Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article
Open access

The Subversive AI Acceptance Scale (SAIA-8): A Scale to Measure User Acceptance of AI-Generated, Privacy-Enhancing Image Modifications

Published: 26 April 2024 Publication History

Abstract

To resist government and corporate use of facial recognition to surveil users through their personal images, researchers have created privacy-enhancing image filters that use adversarial machine learning. These "subversive AI'' (SAI) image filters aim to defend users from facial recognition by distorting personal images in ways that are barely noticeable to humans but confusing to computer vision algorithms. SAI filters are limited, however, by the lack of rigorous user evaluation that assess their acceptability. We addressed this limitation by creating and validating a scale to measure user acceptance --- the SAIA-8. In a three-step process, we apply a mixed-methods approach that closely adhered to best practices for scale creation and validation in measurement theory. Initially, to understand the factors that influence user acceptance of SAI filter outputs, we interviewed 15 participants. Interviewees disliked extant SAI filter outputs because of a perceived lack of usefulness and conflicts with their desired self-presentation. Using insights and statements from the interviews, we generated 106 potential items for the scale. Employing an iterative refinement and validation process with 245 participants from Prolific, we arrived at the SAIA-8 scale: a set of eight items that capture user acceptability of privacy-enhancing perturbations to personal images, and that can aid in benchmarking and prioritizing user acceptability when developing and evaluating new SAI filters.

References

[1]
2001. Principles of Test Construction. In Introduction to measurement theory. Waveland Press, 118?147.
[2]
Abubakar Abid, Ali Abdalla, Ali Abid, Dawood Khan, Abdulrahman Alfozan, and James Zou. 2019. Gradio: Hassle-free sharing and testing of ML models in the wild. https://doi.org/10.48550/arXiv.1906.02569
[3]
Alessandro Acquisti, Idris Adjerid, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor, Saranga Komanduri, Pedro Giovanni Leon, Norman Sadeh, Florian Schaub, Manya Sleeper, Yang Wang, and Shomir Wilson. 2017. Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online. ACM Computing Surveys (CSUR), Vol. 50, 3 (Aug. 2017), 44:1--44:41. https://doi.org/10.1145/3054926
[4]
Shane Ahern, Dean Eckles, Nathaniel S. Good, Simon King, Mor Naaman, and Rahul Nair. 2007. Over-exposed? privacy patterns and considerations in online and mobile photo sharing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '07). Association for Computing Machinery, New York, NY, USA, 357--366. https://doi.org/10.1145/1240624.1240683
[5]
Imtiaz Ahmad, Taslima Akter, Zachary Buher, Rosta Farzan, Apu Kapadia, and Adam J Lee. 2022. Tangible privacy for smart voice assistants: Bystanders' perceptions of physical device controls. Proceedings of the ACM on Human-Computer Interaction, Vol. 6, CSCW2 (2022), 1--31. Publisher: ACM New York, NY, USA.
[6]
Sabri Ahmad, Nazleen Nur Ain Zulkurnain, and Fatin Izzati Khairushalimi. 2016. Assessing the Fitness of a Measurement Model Using Confirmatory Factor Analysis (CFA). International Journal of Innovation and Applied Studies, Vol. 17, 1 (July 2016), 159--168. https://www.proquest.com/docview/1807743937/abstract/81957862A4FE4C64PQ/1 Num Pages: 10 Place: Rabat, Morocco Publisher: International Journal of Innovation and Applied Studies.
[7]
Mary J Allen and Wendy M Yen. 2001. Introduction to measurement theory. Waveland Press.
[8]
Enas Almanasreh, Rebekah Moles, and Timothy F. Chen. 2019. Evaluation of methods used for estimating content validity. Research in Social and Administrative Pharmacy, Vol. 15, 2 (Feb. 2019), 214--221. https://doi.org/10.1016/j.sapharm.2018.03.066
[9]
Mary Jean Amon, Rakibul Hasan, Kurt Hugenberg, Bennett Bertenthal, and Apu Kapadia. 2019. Influencing Photo Sharing Decisions on Social Media: A Case of Paradoxical Findings. (Sept. 2019).
[10]
Reza Anaraky, Bart Knijnenburg, and Marten Risius. 2020. Exacerbating Mindless Compliance: The Danger of Justifications during Privacy Decision Making in the Context of Facebook Applications. AIS Transactions on Human-Computer Interaction, Vol. 12, 2 (June 2020), 70--95. https://doi.org/10.17705/1thci.00129
[11]
Hala Assal, Stephanie Hurtado, Ahsan Imran, and Sonia Chiasson. 2015. What's the deal with privacy apps? a comprehensive exploration of user perception and usability. In Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia (MUM '15). Association for Computing Machinery, New York, NY, USA, 25--36. https://doi.org/10.1145/2836041.2836044
[12]
Saeideh Bakhshi, David Shamma, Lyndon Kennedy, and Eric Gilbert. 2015. Why we filter our photos and how it impacts engagement. In Proceedings of the International AAAI Conference on Web and social media, Vol. 9. 12--21. Issue: 1.
[13]
Beth T. Bell. 2019. ?You take fifty photos, delete forty nine and use one": A qualitative study of adolescent image-sharing practices on social media. International Journal of Child-Computer Interaction, Vol. 20 (June 2019), 64--71. https://doi.org/10.1016/j.ijcci.2019.03.002
[14]
Steven Bellman, Eric J. Johnson, Stephen J. Kobrin, and Gerald L. Lohse. 2004. International Differences in Information Privacy Concerns: A Global Survey of Consumers. The Information Society, Vol. 20, 5 (Nov. 2004), 313--324. https://doi.org/10.1080/01972240490507956 Publisher: Routledge _eprint: https://doi.org/10.1080/01972240490507956.
