{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T02:00:45Z","timestamp":1760234445204,"version":"build-2065373602"},"reference-count":33,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2021,5,21]],"date-time":"2021-05-21T00:00:00Z","timestamp":1621555200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Thanks to the popularity of personal mobile devices, more and more of the different types of private content, such as images and videos, are shared on social networking applications. While content sharing may be an effective practice to enhance social relationships, it is also a source of relevant privacy issues. Unfortunately, users find it difficult to understanding the terms and implications of the privacy policies of apps and services. Moreover, taking privacy decisions about content sharing on social networks is cumbersome and prone to errors that could determine privacy leaks. In this paper, we propose two techniques aimed at supporting the user in taking privacy choices about sharing personal content online. Our techniques are based on machine learning and natural language processing to analyze privacy policies, and on computer vision to assist the user in the privacy-conscious sharing of multimedia content. Experiments with real-world data show the potential of our solutions. We also present ongoing work on a system prototype and chatbot for natural language user assistance.<\/jats:p>","DOI":"10.3390\/fi13060139","type":"journal-article","created":{"date-parts":[[2021,5,21]],"date-time":"2021-05-21T13:15:15Z","timestamp":1621602915000},"page":"139","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["AI-Based Analysis of Policies and Images for Privacy-Conscious Content Sharing"],"prefix":"10.3390","volume":"13","author":[{"given":"Francesco","family":"Contu","sequence":"first","affiliation":[{"name":"Department of Mathematics and Computer Science, University of Cagliari, 09124 Cagliari, Italy"}]},{"given":"Andrea","family":"Demontis","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, University of Cagliari, 09124 Cagliari, Italy"}]},{"given":"Stefano","family":"Dess\u00ec","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, University of Cagliari, 09124 Cagliari, Italy"}]},{"given":"Marco","family":"Muscas","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, University of Cagliari, 09124 Cagliari, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0695-2040","authenticated-orcid":false,"given":"Daniele","family":"Riboni","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, University of Cagliari, 09124 Cagliari, Italy"}]}],"member":"1968","published-online":{"date-parts":[[2021,5,21]]},"reference":[{"key":"ref_1","unstructured":"Shklovski, I., Mainwaring, S.D., Sk\u00falad\u00f3ttir, H.H., and Borgthorsson, H. (May, January 26). Leakiness and creepiness in app space: Perceptions of privacy and mobile app use. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Toronto, ON, Canada."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.aaa1465","article-title":"Privacy and human behavior in the age of information","volume":"347","author":"Acquisti","year":"2015","journal-title":"Science"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Choi, H., Chakraborty, S., Charbiwala, Z.M., and Srivastava, M.B. (2011). Sensorsafe: A framework for privacy-preserving management of personal sensory information. Workshop on Secure Data Management, Springer.","DOI":"10.1007\/978-3-642-23556-6_6"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Kim, S.H., Ko, H.G., Ko, I.Y., and Choi, D. (2015, January 20\u201322). Effects of contextual properties on users\u2019 privacy preferences in mobile computing environments. Proceedings of the 2015 IEEE Trustcom\/BigDataSE\/ISPA, Helsinki, Finland.","DOI":"10.1109\/Trustcom.2015.413"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Brodie, C., Karat, C., and Karat, J. (2006, January 12\u201314). An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench. Proceedings of the Second Symposium on Usable Privacy and Security, Pittsburgh, PA, USA.","DOI":"10.1145\/1143120.1143123"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Bhatia, J., and Breaux, T.D. (2015, January 25). Towards an information type lexicon for privacy policies. Proceedings of the Eighth IEEE International Workshop on Requirements Engineering and Law, RELAW 2015, Ottawa, ON, Canada.","DOI":"10.1109\/RELAW.2015.7330207"},{"key":"ref_7","unstructured":"Zimmeck, S., and Bellovin, S.M. (2014, January 20\u201322). Privee: An Architecture for Automatically Analyzing Web Privacy Policies. Proceedings of the USENIX Security Symposium, San Diego, CA, USA."},{"key":"ref_8","first-page":"506","article-title":"Automatic extraction of access control policies from natural language documents","volume":"17","author":"Narouei","year":"2018","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Spruit, M., and Ferati, D. (2020). Text Mining Business Policy Documents: Applied Data Science in Finance. Int. J. Bus. Intell. Res. IJBIR, 11.","DOI":"10.4018\/IJBIR.20200701.oa1"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"66","DOI":"10.2478\/popets-2019-0037","article-title":"Maps: Scaling privacy compliance analysis to a million apps","volume":"2019","author":"Zimmeck","year":"2019","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Fan, M., Yu, L., Chen, S., Zhou, H., Luo, X., Li, S., Liu, Y., Liu, J., and Liu, T. (2020, January 12\u201315). An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps. Proceedings of the 2020 IEEE 31st International Symposium on Software Reliability Engineering (ISSRE), Coimbra, Portugal.","DOI":"10.1109\/ISSRE5003.2020.00032"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Zerr, S., Siersdorfer, S., Hare, J.S., and Demidova, E. (2012, January 12\u201316). Privacy-aware image classification and search. Proceedings of the 35th International ACM SIGIR Conference on Research and Development in Information Retrieval, Portland, RO, USA.","DOI":"10.1145\/2348283.2348292"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1023\/B:VISI.0000013087.49260.fb","article-title":"Robust Real-Time Face Detection","volume":"57","author":"Viola","year":"2004","journal-title":"Int. J. Comput. Vis."