{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T16:22:16Z","timestamp":1756311736643},"reference-count":109,"publisher":"Privacy Enhancing Technologies Symposium Advisory Board","issue":"1","license":[{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Over the past decade, research has explored managing the availability of shared personal online data, with particular focus on longitudinal aspects of privacy. Yet, there is no taxonomy that takes user perspective and technical approaches into account. In this work, we systematize research on longitudinal privacy management of publicly shared personal online data from these two perspectives: user studies capturing users\u2019 interactions related to the availability of their online data and technical proposals limiting the availability of data. Following a systematic approach, we derive conflicts between these two sides that have not yet been addressed appropriately, resulting in a list of challenging open problems to be tackled by future research. While limitations of data availability in proposed approaches and real systems are mostly time-based, users\u2019 desired models are rather complex, taking into account content, audience, and the context in which data has been shared. Our systematic evaluation reveals interesting challenges broadly categorized by expiration conditions, data co-ownership, user awareness, and security and trust.<\/jats:p>","DOI":"10.2478\/popets-2021-0013","type":"journal-article","created":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T11:47:06Z","timestamp":1608637626000},"page":"229-249","source":"Crossref","is-referenced-by-count":6,"title":["SoK: Managing Longitudinal Privacy of Publicly Shared Personal Online Data"],"prefix":"10.56553","volume":"2021","author":[{"given":"Theodor","family":"Schnitzler","sequence":"first","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum , Bochum , Germany"}]},{"given":"Shujaat","family":"Mirza","sequence":"additional","affiliation":[{"name":"Courant Institute of Mathematical Sciences , New York University , New York City , NY, USA"}]},{"given":"Markus","family":"D\u00fcrmuth","sequence":"additional","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum , Bochum , Germany"}]},{"given":"Christina","family":"P\u00f6pper","sequence":"additional","affiliation":[{"name":"New York University Abu Dhabi , Abu Dhabi , UAE"}]}],"member":"35752","published-online":{"date-parts":[[2020,11,9]]},"reference":[{"key":"2022062314365916686_j_popets-2021-0013_ref_001_w2aab3b7c26b1b6b1ab1ab1Aa","doi-asserted-by":"crossref","unstructured":"[1] A. Abouzied and J. Chen, \u201cHarnessing Data Loss With Forgetful Data Structures,\u201d in ACM Symposium on Cloud Computing, ser. SoCC \u201915. Kohala Coast, HI, USA: ACM, Aug. 2015, pp. 168\u2013173.10.1145\/2806777.2806936","DOI":"10.1145\/2806777.2806936"},{"key":"2022062314365916686_j_popets-2021-0013_ref_002_w2aab3b7c26b1b6b1ab1ab2Aa","doi-asserted-by":"crossref","unstructured":"[2] S. Ahern, D. Eckles, N. S. Good, S. King, M. Naaman, and R. Nair, \u201cOver-exposed? privacy patterns and considerations in online and mobile photo sharing,\u201d in CHI Conference on Human Factors in Computing Systems, ser. CHI \u201907. San Jose, CA, USA: ACM, Apr. 2007, pp. 357\u2013366.10.1145\/1240624.1240683","DOI":"10.1145\/1240624.1240683"},{"key":"2022062314365916686_j_popets-2021-0013_ref_003_w2aab3b7c26b1b6b1ab1ab3Aa","doi-asserted-by":"crossref","unstructured":"[3] H. Almuhimedi, S. Wilson, B. Liu, N. Sadeh, and A. Acquisti, \u201cTweets are Forever: A Large-scale Quantitative Analysis of Deleted Tweets,\u201d in ACM Conference on Computer supported cooperative work, ser. CSCW \u201913. San Antonio, TX, USA: ACM, Feb. 2013, pp. 897\u2013908.10.1145\/2441776.2441878","DOI":"10.1145\/2441776.2441878"},{"key":"2022062314365916686_j_popets-2021-0013_ref_004_w2aab3b7c26b1b6b1ab1ab4Aa","unstructured":"[4] A. Alqhatani and H. R. Lipford, \u201c\u201cThere is nothing that I need to keep secret\u201d: Sharing Practices and Concerns of Wearable Fitness Data,\u201d in USENIX Symposium on Usable Privacy and Security, ser. SOUPS \u201919. Santa Clara, CA, USA: USENIX Association, Aug. 2019."},{"key":"2022062314365916686_j_popets-2021-0013_ref_005_w2aab3b7c26b1b6b1ab1ab5Aa","doi-asserted-by":"crossref","unstructured":"[5] G. Amjad, M. S. Mirza, and C. P\u00f6pper, \u201cForgetting with Puzzles: Using Cryptographic Puzzles to support Digital Forgetting,\u201d in ACM Conference on Data and Application Security and Privacy, ser. CODASPY \u201918. Tempe, AZ, USA: ACM, Mar. 2018, pp. 342\u2013353.10.1145\/3176258.3176327","DOI":"10.1145\/3176258.3176327"},{"key":"2022062314365916686_j_popets-2021-0013_ref_006_w2aab3b7c26b1b6b1ab1ab6Aa","doi-asserted-by":"crossref","unstructured":"[6] O. Ayalon and E. Toch, \u201cRetrospective privacy: managing longitudinal privacy in online social networks,\u201d in Symposium on Usable Privacy and Security, ser. SOUPS \u201913. Newcastle, UK: USENIX Association, Jul. 2013.10.1145\/2501604.2501608","DOI":"10.1145\/2501604.2501608"},{"key":"2022062314365916686_j_popets-2021-0013_ref_007_w2aab3b7c26b1b6b1ab1ab7Aa","unstructured":"[7] E. Bacis, S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, M. Rosa, and P. Samarati, \u201cMix&Slice: Efficient Access Revocation in the Cloud,\u201d in Conference on Computer and Communications Security, ser. CCS \u201916. Vienna, Austria: ACM, Oct. 2016, p. 217\u2013228.10.1145\/2976749.2978377"},{"key":"2022062314365916686_j_popets-2021-0013_ref_008_w2aab3b7c26b1b6b1ab1ab8Aa","doi-asserted-by":"crossref","unstructured":"[8] S. Barth and M. D. de Jong, \u201cThe Privacy Paradox \u2013 Investigating Discrepancies Between Expressed Privacy Concerns and Actual Online Behavior \u2013 A Systematic Literature Review,\u201d Telematics and Informatics, vol. 34, no. 7, pp. 1038\u20131058, 2017.","DOI":"10.1016\/j.tele.2017.04.013"},{"key":"2022062314365916686_j_popets-2021-0013_ref_009_w2aab3b7c26b1b6b1ab1ab9Aa","doi-asserted-by":"crossref","unstructured":"[9] L. Bauer, L. F. Cranor, S. Komanduri, M. L. Mazurek, M. K. Reiter, M. Sleeper, and B. Ur, \u201cThe Post Anachronism: The Temporal Dimension of Facebook Privacy,\u201d in Workshop on Privacy in the Electronic Society, ser. WPES \u201913. Berlin, Germany: ACM, Nov. 2013, pp. 1\u201312.10.1145\/2517840.2517859","DOI":"10.1145\/2517840.2517859"},{"key":"2022062314365916686_j_popets-2021-0013_ref_010_w2aab3b7c26b1b6b1ab1ac10Aa","doi-asserted-by":"crossref","unstructured":"[10] J. B. Bayer, N. B. Ellison, S. Y. Schoenebeck, and E. B. Falk, \u201cSharing the Small Moments: Ephemeral Social Interaction on Snapchat,\u201d Information, Communication & Society, vol. 19, no. 7, pp. 956\u2013977, Apr. 2016.10.1080\/1369118X.2015.1084349","DOI":"10.1080\/1369118X.2015.1084349"},{"key":"2022062314365916686_j_popets-2021-0013_ref_011_w2aab3b7c26b1b6b1ab1ac11Aa","doi-asserted-by":"crossref","unstructured":"[11] F. Beato, M. Kohlweiss, and K. Wouters, \u201cScramble! Your Social Network Data,\u201d in Privacy Enhancing Technologies Symposium, ser. PETS \u201911. Waterloo, ON, Canada: Springer, Jul. 2011, pp. 211\u2013225.10.1007\/978-3-642-22263-4_12","DOI":"10.1007\/978-3-642-22263-4_12"},{"key":"2022062314365916686_j_popets-2021-0013_ref_012_w2aab3b7c26b1b6b1ab1ac12Aa","doi-asserted-by":"crossref","unstructured":"[12] M. S. Bernstein, E. Bakshy, M. Burke, and B. Karrer, \u201cQuantifying the Invisible Audience in Social Networks,\u201d in CHI Conference on Human Factors in Computing Systems, ser. CHI \u201913. Paris, France: ACM, Apr. 2013, pp. 21\u2014-30.10.1145\/2470654.2470658","DOI":"10.1145\/2470654.2470658"},{"key":"2022062314365916686_j_popets-2021-0013_ref_013_w2aab3b7c26b1b6b1ab1ac13Aa","doi-asserted-by":"crossref","unstructured":"[13] A. Besmer and H. Richter Lipford, \u201cMoving Beyond Untagging: Photo Privacy in a Tagged World,\u201d in CHI Conference on Human Factors in Computing Systems, ser. CHI \u201910. Atlanta, GA, USA: ACM, Apr. 2010, pp. 1563\u20131572.10.1145\/1753326.1753560","DOI":"10.1145\/1753326.1753560"},{"key":"2022062314365916686_j_popets-2021-0013_ref_014_w2aab3b7c26b1b6b1ab1ac14Aa","unstructured":"[14] P. Bhattacharya and N. Ganguly, \u201cCharacterizing Deleted Tweets and Their Authors,\u201d in AAAI Conference on Weblogs and Social Media, ser. ICWSM \u201916. Cologne, Germany: AAAI, May 2016."},{"key":"2022062314365916686_j_popets-2021-0013_ref_015_w2aab3b7c26b1b6b1ab1ac15Aa","doi-asserted-by":"crossref","unstructured":"[15] M. Bishop, E. R. Butler, K. Butler, C. Gates, and S. Greenspan, \u201cForgive and Forget: Return to Obscurity,\u201d in New Security Paradigms Workshop, ser. NSPW \u201913. Banff, Alberta, Canada: ACM, Sep. 2013, pp. 1\u201310.10.1145\/2535813.2535814","DOI":"10.1145\/2535813.2535814"},{"key":"2022062314365916686_j_popets-2021-0013_ref_016_w2aab3b7c26b1b6b1ab1ac16Aa","doi-asserted-by":"crossref","unstructured":"[16] B. M. Bowen, S. Hershkop, A. D. Keromytis, and S. J. Stolfo, \u201cBaiting Inside Attackers Using Decoy Documents,\u201d in International Conference on Security and Privacy in Communication Systems, ser. SecureComm \u201909. Athens, Greece: Springer, Sep. 2009, pp. 51\u201370.10.1007\/978-3-642-05284-2_4","DOI":"10.1007\/978-3-642-05284-2_4"},{"key":"2022062314365916686_j_popets-2021-0013_ref_017_w2aab3b7c26b1b6b1ab1ac17Aa","doi-asserted-by":"crossref","unstructured":"[17] T. F. Brady, T. Konkle, and G. A. Alvarez, \u201cA Review of Visual Memory Capacity: Beyond Individual Items and Toward Structured Representations,\u201d Journal of Vision, vol. 11, no. 5, pp. 1\u201334, 05 2011.10.1167\/11.5.4340549821617025","DOI":"10.1167\/11.5.4"},{"key":"2022062314365916686_j_popets-2021-0013_ref_018_w2aab3b7c26b1b6b1ab1ac18Aa","doi-asserted-by":"crossref","unstructured":"[18] Y. Cao and J. Yang, \u201cTowards Making Systems Forget With Machine Unlearning,\u201d in Symposium on Security and Privacy, ser. S&P \u201915. San Jose, CA, USA: IEEE, May 2015, pp. 463\u2013480.10.1109\/SP.2015.35","DOI":"10.1109\/SP.2015.35"},{"key":"2022062314365916686_j_popets-2021-0013_ref_019_w2aab3b7c26b1b6b1ab1ac19Aa","unstructured":"[19] B. Carminati and E. Ferrari, \u201cCollaborative access control in online social networks,\u201d in Conference on Collaborative Computing: Networking, Applications and Worksharing, ser. CollaborateCom \u201911. Orlando, FL, USA: IEEE, Oct. 2011, pp. 231\u2013240.10.4108\/icst.collaboratecom.2011.247109"},{"key":"2022062314365916686_j_popets-2021-0013_ref_020_w2aab3b7c26b1b6b1ab1ac20Aa","doi-asserted-by":"crossref","unstructured":"[20] C. Castelluccia, E. De Cristofaro, A. Francillon, and M.-A. Kaafar, \u201cEphPub: Toward Robust Ephemeral Publishing,\u201d in IEEE Conference on Network Protocols, ser. ICNP \u201911. Vancouver, BC, Canada: IEEE, Oct. 2011, pp. 165\u2013175.10.1109\/ICNP.2011.6089048","DOI":"10.1109\/ICNP.2011.6089048"},{"key":"2022062314365916686_j_popets-2021-0013_ref_021_w2aab3b7c26b1b6b1ab1ac21Aa","unstructured":"[21] I. Cervesato, \u201cThe Dolev-Yao Intruder is the Most Powerful Attacker,\u201d in Annual Symposium on Logic in Computer Science, ser. LICS \u201901. Boston, MA, USA: IEEE, Jun. 2001."},{"key":"2022062314365916686_j_popets-2021-0013_ref_022_w2aab3b7c26b1b6b1ab1ac22Aa","doi-asserted-by":"crossref","unstructured":"[22] J. W. Clark, P. Snyder, D. McCoy, and C. Kanich, \u201c\u201cI Saw Images I Didn\u2019t Even Know I Had\u201d: Understanding User Perceptions of Cloud Storage Privacy,\u201d in CHI Conference on Human Factors in Computing Systems, ser. CHI \u201915. Seoul, Republic of Korea: ACM, Apr. 2015, pp. 1641\u20131644.10.1145\/2702123.2702535","DOI":"10.1145\/2702123.2702535"},{"key":"2022062314365916686_j_popets-2021-0013_ref_023_w2aab3b7c26b1b6b1ab1ac23Aa","doi-asserted-by":"crossref","unstructured":"[23] K. P. Coopamootoo and T. Gro\u00df, \u201cWhy Privacy is All But Forgotten: An Empirical Study of Privacy & Sharing Attitude,\u201d in Privacy Enhancing Technologies Symposium, ser. PETS \u201917. Minneapolis, MN, USA: Sciendo, Jul. 2017, pp. 97\u2013118.10.1515\/popets-2017-0040","DOI":"10.1515\/popets-2017-0040"},{"key":"2022062314365916686_j_popets-2021-0013_ref_024_w2aab3b7c26b1b6b1ab1ac24Aa","doi-asserted-by":"crossref","unstructured":"[24] E. De Cristofaro, C. Soriente, G. Tsudik, and A. Williams, \u201cHummingbird: Privacy at the time of twitter,\u201d in Symposium on Security and Privacy, ser. S&P \u201912. San Francisco, CA, USA: IEEE, May 2012, pp. 285\u2013299.10.1109\/SP.2012.26","DOI":"10.1109\/SP.2012.26"},{"key":"2022062314365916686_j_popets-2021-0013_ref_025_w2aab3b7c26b1b6b1ab1ac25Aa","doi-asserted-by":"crossref","unstructured":"[25] A. Dhir, P. Kaur, K. Lonka, and M. Nieminen, \u201cWhy Do Adolescents Untag Photos on Facebook?\u201d Computers in Human Behavior, vol. 55, no. PB, pp. 1106\u20131115, Feb. 2016.","DOI":"10.1016\/j.chb.2015.11.017"},{"key":"2022062314365916686_j_popets-2021-0013_ref_026_w2aab3b7c26b1b6b1ab1ac26Aa","doi-asserted-by":"crossref","unstructured":"[26] S. Egelman, A. Oates, and S. Krishnamurthi, \u201cOops, I Did it Again: Mitigating Repeated Access Control Errors on Facebook,\u201d in CHI Conference on Human Factors in Computing Systems, ser. CHI \u201911. Vancouver, BC, Canada: ACM, May 2011, pp. 2295\u20132304.10.1145\/1978942.1979280","DOI":"10.1145\/1978942.1979280"},{"key":"2022062314365916686_j_popets-2021-0013_ref_027_w2aab3b7c26b1b6b1ab1ac27Aa","unstructured":"[27] European Parliament, \u201cRegulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation),\u201d 2016."},{"key":"2022062314365916686_j_popets-2021-0013_ref_028_w2aab3b7c26b1b6b1ab1ac28Aa","unstructured":"[28] European Union, \u201cFactsheet on the \u201cRight to be Forgotten\u201d Ruling (C-131\/12),\u201d May 2014, http:\/\/ec.europa.eu\/justice\/data-protection\/files\/factsheets\/factsheet_data_protection_en.pdf, as of October 20, 2020."},{"key":"2022062314365916686_j_popets-2021-0013_ref_029_w2aab3b7c26b1b6b1ab1ac29Aa","doi-asserted-by":"crossref","unstructured":"[29] C. Fiesler, M. Dye, J. L. Feuston, C. Hiruncharoenvate, C. J. Hutto, S. Morrison, P. Khanipour Roshan, U. Pavalanathan, A. S. Bruckman, M. De Choudhury, and E. Gilbert, \u201cWhat (or Who) is Public? Privacy Settings and Social Media Content Sharing,\u201d in Conference on Computer Supported Cooperative Work, ser. CSCW \u201917. Portland, OR, USA: ACM, Feb. 2017, pp. 567\u2013580.10.1145\/2998181.2998223","DOI":"10.1145\/2998181.2998223"},{"key":"2022062314365916686_j_popets-2021-0013_ref_030_w2aab3b7c26b1b6b1ab1ac30Aa","unstructured":"[30] R. Geambasu, T. Kohno, A. A. Levy, and H. M. Levy, \u201cVanish: Increasing Data Privacy with Self-Destructing Data,\u201d in USENIX Security Symposium, ser. USENIX \u201909. Montreal, QC, Canada: USENIX Association, Aug. 2009, pp. 299\u2013316."},{"key":"2022062314365916686_j_popets-2021-0013_ref_031_w2aab3b7c26b1b6b1ab1ac31Aa","unstructured":"[31] R. Geambasu, T. Kohno, A. Krishnamurthy, A. Levy, H. M. Levy, P. Gardner, and V. Moscaritolo, \u201cNew Directions for Self-Destructing Data,\u201d University of Washington, Tech. Rep. Tech. Rep. UW-CSE-11-08-01, 2011."},{"key":"2022062314365916686_j_popets-2021-0013_ref_032_w2aab3b7c26b1b6b1ab1ac32Aa","unstructured":"[32] A. Ginart, M. Guan, G. Valiant, and J. Y. Zou, \u201cMaking ai forget you: Data deletion in machine learning,\u201d in Advances in Neural Information Processing Systems, 2019, pp. 3513\u20133526."},{"key":"2022062314365916686_j_popets-2021-0013_ref_033_w2aab3b7c26b1b6b1ab1ac33Aa","doi-asserted-by":"crossref","unstructured":"[33] B. Greschbach, G. Kreitz, and S. Buchegger, \u201cThe Devil is in the Metadata \u2014 New Privacy Challenges in Decentralised Online Social Networks,\u201d in Conference on Pervasive Computing and Communications Workshops, ser. PerCOM \u201912. Lugano, Switzerland: IEEE, Mar. 2012, pp. 333\u2013339.10.1109\/PerComW.2012.6197506","DOI":"10.1109\/PerComW.2012.6197506"},{"key":"2022062314365916686_j_popets-2021-0013_ref_034_w2aab3b7c26b1b6b1ab1ac34Aa","doi-asserted-by":"crossref","unstructured":"[34] Y. Gurevich, E. Hudis, and J. M. Wing, \u201cInverse Privacy,\u201d Communications of the ACM, vol. 59, no. 7, pp. 38\u201342, Jun. 2016.10.1145\/2838730","DOI":"10.1145\/2838730"},{"key":"2022062314365916686_j_popets-2021-0013_ref_035_w2aab3b7c26b1b6b1ab1ac35Aa","doi-asserted-by":"crossref","unstructured":"[35] H. Habib, N. Shah, and R. Vaish, \u201cImpact of Contextual Factors on Snapchat Public Sharing,\u201d in CHI Conference on Human Factors in Computing Systems, ser. CHI \u201919. Glasgow, UK: ACM, May 2019.10.1145\/3290605.3300256","DOI":"10.1145\/3290605.3300256"},{"key":"2022062314365916686_j_popets-2021-0013_ref_036_w2aab3b7c26b1b6b1ab1ac36Aa","doi-asserted-by":"crossref","unstructured":"[36] R. Hasan, E. Hassan, Y. Li, K. Caine, D. J. Crandall, R. Hoyle, and A. Kapadia, \u201cViewer Experience of Obscuring Scene Elements in Photos to Enhance Privacy,\u201d in CHI Conference on Human Factors in Computing Systems, ser. CHI \u201918. Montreal, QC, Canada: ACM, Apr. 2018.10.1145\/3173574.3173621","DOI":"10.1145\/3173574.3173621"},{"key":"2022062314365916686_j_popets-2021-0013_ref_037_w2aab3b7c26b1b6b1ab1ac37Aa","doi-asserted-by":"crossref","unstructured":"[37] R. Hasan, Y. Li, E. Hassan, K. Caine, D. J. Crandall, R. Hoyle, and A. Kapadia, \u201cCan Privacy Be Satisfying? On Improving Viewer Satisfaction for Privacy-Enhanced Photos Using Aesthetic Transforms,\u201d in CHI Conference on Human Factors in Computing Systems, ser. CHI \u201919. Glasgow, UK: ACM, May 