Hello, I work for the School of Software in the Faculty of Engineering and IT. I teach Database and Data Warehousing and Quality management subjects.
My research area is Privacy in photos and videos. How photos and videos are stored and managed in social media applications.
Bachelor of Information Technology, Course coordinator.
Can supervise: YES
My research interest is on privacy. Privacy in photos and videos, how they are shared and stored using social media.
My research area is about managing the privacy of an individual when their photos and videos are shared via social media. This research particularly focuses on developing a framework which helps an individual to manage their privacy. Managing privacy of an individual when they are on social media is a very interesting topic to me. Because photos and videos contain information more than what they may want to reveal about themselves to others.
Database Principles 31061
Advanced Database 32113.
Tonkin, M, Vitale, J, Herse, S, Raza, SA, Madhisetty, S, Kang, L, Vu, TD, Johnston, B & Williams, MA 2019, 'Privacy First: Designing Responsible and Inclusive Social Robot Applications for in the Wild Studies', 2019 28th IEEE International Conference on Robot and Human Interactive Communication (RO-MAN), IEEE International Conference on Robot and Human Interactive Communication, IEEE, New Delhi, India.View/Download from: Publisher's site
Deploying social robots applications in public spaces for conducting in the wild studies is a significant challenge but critical to the advancement of social robotics. Real world environments are complex, dynamic, and uncertain. Human-Robot interactions can be unstructured and unanticipated. In addition, when the robot is intended to be a shared public resource, management issues such as user access and user privacy arise, leading to design choices that can impact on users' trust and the adoption of the designed system. In this paper we propose a user registration and login system for a social robot and report on people's preferences when registering their personal details with the robot to access services. This study is the first iteration of a larger body of work investigating potential use cases for the Pepper social robot at a government managed centre for startups and innovation. We prototyped and deployed a system for user registration with the robot, which gives users control over registering and accessing services with either face recognition technology or a QR code. The QR code played a critical role in increasing the number of users adopting the technology. We discuss the need to develop social robot applications that responsibly adhere to privacy principles, are inclusive, and cater for a broad spectrum of people.
Madhisetty, S & Williams, MA 2018, 'Managing privacy through key performance indicators when photos and videos are shared via social media', Advances in Intelligent Systems and Computing, Science and Information Conference, Springer, London, United Kingdom, pp. 1103-1117.View/Download from: Publisher's site
© Springer Nature Switzerland AG 2019. There are many definitions of privacy. What is considered sensitive varies from individual to individual. When a document is shared it may reveal certain information, the exchange of information is grounded with a specific context. This contextual grounding may not be afforded when photos and videos are shared, because they may contain rich semantic and syntactic information coded as tacit knowledge. Identifying sensitive information in a photo or a video is a major problem; therefore, rather than making assumptions about what is sensitive in a photo or a video, this research asked a group of study participants why they share content and what their concerns are (if any)? This enabled inferences to be made about categories of sensitivity in accordance with the participants' responses. Interview data was gathered and Grounded Theory was applied. The following themes emerged from the data: a major theme, in which no privacy concerns were developed, three sub-themes in which varying levels of privacy concerns were developed and key performance indicators which manage levels of privacy were determined. This paper focuses on the main themes' key performance indicators and how they can manage privacy when photos and videos are shared over social media.
Madhisetty, S & Williams, MA 2018, 'The role of trust and control in managing privacy when photos and videos are stored or shared', Advances in Intelligent Systems and Computing, Future Technologies Conference, Springer, Vancouver, BC (Canada), pp. 127-140.View/Download from: Publisher's site
© Springer Nature Switzerland AG 2019. A photo or a video could contain sensitive information coded as tacit information, which makes it difficult gauge, the loss of privacy, if such photo or a video were shared. Social media applications like Facebook, Twitter, WhatsApp and many more such applications are becoming popular. The instant sharing of information via photos and videos is making the management of issues which rise out of loss of privacy more difficult. Many users of social media trust that their content will not be misused other than purposes that were originally intended. This paper discusses not only about how much of that trust is real and how much of it was forced, but demonstrates the reasoning behind forced trust. These interferences were made after data collection via interviews and data analysis using Grounded Theory.
Madhisetty, S, Williams, MA, Massy-Greene, J, Franco, L & El Khoury, M 2019, 'How to manage privacy in photos after publication', ICEIS 2019 - Proceedings of the 21st International Conference on Enterprise Information Systems, International Conference on Enterprise Information Systems, SciTechPress, Greece, pp. 162-168.View/Download from: Publisher's site
Copyright © 2019 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved. Photos and videos once published may stay available for people to view it unless they are deleted by the publisher of the photograph. If the content is downloaded and uploaded by others then they lose all the privacy settings once afforded by the publisher of the photograph or video via social media settings. This means that they could be modified or in some cases misused by others. Photos also contain tacit information, which cannot be completely interpreted at the time of their publication. Sensitive information may be revealed to others as the information is coded as tacit information. Tacit information allows different interpretations and creates difficulty in understanding loss of privacy. Free flow and availability of tacit information embedded in a photograph could have serious privacy problems. Our solution discussed in this paper illuminates the difficulty of managing privacy due the tacit information embedded in a photo. It also provides an offline solution for the photograph such that it cannot be modified or altered and gets automatically deleted over a period of time. By extending the Exif data of a photograph by incorporating an in-built feature of automatic deletion, and the access to an image by scrambling the image via adding a hash value. Only a customized application can unscramble the image therefore making it available. This intends to provide a novel offline solution to manage the availability of the image post publication.
