skip to main content
10.1145/2818869.2818931acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesase-bigdataConference Proceedingsconference-collections
research-article

Relationship between Willingness to Share Photos and Preferred Level of Photo Blurring for Privacy Protection

Authors Info & Claims
Published:07 October 2015Publication History

ABSTRACT

While expectations of personal information and life-log accumulation and utilization have been rapidly growing for more personalized services, negative issues have been increasingly recognized due to leakage of privacy information. This study aims to investigate the relationship between willingness to sharing photo and preferred level of photo blurring for privacy protection. We conducted an online questionnaire survey and analyzed it to clarify the relationship between willingness to share photos and preferred level of photo blurring by PSM (Price Sensitivity Measurement). As a result, the PSM approached enabled us to find the acceptable threshold level of photo retouching to blur identifiable people that is acceptable to users.

References

  1. W. Tan, B. M. Blake, I. Saleh and S. D. Dustdar, "Social-Network-Sourced Big Data Analytics," IEEE Internet Computing, vol. 17, no. 5, pp. 62--69, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. "Face Recognition Study FAQ,": http://www.heinz.cmu.edu/acquisti/face-recognition-study-FAQ/. {Accessed on Aug. 24, 2015}.Google ScholarGoogle Scholar
  3. T. Yamada, S. Gohshi and I. Echizen, "Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity," Communications and Multimedia Security, Springer Lecture Notes in Computer Science, vol. 8099, pp. 152--161, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  4. K. Chinomi, N. Nitta, Y. Ito and N. Babaguchi, "PriSurv: Privacy Protected Video Surveillance System Using Adaptive Visual Abstraction," Advances in Multimedia Modeling, Springer Lecture Notes in Computer Science, vol. 4903, pp. 144--154. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. P. Van Westendorp, "NSS-Price Sensitivity Meter (PSM)- A new approach to study consumer perception of price," Proceedings of the 29th ESOMAR Congress, pp. 139--167, 1976.Google ScholarGoogle Scholar
  6. R. Harman and R. Unni, "Price Sensitivity Measurement and New Product Pricing: A Cognitive Response Approach," in Management of Engineering and Technology, 2007.Google ScholarGoogle Scholar
  7. R. Harmon, D. Raffo, F. Stuart, "Incorporating Price Sensitivity Measurement Into the Software Engineering Process," Technology Management for Reshaping the World Portland International Conference on Management of Engineering and Technology, 2003.Google ScholarGoogle Scholar
  8. N. Teodoresch, N. A. Pop and A. F. Stancioiu, "Price Determination and Price Strategy in The Markeing View," Management & Marketing, vol. 3, no. 4, pp. 21--36, 2008.Google ScholarGoogle Scholar
  9. R. C. Lewis and S. Shoemaker, "Price-sensitivity measurement: A tool for the hospitality industry," The Cornell Hotel and Restaurant Administration Quarterly, vol. 38, no. 2, p. 44--54, 1997.Google ScholarGoogle Scholar
  10. "Price Sensitivity Meter (PSM)," intervista, http://www.intervista.ch/en/methods-a-z/psm. {Accessed on Aug. 23, 2015}.Google ScholarGoogle Scholar
  11. S. B. Barnes, "A privacy paradox: Social networking in the United States," First Monday, vol. 11, no. 9, 2006.Google ScholarGoogle Scholar
  12. S. Utz and N. Kramer, "The privacy paradox on social network sites revisited: The role of individual characteristics and group norms," Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 3(2), article 1, 2009.Google ScholarGoogle Scholar
  13. G. Blank, G. Bolsover and E. Dubois, "A New Privacy Paradox: Young people and privacy on social network sites," Oxford Internet Institute, University of Oxford, 2014. {Accessed on Aug. 22, 2015}.Google ScholarGoogle Scholar

Index Terms

  1. Relationship between Willingness to Share Photos and Preferred Level of Photo Blurring for Privacy Protection

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            ASE BD&SI '15: Proceedings of the ASE BigData & SocialInformatics 2015
            October 2015
            381 pages
            ISBN:9781450337359
            DOI:10.1145/2818869

            Copyright © 2015 ACM

            © 2015 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 7 October 2015

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader