
IEEE Symposium on Security and Privacy (SP), pages
137–153.
Adams, A. A., Murata, K., Orito, Y., and Parslow, P. (2011).
Emerging social norms in the UK and Japan on pri-
vacy and revelation in SNS. The International Review
of Information Ethics, 16:18–26.
Bracamonte, V., Orito, Y., Murata, K., Fukuta, Y., and Iso-
hara, T. (2023). Privacy Concerns Towards Privacy
Tools for Social Media Content: A Comparison be-
tween Japan and the USA. Computer Security Sympo-
sium 2023 CSS2023, pages 1435–1442.
Bracamonte, V., Pape, S., and Loebner, S. (2022). “All apps
do this”: Comparing privacy concerns towards privacy
tools and non-privacy tools for social media content.
Proc. Priv. Enhancing Technol., 2022(3).
Bracamonte, V., Tesfay, W. B., and Kiyomoto, S. (2021).
Towards exploring user perception of a privacy sensi-
tive information detection tool. In ICISSP, pages 628–
634.
Caliskan Islam, A., Walsh, J., and Greenstadt, R. (2014).
Privacy detective: Detecting private information and
collective privacy behavior in a large social network.
In Proceedings of the 13th Workshop on Privacy in
the Electronic Society, WPES ’14, pages 35–46, New
York, NY, USA. ACM.
Fukuta, Y., Murata, K., and Orito, Y. (2022). Personal In-
formation Disclosure as a Secondary Action of Con-
sumer Purchase Behaviour. In Proceedings of 83th
Annual Conference of the Japan Society for Informa-
tion and Management, pages 95–98.
Guarino, A., Malandrino, D., and Zaccagnino, R. (2022).
An automatic mechanism to provide privacy aware-
ness and control over unwittingly dissemination of
online private information. Computer Networks,
202:108614.
Hallgren, K. A. (2012). Computing Inter-Rater Reliabil-
ity for Observational Data: An Overview and Tuto-
rial. Tutorials in quantitative methods for psychology,
8(1):23–34.
Hasan, R., Li, Y., Hassan, E., Caine, K., Crandall, D. J.,
Hoyle, R., and Kapadia, A. (2019). Can Privacy
Be Satisfying?: On Improving Viewer Satisfaction
for Privacy-Enhanced Photos Using Aesthetic Trans-
forms. In Proceedings of the 2019 CHI Conference
on Human Factors in Computing Systems, page 367.
ACM.
Li, F., Sun, Z., Li, A., Niu, B., Li, H., and Cao, G. (2019).
HideMe: Privacy-Preserving Photo Sharing on Social
Networks. In IEEE INFOCOM 2019 - IEEE Confer-
ence on Computer Communications, pages 154–162.
Lowry, P. B., Cao, J., and Everard, A. (2011). Privacy
concerns versus desire for interpersonal awareness in
driving the use of self-disclosure technologies: The
case of instant messaging in two cultures. Journal of
Management Information Systems, 27(4):163–200.
Mao, H., Shuai, X., and Kapadia, A. (2011). Loose tweets:
an analysis of privacy leaks on twitter. In Proceedings
of the 10th annual ACM workshop on Privacy in the
electronic society, pages 1–12.
Ministry of Internal Affairs and Communications
(Japan) (2023). Precautions for the use of SNS.
https://www.soumu.go.jp/main\ sosiki/cybersecurity/
kokumin/enduser/enduser\ security02\ 05.html.
Murata, K. and Orito, Y. (2013). Internet Users’ Online
Privacy Protection Awareness: Ideal and Reality. In
Proceedings of 67th Annual Conference of the Japan
Society for Information and Management, pages 65–
68.
Murata, K., Orito, Y., and Fukuta, Y. (2014). Social
attitudes of young people in Japan towards online
privacy. Journal of Law, Information and Science,
23(1):[137]–157.
Nikkei Asia (2014). Customer data leak deals blow to
Benesse. https://asia.nikkei.com/Business/Customer-
data-leak-deals-blow-to-Benesse.
Orito, Y. and Murata, K. (2014). How do users recognise
business models and privacy protection of social me-
dia companies? In Proceedings of 68th Annual Con-
ference of the Japan Society for Information and Man-
agement, pages 157–160.
Orito, Y., Murata, K., and Fukuta, Y. (2013). Do online
privacy policies and seals affect corporate trustwor-
thiness and reputation? The International Review of
Information Ethics, 19(0):52–65.
Sleeper, M., Cranshaw, J., Kelley, P. G., Ur, B., Acquisti, A.,
Cranor, L. F., and Sadeh, N. (2013). “I read my Twit-
ter the next morning and was astonished” A Conversa-
tional Perspective on Twitter Regrets. In Proceedings
of the SIGCHI Conference on Human Factors in Com-
puting Systems, CHI ’13, pages 3277–3286.
Smith, H. J., Milberg, S. J., and Burke, S. J. (1996).
Information Privacy: Measuring Individuals’ Con-
cerns about Organizational Practices. MIS Quarterly,
20(2):167–196.
Statista (2023). Number of social media users in japan
from 2019 to 2023 with a forecast until 2028.
https://www.statista.com/statistics/278994/number-
of-social-network-users-in-japan/.
Tesfay, W. B., Serna, J., and Rannenberg, K. (2019). Pri-
vacyBot: Detecting Privacy Sensitive Information in
Unstructured Texts. In 2019 Sixth International Con-
ference on Social Networks Analysis, Management
and Security (SNAMS), pages 53–60.
Thomas, D. R. (2006). A General Inductive Approach
for Analyzing Qualitative Evaluation Data. American
Journal of Evaluation, 27(2):237–246.
Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon,
P. G., and Cranor, L. F. (2011). ”I regretted the minute
I pressed share”: A qualitative study of regrets on
Facebook. In Proceedings of the Seventh Symposium
on Usable Privacy and Security, SOUPS ’11.
Xu, H., Dinev, T., Smith, H., and Hart, P. (2008). Exam-
ining the Formation of Individual’s Privacy Concerns:
Toward an Integrative View. ICIS 2008 Proceedings.
Xu, H., Gupta, S., Rosson, M. B., and Carroll, J. M. (2012).
Measuring mobile users’ concerns for information pri-
vacy. In International Conference on Information Sys-
tems, ICIS 2012, International Conference on Infor-
mation Systems, ICIS 2012, pages 2278–2293.
SECRYPT 2024 - 21st International Conference on Security and Cryptography
162