{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T13:54:02Z","timestamp":1771336442089,"version":"3.50.1"},"reference-count":131,"publisher":"Association for Computing Machinery (ACM)","issue":"7","license":[{"start":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T00:00:00Z","timestamp":1760572800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2114123"],"award-info":[{"award-number":["CNS-2114123"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2025,10,18]]},"abstract":"<jats:p>Visual content shared on social media often includes sensitive elements that can threaten personal privacy. While privacy protection tools--some of which are powered by the state-of-the-art generative AI (Gen-AI) technologies--have been increasingly developed to address such visual privacy concerns by identifying sensitive elements in visual content and suggesting or applying modifications to process the visual content, the success of these tools depends on how well they meet users' nuanced needs and preferences. In this study, we conducted semi-structured interviews with 18 individuals who have either experienced or caused privacy violations in shared visual content in the past to gather first-hand perspectives on stakeholders' privacy concerns, their preferences for how to address these concerns, and their attitude toward the use of generative AI for privacy protection. Our findings highlight that sensitive elements are often not limited to direct identifiers but include contextual combinations and external information that can lead to unintended inferences. Decisions about whether and what to modify are shaped by concerns about privacy effectiveness, content value, content meaning, and emotional or social relevance, while choices around how to modify are influenced by recognition difficulty, visual content integrity, contextual consistency, atmosphere, and usability of modification methods. Participants saw Gen-AI as a promising tool for lowering editing barriers and enhancing creative control but also raised concerns about data usage, manipulation, and transparency. Importantly, we identify tensions between uploaders and depicted individuals, emphasizing the need for shared consent mechanisms and user-centered design in privacy protection. We conclude by discussing design implications for context-aware, flexible, and ethically responsible privacy tools.<\/jats:p>","DOI":"10.1145\/3757695","type":"journal-article","created":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T17:32:00Z","timestamp":1760635920000},"page":"1-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Understanding User Needs and Attitudes for Privacy Protection Tools in Online Visual Content Sharing"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9635-3385","authenticated-orcid":false,"given":"Chun-Wei","family":"Chiang","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, Indiana, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6608-7467","authenticated-orcid":false,"given":"Harry Yizhou","family":"Tian","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, Indiana, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7364-139X","authenticated-orcid":false,"given":"Ming","family":"Yin","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, Indiana, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,10,16]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"509","volume-title":"Science","volume":"347","author":"Acquisti Alessandro","year":"2015","unstructured":"Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2015. Privacy and human behavior in the age of information. Science, Vol. 347, 6221 (2015), 509-514."},{"key":"e_1_2_1_2_1","volume-title":"Sally Jo Cunningham, and Masood Masoodian","author":"Adams Anne","year":"2007","unstructured":"Anne Adams, Sally Jo Cunningham, and Masood Masoodian. 2007. Sharing, privacy and trust issues for photo collections. (2007)."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240683"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264899"},{"key":"e_1_2_1_5_1","first-page":"1","volume-title":"Proceedings of the ACM on Human-Computer Interaction","volume":"6","author":"Amon Mary Jean","year":"2022","unstructured":"Mary Jean Amon, Nika Kartvelishvili, Bennett I Bertenthal, Kurt Hugenberg, and Apu Kapadia. 2022. Sharenting and children's privacy in the united states: Parenting style, practices, and perspectives on sharing young children's photos on social media. Proceedings of the ACM on Human-Computer Interaction, Vol. 6, CSCW1 (2022), 1-30."