Influencing Photo Sharing Decisions on Social Media: A Case of Paradoxical Findings
暂无分享,去创建一个
Rakibul Hasan | Apu Kapadia | Mary Jean Amon | Bennett I. Bertenthal | Kurt Hugenberg | B. Bertenthal | Apu Kapadia | K. Hugenberg | M. J. Amon | Rakibul Hasan
[1] Elissa M. Redmiles,et al. Examining the Demand for Spam: Who Clicks? , 2018, CHI.
[2] Matthew Lease,et al. Crowdsourcing for Usability Testing , 2012, ASIST.
[3] E. Diener,et al. Effects of self-awareness on antinormative behavior , 1976 .
[4] Xiang-Yang Li,et al. Privacy.tag: privacy concern expressed and respected , 2014, SenSys.
[5] Gail-Joon Ahn,et al. Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks , 2017, SACMAT.
[6] Paul J. Silvia,et al. Objective Self-Awareness Theory: Recent Progress and Enduring Problems , 2001 .
[7] Lois Ann Scheidt,et al. It’s Complicated: The Social Lives of Networked Teens , 2015, New Media Soc..
[8] I. Ajzen. Attitudes, Personality and Behavior , 1988 .
[9] Yunhao Liu,et al. Privacy-friendly photo capturing and sharing system , 2016, UbiComp.
[10] Jose M. Such,et al. Photo Privacy Conflicts in Social Media: A Large-scale Empirical Study , 2017, CHI.
[11] Anca M. Miron,et al. Reactance Theory - 40 Years Later , 2006 .
[12] Alessandro Acquisti,et al. Misplaced Confidences , 2013, WEIS.
[13] David J. Crandall,et al. PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces , 2014, NDSS.
[14] Laura A. Dabbish,et al. Privacy Attitudes of Mechanical Turk Workers and the U.S. Public , 2014, SOUPS.
[15] Seong Joon Oh,et al. I-Pic: A Platform for Privacy-Compliant Image Capture , 2016, MobiSys.
[16] Steven Furnell,et al. Establishing A Personalized Information Security Culture , 2011, Int. J. Mob. Comput. Multim. Commun..
[17] George R. Milne,et al. Gender Differences in Privacy-Related Measures for Young Adult Facebook Users , 2010 .
[18] Sean W. Smith,et al. The effects of introspection on creating privacy policy , 2009, WPES '09.
[19] K. Sheehan,et al. An investigation of gender differences in on-line privacy concerns and resultant behaviors , 1999 .
[20] Sian L. Beilock,et al. Haste does not always make waste: Expertise, direction of attention, and speed versus accuracy in performing sensorimotor skills , 2004, Psychonomic bulletin & review.
[21] David J. Crandall,et al. Enhancing Lifelogging Privacy by Detecting Screens , 2016, CHI.
[22] Timothy D. Wilson,et al. Thinking too much: introspection can reduce the quality of preferences and decisions. , 1991, Journal of personality and social psychology.
[23] P. Sheeran,et al. Planning to break unwanted habits: habit strength moderates implementation intention effects on behaviour change. , 2009, The British journal of social psychology.
[24] Loran F. Nordgren,et al. Unpacking perceived control in risk perception: The mediating role of anticipated regret , 2007 .
[25] Luc Van Gool,et al. Natural and Effective Obfuscation by Head Inpainting , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[26] G. Charness,et al. Strong Evidence for Gender Differences in Risk Taking , 2012 .
[27] David J. Crandall,et al. Can Privacy Be Satisfying?: On Improving Viewer Satisfaction for Privacy-Enhanced Photos Using Aesthetic Transforms , 2019, CHI.
[28] Anna Cinzia Squicciarini,et al. Privacy policies for shared content in social network sites , 2010, The VLDB Journal.
[29] Aaron Smith,et al. Social Media & Mobile Internet Use among Teens and Young Adults. Millennials. , 2010 .
[30] D. Boyd. Taken Out of Context: American Teen Sociality in Networked Publics , 2010 .
[31] David J. Crandall,et al. Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras , 2015, CHI.