[15]
Zinaida Benenson, Gabriele Lenzini, Daniela Oliveira, Simon Parkin, and Sven Uebelacker. 2015. Maybe Poor Johnny Really Cannot Encrypt: The Case for a Complexity Theory for Usable Security. In Proceedings of the 2015 New Security Paradigms Workshop (NSPW '15). Association for Computing Machinery, New York, NY, USA, 85--99. https://doi.org/10.1145/2841113.2841120
[16]
Mark C. Bolino and William H. Turnley. 1999. Measuring Impression Management in Organizations: A Scale Development Based on the Jones and Pittman Taxonomy. Organizational Research Methods, Vol. 2, 2 (April 1999), 187--206. https://doi.org/10.1177/109442819922005 Publisher: SAGE Publications Inc.
[17]
Grant M. Brady, Donald M. Truxillo, Talya N. Bauer, and Mark P. Jones. 2021. The development and validation of the Privacy and Data Security Concerns Scale (PDSCS). International Journal of Selection and Assessment, Vol. 29, 1 (2021), 100--113. https://doi.org/10.1111/ijsa.12311 _eprint: https://onlinelibrary.wiley.com/doi/pdf/10.1111/ijsa.12311.
[18]
John Brook. 1996. SUS: a" quick and dirty" usability scale. Usability evaluation in industry (1996). Publisher: Taylor and Francis.
[19]
Simone Browne. 2015. Dark Matters: On the Surveillance of Blackness. Duke University Press. Google-Books-ID: snmJCgAAQBAJ.
[20]
Finn Brunton and Helen Fay Nissenbaum. 2015. Obfuscation: a user's guide for privacy and protest. MIT Press, Cambridge, Massachusetts.
[21]
James Carifio and Rocco Perla. 2008. Resolving the 50-year debate around using and misusing Likert scales. Medical Education, Vol. 42, 12 (Dec. 2008), 1150--1152. https://doi.org/10.1111/j.1365--2923.2008.03172.x
[22]
Kevin D. Carlson and Andrew O. Herdman. 2012. Understanding the Impact of Convergent Validity on Research Results. Organizational Research Methods, Vol. 15, 1 (Jan. 2012), 17--32. https://doi.org/10.1177/1094428110392383
[23]
Stevie Chancellor, Eric P. S. Baumer, and Munmun De Choudhury. 2019. Who is the "Human" in Human-Centered Machine Learning: The Case of Predicting Mental Health from Social Media. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (Nov. 2019), 147:1--147:32. https://doi.org/10.1145/3359249
[24]
Varun Chandrasekaran, Chuhan Gao, Brian Tang, Kassem Fawaz, Somesh Jha, and Suman Banerjee. 2021. Face-Off: Adversarial Face Obfuscation. Proceedings on Privacy Enhancing Technologies, Vol. 2021, 2 (2021), 369--390.
[25]
Valeriia Cherepanova, Micah Goldblum, Harrison Foley, Shiyuan Duan, John Dickerson, Gavin Taylor, and Tom Goldstein. 2021. LowKey: Leveraging Adversarial Attacks to Protect Social Media Users from Facial Recognition. arXiv:2101.07922 [cs] (Jan. 2021). http://arxiv.org/abs/2101.07922 arXiv: 2101.07922.
[26]
Alexander Cho. 2018. Default publicness: Queer youth of color, social media, and being outed by the machine. New Media & Society, Vol. 20, 9 (Sept. 2018), 3183--3200. https://doi.org/10.1177/1461444817744784 Publisher: SAGE Publications.
[27]
Chhaya Chouhan, Christy M. LaPerriere, Zaina Aljallad, Jess Kropczynski, Heather Lipford, and Pamela J. Wisniewski. 2019. Co-designing for Community Oversight: Helping People Make Privacy and Security Decisions Together. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (Nov. 2019), 146:1--146:31. https://doi.org/10.1145/3359248
[28]
Mitchell Church, Ravi Thambusamy, and Hamid Nemati. 2020. User misrepresentation in online social networks: how competition and altruism impact online disclosure behaviours. Behaviour & Information Technology, Vol. 39, 12 (Dec. 2020), 1320--1340. https://doi.org/10.1080/0144929X.2019.1667440 Publisher: Taylor & Francis _eprint: https://doi.org/10.1080/0144929X.2019.1667440.
[29]
Kovila P.L. Coopamootoo. 2020. Usage Patterns of Privacy-Enhancing Technologies. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS '20). Association for Computing Machinery, New York, NY, USA, 1371--1390. https://doi.org/10.1145/3372297.3423347
[30]
E. D. Cristofaro, C. Soriente, G. Tsudik, and A. Williams. 2012. Hummingbird: Privacy at the Time of Twitter. In 2012 IEEE Symposium on Security and Privacy. 285--299. https://doi.org/10.1109/SP.2012.26 ISSN: 2375--1207.
[31]
Sauvik Das. 2020. Subversive AI: Resisting automated algorithmic surveillance with human-centered adversarial machine learning. In Resistance AI workshop at NeurIPS. 4.
[32]
Sauvik Das, Cori Faklaris, Jason I Hong, Laura A Dabbish, and others. 2022. The security & privacy acceptance framework (spaf). Foundations and Trends® in Privacy and Security, Vol. 5, 1--2 (2022), 1--143. Publisher: Now Publishers, Inc.