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3577014"},{"key":"e_1_2_1_7_1","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1108\/JICES-05-2017-0029","article-title":"A tattoo is not a face. Ethical aspects of tattoo-based biometrics","volume":"16","author":"Bacchini Fabio","year":"2018","unstructured":"Fabio Bacchini and Ludovica Lorusso. 2018. A tattoo is not a face. Ethical aspects of tattoo-based biometrics. Journal of Information, Communication and Ethics in Society, Vol. 16, 2 (2018), 110-122.","journal-title":"Journal of Information, Communication and Ethics in Society"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12276"},{"key":"e_1_2_1_9_1","volume-title":"Mapping actor roles in social media: Different perspectives on value creation in theories of user participation. New media & society","author":"Bechmann Anja","year":"2013","unstructured":"Anja Bechmann and Stine Lomborg. 2013. Mapping actor roles in social media: Different perspectives on value creation in theories of user participation. New media & society, Vol. 15, 5 (2013), 765-781."},{"key":"e_1_2_1_10_1","volume-title":"CHI'09 Extended Abstracts on Human Factors in Computing Systems. 4585-4590","author":"Besmer Andrew","year":"2009","unstructured":"Andrew Besmer and Heather Lipford. 2009. Tagged photos: concerns, perceptions, and protections. In CHI'09 Extended Abstracts on Human Factors in Computing Systems. 4585-4590."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753560"},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems. 1-18","author":"Bhardwaj Divyanshu","year":"2024","unstructured":"Divyanshu Bhardwaj, Alexander Ponticello, Shreya Tomar, Adrian Dabrowski, and Katharina Krombholz. 2024. In Focus, Out of Privacy: The Wearer's Perspective on the Privacy Dilemma of Camera Glasses. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 1-18."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1360612.1360638"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/358916.358935"},{"key":"e_1_2_1_15_1","volume-title":"Thematic analysis","author":"Braun Virginia","unstructured":"Virginia Braun and Victoria Clarke. 2012. Thematic analysis., American Psychological Association."},{"key":"e_1_2_1_16_1","volume-title":"One size fits all? What counts as quality practice in (reflexive) thematic analysis? Qualitative research in psychology","author":"Braun Virginia","year":"2021","unstructured":"Virginia Braun and Victoria Clarke. 2021. One size fits all? What counts as quality practice in (reflexive) thematic analysis? Qualitative research in psychology, Vol. 18, 3 (2021), 328-352."},{"key":"e_1_2_1_17_1","first-page":"1856","volume-title":"Proceedings of the human factors and ergonomics society annual meeting","volume":"49","author":"Caine Kelly E","year":"2005","unstructured":"Kelly E Caine, Wendy A Rogers, and Arthur D Fisk. 2005. Privacy perceptions of an aware home with visual sensing devices. In Proceedings of the human factors and ergonomics society annual meeting, Vol. 49. SAGE Publications Sage CA: Los Angeles, CA, 1856-1858."},{"key":"e_1_2_1_18_1","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1177\/1527476413498121","article-title":"Watching nightlife: Affective labor, social media, and surveillance","volume":"15","author":"Carah Nicholas","year":"2014","unstructured":"Nicholas Carah. 2014. Watching nightlife: Affective labor, social media, and surveillance. Television & New Media, Vol. 15, 3 (2014), 250-265.","journal-title":"Television & New Media"},{"key":"e_1_2_1_19_1","doi-asserted-by":"crossref","first-page":"1579","DOI":"10.1111\/anae.15057","article-title":"Social media for rapid knowledge dissemination: early experience from the COVID-19 pandemic","volume":"75","author":"Chan Albert KM","year":"2020","unstructured":"Albert KM Chan, Chris P Nickson, Jenny W Rudolph, Anna Lee, and Gavin M Joynt. 2020. Social media for rapid knowledge dissemination: early experience from the COVID-19 pandemic. Anaesthesia, Vol. 75, 12 (2020), 1579.","journal-title":"Anaesthesia"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449127"},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision. 1369-1379","author":"Ciftci Umur A","year":"2023","unstructured":"Umur A Ciftci, Gokturk Yuksek, and Ilke Demir. 