Journal Review by Fakhri Alauddin Tarihoran

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

JOURNAL

REVIEW
Title CONFIDENTIAL POLICY FOR PROTECTING USER IMAGES
UPLOADED ON SHARED WEB SITES

Journal Akula Kiranmai, IJSRM


Vol. & Page Volume 5 Issue 6, Page 5732 - 5738
Year 2017
Writter Kiranmai, A., Loshma, G.,
Date May 07, 2024
Reviewer Fakhri Alauddin Tarihoran (0702233130)
Download https://ijsrm.net/index.php/ijsrm/article/view/770/690

Along with the increase in the number of people using internet, the number
of people sharing images across various web sites. One of the major issues
with the sharing of images on public web sites is the unauthorized access of
Abstract the content of the image. We propose a two-level framework which
according to the user’s available history on the site, determines the best
available privacy policy for the user’s images being uploaded. We propose
in this project non-recommended user can search and send the request of
image to the administrator can accept the response and approve the access
permissions. A hierarchical image classification that classifies pictures
initially based on their contents then refine every class into subcategories
based mostly on their metadata. Such a hierarchical classification provides a
higher priority to image content.

Data mining, the extraction of hidden predictive information from large


databases, Data Mining is defined as the procedure of extracting
information from huge sets of data. we can say that data mining is mining
knowledge from data decisions. The automated, prospective analyses
offered by data mining move beyond the analyses of past events provided
by retrospective tools typical of decision support systems. Classification is a
Introduction general process related to categorization , the process in which ideas and
objects are recognized, differentiated, and understood. They scour databases
for hidden patterns, finding predictive information that experts may miss
because it lies outside their expectations.

1
Kiranmai, A. (2017) in his research explains several basic theories and
concepts, such as:
(1) PViz Comprehension Tool for Social Network Privacy Settings:
Literature Mazzia, LeFevre, and E. (2012) introduced the PViz tool for
review understanding social network privacy settings. This tool aids users in
comprehending the visibility of their profiles based on natural sub-
groupings of friends, aligning with users' mental models of privacy
settings
(2) Strategies and Struggles with Privacy in Online Social Networking
Community: Strater and Lipford discussed the challenges and
strategies related to privacy in online social networking
communities. The study highlights the complexities users face in
managing privacy settings and decisions within these platforms
(3) Unique Privacy Needs of Images: The research emphasizes the
distinct privacy requirements of images due to the implicit
information they carry and their exposure in the online environment.
It underscores the importance of addressing privacy concerns
specific to image sharing platforms
(4) Policy Comprehension Tools for Social Networks: Existing policy
comprehension tools like Facebook Audience View may not align
with users' mental models of privacy settings. PViz offers a more
intuitive interface for users to understand and manage privacy
policies within their social networks

2
The research methodology in the paper is not explicitly outlined, but some
information can be inferred from the context provided. Based on the
information presented, the methodology used seems to combine several
Research approaches, including:
methods
1. Literature Analysis: This research appears to be supported by extensive
literature analysis, as many references are mentioned in the text. Literature
analysis is used to support arguments, identify knowledge gaps, and
strengthen the theoretical foundation of the research.

2. Qualitative Research: There are elements of qualitative research in this


study, especially in terms of collecting data regarding the needs, awareness,
and privacy challenges faced by social media users. This may involve
interviews, observations, or content analysis from social media platforms.

3. Conceptual Research: The paper also indicates a conceptual approach in


designing a two-level framework to protect user image privacy. This
involves conceptual thinking in identifying privacy issues, defining
solutions, and developing an appropriate framework.

4. Data Analysis: Although not elaborated in detail, there may be data


analysis related to privacy patterns, user needs, and privacy understanding on
social media platforms.

5. Experimentation or Concept Testing: There is a possibility that this


research also involves concept testing or limited experimentation, especially
regarding the effectiveness of the proposed framework in protecting user
image privacy.

While the specific details of the research methodology are not explicitly
stated, based on the content provided, this research seems to employ a multi-
method approach that includes literature review, qualitative research,
conceptual research, and possibly data analysis or limited experimentation.

The research findings presented in the paper are highly significant. Firstly, the
Research study yields a two-tier framework aimed at protecting the privacy of user-
result uploaded images on shared websites. This framework is designed to take into
account users' histories on the site in determining the best privacy policies for
uploaded images. Additionally, the research proposes a hierarchical image
classification approach based on content and metadata. This approach
prioritizes image content and reduces the impact of missing tags.

