A. Dabrowski, E. R. Weippl, and I. , Echizen: Framework based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing, Proceedings of 2013 IEEE International Conference on Systems, Man and Cybernetics, pp.455-461, 2013.
DOI : 10.1109/smc.2013.83

J. Wickramasuriya, M. Datt, S. Mehrotra, and N. , Venkatasubramanian: Privacy Protecting Data Collection in Media Spaces, Proceedings of the 12th annual ACM international conference on Multimedia, pp.48-55, 2004.
DOI : 10.1145/1027527.1027537

C. Bo, G. Shen, J. Liu, X. Li, Y. Zhang et al., Privacy.tag, Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems, SenSys '14, pp.163-176, 2014.
DOI : 10.1145/2393347.2396460

URL : https://hal.archives-ouvertes.fr/hal-01377991

M. Mondal, Y. Liu, B. Viswanath, K. P. Gummadi, and A. , Mislove: Understanding and Specifying Social Access Control Lists, Proceedings of the Tenth Symposium On Usable Privacy and Security, pp.271-283, 2014.

M. Sleeper, R. Balebako, S. Das, A. L. Mcconahy, J. Wiese et al., The post that wasn't, Proceedings of the 2013 conference on Computer supported cooperative work, CSCW '13, pp.793-802, 2013.
DOI : 10.1145/2441776.2441865

A. Besmer and H. R. Lipford, Privacy Perceptions of Photo Sharing in Facebook, Proceedings of the Fourth Symposium on Usable Privacy and Security, 2008.

P. Kumar and S. Schoenebeck, The Modern Day Baby Book, Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, CSCW '15, pp.1302-1312, 2015.
DOI : 10.1007/s00779-009-0218-7

S. Egelman, A. Oates, and S. , Krishnamurthi: Oops, I did it again: mitigating repeated access control errors on facebook, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp.2295-2304, 2011.

S. Machida, T. Kajiyama, S. Shigeru, and I. Echizen, Analysis of Facebook Friends Using Disclosure Level, 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp.471-474, 2014.
DOI : 10.1109/IIH-MSP.2014.124

M. Sleeper, J. Cranshaw, P. G. Kelley, B. Ur, A. Acquisti et al., "i read my Twitter the next morning and was astonished", Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '13, pp.3277-3286, 2013.
DOI : 10.1145/2470654.2466448

Y. Wang, G. Norcie, S. Komanduri, A. Acquisti, P. G. Leon et al., "I regretted the minute I pressed share", Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS '11, p.10, 2011.
DOI : 10.1145/2078827.2078841

B. Henne, C. Szongott, and M. Smith, SnapMe if you can, Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, WiSec '13, pp.95-106, 2013.
DOI : 10.1145/2462096.2462113

P. Pappachan, R. Yus, P. K. Das, T. Finin, E. Mena et al., A semantic context-aware privacy model for faceblock, Proceedings of the 2nd International Conference on Society , Privacy and the Semantic Web -Policy and Technology, pp.64-72, 2014.

Y. Li, K. Xu, Q. Yan, Y. Li, and R. H. Deng, Understanding OSN-based facial disclosure against face authentication systems, Proceedings of the 9th ACM symposium on Information, computer and communications security, ASIA CCS '14, pp.413-424, 2014.
DOI : 10.1145/2590296.2590315

F. Pallas, M. Ulbricht, L. Jaume-palasí, and U. , Höppner: Offlinetags: a novel privacy approach to online photo sharing, Proceedings of CHI '14 Extended Abstracts on Human Factors in Computing Systems, pp.2179-2184, 2014.

Y. Hu, L. Manikonda, and S. Kambhampati, What We Instagram: A First Analysis of Instagram Photo Content and User Types, Proceedings of the 8th International AAAI Conference on Weblogs and Social Media, 2014.

E. Hall, The Hidden Dimension, Leonardo, vol.6, issue.1, 1966.
DOI : 10.2307/1572461

A. Ashok, V. Nguyen, M. Gruteser, N. Mandayam, W. Yuan et al., Do not share!, Proceedings of the 1st ACM MobiCom workshop on Visible light communication systems, VLCS '14, pp.39-44, 2014.
DOI : 10.1145/2643164.2643168

P. Viola and M. J. Jones, Robust Real-Time Face Detection, International Journal of Computer Vision, vol.57, issue.2, pp.137-154, 2004.
DOI : 10.1023/B:VISI.0000013087.49260.fb

URL : http://csdl.computer.org/comp/proceedings/iccv/2001/1143/02/114320747.pdf