2023. My face my choice: Privacy enhancing deepfakes for social media anonymization. In Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision. 1369-1379."},{"key":"e_1_2_1_22_1","first-page":"11","volume-title":"Proceedings of the ACM on Human Factors in Computing Systems (CHI '24)","author":"Coduto Kathryn D","year":"2024","unstructured":"Kathryn D Coduto and Allison McDonald. 2024. Delete it and move on'': Digital management of shared sexual content after a breakup. Proceedings of the ACM on Human Factors in Computing Systems (CHI '24), Honolulu, HI, USA (2024), 11-16."},{"key":"e_1_2_1_23_1","volume-title":"2021 IEEE international conference on systems, man, and cybernetics (SMC). IEEE, 100-106","author":"Silva Costa Daniel Da","year":"2021","unstructured":"Daniel Da Silva Costa, Pedro Nuno Moura, and Ana Cristina Bicharra Garcia. 2021. Improving human perception of GAN generated facial image synthesis by filtering the training set considering facial attributes. In 2021 IEEE international conference on systems, man, and cybernetics (SMC). IEEE, 100-106."},{"key":"e_1_2_1_24_1","unstructured":"Emilia David and Alex Heath. 2024. Meta says you better disclose your AI fakes or it might just pull them. https:\/\/www.theverge.com\/2024\/2\/6\/24062388\/meta-ai-photo-watermark-facebook-instagram-threads"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.3390\/info11020057"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557352"},{"key":"e_1_2_1_27_1","first-page":"1","volume-title":"Proceedings of the ACM on Human-Computer Interaction","volume":"2","author":"DeVito Michael A","year":"2018","unstructured":"Michael A DeVito, Ashley Marie Walker, and Jeremy Birnholtz. 2018. 'Too Gay for Facebook' Presenting LGBTQ Identity Throughout the Personal Social Media Ecosystem. Proceedings of the ACM on Human-Computer Interaction, Vol. 2, CSCW (2018), 1-23."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.4018\/JOEUC.2016040104"},{"key":"e_1_2_1_29_1","first-page":"3","article-title":"Social media engagement behaviour: a uses and gratifications perspective","volume":"24","author":"Dolan Rebecca","year":"2016","unstructured":"Rebecca Dolan, Jodie Conduit, John Fahy, and Steve Goodman. 2016. Social media engagement behaviour: a uses and gratifications perspective. Journal of strategic marketing, Vol. 24, 3-4 (2016), 261-277.","journal-title":"Journal of strategic marketing"},{"key":"e_1_2_1_30_1","volume-title":"Informatics","volume":"7","author":"Faklaris Cori","year":"2020","unstructured":"Cori Faklaris, Francesco Cafaro, Asa Blevins, Matthew A O'Haver, and Neha Singhal. 2020. A snapshot of bystander attitudes about mobile live-streaming video in public settings. In Informatics, Vol. 7. MDPI, 10."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1177\/160940690600500107"},{"key":"e_1_2_1_32_1","doi-asserted-by":"crossref","first-page":"1341","DOI":"10.1093\/bjc\/azab111","article-title":"Deepfakes and digitally altered imagery abuse: A cross-country exploration of an emerging form of image-based sexual abuse","volume":"62","author":"Flynn Asher","year":"2022","unstructured":"Asher Flynn, Anastasia Powell, Adrian J Scott, and Elena Cama. 2022. Deepfakes and digitally altered imagery abuse: A cross-country exploration of an emerging form of image-based sexual abuse. The British Journal of Criminology, Vol. 62, 6 (2022), 1341-1358.","journal-title":"The British Journal of Criminology"},{"key":"e_1_2_1_33_1","volume-title":"Internet social network communities: Risk taking, trust, and privacy concerns. Computers in human behavior","author":"Fogel Joshua","year":"2009","unstructured":"Joshua Fogel and Elham Nehmad. 2009. Internet social network communities: Risk taking, trust, and privacy concerns. Computers in human behavior, Vol. 25, 1 (2009), 153-160."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2009.5459413"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi7010067"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.08.367"},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 1603-1612","author":"Gilbert Eric","year":"2008","unstructured":"Eric Gilbert, Karrie Karahalios, and Christian Sandvig. 2008. The network in the garden: an empirical analysis of social media in rural life. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 1603-1612."