[33]
Sauvik Das, Tiffany Hyun-Jin Kim, Laura A. Dabbish, and Jason I. Hong. 2014. The Effect of Social Influence on Security Sensitivity. 143--157. https://www.usenix.org/conference/soups2014/proceedings/presentation/das
[34]
Sauvik Das, Adam D.I. Kramer, Laura A. Dabbish, and Jason I. Hong. 2015. The Role of Social Influence in Security Feature Adoption. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '15). Association for Computing Machinery, Vancouver, BC, Canada, 1416--1426. https://doi.org/10.1145/2675133.2675225
[35]
Julia Davies. 2007. Display, Identity and the Everyday: Self-presentation through online image sharing. Discourse: studies in the cultural politics of education, Vol. 28, 4 (2007), 549--564. Publisher: Taylor & Francis.
[36]
Fred D Davis. 1985. A technology acceptance model for empirically testing new end-user information systems: Theory and results. phd. Massachusetts Institute of Technology.
[37]
Robert F DeVellis and Carolyn T Thorpe. 2021. Scale development: Theory and applications. Sage publications.
[38]
Amandeep Dhir. 2017. Why Do Young People Avoid Photo Tagging? A New Service Avoidance Scale. Social Science Computer Review, Vol. 35, 4 (Aug. 2017), 480--497. https://doi.org/10.1177/0894439316653636 Publisher: SAGE Publications Inc.
[39]
Angel Diaz. 2019. New York City Police Department Surveillance Technology. Technical Report. Brennan Center for Justice. https://www.brennancenter.org/our-work/research-reports/new-york-city-police-department-surveillance-technology
[40]
Youngwook Do, Nivedita Arora, Ali Mirzazadeh, Injoo Moon, Eryue Xu, Zhihan Zhang, Gregory D Abowd, and Sauvik Das. 2023. Powering for privacy: Improving user trust in smart speaker microphones with intentional powering and perceptible assurance. (2023).
[41]
Youngwook Do, Jung Wook Park, Yuxi Wu, Avinandan Basu, Dingtian Zhang, Gregory D Abowd, and Sauvik Das. 2021. Smart Webcam Cover: Exploring the Design of an Intelligent Webcam Cover to Improve Usability and Trust. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, Vol. 5, 4 (2021), 1--21. Publisher: ACM New York, NY, USA.
[42]
Serge Egelman and Eyal Peer. 2015. Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS). In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 2873--2882. https://doi.org/10.1145/2702123.2702249
[43]
Upol Ehsan and Mark O. Riedl. 2020. Human-Centered Explainable AI: Towards a Reflective Sociotechnical Approach. In HCI International 2020 - Late Breaking Papers: Multimodality and Intelligence, Constantine Stephanidis, Masaaki Kurosu, Helmut Degen, and Lauren Reinerman-Jones (Eds.). Springer International Publishing, Cham, 449--466. https://doi.org/10.1007/978--3-030--60117--1_33
[44]
Cori Faklaris, Laura A Dabbish, and Jason I Hong. 2019. A self-report measure of end-user security attitudes (SA-6). In Fifteenth symposium on usable privacy and security (SOUPS 2019). 61--77.
[45]
Jesse Fox and Megan A. Vendemia. 2016. Selective Self-Presentation and Social Comparison Through Photographs on Social Networking Sites. Cyberpsychology, Behavior, and Social Networking, Vol. 19, 10 (Oct. 2016), 593--600. https://doi.org/10.1089/cyber.2016.0248 Publisher: Mary Ann Liebert, Inc., publishers.
[46]
S. M. Furnell, D. Katsabas, P. S. Dowland, and F. Reid. 2007. A Practical Usability Evaluation of Security Features in End-User Applications. In New Approaches for Security, Privacy and Trust in Complex Environments (IFIP International Federation for Information Processing ), Hein Venter, Mariki Eloff, Les Labuschagne, Jan Eloff, and Rossouw von Solms (Eds.). Springer US, Boston, MA, 205--216. https://doi.org/10.1007/978-0--387--72367--9_18
[47]
Vaibhav Garg, Kevin Benton, and L. Jean Camp. 2014. The Privacy Paradox: A Facebook Case Study. SSRN Scholarly Paper ID 2411672. Social Science Research Network, Rochester, NY. https://doi.org/10.2139/ssrn.2411672
[48]
Nina Gerber, Verena Zimmermann, Birgit Henhapl, Sinem Emeröz, and Melanie Volkamer. 2018. Finally Johnny Can Encrypt: But Does This Make Him Feel More Secure?. In Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018). Association for Computing Machinery, New York, NY, USA, 1--10. https://doi.org/10.1145/3230833.3230859
[49]
Saikat Guha, Kevin Tang, and Paul Francis. 2008. NOYB: privacy in online social networks. In Proceedings of the first workshop on Online social networks (WOSN '08). Association for Computing Machinery, New York, NY, USA, 49--54. https://doi.org/10.1145/1397735.1397747
[50]
Jan Philip Göpfert, André Artelt, Heiko Wersing, and Barbara Hammer. 2020. Adversarial Attacks Hidden in Plain Sight. In Advances in Intelligent Data Analysis XVIII (Lecture Notes in Computer Science ), Michael R. Berthold, Ad Feelders, and Georg Krempl (Eds.). Springer International Publishing, Cham, 235--247. https://doi.org/10.1007/978--3-030--44584--3_19
[51]
Carol Hall and Amanda Roshier. 2016. Getting the measure of behavior? is seeing believing? Interactions, Vol. 23, 4 (2016), 42--46. Publisher: ACM New York, NY, USA.
