Analyzing the application of the privacy design model in WhatsApp: a case study
Abstract
References
Index Terms
- Analyzing the application of the privacy design model in WhatsApp: a case study
Recommendations
Privacy Design Model Application on Sharing Pictures Apps
IHC '16: Proceedings of the 15th Brazilian Symposium on Human Factors in Computing SystemsThis work in progress is meant to describe the privacy related to user's personal information in apps that allow sharing pictures among users. The Privacy Design Model (PDM) supported the privacy appreciation offered by Instagram and Snapchat. The ...
Do online social network friends still threaten my privacy?
CODASPY '13: Proceedings of the third ACM conference on Data and application security and privacyA user's online social network (OSN) friends commonly share information on their OSN profiles that might also characterize the user him-/herself. Therefore, OSN friends are potentially jeopardizing users' privacy. Previous studies demonstrated that ...
Analyzing facebook privacy settings: user expectations vs. reality
IMC '11: Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conferenceThe sharing of personal data has emerged as a popular activity over online social networking sites like Facebook. As a result, the issue of online social network privacy has received significant attention in both the research literature and the ...
Comments
Information & Contributors
Information
Published In
- General Chairs:
- Caroline Queiroz Santos,
- Maria Lúcia Bento Villela,
- Program Chairs:
- Isabela Gasparini,
- Tayana Uchôa Conte
In-Cooperation
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 76Total Downloads
- Downloads (Last 12 months)12
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in