},{"key":"e_1_2_1_38_1","volume-title":"A survey on differentially private machine learning","author":"Gong Maoguo","year":"2020","unstructured":"Maoguo Gong, Yu Xie, Ke Pan, Kaiyuan Feng, and Alex Kai Qin. 2020. A survey on differentially private machine learning. IEEE computational intelligence magazine, Vol. 15, 2 (2020), 49-64."},{"key":"e_1_2_1_39_1","first-page":"506","volume-title":"proceedings of the international AAAI conference on web and social media","volume":"5","author":"Guerini Marco","year":"2011","unstructured":"Marco Guerini, Carlo Strapparava, and Gozde Ozbal. 2011. Exploring text virality in social networks. In proceedings of the international AAAI conference on web and social media, Vol. 5. 506-509."},{"key":"e_1_2_1_40_1","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.fsc.2010.01.007","article-title":"Photoshop tips and tricks every facial plastic surgeon should know","volume":"18","author":"Hamilton Grant S","year":"2010","unstructured":"Grant S Hamilton. 2010. Photoshop tips and tricks every facial plastic surgeon should know. Facial Plastic Surgery Clinics, Vol. 18, 2 (2010), 283-328.","journal-title":"Facial Plastic Surgery Clinics"},{"key":"e_1_2_1_41_1","unstructured":"Eszter Hargittai et al. 2010. Facebook privacy settings: Who cares? First Monday (2010)."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445258"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173621"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300597"},{"key":"e_1_2_1_45_1","volume-title":"Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks. 95-106","author":"Henne Benjamin","year":"2013","unstructured":"Benjamin Henne, Christian Szongott, and Matthew Smith. 2013. SnapMe if you can: Privacy threats of other peoples' geo-tagged media and what we can do about it. In Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks. 95-106."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/15252019.2010.10722168"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3380960"},{"key":"e_1_2_1_48_1","volume-title":"Proceedings of the 33rd Annual ACM conference on human factors in computing systems. 1645-1648","author":"Hoyle Roberto","year":"2015","unstructured":"Roberto Hoyle, Robert Templeman, Denise Anthony, David Crandall, and Apu Kapadia. 2015. Sensitive lifelogs: A privacy analysis of photos from wearable cameras. In Proceedings of the 33rd Annual ACM conference on human factors in computing systems. 1645-1648."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632079"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076747"},{"key":"e_1_2_1_51_1","volume-title":"2023 14th International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 1157-1160","author":"Hwang JaeYoung","year":"2023","unstructured":"JaeYoung Hwang and SangHoon Oh. 2023. A Brief Survey of Watermarks in Generative AI. In 2023 14th International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 1157-1160."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813603"},{"key":"e_1_2_1_53_1","first-page":"1","volume-title":"Proceedings of the ACM on Human-Computer Interaction","volume":"7","author":"Imana Basileal","year":"2023","unstructured":"Basileal Imana, Aleksandra Korolova, and John Heidemann. 2023. Having your Privacy Cake and Eating it Too: Platform-supported Auditing of Social Media Algorithms for Public Interest. Proceedings of the ACM on Human-Computer Interaction, Vol. 7, CSCW1 (2023), 1-33."},{"key":"e_1_2_1_54_1","first-page":"43","article-title":"Identity theft and social media","volume":"18","author":"Irshad Shareen","year":"2018","unstructured":"Shareen Irshad and Tariq Rahim Soomro. 2018. Identity theft and social media. International Journal of Computer Science and Network Security, Vol. 18, 1 (2018), 43-55.","journal-title":"International Journal of Computer Science and Network Security"},{"key":"e_1_2_1_55_1","volume-title":"2013 10th IEEE international conference on advanced video and signal based surveillance. IEEE, 208-213","author":"Korshunov Pavel","year":"2013","unstructured":"Pavel Korshunov and Touradj Ebrahimi. 2013a. Using face morphing to protect privacy. In 2013 10th IEEE international conference on advanced video and signal based surveillance. IEEE, 208-213."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2013.6636641"},{"key":"e_1_2_1_57_1","volume-title":"Applications of Digital Image Processing XXXVI","author":"Korshunov Pavel","unstructured":"Pavel Korshunov, Andrea Melle, Jean-Luc Dugelay, and Touradj Ebrahimi. 