[52]
Cory Hallam and Gianluca Zanella. 2017. Online self-disclosure: The privacy paradox explained as a temporally discounted balance between concerns and rewards. Computers in Human Behavior, Vol. 68 (March 2017), 217--227. https://doi.org/10.1016/j.chb.2016.11.033
[53]
Mitchell M. Handelsman, William L. Briggs, Nora Sullivan, and Annette Towler. 2005. A Measure of College Student Course Engagement. The Journal of Educational Research, Vol. 98, 3 (Jan. 2005), 184--192. https://doi.org/10.3200/JOER.98.3.184--192 Publisher: Routledge _eprint: https://doi.org/10.3200/JOER.98.3.184--192.
[54]
Rakibul Hasan, Bennett I. Bertenthal, Kurt Hugenberg, and Apu Kapadia. 2021. Your Photo is so Funny that I don't Mind Violating Your Privacy by Sharing it: Effects of Individual Humor Styles on Online Photo-sharing Behaviors. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. ACM, Yokohama Japan, 1--14. https://doi.org/10.1145/3411764.3445258
[55]
Rakibul Hasan, Rudolf Siegel, Rebecca Weil, and Katharina Krombholz. 2022. Developing a psychometric scale to measure one's valuation of other people's privacy. In The eighteenth symposium on usable privacy and security (SOUPS 2022).
[56]
Hassan, Rakibul Hasan, Patrick Shaffer, David Crandall, and Eman T. Apu Kapadia. 2017. Cartooning for Enhanced Privacy in Lifelogging and Streaming Videos. 29--38. https://openaccess.thecvf.com/content_cvpr_2017_workshops/w16/html/Kapadia_Cartooning_for_Enhanced_CVPR_2017_paper.html
[57]
J. He, B. Liu, D. Kong, X. Bao, N. Wang, H. Jin, and G. Kesidis. 2016. PUPPIES: Transformation-Supported Personalized Privacy Preserving Partial Image Sharing. In 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). 359--370. https://doi.org/10.1109/DSN.2016.40 ISSN: 2158--3927.
[58]
Joseph Henrich, Steven J Heine, and Ara Norenzayan. 2010a. Most people are not WEIRD. Nature, Vol. 466, 7302 (2010), 29--29. Publisher: Nature Publishing Group.
[59]
Joseph Henrich, Steven J. Heine, and Ara Norenzayan. 2010b. The weirdest people in the world? Behavioral and Brain Sciences, Vol. 33, 2--3 (June 2010), 61--83. https://doi.org/10.1017/S0140525X0999152X
[60]
Amir Herzberg and Hemi Leibowitz. 2016. Can Johnny finally encrypt? evaluating E2E-encryption in popular IM applications. In Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust (STAST '16). Association for Computing Machinery, New York, NY, USA, 17--28. https://doi.org/10.1145/3046055.3046059
[61]
Kashmir Hill. 2020. This Tool Could Protect Your Photos From Facial Recognition. The New York Times (Aug. 2020). https://www.nytimes.com/2020/08/03/technology/fawkes-tool-protects-photos-from-facial-recognition.html
[62]
Timothy R. Hinkin. 1998. A Brief Tutorial on the Development of Measures for Use in Survey Questionnaires. Organizational Research Methods, Vol. 1, 1 (Jan. 1998), 104--121. https://doi.org/10.1177/109442819800100106
[63]
Chin-Chang Ho and Karl F. MacDorman. 2017. Measuring the Uncanny Valley Effect: Refinements to Indices for Perceived Humanness, Attractiveness, and Eeriness. International Journal of Social Robotics, Vol. 9, 1 (Jan. 2017), 129--139. https://doi.org/10.1007/s12369-016-0380--9
[64]
Daniel T. Holt, Achilles A. Armenakis, Hubert S. Feild, and Stanley G. Harris. 2007. Readiness for Organizational Change: The Systematic Development of a Scale. The Journal of Applied Behavioral Science, Vol. 43, 2 (June 2007), 232--255. https://doi.org/10.1177/0021886306295295 Publisher: SAGE Publications Inc.
[65]
Andreas Holzinger, Gig Searle, Thomas Kleinberger, Ahmed Seffah, and Homa Javahery. 2008. Investigating Usability Metrics for the Design and Development of Applications for the Elderly. In Computers Helping People with Special Needs (Lecture Notes in Computer Science ), Klaus Miesenberger, Joachim Klaus, Wolfgang Zagler, and Arthur Karshmer (Eds.). Springer, Berlin, Heidelberg, 98--105. https://doi.org/10.1007/978--3--540--70540--6_13
[66]
Seoyeon Hong, Mi R. Jahng, Namyeon Lee, and Kevin R. Wise. 2020. Do you filter who you are?: Excessive self-presentation, social cues, and user evaluations of Instagram selfies. Computers in Human Behavior, Vol. 104 (March 2020), 106159. https://doi.org/10.1016/j.chb.2019.106159
[67]
Roberto Hoyle, Luke Stark, Qatrunnada Ismail, David Crandall, Apu Kapadia, and Denise Anthony. 2020. Privacy Norms and Preferences for Photos Posted Online. ACM Transactions on Computer-Human Interaction, Vol. 27, 4 (Sept. 2020), 1--27. https://doi.org/10.1145/3380960
[68]
Yuheng Hu, Lydia Manikonda, and Subbarao Kambhampati. 2014. What We Instagram: A First Analysis of Instagram Photo Content and User Types. Proceedings of the International AAAI Conference on Web and Social Media, Vol. 8, 1 (May 2014), 595--598. https://doi.org/10.1609/icwsm.v8i1.14578 Number: 1.
