A Review Study on Privacy Policy Inference of Multiple User-Uploaded Images on Social Context Websites

Sharing images might prompt presentation of individual data and security breach. This collected data can be misused by unsafe clients. To anticipate such sort of undesirable acknowledgement of individual images, adaptable security settings are required. Recently, such security settings are made accessible and keeping up these measures is a cloudy and error inclined procedure. In this manner, suggestion framework is required which supply client with an adaptable help for organizing security settings in much easier way.

[1]  Anabel Quan-Haase,et al.  Information revelation and internet privacy concerns on social network sites: a case study of facebook , 2009, C&T.

[2]  George Danezis,et al.  Prying Data out of a Social Network , 2009, 2009 International Conference on Advances in Social Network Analysis and Mining.

[3]  Karin Strauss,et al.  Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's applications , 2012, SOUPS.

[4]  Lujo Bauer,et al.  Detecting and resolving policy misconfigurations in access-control systems , 2008, SACMAT '08.

[5]  Eytan Adar,et al.  The PViz comprehension tool for social network privacy settings , 2012, SOUPS.

[6]  Gail-Joon Ahn,et al.  Detecting and resolving privacy conflicts for collaborative data sharing in online social networks , 2011, ACSAC '11.

[7]  Krishna P. Gummadi,et al.  Analyzing facebook privacy settings: user expectations vs. reality , 2011, IMC '11.

[8]  Kristen LeFevre,et al.  Privacy wizards for social networking sites , 2010, WWW '10.

[9]  Trent Jaeger,et al.  Policy management using access control spaces , 2003, TSEC.

[10]  Zeynep Tufekci Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites , 2008 .

[11]  Luke Church,et al.  Privacy suites: shared privacy for social networks , 2009, SOUPS.

[12]  Ranjita Bhagwan,et al.  Baaz: A System for Detecting Access Control Misconfigurations , 2010, USENIX Security Symposium.

[13]  O. Günther,et al.  Privacy concerns and identity in online social networks , 2009 .

[14]  Blase Ur,et al.  Tag, you can see it!: using tags for access control in photo sharing , 2012, CHI.

[15]  D. Altman,et al.  Multiple significance tests: the Bonferroni method , 1995, BMJ.

[16]  Heather Richter Lipford,et al.  Tagged photos: concerns, perceptions, and protections , 2009, CHI Extended Abstracts.

[17]  Steven M. Bellovin,et al.  Facebook and privacy: it's complicated , 2012, SOUPS.

[18]  Smitha Sundareswaran,et al.  A3P: adaptive policy prediction for shared images over popular content sharing sites , 2011, HT '11.

[19]  Yang Wang,et al.  "I regretted the minute I pressed share": a qualitative study of regrets on Facebook , 2011, SOUPS.

[20]  Mor Naaman,et al.  Why we tag: motivations for annotation in mobile and online media , 2007, CHI.

[21]  Heather Richter Lipford,et al.  Moving beyond untagging: photo privacy in a tagged world , 2010, CHI.

[22]  Jessica Staddon,et al.  Are privacy concerns a turn-off?: engagement and privacy in social networks , 2012, SOUPS.