2019.10.1145\/3290605.3300597","DOI":"10.1145\/3290605.3300597"},{"key":"2022062314365916686_j_popets-2021-0013_ref_038_w2aab3b7c26b1b6b1ab1ac38Aa","doi-asserted-by":"crossref","unstructured":"[38] P. Ilia, B. Carminati, E. Ferrari, P. Fragopoulou, and S. Ioannidis, \u201cSAMPAC: Socially-Aware Collaborative Multi-Party Access Control,\u201d in Conference on Datsa and Application Security and Privacy, ser. CODASPY \u201917. Scottsdale, AZ, USA: ACM, Mar. 2017, p. 71\u201382.10.1145\/3029806.3029834","DOI":"10.1145\/3029806.3029834"},{"key":"2022062314365916686_j_popets-2021-0013_ref_039_w2aab3b7c26b1b6b1ab1ac39Aa","doi-asserted-by":"crossref","unstructured":"[39] M. Johnson, S. Egelman, and S. M. Bellovin, \u201cFacebook and Privacy: It\u2019s Complicated,\u201d in Symposium on Usable Privacy and Security, ser. SOUPS \u201912. Washington, D.C., USA: ACM, Jul. 2012.10.1145\/2335356.2335369","DOI":"10.1145\/2335356.2335369"},{"key":"2022062314365916686_j_popets-2021-0013_ref_040_w2aab3b7c26b1b6b1ab1ac40Aa","unstructured":"[40] R. Kang, L. Dabbish, N. Fruchter, and S. Kiesler, \u201c\u201cMy Data Just Goes Everywhere:\u201d User Mental Models of the Internet and Implications for Privacy and Security,\u201d in Symposium On Usable Privacy and Security, ser. SOUPS \u201915. Ottawa, ON, Canada: USENIX Association, Jul. 2015, pp. 39\u201352."},{"key":"2022062314365916686_j_popets-2021-0013_ref_041_w2aab3b7c26b1b6b1ab1ac41Aa","doi-asserted-by":"crossref","unstructured":"[41] M. T. Khan, M. Hyun, C. Kanich, and B. Ur, \u201cForgotten But Not Gone: Identifying the Need for Longitudinal Data Management in Cloud Storage,\u201d in CHI Conference on Human Factors in Computing Systems, ser. CHI \u201918. Montreal, QC, Canada: ACM, Apr. 2018.10.1145\/3173574.3174117","DOI":"10.1145\/3173574.3174117"},{"key":"2022062314365916686_j_popets-2021-0013_ref_042_w2aab3b7c26b1b6b1ab1ac42Aa","doi-asserted-by":"crossref","unstructured":"[42] Y. Li, N. Vishwamitra, B. P. Knijnenburg, H. Hu, and K. Caine, \u201cBlur vs. Block: Investigating the Effectiveness of Privacy-Enhancing Obfuscation for Images,\u201d in IEEE Conference on Computer Vision and Pattern Recognition Workshops, ser. CVPRW \u201917. Honolulu, HI, USA: IEEE, Jul. 2017, pp. 1343\u20131351.10.1109\/CVPRW.2017.176","DOI":"10.1109\/CVPRW.2017.176"},{"key":"2022062314365916686_j_popets-2021-0013_ref_043_w2aab3b7c26b1b6b1ab1ac43Aa","doi-asserted-by":"crossref","unstructured":"[43] \u2014\u2014, \u201cEffectiveness and Users\u2019 Experience of Obfuscation as a Privacy-Enhancing Technology for Sharing Photos,\u201d Proceedings of the ACM on Human-Computer Interaction, vol. 1, no. 67, pp. 1\u201324, 2017.10.1145\/3134702","DOI":"10.1145\/3134702"},{"key":"2022062314365916686_j_popets-2021-0013_ref_044_w2aab3b7c26b1b6b1ab1ac44Aa","unstructured":"[44] H. R. Lipford, A. Besmer, and J. Watson, \u201cUnderstanding Privacy Settings in Facebook with an Audience View,\u201d in USENIX Workshop on Usability, Psychology, and Security, ser. UPSEC \u201908. San Francisco, CA, USA: USENIX Association, Apr. 2008, pp. 1\u20138."},{"key":"2022062314365916686_j_popets-2021-0013_ref_045_w2aab3b7c26b1b6b1ab1ac45Aa","doi-asserted-by":"crossref","unstructured":"[45] Y. Liu, K. P. Gummadi, B. Krishnamurthy, and A. Mislove, \u201cAnalyzing Facebook Privacy Settings: User Expectations vs. Reality,\u201d in Internet Measurement Conference, ser. IMC \u201911. Berlin, Germany: ACM, Nov. 2011, pp. 61\u201370.10.1145\/2068816.2068823","DOI":"10.1145\/2068816.2068823"},{"key":"2022062314365916686_j_popets-2021-0013_ref_046_w2aab3b7c26b1b6b1ab1ac46Aa","doi-asserted-by":"crossref","unstructured":"[46] Y. Liu, C. Kliman-Silver, and A. Mislove, \u201cThe Tweets They Are a-Changin\u2019: Evolution of Twitter Users and Behavior,\u201d in AAAI Conference on Weblogs and Social Media, ser. ICWSM \u201914. Ann Arbor, MI, USA: AAAI, Jun. 2014.","DOI":"10.1609\/icwsm.v8i1.14508"},{"key":"2022062314365916686_j_popets-2021-0013_ref_047_w2aab3b7c26b1b6b1ab1ac47Aa","doi-asserted-by":"crossref","unstructured":"[47] W. Luo, Q. Xie, and U. Hengartner, \u201cFaceCloak: An Architecture for User Privacy on Social Networking Sites,\u201d in Conference on Computational Science and Engineering, ser. CSE \u201909. Vancouver, BC, Canada: IEEE, Aug. 2009, pp. 26\u201333.10.1109\/CSE.2009.387","DOI":"10.1109\/CSE.2009.387"},{"key":"2022062314365916686_j_popets-2021-0013_ref_048_w2aab3b7c26b1b6b1ab1ac48Aa","doi-asserted-by":"crossref","unstructured":"[48] M. Madejski, M. Johnson, and S. M. Bellovin, \u201cA Study of Privacy Settings Errors in an Online Social Network,\u201d in IEEE International Conference on Pervasive Computing and Communications Workshops, ser. PerCOM \u201912. Lugano, Switzerland: IEEE, Mar. 2012, pp. 340\u2013345.10.1109\/PerComW.2012.6197507","DOI":"10.1109\/PerComW.2012.6197507"},{"key":"2022062314365916686_j_popets-2021-0013_ref_049_w2aab3b7c26b1b6b1ab1ac49Aa","unstructured":"[49] M. J. Mainier, R. Morris, and M. O. Louch, \u201cSocial Networks and the Privacy Paradox: A Research Framework,\u201d Issues in Information Systems, vol. 11, no. 1, pp. 513\u2013517, 2010."},{"key":"2022062314365916686_j_popets-2021-0013_ref_050_w2aab3b7c26b1b6b1ab1ac50Aa","doi-asserted-by":"crossref","unstructured":"[50] V. Mayer-Sch\u00f6nberger, Delete: The Virtue of Forgetting in the Digital Age. Princeton, New Jersey, USA: Princeton University Press, Jul. 2011.10.1515\/9781400838455","DOI":"10.1515\/9781400838455"},{"key":"2022062314365916686_j_popets-2021-0013_ref_051_w2aab3b7c26b1b6b1ab1ac51Aa","doi-asserted-by":"crossref","unstructured":"[51] M. L. Mazurek, J. Arsenault, J. Breese et al., \u201cAccess Control for Home Data Sharing: Attitudes, Needs and Practices,\u201d in CHI Conference on Human Factors in Computing Systems, ser. CHI \u201910. Atlanta, GA, USA: ACM, Apr. 2010, pp. 645\u2013654.10.1145\/1753326.1753421","DOI":"10.1145\/1753326.1753421"},{"key":"2022062314365916686_j_popets-2021-0013_ref_052_w2aab3b7c26b1b6b1ab1ac52Aa","doi-asserted-by":"crossref","unstructured":"[52] M. Minaei, M. Mondal, P. Loiseau, K. Gummadi, and A. Kate, \u201cLethe: Conceal Content Deletion from Persistent Observers,\u201d in Privacy Enhancing Technologies Symposium, ser. PETS \u201919. Stockholm, Sweden: Sciendo, Jul. 2019, pp. 206\u2013226.10.2478\/popets-2019-0012","DOI":"10.2478\/popets-2019-0012"},{"key":"2022062314365916686_j_popets-2021-0013_ref_053_w2aab3b7c26b1b6b1ab1ac53Aa","unstructured":"[53] R. E. Mohamed and S. Chiasson, \u201cOnline Privacy and Aging of Digital Artifacts,\u201d in USENIX Symposium on Usable Privacy and Security, ser. SOUPS \u201918. Baltimore, MD, USA: USENIX Association, Aug. 2018."