[69]
Azham Hussain and Maria Kutar. 2009. Usability Metric Framework for Mobile Phone Application. PGNet, ISBN, Vol. 2099 (2009), 978--1.
[70]
Sergio Ibáñez-Sánchez, Carlos Orús, and Carlos Flavián. 2022. Augmented reality filters on social media. Analyzing the drivers of playability based on uses and gratifications theory. Psychology & Marketing, Vol. 39, 3 (2022), 559--578. https://doi.org/10.1002/mar.21639 _eprint: https://onlinelibrary.wiley.com/doi/pdf/10.1002/mar.21639.
[71]
Indu Ilanchezian, Praneeth Vepakomma, Abhishek Singh, Otkrist Gupta, G. N. Srinivasa Prasanna, and Ramesh Raskar. 2019. Maximal adversarial perturbations for obfuscation: Hiding certain attributes while preserving rest. https://doi.org/10.48550/arXiv.1909.12734 arXiv:1909.12734 [cs, stat].
[72]
Ana Javornik, Ben Marder, Jennifer Brannon Barhorst, Graeme McLean, Yvonne Rogers, Paul Marshall, and Luk Warlop. 2022. ?What lies behind the filter?' Uncovering the motivations for using augmented reality (AR) face filters on social media and their effect on well-being. Computers in Human Behavior, Vol. 128 (March 2022), 107126. https://doi.org/10.1016/j.chb.2021.107126
[73]
Ronald Kainda, Ivan Fléchais, and A.W. Roscoe. 2010. Security and Usability: Analysis and Evaluation. In 2010 International Conference on Availability, Reliability and Security. 275--282. https://doi.org/10.1109/ARES.2010.77
[74]
Ruogu Kang, Stephanie Brown, Laura Dabbish, and Sara Kiesler. 2014. Privacy Attitudes of Mechanical Turk Workers and the U. S. Public. 37--49. https://www.usenix.org/conference/soups2014/proceedings/presentation/kang
[75]
Naz Kaya and Margaret J. Weber. 2003. Cross-cultural differences in the perception of crowding and privacy regulation: American and Turkish students. Journal of Environmental Psychology, Vol. 23, 3 (Sept. 2003), 301--309. https://doi.org/10.1016/S0272--4944(02)00087--7
[76]
Brian Keelan. 2002. Handbook of image quality: characterization and prediction. CRC Press.
[77]
Katharina Krombholz, Adrian Dabrowski, Matthew Smith, and Edgar Weippl. 2015. Ok Glass, Leave Me Alone: Towards a Systematization of Privacy Enhancing Technologies for Wearable Computing. In Financial Cryptography and Data Security (Lecture Notes in Computer Science ), Michael Brenner, Nicolas Christin, Benjamin Johnson, and Kurt Rohloff (Eds.). Springer, Berlin, Heidelberg, 274--280. https://doi.org/10.1007/978--3--662--48051--9_20
[78]
H. A. Kruger, L. Drevin, S. Flowerday, and T. Steyn. 2011. An assessment of the role of cultural factors in information security awareness. In 2011 Information Security for South Africa. 1--7. https://doi.org/10.1109/ISSA.2011.6027505 ISSN: 2330--9881.
[79]
Yao Li, Eugenia Ha Rim Rho, and Alfred Kobsa. 2022. Cultural differences in the effects of contextual factors and privacy concerns on users' privacy decision on social networking sites. Behaviour & Information Technology, Vol. 41, 3 (Feb. 2022), 655--677. https://doi.org/10.1080/0144929X.2020.1831608 Publisher: Taylor & Francis _eprint: https://doi.org/10.1080/0144929X.2020.1831608.
[80]
Yifang Li, Nishant Vishwamitra, Bart P. Knijnenburg, Hongxin Hu, and Kelly Caine. 2017. Effectiveness and Users' Experience of Obfuscation as a Privacy-Enhancing Technology for Sharing Photos. Proceedings of the ACM on Human-Computer Interaction, Vol. 1, CSCW (Dec. 2017), 67:1--67:24. https://doi.org/10.1145/3134702
[81]
Q. Vera Liao and Kush R. Varshney. 2022. Human-Centered Explainable AI (XAI): From Algorithms to User Experiences. arXiv:2110.10790 [cs] (Jan. 2022). http://arxiv.org/abs/2110.10790 arXiv: 2110.10790.
[82]
Jiang Liu, Chun Pong Lau, and Rama Chellappa. 2023. DiffProtect: Generate Adversarial Examples with Diffusion Models for Facial Privacy Protection. _eprint: 2305.13625.
[83]
Liu Liu, Olivier De Vel, Qing-Long Han, Jun Zhang, and Yang Xiang. 2018. Detecting and preventing cyber insider threats: A survey. IEEE Communications Surveys & Tutorials, Vol. 20, 2 (2018), 1397--1417. Publisher: IEEE.
[84]
Zhuoran Liu, Zhengyu Zhao, and Martha A Larson. 2019. Pixel Privacy 2019: Protecting Sensitive Scene Information in Images. In MediaEval.
[85]
Jacob Logas, Ari Schlesinger, Zhouyu Li, and Sauvik Das. 2022. Image DePO: towards gradual decentralization of online social networks using decentralized privacy overlays. Proceedings of the ACM on Human-Computer Interaction, Vol. 6, CSCW1 (2022), 1--28. Publisher: ACM New York, NY, USA.
