Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems 2019
DOI: 10.1145/3290605.3300597
|View full text |Cite
|
Sign up to set email alerts
|

Can Privacy Be Satisfying?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 29 publications
(7 citation statements)
references
References 34 publications
1
6
0
Order By: Relevance
“…Hasan et al [48] developed a computer vision approach identifying bystanders in photos taken in public places to preserve their privacy. The potential limitations of item modification approaches are the possibility to infer data subject identity based on the features involved in the content (e.g., location, clothes, friends), delays in the content to be shared, requiring additional effort to increase the aesthetics of the photos [49,50,79], the possibility of false face detection, and possibly rising additional privacy issues by requiring the identification of all subjects within the content [137].…”
Section: Precautionary Mechanisms: Novel Solutions To Manage Mpcsmentioning
confidence: 99%
“…Hasan et al [48] developed a computer vision approach identifying bystanders in photos taken in public places to preserve their privacy. The potential limitations of item modification approaches are the possibility to infer data subject identity based on the features involved in the content (e.g., location, clothes, friends), delays in the content to be shared, requiring additional effort to increase the aesthetics of the photos [49,50,79], the possibility of false face detection, and possibly rising additional privacy issues by requiring the identification of all subjects within the content [137].…”
Section: Precautionary Mechanisms: Novel Solutions To Manage Mpcsmentioning
confidence: 99%
“…For example, Anthony et al discuss how people routinely engage in behaviors to respect the privacy of others [71]. Other work seeks to make privacy 'fun' by encouraging owners of photos to apply stickers or redactions on bystanders [27], [50]. Our work on detecting bystanders should thus be seen as a necessary building block of larger automated frameworks that consider further action on photos.…”
Section: Limitations and Discussionmentioning
confidence: 99%
“…In our reviews, we checked if the authors declared consent collection before sharing photos in the paper (face-photo). Avoidance of violating photo privacy is possible through obfuscation (e.g., blurring or masking) [20], or by using photos that does not fully show the face of participants (e.g., photos with a VR headset on the eyes) [1].…”
Section: Privacymentioning
confidence: 99%