[32] E. Goffman. The Presentation of Self in Everyday Life , 1959 .
[33] Wendy Wood,et al. Habit and intention in everyday life: The multiple processes by which past behavior predicts future behavior. , 1998 .
[34] David J. Crandall,et al. Cartooning for Enhanced Privacy in Lifelogging and Streaming Videos , 2017, 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[35] Peter R. Harris,et al. Sufficient grounds for optimism? The relationship between perceived controllability and optimistic bias , 1996 .
[36] M. Tomasello,et al. Sympathy through Affective Perspective Taking and Its Relation to Prosocial Behavior in Toddlers Sachmerda for Help with Coding; Roger Mundry for Statistical Advice; And , 2022 .
[37] Ara Norenzayan,et al. Like a camera in the sky? Thinking about God increases public self-awareness and socially desirable responding , 2012 .
[38] J. Brug,et al. Does habit strength moderate the intention–behaviour relationship in the Theory of Planned Behaviour? The case of fruit consumption , 2007 .
[39] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[40] Ashwin Machanavajjhala,et al. MarkIt: privacy markers for protecting visual secrets , 2014, UbiComp Adjunct.
[41] Kim Sheehan,et al. Toward a Typology of Internet Users and Online Privacy Concerns , 2002, Inf. Soc..
[42] Anna Cinzia Squicciarini,et al. WWW 2009 MADRID! Track: Security and Privacy / Session: Web Privacy Collective Privacy Management in Social Networks , 2022 .
[43] David J. Crandall,et al. Viewer Experience of Obscuring Scene Elements in Photos to Enhance Privacy , 2018, CHI.
[44] C. Carver,et al. Self-focusing effects of dispositional self-consciousness, mirror presence, and audience presence. , 1978 .
[45] A. Mehrabian,et al. Emotional empathy and associated individual differences , 1988 .
[46] Denise L. Anthony,et al. Toward a Sociology of Privacy , 2017 .
[47] David J. Crandall,et al. Privacy behaviors of lifeloggers using wearable cameras , 2014, UbiComp.
[48] K. Gwet,et al. A comparison of Cohen’s Kappa and Gwet’s AC1 when calculating inter-rater reliability coefficients: a study conducted with personality disorder samples , 2013, BMC Medical Research Methodology.
[49] Alessandro Acquisti,et al. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.
[50] Heather Richter Lipford,et al. Moving beyond untagging: photo privacy in a tagged world , 2010, CHI.
[51] Bill Tomlinson,et al. Who are the crowdworkers?: shifting demographics in mechanical turk , 2010, CHI Extended Abstracts.
[52] Kevin Benton,et al. The Privacy Paradox: A Facebook Case Study , 2014 .
[53] Pan Hui,et al. Your Privacy Is in Your Hand: Interactive Visual Privacy Control with Tags and Gestures , 2017, COMSNETS.
[54] M. Bateson,et al. Cues of being watched enhance cooperation in a real-world setting , 2006, Biology Letters.
[55] Roberto Hoyle. Privacy considerations in the context of wearable cameras , 2016 .
[56] Blase Ur,et al. Tag, you can see it!: using tags for access control in photo sharing , 2012, CHI.
[57] Mor Naaman,et al. Over-exposed?: privacy patterns and considerations in online and mobile photo sharing , 2007, CHI.
[58] William D. Schafer,et al. Gender differences in risk taking: A meta-analysis. , 1999 .
[59] P. Slovic. Perception of risk. , 1987, Science.
[60] Uta Frith,et al. Reputation management in the age of the world-wide web , 2010, Trends in Cognitive Sciences.
[61] Hongxin Hu,et al. Effectiveness and Users' Experience of Obfuscation as a Privacy-Enhancing Technology for Sharing Photos , 2017, Proc. ACM Hum. Comput. Interact..
[62] K. Gwet. Computing inter-rater reliability and its variance in the presence of high agreement. , 2008, The British journal of mathematical and statistical psychology.
[63] A. Galinsky,et al. Perspective taking combats automatic expressions of racial bias. , 2011, Journal of personality and social psychology.