Pfeiffer, S, Ebrahimian, D, Herse, S, Le, TN, Leong, S, Lu, B, Powell, K, Raza, SA, Sang, T, Sawant, I, Tonkin, M, Vinaviles, C, Vu, TD, Yang, Q, Billingsley, R, Clark, J, Johnston, B, Madhisetty, S, McLaren, N, Peppas, P, Vitale, J & Williams, MA 2018, 'UTS Unleashed! RoboCup@Home SSPL Champions 2019', RoboCup 2019: Robot World Cup XXIII, Robot World Cup, Springer International Publishing, Sydney, NSW, Australia, pp. 603-615.View/Download from: Publisher's site
This paper summarizes the approaches employed by Team UTS Unleashed! to take First Place in the 2019 RoboCup@Home Social Standard Platform League. First, our system architecture is introduced. Next, our approach to basic skills needed for a strong performance in the competition. We describe several implementations for tests participation. Finally our software development methodology is discussed.
Madhisetty, S & Williams, MA 2017, 'Framework for privacy in photos and videos when using social media', ICEIS 2017 - Proceedings of the 19th International Conference on Enterprise Information Systems, International Conference on Enterprise Information Systems, Science and Technology Publications, Porto, Portugal, pp. 331-336.View/Download from: Publisher's site
Privacy is a social construct. Having said that, how can it be contextualised and studied scientifically? This research contributes by investigating how to manage privacy better in the context of sharing and storing photos and videos using social media. Social media such as Facebook, Twitter, WhatsApp and many more applications are becoming popular. The instant sharing of tacit information via photos and videos makes the problem of privacy even more critical.The main problem was, nobody could define the actual meaning of privacy. Though there are definitions about privacy and Acts to protect it, there is no clear consensus as to what it actually means. I asked myself a question, how do I manage something when I don't know what it means exactly? I then decided to do this research by asking questions about privacy in particular categories of photos so that I could arrive at a general consensus. The data has been processed using the principles of Grounded Theory (GT) to develop a framework which assists in the effective management of privacy in photos and videos.
Madhisetty, S, Busch, P & Feuerlicht, G 2008, 'Utility Computing Framework and its Impact on the Medical Industry', Con-IRM 2008 (IRMA), International Conference on Information Resources Management, IDEA Group Publishing, Ontario, Canada, pp. 1-7.
Madhisetty, S, Busch, P, Feuerlicht, G & Flax, L 2008, 'Utility Computing and its influence on the IT Industry', 2008 International Conference On Enterprise Systems and Web Technologies, International Conference On Enterprise Systems and Web Technologies, ISRST, Orlando, USA, pp. 134-140.
Madhisetty, S 2007, 'Utility Computing and Its Applications', Managing Worldwide Operations & Communications with Information Technology, 2007 Information Resources Management Association, Vancouver, Canada, pp. 1037-1038.
Steele, R, Ventsov, Y, Madhisetty, S & Benkovich, L 2004, 'A two-tier architecture for automated mobile applications', International Conference on Information Technology: Coding Computing, ITCC, pp. 281-285.View/Download from: Publisher's site
Emerging high bandwidth wireless infrastructure such as WiFi and Bluetooth networks make possible mobile applications that involve automated "conversations" between mobile devices and other land-based systems. By automated is meant that communication does not necessarily require human initiation or intervention. Such applications have been previously economically unviabie on GSM/ GPRS networks due to the costs per call and/ or per data volume and technically challenging as providing for run-time flexibility in such communication poses semantic encoding difficulties. Nevertheless such applications are particularly well suited to mobile device interfaces, which have input and display limitations, as they minimize the required level of human user input. In this paper we propose a two-tier architecture for simple database-centric mobile applications, capable of such automated communication, that uses polymorphism to achieve run-time flexibility.
Steele, RJ, Ventsov, Y, Madhisetty, S & Benkovich, L 2004, 'A Two-tier Architecture for Automated Mobile Applications', Proceedings ITCC 2004 - International Conference on Information Technology: Coding and Computing - Volume 2, International Conference on Information Technology: Coding and Computing, IEEE Computer Society, Las Vegas, USA, pp. 282-286.View/Download from: Publisher's site
Emerging high bandwidth wireless infrastructure such as WiFi and Bluetooth networks make possible mobile applications that involve automated "conversations" between mobile devices and other land-based systems. By automated is meant that communication does not necessarily require human initiation or intervention. Such applications have been previously economically unviable on GSM/ GPRS networks due to the costs per call and/ or per data volume and technically challenging as providing for run-time flexibility in such communication poses semantic encoding difficulties. Nevertheless such applications are particularly well suited to mobile device interfaces, which have input and display limitations, as they minimize the required level of human user input. In this paper we propose a two-tier architecture for simple database-centric mobile applications, capable of such automated communication, that uses polymorphism to achieve run-time flexibility.