Authors: Srinivas Madhisetty ; Mary-Anne Williams ; John Massy-Greene ; Luke Franco and Mark El Khoury

Affiliation: Magic Lab, University of Technology Sydney, Ultimo, Sydney and Australia

ISBN: 978-989-758-372-8

ISSN: 2184-4992

Keyword(s): Privacy in Photos, Tacit Information, Grounded Theory.

Related Ontology Subjects/Areas/Topics: Computer-Supported Education ; Enterprise Information Systems ; Information Systems Analysis and Specification ; Information Technologies Supporting Learning ; Security ; Security and Privacy ; Society, e-Business and e-Government ; Software Agents and Internet Computing ; Tools, Techniques and Methodologies for System Development ; Web 2.0 and Social Networking Controls ; Web Information Systems and Technologies

Abstract: Photos and videos once published may stay available for people to view it unless they are deleted by the publisher of the photograph. If the content is downloaded and uploaded by others then they lose all the privacy settings once afforded by the publisher of the photograph or video via social media settings. This means that they could be modified or in some cases misused by others. Photos also contain tacit information, which cannot be completely interpreted at the time of their publication. Sensitive information may be revealed to others as the information is coded as tacit information. Tacit information allows different interpretations and creates difficulty in understanding loss of privacy. Free flow and availability of tacit information embedded in a photograph could have serious privacy problems. Our solution discussed in this paper illuminates the difficulty of managing privacy due the tacit information embedded in a photo. It also provides an offline solution for the photograp h such that it cannot be modified or altered and gets automatically deleted over a period of time. By extending the Exif data of a photograph by incorporating an in-built feature of automatic deletion, and the access to an image by scrambling the image via adding a hash value. Only a customized application can unscramble the image therefore making it available. This intends to provide a novel offline solution to manage the availability of the image post publication. (More)

PDF ImageFull Text


Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Madhisetty, S.; Williams, M.; Massy-Greene, J.; Franco, L. and El Khoury, M. (2019). How to Manage Privacy in Photos after Publication.In Proceedings of the 21st International Conference on Enterprise Information Systems - Volume 2: ICEIS, ISBN 978-989-758-372-8, ISSN 2184-4992, pages 162-168. DOI: 10.5220/0007614001620168

author={Srinivas Madhisetty. and Mary{-}Anne Williams. and John Massy{-}Greene. and Luke Franco. and Mark El Khoury.},
title={How to Manage Privacy in Photos after Publication},
booktitle={Proceedings of the 21st International Conference on Enterprise Information Systems - Volume 2: ICEIS,},


JO - Proceedings of the 21st International Conference on Enterprise Information Systems - Volume 2: ICEIS,
TI - How to Manage Privacy in Photos after Publication
SN - 978-989-758-372-8
AU - Madhisetty, S.
AU - Williams, M.
AU - Massy-Greene, J.
AU - Franco, L.
AU - El Khoury, M.
PY - 2019
SP - 162
EP - 168
DO - 10.5220/0007614001620168

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.