Information technologies and the shifting balance between privacy and social control
Computerization and controversy (2nd ed.)
Journal of the American Society for Information Science - Special issue: electronic publishing
Beyond the mirror world: privacy and the representational practices of computing
Technology and privacy
Convergence revisited: toward a global policy for the protection of personal data?
Technology and privacy
Multimedia information changes the whole privacy ballgame
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
Time as essence for photo browsing through personal digital libraries
Proceedings of the 2nd ACM/IEEE-CS joint conference on Digital libraries
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
How do people manage their digital photographs?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
What You Don't Know Can Hurt You: Privacy in Collaborative Computing
HCI '96 Proceedings of HCI on People and Computers XI
Who wants to know what when? privacy preference determinants in ubiquitous computing
CHI '03 Extended Abstracts on Human Factors in Computing Systems
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Leveraging context to resolve identity in photo albums
Proceedings of the 5th ACM/IEEE-CS joint conference on Digital libraries
Social empowerment and exclusion: A case study on digital libraries
ACM Transactions on Computer-Human Interaction (TOCHI)
The language of privacy: Learning from video media space analysis and design
ACM Transactions on Computer-Human Interaction (TOCHI)
Autoethnography: a tool for practice and education
CHINZ '05 Proceedings of the 6th ACM SIGCHI New Zealand chapter's international conference on Computer-human interaction: making CHI natural
Temporal event clustering for digital photo collections
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
A grounded theory of information sharing behavior in a personal learning space
CSCW '06 Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work
Give and take: a study of consumer photo-sharing culture and practice
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The roles of time, place, value and relationships in collocated photo sharing with camera phones
BCS-HCI '08 Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction - Volume 1
Moving beyond untagging: photo privacy in a tagged world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The ownership and reuse of visual media
Proceedings of the 11th annual international ACM/IEEE joint conference on Digital libraries
Of Catwalk Technologies and Boundary Creatures
ACM Transactions on Computer-Human Interaction (TOCHI) - Special Issue of “The Turn to The Wild”
Hi-index | 0.00 |
Technological developments now allow community groups, clubs, and even ordinary individuals to create their own, publicly accessible online digital multi-media collections. However, it is unclear as to whether the users of such collection are fully aware of the potential privacy implications of submitting their personal contents (e.g. photographs, video, etc.) to these digital collections. They may even hold misconceptions of the technological support for preserving their privacy. In this paper we present results from 18 autoethnographic investigations and 19 ethnographic observations and interviews into privacy issues that arise when people make their personal photo collections available online. The Adams' privacy model is used to discuss the findings according to information sensitivity, information receiver, and information usage. Further issues of trust and ad hoc poorly supported protection strategies are also presented. Ultimately while photographic data is potentially highly sensitive, the privacy risks are often hidden and the protection mechanisms are limited.