ABSTRACT
While expectations of personal information and life-log accumulation and utilization have been rapidly growing for more personalized services, negative issues have been increasingly recognized due to leakage of privacy information. This study aims to investigate the relationship between willingness to sharing photo and preferred level of photo blurring for privacy protection. We conducted an online questionnaire survey and analyzed it to clarify the relationship between willingness to share photos and preferred level of photo blurring by PSM (Price Sensitivity Measurement). As a result, the PSM approached enabled us to find the acceptable threshold level of photo retouching to blur identifiable people that is acceptable to users.
- W. Tan, B. M. Blake, I. Saleh and S. D. Dustdar, "Social-Network-Sourced Big Data Analytics," IEEE Internet Computing, vol. 17, no. 5, pp. 62--69, 2013. Google ScholarDigital Library
- "Face Recognition Study FAQ,": http://www.heinz.cmu.edu/acquisti/face-recognition-study-FAQ/. {Accessed on Aug. 24, 2015}.Google Scholar
- T. Yamada, S. Gohshi and I. Echizen, "Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity," Communications and Multimedia Security, Springer Lecture Notes in Computer Science, vol. 8099, pp. 152--161, 2013.Google ScholarCross Ref
- K. Chinomi, N. Nitta, Y. Ito and N. Babaguchi, "PriSurv: Privacy Protected Video Surveillance System Using Adaptive Visual Abstraction," Advances in Multimedia Modeling, Springer Lecture Notes in Computer Science, vol. 4903, pp. 144--154. 2008. Google ScholarDigital Library
- P. Van Westendorp, "NSS-Price Sensitivity Meter (PSM)- A new approach to study consumer perception of price," Proceedings of the 29th ESOMAR Congress, pp. 139--167, 1976.Google Scholar
- R. Harman and R. Unni, "Price Sensitivity Measurement and New Product Pricing: A Cognitive Response Approach," in Management of Engineering and Technology, 2007.Google Scholar
- R. Harmon, D. Raffo, F. Stuart, "Incorporating Price Sensitivity Measurement Into the Software Engineering Process," Technology Management for Reshaping the World Portland International Conference on Management of Engineering and Technology, 2003.Google Scholar
- N. Teodoresch, N. A. Pop and A. F. Stancioiu, "Price Determination and Price Strategy in The Markeing View," Management & Marketing, vol. 3, no. 4, pp. 21--36, 2008.Google Scholar
- R. C. Lewis and S. Shoemaker, "Price-sensitivity measurement: A tool for the hospitality industry," The Cornell Hotel and Restaurant Administration Quarterly, vol. 38, no. 2, p. 44--54, 1997.Google Scholar
- "Price Sensitivity Meter (PSM)," intervista, http://www.intervista.ch/en/methods-a-z/psm. {Accessed on Aug. 23, 2015}.Google Scholar
- S. B. Barnes, "A privacy paradox: Social networking in the United States," First Monday, vol. 11, no. 9, 2006.Google Scholar
- S. Utz and N. Kramer, "The privacy paradox on social network sites revisited: The role of individual characteristics and group norms," Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 3(2), article 1, 2009.Google Scholar
- G. Blank, G. Bolsover and E. Dubois, "A New Privacy Paradox: Young people and privacy on social network sites," Oxford Internet Institute, University of Oxford, 2014. {Accessed on Aug. 22, 2015}.Google Scholar
Index Terms
- Relationship between Willingness to Share Photos and Preferred Level of Photo Blurring for Privacy Protection
Recommendations
Photo Privacy Protection on Online Social Networks
CSCW '18 Companion: Companion of the 2018 ACM Conference on Computer Supported Cooperative Work and Social ComputingThrough my doctoral research, I aim to provide a better online photo privacy protection strategy than existing approaches such as photo self-censorship and recipient control on Online Social Networks (OSNs). To inform the building for an effective and ...
A Survey on Privacy in Social Media: Identification, Mitigation, and Applications
The increasing popularity of social media has attracted a huge number of people to participate in numerous activities on a daily basis. This results in tremendous amounts of rich user-generated data. These data provide opportunities for researchers and ...
Privacy perception and protection on Chinese social media: a case study of WeChat
In this study, the under-examined area of privacy perception and protection on Chinese social media is investigated. The prevalence of digital technology shapes the social, political and cultural aspects of the lives of urban young adults. The ...
Comments