[86]
Ryan Mac, Caroline Haskins, and Logan McDonald. 2020. Clearview's Facial Recognition App Has Been Used By The Justice Department, ICE, Macy's, Walmart, And The NBA. https://www.buzzfeednews.com/article/ryanmac/clearview-ai-fbi-ice-global-law-enforcement
[87]
Penousal Machado and Amilcar Cardoso. 1998. Computing Aesthetics. In Advances in Artificial Intelligence (Lecture Notes in Computer Science ), Flávio Moreira de Oliveira (Ed.). Springer, Berlin, Heidelberg, 219--228. https://doi.org/10.1007/10692710_23
[88]
Naresh K. Malhotra, Sung S. Kim, and James Agarwal. 2004. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research, Vol. 15, 4 (Dec. 2004), 336--355. https://doi.org/10.1287/isre.1040.0032 Publisher: INFORMS.
[89]
Nur MERDANO?LU and P?nar ONAY DURDU. 2018. A systematic mapping study of usability vs security. In 2018 6th International Conference on Control Engineering & Information Technology (CEIT). 1--6. https://doi.org/10.1109/CEIT.2018.8751841
[90]
Jacqueline Murray. 2013. Likert Data: What to use, parametric or non-parametric?, Vol. 4, 11 (2013).
[91]
Moses Namara, Daricia Wilkinson, Kelly Caine, and Bart P. Knijnenburg. 2020. Emotional and Practical Considerations Towards the Adoption and Abandonment of VPNs as a Privacy-Enhancing Technology. Proceedings on Privacy Enhancing Technologies, Vol. 2020, 1 (Jan. 2020), 83--102. https://doi.org/10.2478/popets-2020-0006
[92]
Geoffrey Norman. 2010. Likert scales, levels of measurement and the ?laws" of statistics. Advances in health sciences education : theory and practice, Vol. 15 (Feb. 2010), 625--32. https://doi.org/10.1007/s10459-010--9222-y
[93]
Melvin R Novick. 1966. The axioms and principal results of classical test theory. Journal of mathematical psychology, Vol. 3, 1 (1966), 1--18. Publisher: Elsevier.
[94]
Anne Oeldorf-Hirsch and S. Shyam Sundar. 2016. Social and Technological Motivations for Online Photo Sharing. Journal of Broadcasting & Electronic Media, Vol. 60, 4 (Oct. 2016), 624--642. https://doi.org/10.1080/08838151.2016.1234478 Publisher: Routledge _eprint: https://doi.org/10.1080/08838151.2016.1234478.
[95]
Michael A. Oren and Stephen B. Gilbert. 2011. Framework for measuring social affinity for CSCW software. In CHI '11 Extended Abstracts on Human Factors in Computing Systems (CHI EA '11). Association for Computing Machinery, New York, NY, USA, 1387--1392. https://doi.org/10.1145/1979742.1979779
[96]
Hilarie Orman. 2015. Why Won't Johnny Encrypt? IEEE Internet Computing, Vol. 19, 1 (Jan. 2015), 90--94. https://doi.org/10.1109/MIC.2015.16 Conference Name: IEEE Internet Computing.
[97]
Greg Orr. 2003. Diffusion of innovations, by Everett Rogers (1995). Retrieved January, Vol. 21 (2003), 2005.
[98]
Xinru Page, Reza Ghaiumy Anaraky, Bart P. Knijnenburg, and Pamela J. Wisniewski. 2019. Pragmatic Tool vs. Relational Hindrance: Exploring Why Some Social Media Users Avoid Privacy Features. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (Nov. 2019), 110:1--110:23. https://doi.org/10.1145/3359212
[99]
Yilang Peng. 2017. Time Travel with One Click: Effects of Digital Filters on Perceptions of Photographs. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17). Association for Computing Machinery, New York, NY, USA, 6000--6011. https://doi.org/10.1145/3025453.3025810
[100]
Sabid Bin Habib Pias, Imtiaz Ahmad, Taslima Akter, Apu Kapadia, and Adam J Lee. 2022. Decaying Photos for Enhanced Privacy: User Perceptions Towards Temporal Redactions and'Trusted'Platforms. Proceedings of the ACM on Human-Computer Interaction, Vol. 6, CSCW2 (2022), 1--30. Publisher: ACM New York, NY, USA.
[101]
Jeffrey G. Proudfoot, David Wilson, Joseph S. Valacich, and Michael D. Byrd. 2018. Saving face on Facebook: privacy concerns, social benefits, and impression management. Behaviour & Information Technology, Vol. 37, 1 (Jan. 2018), 16--37. https://doi.org/10.1080/0144929X.2017.1389988 Publisher: Taylor & Francis _eprint: https://doi.org/10.1080/0144929X.2017.1389988.
[102]
Moo-Ryong Ra, Ramesh Govindan, and Antonio Ortega. 2013. P3: Toward Privacy-Preserving Photo Sharing. 515--528. https://www.usenix.org/conference/nsdi13/technical-sessions/presentation/ra
[103]
Emilee Rader, Rick Wash, and Brandon Brooks. 2012. Stories as informal lessons about security. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS '12). Association for Computing Machinery, Washington, D.C., 1--17. https://doi.org/10.1145/2335356.2335364
[104]
Evani Radiya-Dixit and Florian Tramèr. 2021. Data Poisoning Won't Save You From Facial Recognition. arXiv:2106.14851 [cs] (June 2021). http://arxiv.org/abs/2106.14851 arXiv: 2106.14851.