},{"key":"2022062314365916686_j_popets-2021-0013_ref_054_w2aab3b7c26b1b6b1ab1ac54Aa","unstructured":"[54] M. Mondal, M. Johnnatan, S. Ghosh, K. P. Gummadi, and A. Kate, \u201cForgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data,\u201d in Symposium on Usable Privacy and Security, ser. SOUPS \u201916. Denver, CO, USA: USENIX Association, Jun. 2016, pp. 287\u2013299."},{"key":"2022062314365916686_j_popets-2021-0013_ref_055_w2aab3b7c26b1b6b1ab1ac55Aa","unstructured":"[55] M. Mondal, Y. Liu, B. Viswanath, K. P. Gummadi, and A. Mislove, \u201cUnderstanding and Specifying Social Access Control Lists,\u201d in Symposium on Usable Privacy and Security, ser. SOUPS \u201914. Menlo Park, California, USA: USENIX Association, Jul. 2014."},{"key":"2022062314365916686_j_popets-2021-0013_ref_056_w2aab3b7c26b1b6b1ab1ac56Aa","doi-asserted-by":"crossref","unstructured":"[56] M. Mondal, J. Messias, S. Ghosh, K. P. Gummadi, and A. Kate, \u201cLongitudinal Privacy Management in Social Media: The Need for Better Controls,\u201d IEEE Internet Computing, vol. 21, no. 3, pp. 48\u201355, May 2017.10.1109\/MIC.2017.76","DOI":"10.1109\/MIC.2017.76"},{"key":"2022062314365916686_j_popets-2021-0013_ref_057_w2aab3b7c26b1b6b1ab1ac57Aa","doi-asserted-by":"crossref","unstructured":"[57] M. Mondal, G. S. Yilmaz, N. Hirsch, M. T. Khan, M. Tang, C. Tran, C. Kanich, B. Ur, and E. Zheleva, \u201cMoving Beyond Set-It-And-Forget-It Privacy Settings on Social Media,\u201d in ACM Conference on Computer and Communications Security, ser. CCS \u201919. London, UK: ACM, Nov. 2019, pp. 991\u20131008.10.1145\/3319535.3354202","DOI":"10.1145\/3319535.3354202"},{"key":"2022062314365916686_j_popets-2021-0013_ref_058_w2aab3b7c26b1b6b1ab1ac58Aa","doi-asserted-by":"crossref","unstructured":"[58] S.-M. Moosavi-Dezfooli, A. Fawzi, O. Fawzi, and P. Frossard, \u201cUniversal Adversarial Perturbations,\u201d in IEEE Conference on Computer Vision and Pattern Recognition, ser. CVPR \u201917. Honolulu, HI, USA: IEEE, Jul. 2017, pp. 86\u201394.10.1109\/CVPR.2017.17","DOI":"10.1109\/CVPR.2017.17"},{"key":"2022062314365916686_j_popets-2021-0013_ref_059_w2aab3b7c26b1b6b1ab1ac59Aa","unstructured":"[59] G. E. M\u00fcller and A. Pilzecker, Experimentelle Beitr\u00e4ge zur Lehre vom Ged\u00e4chtniss. JA Barth, 1900, vol. 1."},{"key":"2022062314365916686_j_popets-2021-0013_ref_060_w2aab3b7c26b1b6b1ab1ac60Aa","unstructured":"[60] A. Murillo, A. Kramm, S. Schnorf, and A. De Luca, \u201c\u201cIf I press delete, it\u2019s gone\u201d - User Understanding of Online Data Deletion and Expiration,\u201d in USENIX Symposium on Usable Privacy and Security, ser. SOUPS \u201918. Baltimore, MD, USA: USENIX Association, Aug. 2018, pp. 329\u2013339."},{"key":"2022062314365916686_j_popets-2021-0013_ref_061_w2aab3b7c26b1b6b1ab1ac61Aa","doi-asserted-by":"crossref","unstructured":"[61] J. Nagy and P. Pecho, \u201cSocial Networks Security,\u201d in Conference on Emerging Security Information, Systems and Technologies, ser. SECUREWARE \u201909. Athens, Greece: IARIA, Jun. 2009, pp. 321\u2013325.10.1109\/SECURWARE.2009.56","DOI":"10.1109\/SECURWARE.2009.56"},{"key":"2022062314365916686_j_popets-2021-0013_ref_062_w2aab3b7c26b1b6b1ab1ac62Aa","doi-asserted-by":"crossref","unstructured":"[62] M. Netter, M. Riesner, M. Weber, and G. Pernul, \u201cPrivacy Settings in Online Social Networks\u2013Preferences, Perception, and Reality,\u201d in Hawaii International Conference on System Sciences, ser. HICSS \u201913. Wailea, HI, USA: IEEE, Jan. 2013, pp. 3219\u20133228.10.1109\/HICSS.2013.455","DOI":"10.1109\/HICSS.2013.455"},{"key":"2022062314365916686_j_popets-2021-0013_ref_063_w2aab3b7c26b1b6b1ab1ac63Aa","unstructured":"[63] C. Nieder\u00e9e, \u201cLearning from Human Memory: Managed Forgetting and Contextualized Remembering for Digital Memories,\u201d in Conference on Theory and Practice of Digital Libraries, ser. TPDL \u201915. Pozna\u0144, Poland: Springer, Sep. 2015, pp. 1\u20136."},{"key":"2022062314365916686_j_popets-2021-0013_ref_064_w2aab3b7c26b1b6b1ab1ac64Aa","doi-asserted-by":"crossref","unstructured":"[64] C. Nieder\u00e9e, N. Kanhabua, F. Gallo, and R. H. Logie, \u201cForgetful Digital Memory: Towards Brain-inspired Long-term Data and Information Management,\u201d ACM SIGMOD Record, vol. 44, no. 2, pp. 41\u201346, 2015.10.1145\/2814710.2814718","DOI":"10.1145\/2814710.2814718"},{"key":"2022062314365916686_j_popets-2021-0013_ref_065_w2aab3b7c26b1b6b1ab1ac65Aa","unstructured":"[65] S. J. Oh, M. Fritz, and B. Schiele, \u201cAdversarial Image Perturbation for Privacy Protection: A Game Theory Perspective,\u201d in IEEE International Conference on Computer Vision, ser. ICCV \u201917. Venice, Italy: IEEE, Oct. 2017, pp. 1482\u20131491."},{"key":"2022062314365916686_j_popets-2021-0013_ref_066_w2aab3b7c26b1b6b1ab1ac66Aa","doi-asserted-by":"crossref","unstructured":"[66] A.-M. Olteanu, K. Huguenin, I. Dacosta, and J.-P. Hubaux, \u201cConsensual and Privacy-preserving Sharing of Multi-subject and Interdependent Data,\u201d in Symposium on Network and Distributed System Security, ser. NDSS \u201918. San Diego, CA, USA: Internet Society, Feb. 2018, pp. 1\u201316.10.14722\/ndss.2018.23002","DOI":"10.14722\/ndss.2018.23002"},{"key":"2022062314365916686_j_popets-2021-0013_ref_067_w2aab3b7c26b1b6b1ab1ac67Aa","unstructured":"[67] Open Whisper Systems, \u201cSignal,\u201d May 2010, https:\/\/signal.org\/, as of October 20, 2020."