2013. Framework for objective evaluation of privacy filters. In Applications of Digital Image Processing XXXVI, Vol. 8856. SPIE, 265-276."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1178657.1178665"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12394-009-0019-1"},{"key":"e_1_2_1_60_1","first-page":"107","article-title":"From identification to identity theft: Public perceptions of biometric privacy harms","volume":"10","author":"Kugler Matthew B","year":"2019","unstructured":"Matthew B Kugler. 2019. From identification to identity theft: Public perceptions of biometric privacy harms. UC Irvine L. Rev., Vol. 10 (2019), 107.","journal-title":"UC Irvine L. Rev."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1080\/13683500.2020.1738357"},{"key":"e_1_2_1_62_1","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems. 1-19","author":"Lee Hao-Ping","year":"2024","unstructured":"Hao-Ping Lee, Yu-Ju Yang, Thomas Serban Von Davier, Jodi Forlizzi, and Sauvik Das. 2024. Deepfakes, Phrenology, Surveillance, and More! A Taxonomy of AI Privacy Risks. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 1-19."},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2008.01432.x"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737466"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517520"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376498"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134702"},{"key":"e_1_2_1_68_1","first-page":"1","article-title":"Privacy intelligence: A survey on image privacy in online social networks","volume":"55","author":"Liu Chi","year":"2022","unstructured":"Chi Liu, Tianqing Zhu, Jun Zhang, and Wanlei Zhou. 2022. Privacy intelligence: A survey on image privacy in online social networks. Comput. Surveys, Vol. 55, 8 (2022), 1-35.","journal-title":"Comput. Surveys"},{"key":"e_1_2_1_69_1","first-page":"1","volume-title":"Privacy-Enhancing Image Modifications. Proceedings of the ACM on Human-Computer Interaction","volume":"8","author":"Logas Jacob","year":"2024","unstructured":"Jacob Logas, Poojita Garg, Rosa I Arriaga, and Sauvik Das. 2024. The Subversive AI Acceptance Scale (SAIA-8): A Scale to Measure User Acceptance of AI-Generated, Privacy-Enhancing Image Modifications. Proceedings of the ACM on Human-Computer Interaction, Vol. 8, CSCW1 (2024), 1-43."},{"key":"e_1_2_1_70_1","first-page":"1","volume-title":"Proceedings of the ACM on Human-Computer Interaction","volume":"6","author":"Logas Jacob","year":"2022","unstructured":"Jacob Logas, Ari Schlesinger, Zhouyu Li, and Sauvik Das. 2022. Image DePO: towards gradual decentralization of online social networks using decentralized privacy overlays. Proceedings of the ACM on Human-Computer Interaction, Vol. 6, CSCW1 (2022), 1-28."},{"key":"e_1_2_1_71_1","volume-title":"Distributed consent and its impact on privacy and observability in social networks. arXiv preprint arXiv:2006.16140","author":"Lovato Juniper","year":"2020","unstructured":"Juniper Lovato, Antoine Allard, Randall Harp, and Laurent H\u00e9bert-Dufresne. 2020. Distributed consent and its impact on privacy and observability in social networks. arXiv preprint arXiv:2006.16140 (2020)."},{"key":"e_1_2_1_72_1","doi-asserted-by":"crossref","first-page":"647","DOI":"10.1080\/15564886.2022.2036656","article-title":"Deepfakes and domestic violence: perpetrating intimate partner abuse using video technology","volume":"17","author":"Lucas Kweilin T","year":"2022","unstructured":"Kweilin T Lucas. 2022. Deepfakes and domestic violence: perpetrating intimate partner abuse using video technology. Victims & Offenders, Vol. 17, 5 (2022), 647-659.","journal-title":"Victims & Offenders"},{"key":"e_1_2_1_73_1","first-page":"205630511769773","article-title":"Where dating meets data: Investigating social and institutional privacy concerns on Tinder","volume":"3","author":"Lutz Christoph","year":"2017","unstructured":"Christoph Lutz and Giulia Ranzini. 2017. Where dating meets data: Investigating social and institutional privacy concerns on Tinder. Social Media Society, Vol. 3, 1 (2017), 2056305117697735.","journal-title":"Social Media Society"},{"key":"e_1_2_1_74_1","volume-title":"Raising Awareness of Location Information Vulnerabilities in Social Media Photos using LLMs. arXiv preprint arXiv:2503.20226","author":"Ma Ying","year":"2025","unstructured":"Ying Ma, Shiquan Zhang, Dongju Yang, Zhanna Sarsenbayeva, Jarrod Knibbe, and Jorge Goncalves. 