Affiliation:
1. Georgia Institute of Technology, Atlanta, GA, USA
Abstract
Centralized online social networks --- e.g., Facebook, Twitter and TikTok --- help drive social connection on the Internet, but have nigh unfettered access to monitor and monetize the personal data of their users. This centralization can especially undermine the use of the social internet by minority populations, who disproportionately bear the costs of institutional surveillance. We introduce a new class of privacy-enhancing technology --- decentralized privacy overlays (DePOs) --- that helps cOSN users regain some control over their personal data by allowing them to selectively share secret content on cOSNs through decentralized content distribution networks. As a first step, we present an implementation and user evaluation of Image DePO, a proof-of-concept design probe that allows users to upload and share secret photos on Facebook through the Interplanetary File System peer-to-peer protocol. We qualitatively evaluated Image DePO in a controlled, test environment with 19 queer and Black, Indigenous, (and) Person of Color (BIPOC) participants. We found that while Image DePO could help address the institutional threats with which our participants expressed concern, interpersonal threats were the more salient concern in their decisions to share content. Accordingly, we argue that in order to see widespread use, DePOs must align protection against abstract institutional threats with protection against the more salient interpersonal threats users consider when making specific sharing decisions.
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Networks and Communications,Human-Computer Interaction,Social Sciences (miscellaneous)
Reference107 articles.
1. Analysis of Facebook steganographic capabilities
2. Mark Andrejevic . 2011. Exploitation in the Data Mine . In Internet and Surveillance . Routledge . Num Pages: 18. Mark Andrejevic. 2011. Exploitation in the Data Mine. In Internet and Surveillance. Routledge. Num Pages: 18.
3. Persona
4. The post anachronism
5. E. Baumer . 2007. Questioning the Technological Panacea: Three Reflective Questions for Designers. undefined ( 2007 ). https://www.semanticscholar.org/paper/Questioning-the-Technological-Panacea%3A-Three-for-Baumer/344139846c86e96c4854477d35e5d0ee519af9f3 E. Baumer. 2007. Questioning the Technological Panacea: Three Reflective Questions for Designers. undefined (2007). https://www.semanticscholar.org/paper/Questioning-the-Technological-Panacea%3A-Three-for-Baumer/344139846c86e96c4854477d35e5d0ee519af9f3
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献