{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:57:13Z","timestamp":1742936233915,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319685564"},{"type":"electronic","value":"9783319685571"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68557-1_24","type":"book-chapter","created":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T02:50:02Z","timestamp":1506999002000},"page":"261-275","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["PrivacyTag: A Community-Based Method for Protecting Privacy of Photographed Subjects in Online Social Networks"],"prefix":"10.1007","author":[{"given":"Shimon","family":"Machida","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Adrian","family":"Dabrowski","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Edgar","family":"Weippl","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Isao","family":"Echizen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,10,4]]},"reference":[{"key":"24_CR1","unstructured":"Bosker, B.: The Twitter Typo That Exposed Anthony Weiner. http:\/\/www.huffingtonpost.com\/2011\/06\/07\/anthony-weiner-twitter-dm\\_n\\_872590.html. Accessed 10 May 2017"},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"Dabrowski, A., Weippl, E.R., Echizen, I.: Framework based on privacy policy hiding for preventing unauthorized face image processing. In: Proceedings of 2013 IEEE International Conference on Systems, Man and Cybernetics, pp. 455\u2013461 (2013)","DOI":"10.1109\/SMC.2013.83"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Wickramasuriya, J., Datt, M., Mehrotra, S., Venkatasubramanian, N.: Privacy protecting data collection in media spaces. In: Proceedings of the 12th Annual ACM International Conference on Multimedia, pp. 48\u201355 (2004)","DOI":"10.1145\/1027527.1027537"},{"key":"24_CR4","unstructured":"Survey research regarding ethics of information security in 2014 (in Japanese). https:\/\/www.ipa.go.jp\/files\/000044094.pdf. Accessed 10 May 2017"},{"key":"24_CR5","unstructured":"Be careful when you post a photo during your vacation (in Japanese). http:\/\/www.ipa.go.jp\/security\/txt\/2015\/05outline.html. Accessed 10 May 2017"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Bo, C., Shen, G., Liu, J., Li, X.-Y., Zhang, Y., Zhao, F.: Privacy.tag: privacy concern expressed and respected. In: Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems, pp. 163\u2013176 (2014)","DOI":"10.1145\/2668332.2668339"},{"key":"24_CR7","unstructured":"Mondal, M., Liu, Y., Viswanath, B., Gummadi, K.P., Mislove, A.: Understanding and specifying social access control lists. In: Proceedings of the Tenth Symposium on Usable Privacy and Security, pp. 271\u2013283 (2014)"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Sleeper, M., Balebako, R., Das, S., McConahy, A.L., Wiese, J., Cranor, L.F.: The post that wasn\u2019t: exploring self-censorship on facebook. In: Proceedings of the 2013 Conference on Computer Supported Cooperative Work, pp. 793\u2013802 (2013)","DOI":"10.1145\/2441776.2441865"},{"key":"24_CR9","unstructured":"Besmer, A., Lipford, H.R.: Privacy perceptions of photo sharing in facebook. In: Proceedings of the Fourth Symposium on Usable Privacy and Security (2008)"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Kumar, P., Schoenebeck, S.: The Modern day baby book: enacting good mothering and stewarding privacy on facebook. In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, pp. 1302\u20131312 (2015)","DOI":"10.1145\/2675133.2675149"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Egelman, S., Oates, A., Krishnamurthi, S.: Oops, I did it again: mitigating repeated access control errors on facebook. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2295\u20132304 (2011)","DOI":"10.1145\/1978942.1979280"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Machida, S., Kajiyama, T., Shigeru, S., Echizen, I.: Analysis of facebook friends using disclosure level. In: Proceedings of the Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 471\u2013474 (2014)","DOI":"10.1109\/IIH-MSP.2014.124"},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Sleeper, M., Cranshaw, J., Kelley, P.G., Ur, B., Acquisti, A., Cranor, L.F., Sadeh, N.: \u201cI read my Twitter the next morning and was astonished\u201d: a conversational perspective on Twitter regrets. