{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:10:35Z","timestamp":1742926235410,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030425036"},{"type":"electronic","value":"9783030425043"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-42504-3_29","type":"book-chapter","created":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T18:03:57Z","timestamp":1583863437000},"page":"462-478","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy in Location-Based Services and Their Criticality Based on Usage Context"],"prefix":"10.1007","author":[{"given":"Tom","family":"Lorenz","sequence":"first","affiliation":[]},{"given":"Ina","family":"Schiering","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,6]]},"reference":[{"key":"29_CR1","unstructured":"Barkhuus, L., Dey, A.K.: Location-based services for mobile telephony: a study of users\u2019 privacy concerns. In: INTERACT 2003, vol. 3, pp. 702\u2013712. Citeseer (2003)"},{"issue":"2","key":"29_CR2","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/MPRV.2008.34","volume":"7","author":"P Bellavista","year":"2008","unstructured":"Bellavista, P., K\u00fcpper, A., Helal, S.: Location-based services: back to the future. IEEE Pervasive Comput. 7(2), 85\u201389 (2008)","journal-title":"IEEE Pervasive Comput."},{"issue":"1","key":"29_CR3","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"AR Beresford","year":"2003","unstructured":"Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Comput. 2(1), 46\u201355 (2003)","journal-title":"IEEE Pervasive Comput."},{"key":"29_CR4","unstructured":"Beresford, A.R., Stajano, F.: Mix zones: user privacy in location-aware services. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 127\u2013131. IEEE (2004)"},{"key":"29_CR5","unstructured":"Boutet, A., Mokhtar, S.B., Primault, V.: Uniqueness assessment of human mobility on multi-sensor datasets (2016)"},{"key":"29_CR6","unstructured":"Cipolla, R., Robertson, D., Tordoff, B.: Image-based localization. In: Proceedings International Conference Virtual Systems and Multimedia, vol. 2004 (2004)"},{"key":"29_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-319-47072-6_15","volume-title":"Data Privacy Management and Security Assurance","author":"SJ De","year":"2016","unstructured":"De, S.J., Le M\u00e9tayer, D.: PRIAM: a privacy risk analysis methodology. In: Livraga, G., Torra, V., Aldini, A., Martinelli, F., Suri, N. (eds.) DPM\/QASA -2016. LNCS, vol. 9963, pp. 221\u2013229. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-47072-6_15"},{"key":"29_CR8","doi-asserted-by":"publisher","first-page":"1376","DOI":"10.1038\/srep01376","volume":"3","author":"YA De Montjoye","year":"2013","unstructured":"De Montjoye, Y.A., Hidalgo, C.A., Verleysen, M., Blondel, V.D.: Unique in the crowd: the privacy bounds of human mobility. Sci. Rep. 3, 1376 (2013)","journal-title":"Sci. Rep."},{"key":"29_CR9","unstructured":"YourDictionary: Definition of \u201cintrusive\u201d (2015). https:\/\/www.yourdictionary.com\/intrusive"},{"key":"29_CR10","unstructured":"YourDictionary: Definition of \u201cuseful\u201d (2015). https:\/\/www.yourdictionary.com\/useful"},{"key":"29_CR11","unstructured":"Dou, E., Eklund, P.W., Gretzel, U.: Location privacy acceptance: attitudes to transport-based location-aware mobile applications on university campus (2016)"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Egelman, S., Wagner, D.: I\u2019ve got 99 problems, but vibration ain\u2019t one: a survey of smartphone users\u2019 concerns. In: Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 33\u201344. ACM (2012)","DOI":"10.1145\/2381934.2381943"},{"key":"29_CR13","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-94-007-5170-5_1","volume-title":"European Data Protection: Coming of Age","author":"RL Finn","year":"2013","unstructured":"Finn, R.L., Wright, D., Friedewald, M.: Seven types of privacy. In: Gutwirth, S., Leenes, R., de Hert, P., Poullet, Y. (eds.) European Data Protection: Coming of Age, pp. 3\u201332. Springer, Dordrecht (2013). https:\/\/doi.org\/10.1007\/978-94-007-5170-5_1"},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Fitzpatrick, C., Birnholtz, J., Brubaker, J.R.: Social and personal disclosure in a location-based real time dating app. In: 2015 48th Hawaii International Conference on System Sciences, pp. 1983\u20131992. IEEE (2015). http:\/\/ieeexplore.ieee.org\/document\/7070049\/","DOI":"10.1109\/HICSS.2015.237"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"Gardner, Z., Leibovici, D., Basiri, A., Foody, G.: Trading-off location accuracy and service quality: privacy concerns and user profiles. In: 2017 International Conference on Localization and GNSS (ICL-GNSS), pp. 1\u20135. IEEE (2017)","DOI":"10.1109\/ICL-GNSS.2017.8376244"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Garon, M., Boulet, P.O., Doironz, J.P., Beaulieu, L., Lalonde, J.F.: Real-time high resolution 3d data on the HoloLens. In: 2016 IEEE International Symposium on Mixed and Augmented Reality (ISMAR-Adjunct), pp. 189\u2013191. IEEE (2016)","DOI":"10.1109\/ISMAR-Adjunct.2016.0073"},{"key":"29_CR17","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/j.jnca.2013.04.006","volume":"39","author":"D Gavalas","year":"2014","unstructured":"Gavalas, D., Konstantopoulos, C., Mastakas, K., Pantziou, G.: Mobile recommender systems in tourism. J. Netw. Comput. Appl. 39, 319\u2013333 (2014)","journal-title":"J. Netw. Comput. Appl."},{"key":"29_CR18","unstructured":"Hito, G.: Overlaying virtual scale models on real environments without the use of peripherals (2018)"},{"key":"29_CR19","doi-asserted-by":"crossref","unstructured":"Hossain, A., Quattrone, A., Tanin, E., Kulik, L.: On the effectiveness of removing location information from trajectory data for preserving location privacy. In: Proceedings of the 9th ACM SIGSPATIAL International Workshop on Computational Transportation Science, pp. 49\u201354. ACM (2016)","DOI":"10.1145\/3003965.3003966"},{"issue":"1","key":"29_CR20","doi-asserted-by":"publisher","first-page":"195","DOI":"10.5194\/isprs-archives-XLII-1-195-2018","volume":"42","author":"P H\u00fcbner","year":"2018","unstructured":"H\u00fcbner, P., Weinmann, M., Wursthorn, S.: Marker-based localization of the Microsoft HoloLens in building models. Int. Arch. Photogram. Remote Sens. Spat. Inf. Sci. 42(1), 195\u2013202 (2018)","journal-title":"Int. Arch. Photogram. Remote Sens. Spat. Inf. Sci."},{"key":"29_CR21","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/j.jbusres.2018.06.018","volume":"91","author":"PE Ketelaar","year":"2018","unstructured":"Ketelaar, P.E., et al.: \u201cOpening\u201d location-based mobile ads: how openness and location congruency of location-based ads weaken negative effects of intrusiveness on brand choice. J. Bus. Res. 91, 277\u2013285 (2018)","journal-title":"J. Bus. Res."},{"issue":"6","key":"29_CR22","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/s00779-008-0212-5","volume":"13","author":"J Krumm","year":"2009","unstructured":"Krumm, J.: A survey of computational location privacy. Pers. Ubiquit. Comput. 13(6), 391\u2013399 (2009)","journal-title":"Pers. Ubiquit. Comput."},{"issue":"1","key":"29_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.dss.2012.02.002","volume":"54","author":"K Li","year":"2012","unstructured":"Li, K., Du, T.C.: Building a targeted mobile advertising system for location-based services. Decis. Support Syst. 54(1), 1\u20138 (2012)","journal-title":"Decis. Support Syst."},{"issue":"3","key":"29_CR24","doi-asserted-by":"publisher","first-page":"720","DOI":"10.1109\/TNET.2012.2208983","volume":"21","author":"CY Ma","year":"2013","unstructured":"Ma, C.Y., Yau, D.K., Yip, N.K., Rao, N.S.: Privacy vulnerability of published anonymous mobility traces. IEEE\/ACM Trans. Netw. (TON) 21(3), 720\u2013733 (2013)","journal-title":"IEEE\/ACM Trans. Netw. (TON)"},{"key":"29_CR25","first-page":"9","volume":"198","author":"P Meng","year":"2014","unstructured":"Meng, P., Fehre, K., Rappelsberger, A., Adlassnig, K.P.: Framework for near-field-communication-based geo-localization and personalization for android-based smartphones - application in hospital environments. eHealth 198, 9\u201316 (2014)","journal-title":"eHealth"},{"key":"29_CR26","doi-asserted-by":"crossref","unstructured":"Meyerowitz, J., Roy Choudhury, R.: Hiding stars with fireworks: location privacy through camouflage. In: Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, pp. 345\u2013356. ACM (2009)","DOI":"10.1145\/1614320.1614358"},{"key":"29_CR27","unstructured":"Nister, D., Naroditsky, O., Bergen, J.: Visual odometry. In: Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, CVPR 2004, vol. 1, pp. 652\u2013659. IEEE (2004). http:\/\/ieeexplore.ieee.org\/document\/1315094\/"},{"issue":"3","key":"29_CR28","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1017\/S026357470900575X","volume":"28","author":"I Parra","year":"2010","unstructured":"Parra, I., Sotelo, M.A., Llorca, D.F., Oca\u00f1a, M.: Robust visual odometry for vehicle localization in urban environments. Robotica 28(3), 441\u2013452 (2010)","journal-title":"Robotica"},{"issue":"1","key":"29_CR29","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/JSYST.2014.2354235","volume":"11","author":"T Peng","year":"2014","unstructured":"Peng, T., Liu, Q., Wang, G.: Enhanced location privacy preserving scheme in location-based services. IEEE Syst. J. 11(1), 219\u2013230 (2014)","journal-title":"IEEE Syst. J."},{"key":"29_CR30","unstructured":"Qu, X.: Landmark based localization: detection and update of landmarks with uncertainty analysis, p. 191, October 2016"},{"key":"29_CR31","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1016\/j.chb.2017.07.030","volume":"76","author":"PA Rauschnabel","year":"2017","unstructured":"Rauschnabel, P.A., Rossmann, A., tom Dieck, M.C.: An adoption framework for mobile augmented reality games: the case of Pok\u00e9mon Go. Comput. Hum. Behav. 76, 276\u2013286 (2017)","journal-title":"Comput. Hum. Behav."},{"key":"29_CR32","doi-asserted-by":"crossref","unstructured":"Reuben, J., Martucci, L.A., Fischer-H\u00fcbner, S., Packer, H.S., Hedbom, H., Moreau, L.: Privacy impact assessment template for provenance. In: 2016 11th International Conference on Availability, Reliability and Security (ARES), pp. 653\u2013660, August 2016","DOI":"10.1109\/ARES.2016.95"},{"key":"29_CR33","volume-title":"Localization Using Visual Odometry and a Single Downward-Pointing Camera","author":"AJ Swank","year":"2012","unstructured":"Swank, A.J.: Localization Using Visual Odometry and a Single Downward-Pointing Camera. NASA Glenn Research Center, Cleveland (2012)"},{"issue":"2","key":"29_CR34","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1177\/0263775815608851","volume":"34","author":"L Taylor","year":"2016","unstructured":"Taylor, L.: No place to hide? The ethics and analytics of tracking mobility using mobile phone data. Env. Plan. D Soc. Space 34(2), 319\u2013336 (2016)","journal-title":"Env. Plan. D Soc. Space"},{"issue":"3","key":"29_CR35","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/j.giq.2016.06.004","volume":"33","author":"L Van Zoonen","year":"2016","unstructured":"Van Zoonen, L.: Privacy concerns in smart cities. Gov. Inf. Q. 33(3), 472\u2013480 (2016)","journal-title":"Gov. Inf. Q."},{"key":"29_CR36","doi-asserted-by":"crossref","unstructured":"Xue, M., Liu, Y., Ross, K.W., Qian, H.: I know where you are: thwarting privacy protection in location-based social discovery services. In: 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 179\u2013184. IEEE (2015)","DOI":"10.1109\/INFCOMW.2015.7179381"},{"issue":"5","key":"29_CR37","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1109\/THMS.2014.2368092","volume":"45","author":"B Zhou","year":"2014","unstructured":"Zhou, B., Li, Q., Mao, Q., Tu, W., Zhang, X.: Activity sequence-based indoor pedestrian localization using smartphones. IEEE Trans. Hum. Mach. Syst. 45(5), 562\u2013574 (2014)","journal-title":"IEEE Trans. Hum. Mach. Syst."}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management. Data for Better Living: AI and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-42504-3_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,10]],"date-time":"2024-03-10T01:24:46Z","timestamp":1710033886000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-42504-3_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030425036","9783030425043"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-42504-3_29","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"6 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Privacy and Identity","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Summer School on Privacy and Identity Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Windisch","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Switzerland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"privacy-identity2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ifip-summerschool.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"71% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}