[105]
Arezoo Rajabi, Rakesh B Bobba, Mike Rosulek, Charles Wright, and Wu-chi Feng. 2021. On the (im) practicality of adversarial perturbation for image privacy. Proceedings on Privacy Enhancing Technologies (2021).
[106]
Christian Remy, Oliver Bates, Alan Dix, Vanessa Thomas, Mike Hazas, Adrian Friday, and Elaine M. Huang. 2018. Evaluation Beyond Usability: Validating Sustainable HCI Research. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). Association for Computing Machinery, New York, NY, USA, 1--14. https://doi.org/10.1145/3173574.3173790
[107]
Sebastian Ruder. 2017. An overview of gradient descent optimization algorithms. arXiv: 1609.04747 [cs.LG].
[108]
Jian Raymond Rui and Michael A Stefanone. 2013. Strategic image management online: Self-presentation, self-esteem and social network perspectives. Information, Communication & Society, Vol. 16, 8 (2013), 1286--1305. Publisher: Taylor & Francis.
[109]
Scott Ruoti, Jeff Andersen, Daniel Zappala, and Kent Seamons. 2016. Why Johnny Still, Still Can't Encrypt: Evaluating the Usability of a Modern PGP Client. (Jan. 2016). http://arxiv.org/abs/1510.08555 arXiv:1510.08555 [cs].
[110]
Johnny Saldaña. 2009. The coding manual for qualitative researchers. Sage, Los Angeles, Calif. OCLC: ocn233937452.
[111]
Ilyssa Salomon and Christia Spears Brown. 2021. That selfie becomes you: examining taking and posting selfies as forms of self-objectification. Media Psychology, Vol. 24, 6 (Nov. 2021), 847--865. https://doi.org/10.1080/15213269.2020.1817091 Publisher: Routledge _eprint: https://doi.org/10.1080/15213269.2020.1817091.
[112]
Ayon Sen, Xiaojin Zhu, Erin Marshall, and Robert Nowak. 2020. Popular Imperceptibility Measures in Visual Adversarial Attacks are Far from Human Perception. In Decision and Game Theory for Security (Lecture Notes in Computer Science ), Quanyan Zhu, John S. Baras, Radha Poovendran, and Juntao Chen (Eds.). Springer International Publishing, Cham, 188--199. https://doi.org/10.1007/978--3-030--64793--3_10
[113]
Ayon Sen, Xiaojin Zhu, Liam Marshall, and Robert Nowak. 2019. Should Adversarial Attacks Use Pixel p-Norm? https://doi.org/10.48550/arXiv.1906.02439 arXiv:1906.02439 [cs, stat].
[114]
Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, and Ben Y. Zhao. 2023. Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models. _eprint: 2302.04222.
[115]
Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, and Ben Y Zhao. 2020. Fawkes: Protecting Privacy against Unauthorized Deep Learning Models. 16.
[116]
Mahmood Sharif, Lujo Bauer, and Michael K. Reiter. 2018. On the Suitability of Lp-Norms for Creating and Preventing Adversarial Examples. 1605--1613. https://openaccess.thecvf.com/content_cvpr_2018_workshops/w32/html/Sharif_On_the_Suitability_CVPR_2018_paper.html
[117]
Ernestasia Siahaan, Alan Hanjalic, and Judith Redi. 2016. A Reliable Methodology to Collect Ground Truth Data of Image Aesthetic Appeal. IEEE Transactions on Multimedia, Vol. 18, 7 (July 2016), 1338--1350. https://doi.org/10.1109/TMM.2016.2559942 Conference Name: IEEE Transactions on Multimedia.
[118]
Stephen G. Sireci. 1998. The Construct of Content Validity. Social Indicators Research, Vol. 45, 1/3 (1998), 83--117. https://www.jstor.org/stable/27522338 Publisher: Springer.
[119]
Manya Sleeper, Rebecca Balebako, Sauvik Das, Amber Lynn McConahy, Jason Wiese, and Lorrie Faith Cranor. 2013. The post that wasn't: exploring self-censorship on facebook. In Proceedings of the 2013 conference on Computer supported cooperative work (CSCW '13). Association for Computing Machinery, New York, NY, USA, 793--802. https://doi.org/10.1145/2441776.2441865
[120]
Elizabeth Stoycheff, G. Scott Burgess, and Maria Clara Martucci. 2020. Online censorship and digital surveillance: the relationship between suppression technologies and democratization across countries. Information, Communication & Society, Vol. 23, 4 (March 2020), 474--490. https://doi.org/10.1080/1369118X.2018.1518472 Publisher: Routledge _eprint: https://doi.org/10.1080/1369118X.2018.1518472.
[121]
Priyanka Surendran. 2012. Technology Acceptance Model: A Survey of Literature. International Journal of Business and Social Research (2012).
[122]
Bernadette Szajna. 1996. Empirical Evaluation of the Revised Technology Acceptance Model. Management Science, Vol. 42, 1 (Jan. 1996), 85--92. https://doi.org/10.1287/mnsc.42.1.85
[123]
Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2014. Intriguing properties of neural networks. http://arxiv.org/abs/1312.6199 arXiv:1312.6199 [cs].