},{"key":"2022062314365916686_j_popets-2021-0013_ref_068_w2aab3b7c26b1b6b1ab1ac68Aa","doi-asserted-by":"crossref","unstructured":"[68] A. Oshrat and T. Eran, \u201cNot Even Past: Information Aging and Temporal Privacy in Online Social Networks,\u201d vol. 32, no. 2. Taylor & Francis, 2017, pp. 73\u2013102.10.1080\/07370024.2016.1203791","DOI":"10.1080\/07370024.2016.1203791"},{"key":"2022062314365916686_j_popets-2021-0013_ref_069_w2aab3b7c26b1b6b1ab1ac69Aa","doi-asserted-by":"crossref","unstructured":"[69] Y. J. Park, \u201cDigital Literacy and Privacy Behavior Online,\u201d Communication Research, vol. 40, no. 2, pp. 215\u2013236, 2013.10.1177\/0093650211418338","DOI":"10.1177\/0093650211418338"},{"key":"2022062314365916686_j_popets-2021-0013_ref_070_w2aab3b7c26b1b6b1ab1ac70Aa","unstructured":"[70] R. Perlman, \u201cThe Ephemerizer: Making Data Disappear,\u201d Sun Microsystems Laboratories, Inc., Mountain View, CA, USA, Tech. Rep. SMLI TR-2005-140, Feb. 2005."},{"key":"2022062314365916686_j_popets-2021-0013_ref_071_w2aab3b7c26b1b6b1ab1ac71Aa","doi-asserted-by":"crossref","unstructured":"[71] E. Politou, E. Alepis, and C. Patsakis, \u201cForgetting Personal Data and Revoking Consent Under the GDPR: Challenges and Proposed Solutions,\u201d Journal of Cybersecurity, vol. 4, no. 1, pp. 1\u201320, Mar. 2018.10.1093\/cybsec\/tyy001","DOI":"10.1093\/cybsec\/tyy001"},{"key":"2022062314365916686_j_popets-2021-0013_ref_072_w2aab3b7c26b1b6b1ab1ac72Aa","doi-asserted-by":"crossref","unstructured":"[72] C. P\u00f6pper, D. Basin, S. Capkun, and C. Cremers, \u201cKeeping Data Secret under Full Compromise using Porter Devices,\u201d in Annual Computer Security Applications Conference, ser. ACSAC \u201910. Orlando, FL, USA: ACM, Dec. 2010, pp. 241\u2013250.10.1145\/1920261.1920297","DOI":"10.1145\/1920261.1920297"},{"key":"2022062314365916686_j_popets-2021-0013_ref_073_w2aab3b7c26b1b6b1ab1ac73Aa","unstructured":"[73] Proton Technologies AG, \u201cProtonMail,\u201d May 2014, https:\/\/protonmail.com\/, as of October 20, 2020."},{"key":"2022062314365916686_j_popets-2021-0013_ref_074_w2aab3b7c26b1b6b1ab1ac74Aa","doi-asserted-by":"crossref","unstructured":"[74] S. Rajtmajer, A. Squicciarini, J. M. Such, J. Semonsen, and A. Belmonte, \u201cAn Ultimatum Game Model for the Evolution of Privacy in Jointly Managed Content,\u201d in Conference on Decision and Game Theory for Security, ser. GameSec \u201907. Vienna, Austria: Springer, Oct. 2017, pp. 112\u2013130.10.1007\/978-3-319-68711-7_7","DOI":"10.1007\/978-3-319-68711-7_7"},{"key":"2022062314365916686_j_popets-2021-0013_ref_075_w2aab3b7c26b1b6b1ab1ac75Aa","doi-asserted-by":"crossref","unstructured":"[75] K. M. Ramokapane, A. Rashid, and J. M. Such, \u201cAssured Deletion in the Cloud: Requirements, Challenges and Future Directions,\u201d in ACM Cloud Computing Security Workshop, ser. CCSW \u201916. Vienna, Austria: ACM, Oct. 2016, pp. 97\u2013108.10.1145\/2996429.2996434","DOI":"10.1145\/2996429.2996434"},{"key":"2022062314365916686_j_popets-2021-0013_ref_076_w2aab3b7c26b1b6b1ab1ac76Aa","unstructured":"[76] \u2014\u2014, \u201c\u201dI Feel Stupid I Can\u2019t Delete...\u201d: A Study of Users\u2019 Cloud Deletion Practices and Coping Strategies,\u201d in Symposium on Usable Privacy and Security, ser. SOUPS \u201917. Santa Clara, CA: USENIX Association, 2017, pp. 241\u2013256."},{"key":"2022062314365916686_j_popets-2021-0013_ref_077_w2aab3b7c26b1b6b1ab1ac77Aa","unstructured":"[77] Y. Rashidi, T. Ahmed, F. Patel, E. Fath, A. Kapadia, C. Nippert-Eng, and N. M. Su, \u201c\u201cYou Don\u2019t Want to be the Next Meme\u201d: College Students\u2019 Workarounds to Manage Privacy in the Era of Pervasive Photography,\u201d in Symposium on Usable Privacy and Security, ser. SOUPS \u201918. Baltimore, MD, USA: USENIX Association, Aug. 2018, pp. 143\u2013157."},{"key":"2022062314365916686_j_popets-2021-0013_ref_078_w2aab3b7c26b1b6b1ab1ac78Aa","doi-asserted-by":"crossref","unstructured":"[78] J. Reardon, D. Basin, and S. Capkun, \u201cSoK: Secure Data Deletion,\u201d in IEEE Symposium on Security and Privacy, ser. SP \u201913. San Francisco, California, USA: IEEE, May 2013, pp. 301\u2013315.10.1109\/SP.2013.28","DOI":"10.1109\/SP.2013.28"},{"key":"2022062314365916686_j_popets-2021-0013_ref_079_w2aab3b7c26b1b6b1ab1ac79Aa","doi-asserted-by":"crossref","unstructured":"[79] S. Reimann and M. D\u00fcrmuth, \u201cTimed Revocation of User Data: Long Expiration Times from Existing Infrastructure,\u201d in ACM Workshop on Privacy in the Electronic Society, ser. WPES \u201912. Raleigh, NC, USA: ACM, Oct. 2012, pp. 65\u201374.10.1145\/2381966.2381976","DOI":"10.1145\/2381966.2381976"},{"key":"2022062314365916686_j_popets-2021-0013_ref_080_w2aab3b7c26b1b6b1ab1ac80Aa","doi-asserted-by":"crossref","unstructured":"[80] B. Reynolds, J. Venkatanathan, J. Gon\u00e7alves, and V. Kostakos, \u201cSharing Ephemeral Information in Online Social Networks: Privacy Perceptions and Behaviours,\u201d in IFIP Conference on Human-Computer Interaction, ser. INTERACT \u201911. Lisbon, Portugal: IFIP, 2011, pp. 204\u2013215.","DOI":"10.1007\/978-3-642-23765-2_14"},{"key":"2022062314365916686_j_popets-2021-0013_ref_081_w2aab3b7c26b1b6b1ab1ac81Aa","doi-asserted-by":"crossref","unstructured":"[81] A. Schlesinger, E. Chandrasekharan, C. A. Masden, A. S. Bruckman, W. K. Edwards, and R. E. Grinter, \u201cSituated Anonymity: Impacts of Anonymity, Ephemerality, and Hyper-locality on Social Media,\u201d in CHI Conference on Human Factors in Computing Systems, ser. CHI \u201917. Denver, CO, USA: ACM, May 2017, pp. 6912\u20136924.10.1145\/3025453.3025682","DOI":"10.1145\/3025453.3025682"},{"key":"2022062314365916686_j_popets-2021-0013_ref_082_w2aab3b7c26b1b6b1ab1ac82Aa","doi-asserted-by":"crossref","unstructured":"[82] T. Schnitzler, M. D\u00fcrmuth, and C. P\u00f6pper, \u201cTowards Contractual Agreements for Revocation of Online Data,\u201d in ICT Systems Security and Privacy Protection, ser. IFIP SEC \u201919. Lisbon, Portugal: Springer, Jun. 2019.10.1007\/978-3-030-22312-0_26","DOI":"10.1007\/978-3-030-22312-0_26"},{"key":"2022062314365916686_j_popets-2021-0013_ref_083_w2aab3b7c26b1b6b1ab1ac83Aa","doi-asserted-by":"crossref","unstructured":"[83] T. Schnitzler, C. Utz, F. Farke, C. P\u00f6pper, and M. D\u00fcrmuth, \u201cUser Perception and Expectations on Deleting Instant Messages \u2013 or \u2013 \u201cWhat Happens If I Press This Button?