skip to main content
10.1145/2462096.2462113acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

SnapMe if you can: privacy threats of other peoples' geo-tagged media and what we can do about it

Published: 17 April 2013 Publication History

Abstract

The amount of media uploaded to the Web is still rapidly expanding. The ease-of-use of modern smartphones in combination with the proliferation of high-speed mobile networks facilitates a culture of spontaneous and often carefree sharing of user-generated content, especially photos and videos. An increasing number of modern devices are capable of embedding location information and other metadata into created content. However, currently there is not much user awareness of possible privacy consequences of such data. While in most cases users upload their own media consciously, the flood of media uploaded by others is so huge that it is almost impossible for users to stay aware of all media that might be relevant to them. Current social network services and photo-sharing sites mainly focus on the privacy of users' own media in terms of access control, but offer few possibilities to deal with privacy implications created by other users' actions. We conducted an online survey with 414 participants. The results show that users would like to get more information about media shared by others. Based on an analysis of prevalent sharing services like Flickr, Facebook, or Google+ and an analysis of metadata of three different sets of crawled photos, we discuss privacy implications and potentials of the emerging trend of (geo-)tagged media. Finally, we present a novel concept on how location information can actually help users to control the flood of potentially infringing or interesting media.

References

[1]
S. Ahern, D. Eckles, N. Good, S. King, M. Naaman, and R. Nair. Over-exposed?: privacy patterns and considerations in online and mobile photo sharing. In Proceedings of the SIGCHI conference on Human factors in computing systems, pages 357--366, 2007.
[2]
R. Bekkerman and A. McCallum. Disambiguating Web appearances of people in a social network. In Proceedings of the 14th international conference on World Wide Web - WWW '05, page 463, May 2005.
[3]
A. Besmer and H. Lipford. Privacy Perceptions of Photo Sharing in Facebook. In Proc. SOUPS, 2008.
[4]
A. Besmer and H. Richter Lipford. Moving beyond untagging: photo privacy in a tagged world. In Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, 2010.
[5]
T. Burghardt, A. Walter, E. Buchmann, and K. Bohm. Primo - towards privacy aware image sharing. In IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2008. WI-IAT '08., volume 3, pages 21 --24, December 2008.
[6]
Carnegie Mellons Mobile Commerce Laboratory. Locaccino - a user-controllable location-sharing tool. http://locaccino.org/, 2011.
[7]
E. Eldon. New Facebook Statistics Show Big Increase in Content Sharing, Local Business Pages. http://www.insidefacebook.com/2010/02/15/new-facebook-statistics-show-big-increase-in-content-sharing-local-business-pages/, Februar 2010.
[8]
L. Fang and K. LeFevre. Privacy wizards for social networking sites. In Proceedings of the 19th international conference on World wide web - WWW '10, page 351, Apr. 2010.
[9]
I. R. Fasel and J. R. Movellan. A comparison of face detection algorithms. In Proceedings of the International Conference on Artificial Neural Networks, ICANN '02, pages 1325--1332, 2002.
[10]
A. P. Felt, S. Egelman, and D. Wagner. I've got 99 problems, but vibration ain't one: A survey of smartphone users' concerns. In Workshop on Usable Privacy & Security for Mobile Devices, Symposium On Usable Privacy and Security, SOUPS '12. ACM, 2012.
[11]
Flickr. Camera Finder. http://www.flickr.com/cameras, October 2011.
[12]
T. Hawk. Is There a Major Security Hole in Flickr's New "Geo-Fences" Feature? http://thomashawk.com/ 2011/ 08/ is-there-a-major-security-hole-in-flickrs-new-geo-fences-feature.html, August 2011.
[13]
B. Henne, C. Szongott, and M. Smith. Towards a mobile security & privacy simulator. In Open Systems (ICOS), 2011 IEEE Conference on, Sept. 2011.
[14]
L. Jiang, J. Wang, N. An, S. Wang, J. Zhan, and L. Li. Two birds with one stone. In Proceedings of the 18th international conference on World wide web - WWW '09, page 1201, Apr. 2009.
[15]
P. Kumaraguru and L. F. Cranor. Privacy Indexes: A Survey of Westin's Studies. pages 1--22, Dec. 2005.
[16]
S. Mahmood and Y. Desmedt. Poster: Preliminary analysis of google+ privacy. In Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pages 809--811. ACM, 2011.
[17]
M. Mannan and P. C. van Oorschot. Privacy-enhanced sharing of personal content on the web. In Proceeding of the 17th international conference on World Wide Web - WWW '08, page 487, April 2008.
[18]
Metadata Working Group. Guidelines for handling image metadata. version 2.0. http://www.metadataworkinggroup.org/pdf/mwg_guidance.pdf, November 2010.
[19]
R. J. Moore. Instagram now adding 130,000 users per week: Analysis. http://techcrunch.com/2011/03/10/instagram-adding-130000-users-per-week/, Mar 2011.
[20]
MSDN Library. People tagging overview. http://msdn.microsoft.com/en-us/library/ee719905(v=VS.85).aspx, July 2011.
[21]
Onvab. The business of facebook: Facts, users statistics & their usage trends. http://onvab.com/blog/facebook-users-statistics-usage-trends/, 10/2012.
[22]
R. Paul. First look: Android 4.0 SDK opens up face recognition APIs. http://arstechnica.com/gadgets/news/2011/10/first-look-android-40-sdk-opens-up-face-recognition-apis.ars, October 2011.
[23]
S. Perez. Facial Recognition Comes to iOS 5 via New Developer Tools. http://readwrite.com/2011/07/27/facial_recognition_comes_to_ios_5, 2011.
[24]
P. J. Phillips, W. T. Scruggs, A. J. O'Toole, P. J. Flynn, K. W. Bowyer, C. L. Schott, and M. Sharpe. Frvt 2006 and ice 2006 large-scale results, 2007.
[25]
M. Smith, B. Henne, C. Szongott, and G. von Voigt. Big data privacy issues in public social media. In 2012 Digital Ecosystems and Technologies Conference (DEST), 2012.
[26]
A. C. Squicciarini, H. Xu, and X. L. Zhang. Cope: Enabling collaborative privacy management in online social networks. J. Am. Soc. Inf. Sci. Technol., 62(3):521--534, Mar. 2011.
[27]
Sysomos Inc. Replies and Retweets on Twitter. http://www.sysomos.com/insidetwitter/engagement/, September 2010.
[28]
Viewdle. SocialCamera. http://www.viewdle.com/products/mobile/.
[29]
A. Vogel. AvPicFaceXmpTagger 1.7. http://www.anvo-it.de/wiki/avpicfacexmptagger:main, 2010.
[30]
S. Zerr, S. Siersdorfer, J. Hare, and E. Demidova. Privacy-aware image classification and search. In SIGIR '12: Proceedings of the 35th international conference on Research and development in information retrieval, Aug. 2012.

