{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T04:07:24Z","timestamp":1749701244488,"version":"3.41.0"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319472881"},{"type":"electronic","value":"9783319472898"}],"license":[{"start":{"date-parts":[[2016,10,13]],"date-time":"2016-10-13T00:00:00Z","timestamp":1476316800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-47289-8_18","type":"book-chapter","created":{"date-parts":[[2016,10,12]],"date-time":"2016-10-12T09:35:00Z","timestamp":1476264900000},"page":"357-373","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Ephemerality Is the New Black: A Novel Perspective on Location Data Management and Location Privacy in LBS"],"prefix":"10.1007","author":[{"given":"Mehrnaz","family":"Ataei","sequence":"first","affiliation":[]},{"given":"Christian","family":"Kray","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,13]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Abbas, R., Michael, K. and Michael, M.G., 2015. Using a Social-Ethical Framework to Evaluate Location-Based Services in an Internet of Things World. International Review of Information Ethics, 22(12).","DOI":"10.29173\/irie127"},{"key":"18_CR2","unstructured":"Balogun, A.M. and Zhu, S.Y., 2013. Privacy Impacts of Data Encryption on the Efficiency of Digital Forensics Technology. arXiv preprint arXiv:1312.3183."},{"key":"18_CR3","unstructured":"Barkuus, L. & Dey, A., 2003. Location-Based Services for Mobile Telephony: a Study of Users\u2019 Privacy Concerns. In Proceedings of the International Conference on Human-Computer Interaction (INTERACT). pp. 1\u20135."},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Beresford & Stajano, F., 2003. Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1), pp. 46\u201355. Available at: http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=1186725.","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Cavoukian, A., 2010. Privac y by Design. Identity in the Information Society, 3(2), pp. 1\u201312.","DOI":"10.1007\/s12394-010-0062-y"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Chow, C.-Y. & Mokbel, M.F., 2009. Privacy in location-based services: a system architecture perspective. Sigspatial Special, (2), pp. 23\u201327. Available at: http:\/\/dl.acm.org\/citation.cfm?id=1567258.","DOI":"10.1145\/1567253.1567258"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Clarke, R., 1988. Information technology and dataveillance. Communications of the ACM, 31 (5), 498\u2013512.","DOI":"10.1145\/42411.42413"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Clarke, R. and Wigan, M., 2011. You are where you\u2019ve been: the privacy implications of location and tracking technologies. Journal of Location Based Services, 5(3\u20134), pp. 138\u2013155.","DOI":"10.1080\/17489725.2011.637969"},{"key":"18_CR9","unstructured":"Duckham, M. and Kulik, L., 2006. Location privacy and location-aware computing. Dynamic & mobile GIS: investigating change in space and time, 3, pp. 35\u201351."},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Fodor, M. & Brem, A., 2015. Do privacy concerns matter for Millennials? Results from an empirical analysis of Location-Based Services adoption in Germany. Computers in Human Behavior, 53, pp. 344\u2013353. Available at: http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0747563215300066.","DOI":"10.1016\/j.chb.2015.06.048"},{"key":"18_CR11","unstructured":"Foursquare. 2016. foursquare. [ONLINE] Available at: https:\/\/foursquare.com. [Accessed 15 June 2016]."},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Hightower, J., Brumitt, B. & Borriello, G., 2002. The location stack: A layered model for location in ubiquitous computing. Proceedings\u20144th IEEE Workshop on Mobile Computing Systems and Applications, WMCSA 2002, pp. 22\u201328.","DOI":"10.1109\/MCSA.2002.1017482"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Hoh, B. et al., 2006. Enhancing security and privacy in traffic-monitoring systems. IEEE Pervasive Computing, 5(4), pp. 38\u201346.","DOI":"10.1109\/MPRV.2006.69"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Junglas, I. & Watson, R., 2008. Location-based Services., 51(3), pp. 65\u201370. Available at: http:\/\/pewinternet.org\/Reports\/2013\/Location.aspx.","DOI":"10.1145\/1325555.1325568"},{"key":"18_CR16","unstructured":"Kessler, G.C., 2016. An Overview of Cryptography (Updated Version, 3 March 2016)."