\u201d,\u201d in European Workshop on Usable Security, ser. EuroUSEC \u201918. London, UK: Internet Society, Apr. 2018, pp. 1\u20139.10.14722\/eurousec.2018.23009","DOI":"10.14722\/eurousec.2018.23009"},{"key":"2022062314365916686_j_popets-2021-0013_ref_084_w2aab3b7c26b1b6b1ab1ac84Aa","doi-asserted-by":"crossref","unstructured":"[84] E. Shein, \u201cEphemeral Data,\u201d Communications of the ACM, vol. 56, no. 9, pp. 20\u201322, Sep. 2013.10.1145\/2500468.2500474","DOI":"10.1145\/2500468.2500474"},{"key":"2022062314365916686_j_popets-2021-0013_ref_085_w2aab3b7c26b1b6b1ab1ac85Aa","unstructured":"[85] C. Sitawarin, A. N. Bhagoji, A. Mosenia, P. Mittal, and M. Chiang, \u201cRogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos,\u201d in IEEE Deep Learning and Security Workshop, ser. DLS \u201918. San Francisco, CA, USA: IEEE, May 2018."},{"key":"2022062314365916686_j_popets-2021-0013_ref_086_w2aab3b7c26b1b6b1ab1ac86Aa","doi-asserted-by":"crossref","unstructured":"[86] M. Sleeper, J. Cranshaw, P. G. Kelley, B. Ur, A. Acquisti, L. F. Cranor, and N. Sadeh, \u201c\u201dI Read My Twitter the Next Morning and Was Astonished\u201d: A Conversational Perspective on Twitter Regrets,\u201d in CHI Conference on Human Factors in Computing Systems, ser. CHI \u201913. Paris, France: ACM, 2013, pp. 3277\u20133286.","DOI":"10.1145\/2470654.2466448"},{"key":"2022062314365916686_j_popets-2021-0013_ref_087_w2aab3b7c26b1b6b1ab1ac87Aa","doi-asserted-by":"crossref","unstructured":"[87] M. Sleeper, W. Melicher, H. Habib, L. Bauer, L. F. Cranor, and M. L. Mazurek, \u201cSharing Personal Content Online: Exploring Channel Choice and Multi-Channel Behaviors,\u201d in CHI Conference on Human Factors in Computing Systems, ser. CHI \u201916. Santa Clara, CA, USA: ACM, May 2016, pp. 101\u2013112.10.1145\/2858036.2858170","DOI":"10.1145\/2858036.2858170"},{"key":"2022062314365916686_j_popets-2021-0013_ref_088_w2aab3b7c26b1b6b1ab1ac88Aa","unstructured":"[88] Snap Inc., \u201cSnapchat,\u201d Sep. 2011, https:\/\/www.snapchat.com\/, as of October 20, 2020."},{"key":"2022062314365916686_j_popets-2021-0013_ref_089_w2aab3b7c26b1b6b1ab1ac89Aa","doi-asserted-by":"crossref","unstructured":"[89] P. Snyder and C. Kanich, \u201cCloudsweeper: Enabling Data-centric Document Management for Secure Cloud Archives,\u201d in ACM Cloud Computing Security Workshop, ser. CCSW \u201913. Berlin, Germany: ACM, Nov. 2013, pp. 47\u201354.10.1145\/2517488.2517495","DOI":"10.1145\/2517488.2517495"},{"key":"2022062314365916686_j_popets-2021-0013_ref_090_w2aab3b7c26b1b6b1ab1ac90Aa","doi-asserted-by":"crossref","unstructured":"[90] D. J. Solove, \u201cA Taxonomy of Privacy,\u201d University of Pennsylvania Law Review, vol. 154, no. 3, pp. 477\u2013560, Januar 2006.10.2307\/40041279","DOI":"10.2307\/40041279"},{"key":"2022062314365916686_j_popets-2021-0013_ref_091_w2aab3b7c26b1b6b1ab1ac91Aa","doi-asserted-by":"crossref","unstructured":"[91] A. C. Squicciarini, M. Shehab, and F. Paci, \u201cCollective Privacy Management in Social Networks,\u201d in Conference on World Wide Web, ser. WWW \u201909. Madrid, Spain: ACM, Apr. 2009, pp. 521\u2013530.10.1145\/1526709.1526780","DOI":"10.1145\/1526709.1526780"},{"key":"2022062314365916686_j_popets-2021-0013_ref_092_w2aab3b7c26b1b6b1ab1ac92Aa","unstructured":"[92] Statista Inc., \u201cDistribution of Facebook users worldwide as of January 2020, by age and gender,\u201d Feb. 2020, https:\/\/www.statista.com\/statistics\/376128\/facebook-global-user-age-distribution\/, as of October 20, 2020."},{"key":"2022062314365916686_j_popets-2021-0013_ref_093_w2aab3b7c26b1b6b1ab1ac93Aa","doi-asserted-by":"crossref","unstructured":"[93] K. Stokes and N. Carlsson, \u201cA Peer-to-Peer Agent Community for Digital Oblivion in Online Social Networks,\u201d in IEEE Conference on Privacy, Security and Trust, ser. PST \u201913. Tarragona, Spain: IEEE, Jul. 2013, pp. 103\u2013110.10.1109\/PST.2013.6596043","DOI":"10.1109\/PST.2013.6596043"},{"key":"2022062314365916686_j_popets-2021-0013_ref_094_w2aab3b7c26b1b6b1ab1ac94Aa","doi-asserted-by":"crossref","unstructured":"[94] F. D. Stutzman, R. Gross, and A. Acquisti, \u201cSilent Listeners: The Evolution of Privacy and Disclosure on Face-book,\u201d IEEE Security and Privacy Magazine, vol. 4, no. 2, pp. 7\u201341, 2013.10.29012\/jpc.v4i2.620","DOI":"10.29012\/jpc.v4i2.620"},{"key":"2022062314365916686_j_popets-2021-0013_ref_095_w2aab3b7c26b1b6b1ab1ac95Aa","doi-asserted-by":"crossref","unstructured":"[95] J. M. Such and N. Criado, \u201cResolving Multi-Party Privacy Conflicts in Social Media,\u201d IEEE Transactions on Knowledge and Data Engineering, vol. 28, no. 7, pp. 1851\u20131863, Jul. 2016.","DOI":"10.1109\/TKDE.2016.2539165"},{"key":"2022062314365916686_j_popets-2021-0013_ref_096_w2aab3b7c26b1b6b1ab1ac96Aa","unstructured":"[96] Telegram Messenger LLP, \u201cTelegram,\u201d Aug. 2013, https:\/\/telegram.org\/, as of October 20, 2020."