Cited By

View all
  • (2024)Where Have You Been? A Study of Privacy Risk for Point-of-Interest RecommendationProceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3637528.3671758(175-186)Online publication date: 25-Aug-2024
  • (2024)In Focus, Out of Privacy: The Wearer's Perspective on the Privacy Dilemma of Camera GlassesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642242(1-18)Online publication date: 11-May-2024
  • (2023)Modeling User Characteristics Associated with Interdependent Privacy Perceptions on Social MediaACM Transactions on Computer-Human Interaction10.1145/357701430:3(1-32)Online publication date: 2-Jan-2023
  • Show More Cited By

Index Terms

  1. SnapMe if you can: privacy threats of other peoples' geo-tagged media and what we can do about it

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WiSec '13: Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
      April 2013
      230 pages
      ISBN:9781450319980
      DOI:10.1145/2462096
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 17 April 2013

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. awareness
      2. geo-tagging
      3. photo-sharing
      4. privacy
      5. social media

      Qualifiers

      • Research-article

      Conference

      WISEC'13
      Sponsor:

      Acceptance Rates

      WiSec '13 Paper Acceptance Rate 26 of 70 submissions, 37%;
      Overall Acceptance Rate 98 of 338 submissions, 29%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)27
      • Downloads (Last 6 weeks)4
      Reflects downloads up to 03 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Where Have You Been? A Study of Privacy Risk for Point-of-Interest RecommendationProceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3637528.3671758(175-186)Online publication date: 25-Aug-2024
      • (2024)In Focus, Out of Privacy: The Wearer's Perspective on the Privacy Dilemma of Camera GlassesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642242(1-18)Online publication date: 11-May-2024
      • (2023)Modeling User Characteristics Associated with Interdependent Privacy Perceptions on Social MediaACM Transactions on Computer-Human Interaction10.1145/357701430:3(1-32)Online publication date: 2-Jan-2023
      • (2023)Bottom-up psychosocial interventions for interdependent privacy: Effectiveness based on individual and content differencesProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581117(1-20)Online publication date: 19-Apr-2023
      • (2023)“Do You Know You Are Tracked by Photos That You Didn’t Take”: Large-Scale Location-Aware Multi-Party Image Privacy ProtectionIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.313223020:1(301-312)Online publication date: 1-Jan-2023
      • (2023)Privacy Protection Against Reverse Image Search2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)10.1109/ICAIS56108.2023.10073803(1207-1214)Online publication date: 2-Feb-2023
      • (2022)Characterizing and Detecting Non-Consensual Photo Sharing on Social NetworksProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3560571(3209-3222)Online publication date: 7-Nov-2022
      • (2022)Obfuscation Remedies Harms Arising from Content Flagging of PhotosProceedings of the 2022 CHI Conference on Human Factors in Computing Systems10.1145/3491102.3517520(1-25)Online publication date: 29-Apr-2022
      • (2021)When Forcing Collaboration is the Most Sensible ChoiceProceedings of the ACM on Human-Computer Interaction10.1145/34491275:CSCW1(1-36)Online publication date: 22-Apr-2021
      • (2021)A Spatial Source Location Privacy-aware Duty Cycle for Internet of Things Sensor NetworksACM Transactions on Internet of Things10.1145/34303792:1(1-32)Online publication date: 1-Feb-2021
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media