2025. Raising Awareness of Location Information Vulnerabilities in Social Media Photos using LLMs. arXiv preprint arXiv:2503.20226 (2025)."},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1080\/08164649.2018.1542592"},{"key":"e_1_2_1_76_1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data. In Artificial intelligence and statistics","author":"McMahan Brendan","year":"2017","unstructured":"Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Artificial intelligence and statistics. PMLR, 1273-1282.","journal-title":"PMLR"},{"key":"e_1_2_1_77_1","volume-title":"Proceedings of the SIGCHI conference on Human factors in computing systems. 347-356","author":"Miller Andrew D","year":"2007","unstructured":"Andrew D Miller and W Keith Edwards. 2007. Give and take: a study of consumer photo-sharing culture and practice. In Proceedings of the SIGCHI conference on Human factors in computing systems. 347-356."},{"key":"e_1_2_1_78_1","volume-title":"Proceedings of the 24th international conference on World Wide Web. 776-786","author":"Minkus Tehila","year":"2015","unstructured":"Tehila Minkus, Kelvin Liu, and Keith W Ross. 2015. Children seen but not heard: When parents compromise children's online privacy. In Proceedings of the 24th international conference on World Wide Web. 776-786."},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3672539.3686778"},{"key":"e_1_2_1_80_1","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1109\/TDSC.2021.3132230","article-title":"Do you know you are tracked by photos that you didn't take'': large-scale location-aware multi-party image privacy protection","volume":"20","author":"Morris Joshua","year":"2021","unstructured":"Joshua Morris, Sara Newman, Kannappan Palaniappan, Jianping Fan, and Dan Lin. 2021. ''Do you know you are tracked by photos that you didn't take'': large-scale location-aware multi-party image privacy protection. IEEE Transactions on Dependable and Secure Computing, Vol. 20, 1 (2021), 301-312.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642164"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2015.7177394"},{"key":"e_1_2_1_83_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev., Vol. 79 (2004), 119.","journal-title":"Wash. L. Rev."},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46487-9_2"},{"key":"e_1_2_1_85_1","first-page":"11","article-title":"Artificial intelligence-altered videos (deepfakes), image-based sexual abuse, and data privacy concerns","volume":"25","author":"Okolie Chidera","year":"2023","unstructured":"Chidera Okolie. 2023. Artificial intelligence-altered videos (deepfakes), image-based sexual abuse, and data privacy concerns. Journal of International Women's Studies, Vol. 25, 2 (2023), 11.","journal-title":"Journal of International Women's Studies"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23002"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.398"},{"key":"e_1_2_1_88_1","volume-title":"Information sharing on social media sites. Computers in human behavior","author":"Osatuyi Babajide","year":"2013","unstructured":"Babajide Osatuyi. 2013. Information sharing on social media sites. Computers in human behavior, Vol. 29, 6 (2013), 2622-2631."},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.3390\/s150612959"},{"key":"e_1_2_1_90_1","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/s11019-014-9580-y","article-title":"The ethics of clinical photography and social media","volume":"18","author":"Palacios-Gonz\u00e1lez C\u00e9sar","year":"2015","unstructured":"C\u00e9sar Palacios-Gonz\u00e1lez. 2015. The ethics of clinical photography and social media. Medicine, Health Care and Philosophy, Vol. 18, 1 (2015), 63-70.","journal-title":"Medicine, Health Care and Philosophy"},{"key":"e_1_2_1_91_1","volume-title":"Boundaries of privacy: Dialectics of disclosure","author":"Petronio Sandra","unstructured":"Sandra Petronio. 2002. Boundaries of privacy: Dialectics of disclosure. Suny Press."},{"key":"e_1_2_1_92_1","volume-title":"creeping, and wall cleaning: Understanding privacy in the age of Facebook. First Monday","author":"Raynes-Goldie Kate","year":"2010","unstructured":"Kate Raynes-Goldie. 2010. Aliases, creeping, and wall cleaning: Understanding privacy in the age of Facebook. First Monday (2010)."},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1080\/10811680.2020.1735194"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1080\/10510974.2017.1280067"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300750"},{"key":"e_1_2_1_96_1","unstructured":"Johnny Salda na. 2021. The coding manual for qualitative researchers. (2021)."