3
Beyond the technical aspects, the paper also delves into privacy settings for
various types of profiles on social networking sites, such as public profiles,
private profiles, and search profiles. This aims to provide users with better
control over the information they share. The research reveals that social
networking site users often lack awareness of privacy issues associated with
sharing personal information and images. This underscores the need for
greater education and awareness of online privacy among users.

In conclusion, this research makes a significant contribution to developing


understanding and solutions related to the privacy challenges faced by users of
shared websites and online social networks. Recommendations are also
provided for the development of improved privacy policy recommendation
systems that are user-friendly. Thus, the research not only provides a
comprehensive overview of online privacy issues but also offers concrete
steps to enhance overall user privacy experiences.

Furthermore, the research findings shed light on the importance of context-


aware privacy settings, especially in the context of image sharing and social
media interactions. It emphasizes the need for personalized and granular
control over privacy settings, considering factors such as location data, social
connections, and content sensitivity.

The study also discusses the challenges and implications of default privacy
settings on social networking sites. It highlights that a significant portion of
content remains shared with default settings, often exposing more information
than users intend. This highlights the gap between users' privacy expectations
and the reality of their privacy settings on these platforms.

Moreover, the research suggests potential avenues for future enhancements,


such as integrating behavior-based algorithms for classifying attackers and
users. This could lead to more robust access control mechanisms and
improved privacy levels for users across social media platforms.

In summary, the research not only provides insights into current privacy issues
but also offers directions for advancing privacy protection mechanisms and
user awareness in the ever-evolving landscape of online interactions and data
sharing.

4
This journal is a valuable contribution to understanding and addressing the
privacy challenges faced by users of shared websites and online social
networks. The research introduces a two-tier framework aimed at protecting
the privacy of user-uploaded images, taking into account users' histories on
the site. Additionally, it proposes a hierarchical image classification
approach based on content and metadata, offering more granular control over
privacy.
Consclusion
The journal also highlights the lack of privacy awareness among users of
social networking sites, particularly concerning default privacy settings that
often disclose more information than intended. This underscores the need for
better education about online privacy.

In conclusion, this journal provides insights into current privacy issues and
offers directions for enhancing privacy protection mechanisms and user
awareness in the evolving online landscape. It lays a solid foundation for the
development of more effective and user-friendly privacy policies in the
future.

1. User History-Based Privacy Framework: The research presents a two-


tier framework that considers user history on shared websites to
Strengths determine the best privacy policies for user-uploaded images. This
approach results in more personalized and customizable privacy
controls based on user preferences.
2. Hierarchical Image Classification Approach: The journal proposes a
hierarchical image classification approach where images are
categorized based on content and metadata. This helps prioritize
sensitive information and reduces the risk of unauthorized access to
uploaded content.
3. Disclosure of Default Privacy Setting Issues: The research sheds light
on the often overlooked default privacy settings on social networking
sites and how they can inadvertently reveal more information than
intended by users. This underscores the need for better privacy
awareness and education among users.
4. Providing Guidance for Developing More Effective Privacy Policies:
The journal not only identifies current privacy issues but also offers
guidance for enhancing privacy protection mechanisms and user
awareness in the evolving online environment. It can serve as a strong
foundation for the development of more effective privacy policies in
the future.

5
1. Limited Scope of Research: The journal may have limitations in its
Weekness research scope, such as focusing only on a specific aspect of the user-
uploaded image privacy issue without considering other relevant
factors.
2. Limited Data Collection Methods: Insufficient relevant data or
limited data collection methods can reduce the accuracy or
representation of the research findings. This can affect the validity
and generalizability of the research findings.
3. Limitations in Data Analysis or Interpretation: The journal may not
comprehensively analyze or interpret the collected data, resulting in
weaker or less in-depth conclusions.
4. Limited Availability of Related Literature: The research may not
delve deeply into related literature or references on the topic, which
can affect the research context and a deeper understanding of the
issues discussed.
5. Relevance or Practical Implications for End Users: The journal may
not be directly relevant or have strong practical implications for end
users or stakeholders involved in the online image privacy issues.
6. Lack of Validity Testing or Result Reproducibility: The research may
lack validity testing or result reproducibility, which can reduce
confidence in the research findings.

You might also like