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 3277\u20133286 (2013)","DOI":"10.1145\/2470654.2466448"},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P.G., Cranor, L.F.: \u201cI regretted the minute I pressed share\u201d: a qualitative study of regrets on Facebook. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, p. 10 (2011)","DOI":"10.1145\/2078827.2078841"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Henne, B., Szongott, C., Smith, M.: SnapMe if you can: privacy threats of other peoples\u2019 geo-tagged media and what we can do about it. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 95\u2013106 (2013)","DOI":"10.1145\/2462096.2462113"},{"key":"24_CR16","unstructured":"Pappachan, P., Yus, R., Das, P.K., Finin, T., Mena, E., Joshi, A.: A semantic context-aware privacy model for faceblock. In: Proceedings of the 2nd International Conference on Society, Privacy and the Semantic Web - Policy and Technology, pp. 64\u201372 (2014)"},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Li, Y., Xu, K., Yan, Q., Li, Y., Deng, R.H.: Understanding OSN-based facial disclosure against face authentication systems. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, pp. 413\u2013424 (2014)","DOI":"10.1145\/2590296.2590315"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Pallas, F., Ulbricht, M.-R., Jaume-Palas\u00ed, L., H\u00f6ppner, U.: Offlinetags: a novel privacy approach to online photo sharing. In: Proceedings of CHI 2014 Extended Abstracts on Human Factors in Computing Systems, pp. 2179\u20132184 (2014)","DOI":"10.1145\/2559206.2581195"},{"key":"24_CR19","unstructured":"Cammozzo, A.: TagMeNot. http:\/\/tagmenot.info\/. Accessed 10 May 2017"},{"key":"24_CR20","doi-asserted-by":"crossref","unstructured":"Hu, Y., Manikonda, L., Kambhampati, S.: What we instagram: a first analysis of instagram photo content and user types. In: Proceedings of the 8th International AAAI Conference on Weblogs and Social Media (2014)","DOI":"10.1609\/icwsm.v8i1.14578"},{"key":"24_CR21","volume-title":"The Hidden Dimension","author":"ET Hall","year":"1966","unstructured":"Hall, E.T.: The Hidden Dimension. Anchor Books\/Doubleday, New York (1966)"},{"key":"24_CR22","doi-asserted-by":"crossref","unstructured":"Ashok, A., Nguyen, V., Gruteser, M., Mandayam, N., Yuan, W., Dana, K.: Do not share!: invisible light beacons for signaling preferences to privacy-respecting cameras. In: Proceedings of the 1st ACM MobiCom Workshop on Visible Light Communication Systems, pp. 39\u201344 (2014)","DOI":"10.1145\/2643164.2643168"},{"issue":"2","key":"24_CR23","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1023\/B:VISI.0000013087.49260.fb","volume":"57","author":"P Viola","year":"2004","unstructured":"Viola, P., Jones, M.J.: Robust real-time face detection. Int. J. Comput. Vis. 57(2), 137\u2013154 (2004). Springer","journal-title":"Int. J. Comput. Vis."},{"key":"24_CR24","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-1-84882-301-3_2","volume-title":"Protecting Privacy in Video Surveillance","author":"S-CS Cheung","year":"2009","unstructured":"Cheung, S.-C.S., Venkatesh, M.V., Paruchuri, J.K., Zhao, J., Nguyen, T.: Protecting and managing privacy information in video surveillance systems. In: Senior, A. (ed.) Protecting Privacy in Video Surveillance, pp. 11\u201333. Springer, London (2009)"}],"container-title":["Lecture Notes in Computer Science","Digital Nations \u2013 Smart Cities, Innovation, and Sustainability"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68557-1_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,11]],"date-time":"2024-03-11T14:29:01Z","timestamp":1710167341000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-68557-1_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319685564","9783319685571"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68557-1_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"4 October 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"I3E","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on e-Business, e-Services and e-Society","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Delhi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"i3e2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/dms.iitd.ac.in\/I3E2017.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}