},{"key":"2022062314365916686_j_popets-2021-0013_ref_097_w2aab3b7c26b1b6b1ab1ac97Aa","doi-asserted-by":"crossref","unstructured":"[97] K. Thomas, C. Grier, and D. M. Nicol, \u201cunFriendly: Multi-party Privacy Risks in Social Networks,\u201d in Privacy Enhancing Technologies Symposium, ser. PETS \u201910. Berlin, Germany: Springer, 2010, pp. 236\u2013252.","DOI":"10.1007\/978-3-642-14527-8_14"},{"key":"2022062314365916686_j_popets-2021-0013_ref_098_w2aab3b7c26b1b6b1ab1ac98Aa","doi-asserted-by":"crossref","unstructured":"[98] J. Y. Tsai, S. Egelman, L. F. Cranor, and A. Acquisti, \u201cThe Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study,\u201d Information Systems Research, vol. 22, no. 2, pp. 254\u2013268, 2011.10.1287\/isre.1090.0260","DOI":"10.1287\/isre.1090.0260"},{"key":"2022062314365916686_j_popets-2021-0013_ref_099_w2aab3b7c26b1b6b1ab1ac99Aa","doi-asserted-by":"crossref","unstructured":"[99] N. Unger, S. Dechand, J. Bonneau, S. Fahl, H. Perl, I. Goldberg, and M. Smith, \u201cSoK: Secure Messaging,\u201d in IEEE Symposium on Security and Privacy, ser. SP \u201915. San Jose, CA, USA: IEEE, May 2015, pp. 232\u2013249.10.1109\/SP.2015.22","DOI":"10.1109\/SP.2015.22"},{"key":"2022062314365916686_j_popets-2021-0013_ref_100_w2aab3b7c26b1b6b1ab1ad100Aa","doi-asserted-by":"crossref","unstructured":"[100] M. Veale, R. Binns, and L. Edwards, \u201cAlgorithms that remember: model inversion attacks and data protection law,\u201d Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol. 376, no. 2133, p. 20180083, 2018.","DOI":"10.1098\/rsta.2018.0083"},{"key":"2022062314365916686_j_popets-2021-0013_ref_101_w2aab3b7c26b1b6b1ab1ad101Aa","doi-asserted-by":"crossref","unstructured":"[101] E. F. Villaronga, P. Kieseberg, and T. Li, \u201cHumans forget, machines remember: Artificial intelligence and the right to be forgotten,\u201d Computer Law & Security Review, vol. 34, no. 2, pp. 304\u2013313, 2018.10.1016\/j.clsr.2017.08.007","DOI":"10.1016\/j.clsr.2017.08.007"},{"key":"2022062314365916686_j_popets-2021-0013_ref_102_w2aab3b7c26b1b6b1ab1ad102Aa","doi-asserted-by":"crossref","unstructured":"[102] Y. Wang, G. Norcie, S. Komanduri, A. Acquisti, P. G. Leon, and L. F. Cranor, \u201c\u201dI Regretted the Minute I Pressed Share\u201d: A Qualitative Study of Regrets on Face-book,\u201d in Symposium on Usable Privacy and Security, ser. SOUPS \u201911. Pittsburgh, PA, USA: ACM, 2011, pp. 1\u201316.","DOI":"10.1145\/2078827.2078841"},{"key":"2022062314365916686_j_popets-2021-0013_ref_103_w2aab3b7c26b1b6b1ab1ad103Aa","doi-asserted-by":"crossref","unstructured":"[103] R. Wash, \u201cFolk Models of Home Computer Security,\u201d in Symposium on Usable Privacy and Security, ser. SOUPS \u201910. Redmond, WA, USA: ACM, Jul. 2010.10.1145\/1837110.1837125","DOI":"10.1145\/1837110.1837125"},{"key":"2022062314365916686_j_popets-2021-0013_ref_104_w2aab3b7c26b1b6b1ab1ad104Aa","unstructured":"[104] G. Wegberg, H. Ritzdorf, and S. Capkun, \u201cMulti-User Secure Deletion on Agnostic Cloud Storage,\u201d ETH Zurich, Zurich, Switzerland, Tech. Rep., Oct. 2017."},{"key":"2022062314365916686_j_popets-2021-0013_ref_105_w2aab3b7c26b1b6b1ab1ad105Aa","doi-asserted-by":"crossref","unstructured":"[105] R. Wishart, D. Corapi, S. Marinovic, and M. Sloman, \u201cCollaborative Privacy Policy Authoring in a Social Networking Context,\u201d in Symposium on Policies for Distributed Systems and Networks, ser. POLICY \u201910. Washington D. C., USA: IEEE, Jul. 2010, pp. 1\u20138.10.1109\/POLICY.2010.13","DOI":"10.1109\/POLICY.2010.13"},{"key":"2022062314365916686_j_popets-2021-0013_ref_106_w2aab3b7c26b1b6b1ab1ad106Aa","doi-asserted-by":"crossref","unstructured":"[106] Y. Xue, K. Xue, N. Gai, J. Hong, D. S. L. Wei, and P. Hong, \u201cAn Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage,\u201d IEEE Transactions on Information Forensics and Security, vol. 14, no. 11, pp. 2927\u20132942, Nov. 2019.","DOI":"10.1109\/TIFS.2019.2911166"},{"key":"2022062314365916686_j_popets-2021-0013_ref_107_w2aab3b7c26b1b6b1ab1ad107Aa","unstructured":"[107] C. W. Yoo, H. J. Ahn, and H. R. Rao, \u201cAn Exploration of the Impact of Information Privacy Invasion,\u201d in International Conference on Information Systems, ser. ICIS \u201912. Orlando, FL, USA: AIS, Dec. 2012."},{"key":"2022062314365916686_j_popets-2021-0013_ref_108_w2aab3b7c26b1b6b1ab1ad108Aa","doi-asserted-by":"crossref","unstructured":"[108] A. Zarras, K. Kohls, M. D\u00fcrmuth, and C. P\u00f6pper, \u201cNeuralyzer: Flexible Expiration Times for the Revocation of Online Data,\u201d in ACM Conference on Data and Application Security and Privacy, ser. CODASPY \u201916. New Orleans, Louisiana, USA: ACM, Mar. 2016, pp. 14\u201325.10.1145\/2857705.2857714","DOI":"10.1145\/2857705.2857714"},{"key":"2022062314365916686_j_popets-2021-0013_ref_109_w2aab3b7c26b1b6b1ab1ad109Aa","doi-asserted-by":"crossref","unstructured":"[109] L. Zhou, W. Wang, and K. Chen, \u201cTweet Properly: Analyzing Deleted Tweets to Understand and Identify Regrettable Ones,\u201d in The World Wide Web Conference, ser. WWW \u201916. Montreal, QC, Canada: ACM, Apr. 2016, pp. 603\u2013612.10.1145\/2872427.2883052","DOI":"10.1145\/2872427.2883052"}],"container-title":["Proceedings on Privacy Enhancing Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/content.sciendo.com\/view\/journals\/popets\/2021\/1\/article-p229.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.sciendo.com\/pdf\/10.2478\/popets-2021-0013","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,8]],"date-time":"2022-12-08T14:04:17Z","timestamp":1670508257000},"score":1,"resource":{"primary":{"URL":"https:\/\/petsymposium.org\/popets\/2021\/popets-2021-0013.php"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,9]]},"references-count":109,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2020,11,9]]},"published-print":{"date-parts":[[2021,1,1]]}},"alternative-id":["10.2478\/popets-2021-0013"],"URL":"https:\/\/doi.org\/10.2478\/popets-2021-0013","relation":{},"ISSN":["2299-0984"],"issn-type":[{"value":"2299-0984","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,9]]}}}