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Squicciarini, A.C., Caragea, C., and Balakavi, R. (2014, January 1\u20134). Analyzing images\u2019 privacy for the modern web. Proceedings of the 25th ACM Conference on Hypertext and Social Media, HT \u201914, Santiago, Chile.","DOI":"10.1145\/2631775.2631803"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1921","DOI":"10.1016\/S0031-3203(98)00079-X","article-title":"On image classification: City images vs. landscapes","volume":"31","author":"Vailaya","year":"1998","journal-title":"Pattern Recognit."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MPRV.2010.7","article-title":"Human Activity Recognition and Pattern Discovery","volume":"9","author":"Kim","year":"2010","journal-title":"IEEE Pervasive Comput."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","article-title":"Distinctive Image Features from Scale-Invariant Keypoints","volume":"60","author":"Lowe","year":"2004","journal-title":"Int. J. Comput. Vis."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Yang, J., Jiang, Y., Hauptmann, A.G., and Ngo, C. (2007, January 24\u201329). Evaluating bag-of-visual-words representations in scene classification. Proceedings of the 9th ACM SIGMM International Workshop on Multimedia Information Retrieval, MIR 2007, Augsburg, Bavaria, Germany.","DOI":"10.1145\/1290082.1290111"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3386082","article-title":"Image privacy prediction using deep neural networks","volume":"14","author":"Tonge","year":"2020","journal-title":"ACM Trans. Web"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1317","DOI":"10.1109\/TIFS.2017.2787986","article-title":"Leveraging content sensitiveness and user trustworthiness to recommend fine-grained privacy settings for social image sharing","volume":"13","author":"Yu","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_21","unstructured":"Google (2021, May 20). Google Privacy Policy. Available online: https:\/\/policies.google.com\/privacy?hl=en-US."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"19912","DOI":"10.1109\/ACCESS.2018.2822693","article-title":"An empirical study on the privacy preservation of online social networks","volume":"6","author":"Siddula","year":"2018","journal-title":"IEEE Access"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"1129","DOI":"10.1016\/j.ipm.2018.08.001","article-title":"Semantic text classification: A survey of past and recent advances","volume":"54","author":"Ganiz","year":"2018","journal-title":"Inf. Process. Manag."},{"key":"ref_24","unstructured":"(2021, May 20). Natural Language Toolkit. Available online: https:\/\/www.nltk.org\/."},{"key":"ref_25","unstructured":"Dekel, O., and Shamir, O. (2010, January 13\u201315). Multiclass-multilabel classification with more classes than examples. Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, JMLR Workshop and Conference Proceedings, Sardinia, Italy."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/s10994-011-5256-5","article-title":"Classifier chains for multi-label classification","volume":"85","author":"Read","year":"2011","journal-title":"Mach. Learn."},{"key":"ref_27","unstructured":"Parmar, A., Katariya, R., and Patel, V. (2021, May 20). A Review on Random Forest: An Ensemble Classifier. Available online: https:\/\/www.researchgate.net\/publication\/329820638_A_Review_on_Random_Forest_An_Ensemble_Classifier."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"536","DOI":"10.1016\/j.ins.2014.02.030","article-title":"A data-driven study of image feature extraction and fusion","volume":"281","author":"Wang","year":"2014","journal-title":"Inf. Sci."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1695","DOI":"10.1016\/j.ijleo.2015.05.002","article-title":"Content based image retrieval system using clustered scale invariant feature transforms","volume":"126","author":"Montazer","year":"2015","journal-title":"Optik"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Squicciarini, A.C., Novelli, A., Lin, D., Caragea, C., and Zhong, H. (2017, January 28\u201330). From Tag to Protect: A Tag-Driven Policy Recommender System for Image Sharing. Proceedings of the 15th Annual Conference on Privacy, Security and Trust, PST 2017, Calgary, AB, Canada.","DOI":"10.1109\/PST.2017.00047"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Gao, S., Wang, Z., Chia, L., and Tsang, I.W. (2010, January 25\u201329). Automatic image tagging via category label and web data. Proceedings of the 18th International Conference on Multimedia 2010, Firenze, Italy.","DOI":"10.1145\/1873951.1874164"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"De Meo, P., Ferrara, E., Fiumara, G., and Provetti, A. (2011, January 22\u201324). Generalized Louvain Method for Community Detection in Large Networks. Proceedings of the 2011 11th International Conference on Intelligent Systems Design and Applications, Cordoba, Spain.","DOI":"10.1109\/ISDA.2011.6121636"},{"key":"ref_33","unstructured":"Frank, E., Hall, M.A., Holmes, G., Kirkby, R., and Pfahringer, B. (2005). WEKA\u2014A Machine Learning Workbench for Data Mining. The Data Mining and Knowledge Discovery Handbook, Springer."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/13\/6\/139\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T06:05:51Z","timestamp":1760162751000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/13\/6\/139"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,21]]},"references-count":33,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2021,6]]}},"alternative-id":["fi13060139"],"URL":"https:\/\/doi.org\/10.3390\/fi13060139","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2021,5,21]]}}}