},{"key":"e_1_2_1_97_1","first-page":"1","volume-title":"Proceedings of the ACM on Human-Computer Interaction","volume":"7","author":"Niksirat Kavous Salehzadeh","year":"2023","unstructured":"Kavous Salehzadeh Niksirat, Diana Korka, Hamza Harkous, K\u00e9vin Huguenin, and Mauro Cherubini. 2023. On the potential of mediation chatbots for mitigating multiparty privacy conflicts-a wizard-of-Oz study. Proceedings of the ACM on Human-Computer Interaction, Vol. 7, CSCW1 (2023), 1-33."},{"key":"e_1_2_1_98_1","volume-title":"Explainable AI: interpreting, explaining and visualizing deep learning","author":"Samek Wojciech","unstructured":"Wojciech Samek and Klaus-Robert M\u00fcller. 2019. Towards explainable artificial intelligence. In Explainable AI: interpreting, explaining and visualizing deep learning. Springer, 5-22."},{"key":"e_1_2_1_99_1","first-page":"1","volume-title":"Proceedings of the ACM on Human-computer Interaction","volume":"4","author":"Scheuerman Morgan Klaus","year":"2020","unstructured":"Morgan Klaus Scheuerman, Kandrea Wade, Caitlin Lustig, and Jed R Brubaker. 2020. How we've taught algorithms to see identity: Constructing race and gender in image databases for facial analysis. Proceedings of the ACM on Human-computer Interaction, Vol. 4, CSCW1 (2020), 1-35."},{"key":"e_1_2_1_100_1","volume-title":"Generalizability in qualitative research: Misunderstandings, opportunities and recommendations for the sport and exercise sciences. Qualitative research in sport, exercise and health","author":"Smith Brett","year":"2018","unstructured":"Brett Smith. 2018. Generalizability in qualitative research: Misunderstandings, opportunities and recommendations for the sport and exercise sciences. Qualitative research in sport, exercise and health, Vol. 10, 1 (2018), 137-149."},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983644"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2015.1107167"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145320"},{"key":"e_1_2_1_104_1","volume-title":"Proceedings of the SIGCHI conference on human factors in computing systems. 1553-1562","author":"Stutzman Fred","year":"2010","unstructured":"Fred Stutzman and Jacob Kramer-Duffield. 2010. Friends only: examining a privacy-enhancing behavior in facebook. In Proceedings of the SIGCHI conference on human factors in computing systems. 1553-1562."},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2539165"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1145\/3208039"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025668"},{"key":"e_1_2_1_108_1","first-page":"1","article-title":"Relationship between willingness to share photos and preferred level of photo blurring for privacy protection","volume":"2015","author":"Tanaka Yasuhiro","year":"2015","unstructured":"Yasuhiro Tanaka, Akihisa Kodate, Yu Ichifuji, and Noboru Sonehara. 2015. Relationship between willingness to share photos and preferred level of photo blurring for privacy protection. In Proceedings of the ASE BigData & SocialInformatics 2015. 1-5.","journal-title":"Proceedings of the ASE BigData & SocialInformatics"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.11.046"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10169"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397481.3450650"},{"key":"e_1_2_1_112_1","volume-title":"Proceedings of the seventh symposium on usable privacy and security. 1-16","author":"Wang Yang","year":"2011","unstructured":"Yang Wang, Gregory Norcie, Saranga Komanduri, Alessandro Acquisti, Pedro Giovanni Leon, and Lorrie Faith Cranor. 2011. '' I regretted the minute I pressed share'' a qualitative study of regrets on Facebook. In Proceedings of the seventh symposium on usable privacy and security. 1-16."},{"key":"e_1_2_1_113_1","volume-title":"Show me how it feels to work here: Using photography to research organizational aesthetics. ephemera","author":"Warren Samantha","year":"2002","unstructured":"Samantha Warren. 2002. Show me how it feels to work here: Using photography to research organizational aesthetics. ephemera, Vol. 2, 3 (2002), 224-245."},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642135"},{"key":"e_1_2_1_115_1","volume-title":"International management review","author":"Williams Michael","year":"2019","unstructured":"Michael Williams and Tami Moser. 