kiew. 1996. A Partial Test and Development of Delone and Mclean's Model of IS Success. Australasian Journal of Information Systems 4, 1 (1996).
[69]
Snapeditor. 2017. Snapchat effeects: how to use lenses & filters for face effects. (24 January 2017). Retrieved April 23, 2017 from https://snapchat.photography/snapchat-effects/.
[70]
Nadia Spock. 2016. Snapchat gives a voice to survivors of sexual abuse. Blog. (21 July 2016). Retrieved April 13, 2017 from http://news.wgbh.org/2016/07/21/snapchat-gives-voice-survivors-sexual-abuse.
[71]
Anna Cinzia Squicciarini, Dan Lin, Smitha Sundareswaran, and Joshua Wede. 2015. Privacy policy inference of user-uploaded images on content sharing sites. IEEE transactions on knowledge and data engineering 27, 1 (2015), 193--206.
[72]
John A Swets. 1964. Signal Detection and Recognition in Human Observers: Contemporary Readings. (1964).
[73]
Yasuhiro Tanaka, Akihisa Kodate, Yu Ichifuji, and Noboru Sonehara. 2015. Relationship between Willingness to Share Photos and Preferred Level of Photo Blurring for Privacy Protection. In Proceedings of the ASE BigData & SocialInformatics 2015. ACM, 33.
[74]
Kurt Thomas, Chris Grier, and David M Nicol. 2010. unfriendly: Multi-party privacy risks in social networks. In International Symposium on Privacy Enhancing Technologies Symposium. Springer, 236--252.
[75]
Cody Toombs. 2017. Snapseed v2.17 adds tools to make wild facial adjustments, create double exposures, and more. Blog. (22 March 2017). http://www.androidpolice.com/2017/03/22/snapseed-v2--17-adds-tools-to-make-wild-facial-adjustments-create-double-exposures-and-more-apk-download/.
[76]
Janet Vertesi, Jofish Kaye, Samantha N Jarosewski, Vera D Khovanskaya, and Jenna Song. 2016. Data Narratives: uncovering tensions in personal data management. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. ACM, 478--490.
[77]
Carmen Ruiz Vicente, Dario Freni, Claudio Bettini, and Christian S Jensen. 2011. Location-related privacy in geo-social networks. IEEE Internet Computing 15, 3 (2011), 20--27.
[78]
Nishant Vishwamitra, Yifang Li, Kevin Wang, Hongxin Hu, Kelly Caine, and Gail-Joon Ahn. 2017. Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks. In Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies. ACM, 155--166.
[79]
Jessica Vitak and Jinyoung Kim. 2014. You can't block people offline: Examining how Facebook's affordances shape the disclosure process. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing. ACM, 461--474.
[80]
Emanuel von Zezschwitz, Alexander De Luca, and Heinrich Hussmann. 2015. Filter Selection and Evaluation. (2015).
[81]
Alan F Westin. 1968. Privacy and freedom. Washington and Lee Law Review 25, 1 (1968), 166.
[82]
Pamela Wisniewski, AKM Islam, Bart P Knijnenburg, and Sameer Patil. 2015. Give social network users the privacy they want. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing. ACM, 1427--1441.
[83]
Bin Xu, Pamara Chang, Christopher L Welker, Natalya N Bazarova, and Dan Cosley. 2016. Automatic archiving versus default deletion: What Snapchat tells us about ephemerality in design. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. ACM, 1662--1675.
[84]
Andrew W Yip and Pawan Sinha. 2002. Contribution of color to face recognition. Perception 31, 8 (2002), 995--1003.
[85]
Xiaoyi Yu, Kenta Chinomi, Takashi Koshimizu, Naoko Nitta, Yoshimichi Ito, and Noboru Babaguchi. 2008. Privacy protecting visual processing for secure video surveillance. In Image Processing, 2008. ICIP 2008. 15th IEEE International Conference on. IEEE, 1672--1675.

Cited By

View all
  • (2025)Assessing User Perceptions and Preferences on Applying Obfuscation Techniques for Privacy Protection in Augmented RealityFuture Internet10.3390/fi1702005517:2(55)Online publication date: 25-Jan-2025
  • (2025)Toward a Privacy-Preserving Face Recognition System: A Survey of Leakages and SolutionsACM Computing Surveys10.1145/367322457:6(1-38)Online publication date: 10-Feb-2025
  • (2025)SANSee: A Physical-Layer Semantic-Aware Networking Framework for Distributed Wireless SensingIEEE Transactions on Mobile Computing10.1109/TMC.2024.348327224:3(1636-1653)Online publication date: 1-Mar-2025
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Human-Computer Interaction
Proceedings of the ACM on Human-Computer Interaction  Volume 1, Issue CSCW
November 2017
2095 pages
EISSN:2573-0142
DOI:10.1145/3171581
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 December 2017
Published in PACMHCI Volume 1, Issue CSCW

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. image obfuscation
  2. image redaction
  3. online social network
  4. privacy
  5. security
  6. user experience

Qualifiers

  • Research-article

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)372
  • Downloads (Last 6 weeks)22
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Assessing User Perceptions and Preferences on Applying Obfuscation Techniques for Privacy Protection in Augmented RealityFuture Internet10.3390/fi1702005517:2(55)Online publication date: 25-Jan-2025
  • (2025)Toward a Privacy-Preserving Face Recognition System: A Survey of Leakages and SolutionsACM Computing Surveys10.1145/367322457:6(1-38)Online publication date: 10-Feb-2025
  • (2025)SANSee: A Physical-Layer Semantic-Aware Networking Framework for Distributed Wireless SensingIEEE Transactions on Mobile Computing10.1109/TMC.2024.348327224:3(1636-1653)Online publication date: 1-Mar-2025
  • (2025)AdaWiFi, Collaborative WiFi Sensing for Cross-Environment AdaptationIEEE Transactions on Mobile Computing10.1109/TMC.2024.347485324:2(845-858)Online publication date: 1-Feb-2025
  • (2025)Multi-Target Device-Free Positioning Based on Spatial-Temporal mmWave Point CloudIEEE Transactions on Mobile Computing10.1109/TMC.2024.347467124:2(1163-1180)Online publication date: 1-Feb-2025
  • (2024)Let me quickly share it - Time Pressure when Sharing on Social MediaProceedings of the International Conference on Mobile and Ubiquitous Multimedia10.1145/3701571.3701578(280-299)Online publication date: 1-Dec-2024
  • (2024)Investigating the Perception of Facial Anonymization Techniques in 360° VideosACM Transactions on Applied Perception10.1145/369525421:4(1-17)Online publication date: 15-Nov-2024
  • (2024)GrainSense: A Wireless Grain Moisture Sensing System Based on Wi-Fi SignalsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36785898:3(1-25)Online publication date: 9-Sep-2024
  • (2024)Manipulate to Obfuscate: A Privacy-Focused Intelligent Image Manipulation Tool for End-UsersAdjunct Proceedings of the 37th Annual ACM Symposium on User Interface Software and Technology10.1145/3672539.3686778(1-3)Online publication date: 13-Oct-2024
  • (2024)ScreenConcealer: Privacy-protection System with Obfuscations for Screen SharingAdjunct Proceedings of the 37th Annual ACM Symposium on User Interface Software and Technology10.1145/3672539.3686750(1-3)Online publication date: 13-Oct-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media