Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Kuzma, Joanne (2012)
Publisher: Inderscience
Languages: English
Types: Article
Subjects: T1
This paper investigates the levels of geocoding images with children pictures, and discusses privacy and safety issues that may affect children. This study analyzed the number of geocoded images of children’s pictures on Flickr, a popular image-sharing site. For 50 of the top most expensive residential zip codes in the U.S., the number of images that had gelocation tags was counted. Results showed significant number of images with children’s faces that had geotagged information. The location information could possibly be used to locate a child’s home or other location based on information publicly available on Flickr. Publishing geolocation data raises concerns about privacy and security of children when such personalized information is available to Internet users who may dubious reasons for accessing this data. People should understand the implications of this technology and post only appropriate data in order to protect themselves and their children.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • Bhasin, M. (2006) 'Guarding Privacy on the Internet', Global Business Review, Vol. 7, No. 1, 137-156.
    • Bowie, N. and Jamal, K. (2006) 'Privacy Rights on the Internet, Self Regulation or Government Regulation', Business Ethics Quarterly, Vol. 16, No. 3, pp. 323-342.
    • Burdon, M. (2010), “Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Privacy Laws”, University of Illinois Journal of Law Technology and Policy, Vol. 1, pp. 1-50.
    • Butcher, D. (2011), “Legal and regulatory risks associated with the growth of mobile marketing”, Mobile Commerce Daily, http://www.mobilecommercedaily.com/2011/04/13/legal-and-regulatory-risks-associatedwith-the-growth-of-mobile-marketing
    • Clements, M., Serdyukov, P., Vries, A., and Reinders, M., (2010), "Using flickr geotags to predict user travel behaviour", in Proceeding of the 33rd International ACM SIGIR conferences on Research and development in information retrieval, 19-23 July 2010, Geneva, Switzerland, pp.851-852.
    • Douglas, H. (2010), “Handsets provide a new way of connecting to the internet, but also provide new privacy problems for users”, ITPro, http://www.itpro.co.uk/625108/mobileusers-wary-over-geotagging
    • Federal Trade Commission (FTC), (2010), “Protecting Consumer Privacy in an Era of Rapid Change, A Proposed Framework for Business and Policy Makers”, http://www.ftc.gov/os/2010/12/101201privacyreport.pdf
    • Free Image Hosting (2011) “Free Image Hosting FAQ”, http://www.freeimagehosting.net/faq.php
    • Flickr (2011), “Flickr Maps”, http://www.flickr.com/map
    • Friedland, G. and Sommer, R., (2010), “Cybercasing the Joint: On the Privacy Implications of Geotagging”, In Proceedings of the Fifth USENIX Workshop on Hot Topics in Security (HotSec 10), August 2010, Washington, D.C., http://usenix.org/events/hotsec10/tech/full_papers/Friedland.pdf.
    • Grensing-Pophal, L. (2011) “Security and Identity: Balancing Privacy, Flexibility and Ease of Use”, EContentMag.com, Vol. 34, No. 1, http://www.econtentmag.com/Articles/Editorial/Feature/Security-and-Identity-BalancingPrivacy-Flexibility-and-Ease-of-Use-73858.htm
    • The Higley 100 (2011), “The Elite 100: America's Highest Income Neighborhoods”, http://higley1000.com/archives/44
    • Joshi, D., Gallagher, A., Yu, J., and Luo, J., (2010) Exploring user image tags for geolocation inference. In IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP), 14-19 March 2010, Dallas, Tx, pp. 5598-5601.
    • Joshi, D. and Luo, J., (2008), “Inferring generic activities and events from image content and bags of geo-tags”, In Proceedings of the 2008 international conference on Content-based image and video retrieval, 7-9, July 2008, Niagara Falls, ON, Canada, pp. 37-46.
    • Lofing, N. (2010), “Facebook's new geotagging ability bring potential for abuse“, The Sacremento Bee, http://www.sacbee.com/2010/08/24/2977615/facebooks-newgeotagging-ability.html#storylink=misearch
    • Miyazaki, A., Standaland, A., Lwin, M. (2009), “Self-Regulatory Safeguards and the Online Privacy of Preteen Children”, Journal of Advertising, Vol. 38, No. 4, pp. 79-91.
    • Ozer, N., Conley, C., O'Connell, H., Ginsburg, E. and Gubins, T. (2010), “ Location-Based Services: Time for a Privacy Check-In”, ACLU of Northern California, http://www.aclunc.org/issues/technology/asset_upload_file533_9627.pdf
    • Photobucket, (2011), “About Photobucket”, http://photobucket.com/about.
    • The Local, (2010), “Politicians call for 'geotagging' laws ahead of data summit”, http://www.thelocal.de/sci-tech/20100920-29937.html
    • U.S. House, 111th Congress. “H.R. 5777, Best Practices Act.” (Version 1: Version Date: July 19, 2010), http://www.house.gov/apps/list/press/il01_rush/h_r_5777_the_best_practices_act_2010.pd f
    • Vicente, C., Freni, D., Bettini, C. and Jensen, C. (2011), “Location-Related Privacy in GeoSocial Networks”, IEEE Internet Computing, Vol. 15, No. 3, pp. 20-27.
    • Yu, J., Joshi, D. and Luo, J., (2009), “Connecting people in photo-sharing sites by photo content and user annotations”, In IEEE International Conference on Multimedia and Expo 2009, 28 June-3 July, 2009, New York, NY, pp. 1464-1467.
    • Burghardt, T., Buchmann, E., Muller, J. and Bohm, K. (2009), “Understanding User Preferences and Awareness: Privacy Mechanisms in Location-Based Services,” Lecture Notes in Computer Science, Vol. 5870/2009, pp. 304-321.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article