2019. The art of coding and thematic exploration in qualitative research. International management review, Vol. 15, 1 (2019), 45-55."},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579603"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642103"},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2443795"},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2443795"},{"key":"e_1_2_1_120_1","first-page":"524","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","volume":"34","author":"Yang Jinghan","year":"2020","unstructured":"Jinghan Yang, Ayan Chakrabarti, and Yevgeniy Vorobeychik. 2020. Protecting geolocation privacy of photo collections. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 34. 524-531."},{"key":"e_1_2_1_121_1","volume-title":"Proceedings of the fourth international conference on Communities and technologies. 265-274","author":"Young Alyson L","year":"2009","unstructured":"Alyson L Young and Anabel Quan-Haase. 2009. Information revelation and internet privacy concerns on social network sites: a case study of facebook. In Proceedings of the fourth international conference on Communities and technologies. 265-274."},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787986"},{"key":"e_1_2_1_123_1","volume-title":"Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies. 93-104","author":"Yu Lingjing","year":"2018","unstructured":"Lingjing Yu, Sri Mounica Motipalli, Dongwon Lee, Peng Liu, Heng Xu, Qingyun Liu, Jianlong Tan, and Bo Luo. 2018b. My friend leaks my privacy: Modeling and analyzing privacy in social networks. In Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies. 93-104."},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2008.4712094"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-spr.2016.0756"},{"key":"e_1_2_1_126_1","volume-title":"Services and Contexts: Third International Conference, ITAP 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Part II 3. Springer, 181-200","author":"Zeissig Eva-Maria","year":"2017","unstructured":"Eva-Maria Zeissig, Chantal Lidynia, Luisa Vervier, Andera Gadeib, and Martina Ziefle. 2017. Online privacy perceptions of older adults. In Human Aspects of IT for the Aged Population. Applications, Services and Contexts: Third International Conference, ITAP 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Part II 3. Springer, 181-200."},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348292"},{"key":"e_1_2_1_128_1","doi-asserted-by":"crossref","first-page":"2488","DOI":"10.1109\/TMC.2018.2878711","article-title":"Cloak of invisibility: Privacy-friendly photo capturing and sharing system","volume":"18","author":"Zhang Lan","year":"2018","unstructured":"Lan Zhang, Xiang-Yang Li, Kebin Liu, Cihang Liu, Xuan Ding, and Yunhao Liu. 2018. Cloak of invisibility: Privacy-friendly photo capturing and sharing system. IEEE Transactions on Mobile Computing, Vol. 18, 11 (2018), 2488-2501.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v16i1.19387"},{"key":"e_1_2_1_130_1","volume-title":"Face recognition: A literature survey. ACM computing surveys (CSUR)","author":"Zhao Wenyi","year":"2003","unstructured":"Wenyi Zhao, Rama Chellappa, P Jonathon Phillips, and Azriel Rosenfeld. 2003. Face recognition: A literature survey. ACM computing surveys (CSUR), Vol. 35, 4 (2003), 399-458."},{"key":"e_1_2_1_131_1","volume-title":"Proceedings of the 2007 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries. 197-204","author":"Zukowski Tomasz","year":"2007","unstructured":"Tomasz Zukowski and Irwin Brown. 2007. Examining the influence of demographic factors on internet users' information privacy concerns. In Proceedings of the 2007 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries. 197-204."}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3757695","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3757695","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T17:35:54Z","timestamp":1760636154000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3757695"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,16]]},"references-count":131,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,10,18]]}},"alternative-id":["10.1145\/3757695"],"URL":"https:\/\/doi.org\/10.1145\/3757695","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,16]]},"assertion":[{"value":"2025-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}