[124]
Monika Taddicken. 2014. The ?Privacy Paradox' in the Social Web: The Impact of Privacy Concerns, Individual Characteristics, and the Perceived Social Relevance on Different Forms of Self-Disclosure*. Journal of Computer-Mediated Communication, Vol. 19, 2 (Jan. 2014), 248--273. https://doi.org/10.1111/jcc4.12052
[125]
Miguel A. Teruel, Elena Navarro, Víctor López-Jaquero, Francisco Montero, and Pascual González. 2014. A CSCW Requirements Engineering CASE Tool: Development and usability evaluation. Information and Software Technology, Vol. 56, 8 (Aug. 2014), 922--949. https://doi.org/10.1016/j.infsof.2014.02.009
[126]
Kim-Han Thung and Paramesran Raveendran. 2009. A survey of image quality measures. In 2009 International Conference for Technical Postgraduates (TECHPOS). 1--4. https://doi.org/10.1109/TECHPOS.2009.5412098
[127]
Alise Tifentale and Lev Manovich. 2015. Selfiecity: Exploring Photography and Self-Fashioning in Social Media. In Postdigital Aesthetics: Art, Computation and Design, David M. Berry and Michael Dieter (Eds.). Palgrave Macmillan UK, London, 109--122. https://doi.org/10.1057/9781137437204_9
[128]
Ledyard R Tucker and Robert C MacCallum. 1997. Exploratory factor analysis. Unpublished manuscript, Ohio State University, Columbus (1997), 1--459.
[129]
Megan A. Vendemia and David C. DeAndrea. 2021. The effects of engaging in digital photo modifications and receiving favorable comments on women's selfies shared on social media. Body Image, Vol. 37 (June 2021), 74--83. https://doi.org/10.1016/j.bodyim.2021.01.011
[130]
Serena Wang, Cori Faklaris, Junchao Lin, Laura Dabbish, and Jason I Hong. 2022. 'It's problematic but I'm not concerned': University perspectives on account sharing. Proceedings of the ACM on Human-Computer Interaction, Vol. 6, CSCW1 (2022), 1--27. Publisher: ACM New York, NY, USA.
[131]
Emily Wenger, Shawn Shan, Haitao Zheng, and Ben Y. Zhao. 2023. SoK: Anti-Facial Recognition Technology. _eprint: 2112.04558.
[132]
Alma Whitten and J Doug Tygar. 1999. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. In USENIX Security Symposium, Vol. 348. 169--184.
[133]
Xiao Yang, Yinpeng Dong, Tianyu Pang, Hang Su, Jun Zhu, Yuefeng Chen, and Hui Xue. 2021. Towards Face Encryption by Generating Adversarial Identity Masks. In Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV). 3897--3907.
[134]
Svetlana Yarosh, Panos Markopoulos, and Gregory D. Abowd. 2014. Towards a questionnaire for measuring affective benefits and costs of communication technologies. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing (CSCW '14). Association for Computing Machinery, New York, NY, USA, 84--96. https://doi.org/10.1145/2531602.2531634
[135]
J. Yu, Z. Kuang, Z. Yu, D. Lin, and J. Fan. 2017a. Privacy Setting Recommendation for Image Sharing. In 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA). 726--730. https://doi.org/10.1109/ICMLA.2017.00--73
[136]
J. Yu, B. Zhang, Z. Kuang, D. Lin, and J. Fan. 2017b. iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning. IEEE Transactions on Information Forensics and Security, Vol. 12, 5 (May 2017), 1005--1016. https://doi.org/10.1109/TIFS.2016.2636090 Conference Name: IEEE Transactions on Information Forensics and Security.
[137]
Abbas Zabihzadeh, Mohammad Ali Mazaheri, Javad Hatami, Mohammad Reza Nikfarjam, Leili Panaghi, and Telli Davoodi. 2019. Cultural differences in conceptual representation of ?Privacy": A comparison between Iran and the United States. The Journal of Social Psychology, Vol. 159, 4 (July 2019), 357--370. https://doi.org/10.1080/00224545.2018.1493676 Publisher: Routledge _eprint: https://doi.org/10.1080/00224545.2018.1493676.
[138]
Zijian Zhang, Jaspreet Singh, Ujwal Gadiraju, and Avishek Anand. 2019. Dissonance Between Human and Machine Understanding. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (Nov. 2019), 56:1--56:23. https://doi.org/10.1145/3359158
[139]
Dorothy Zhao, Mikako Inaba, and Andrés Monroy-Hernández. 2022. Understanding teenage perceptions and configurations of privacy on instagram. Proc. ACM Hum.-Comput. Interact., Vol. 6, CSCW2 (Nov. 2022). https://doi.org/10.1145/3555608 Number of pages: 28 Place: New York, NY, USA Publisher: Association for Computing Machinery tex.articleno: 550 tex.issue_date: November 2022.
[140]
Shoshana Zuboff. 2019. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. PublicAffairs. Google-Books-ID: lRqrDQAAQBAJ.
[141]
Umur A. Çiftçi, Gokturk Yuksek, and ?lke Demir. 2023. My Face My Choice: Privacy Enhancing Deepfakes for Social Media Anonymization. In Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision (WACV). 1369--1379.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Human-Computer Interaction
Proceedings of the ACM on Human-Computer Interaction  Volume 8, Issue CSCW1
CSCW
April 2024
6294 pages
EISSN:2573-0142
DOI:10.1145/3661497
Issue’s Table of Contents
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike International 4.0 License.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 April 2024
Published in PACMHCI Volume 8, Issue CSCW1

Check for updates

Author Tags

  1. acceptability
  2. adversarial machine learning
  3. human factors
  4. measurement theory
  5. mixed methods
  6. scale development
  7. subversive artificial intelligence

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 318
    Total Downloads
  • Downloads (Last 12 months)318
  • Downloads (Last 6 weeks)82
Reflects downloads up to 18 Nov 2024

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media