},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Kido, H., Yanagisawa, Y. & Satoh, T., 2005. An anonymous communication technique using dummies for location-based services. Proceedings\u2014International Conference on Pervasive Services, ICPS \u201905, 2005, pp. 88\u201397.","DOI":"10.1109\/ICDE.2005.269"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Krumm, J., 2007. Inference Attacks on Location Tracks. Pervasive Computing, 10(Pervasive), pp. 127\u2013143. Available at: http:\/\/www.springerlink.com\/index\/TG64551RW2716103.pdf\\nhttp:\/\/research.microsoft.com\/en-us\/um\/people\/jckrumm\/publications2007\/inferenceattackrefined02distribute.pdf.","DOI":"10.1007\/978-3-540-72037-9_8"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Krumm, J., 2009. A survey of computational location privacy. Personal and Ubiquitous Computing, 13(6), pp. 391\u2013399.","DOI":"10.1007\/s00779-008-0212-5"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Lee, D.L., Zhu, M. & Hu, H., 2005. When Location-Based Services Meet Databases. Mobile Information Systems, 1(2), pp. 81\u201390. Available at: http:\/\/iospress.metapress.com\/index\/d3fy03rg5vvvbc29.pdf\\nhttp:\/\/www.hindawi.com\/journals\/misy\/2005\/941816\/abs\/.","DOI":"10.1155\/2005\/941816"},{"key":"18_CR20","unstructured":"Malaka, R. & Zipf, A., 2000. Deep Map: Challenging IT research in the framework of a tourist information system. ENTER 2000: 7th. International Congress on Tourism and Communications Technologies in Tourism, Barcelona, Spain, 26\u201328 April 2000, pp. 1\u201311. Available at: http:\/\/195.130.87.21:8080\/dspace\/handle\/123456789\/581."},{"key":"18_CR21","unstructured":"Mokbel, M.F., Ghanem, T.M. & Aref, W.G., 2003. Spatio-Temporal Access Methods. IEEE Data Engineering Bulletin, 26(2), pp. 40\u201349. Available at: http:\/\/dl.acm.org\/citation.cfm?id=1458187."},{"key":"18_CR22","unstructured":"Mokbel, M.F., Chow, C.-Y. & Aref, W., 2006. The new Casper: query processing for location services without compromising privacy. Vldb\u201906, (1), pp. 763\u2013774. Available at: http:\/\/dl.acm.org\/citation.cfm?id=1164193."},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"O\u2019Hara, K., 2008. Understanding geocaching practices and motivations. Proceedings of the SIGCHI Conference on Human \u2026, p. 1177. Available at: http:\/\/portal.acm.org\/citation.cfm?doid=1357054.1357239\\nhttp:\/\/dl.acm.org\/citation.cfm?id=1357239.","DOI":"10.1145\/1357054.1357239"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Patterson, D.J. et al., 2003. Inferring High-Level Behavior from Low-Level Sensors. UbiComp 2003 Ubiquitous Computing, 2864, pp. 73\u201389. Available at: http:\/\/www.springerlink.com\/index\/k3x004g773qj80kg.pdf.","DOI":"10.1007\/978-3-540-39653-6_6"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Ran, L., Helal, S. & Moore, S., 2004. Drishti: An integrated indoor\/outdoor blind navigation system and service. Proceedings - Second IEEE Annual Conference on Pervasive Computing and Communications, PerCom, pp. 23\u201330.","DOI":"10.1109\/PERCOM.2004.1276842"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"Sathe, S. et al., 2014. Enabling Location-Based Services 2.0: Challenges and Opportunities. Mobile Data Management (MDM), 2014 IEEE 15th International Conference on IS\u2013SN -, 1, pp. 317\u2013320.","DOI":"10.1109\/MDM.2014.45"},{"key":"18_CR27","unstructured":"Schiller, J. & Voisard, A., 2004. Location-based Services, Morgan Kaufmann."},{"key":"18_CR39","doi-asserted-by":"crossref","unstructured":"Spiekermann, S. 2004.\u00a0General Aspects of Location-Based Services. In:\u00a0Schiller, J. & Voisard, A., 2004.\u00a0Location-based Services. Morgan Kaufmann, pp.15\u201333","DOI":"10.1016\/B978-155860929-7\/50002-9"},{"key":"18_CR28","unstructured":"Steiniger, S., Neun, M., Edwardes, A. and Lenz, B., 2008. Foundations of LBS. CartouCHe-Cartography for Swiss Higher Education. Obtido em, 20, p. 2010."},{"key":"18_CR38","unstructured":"Strassman, M. and Collier, C. 2004.\u00a0Case Study: Development of the Find Friend. In:\u00a0Schiller, J. & Voisard, A., 2004.\u00a0Location-based Services. Morgan Kaufmann, pp.34\u201348."},{"key":"18_CR30","doi-asserted-by":"crossref","unstructured":"Stroeken, K., Verdoolaege, A.,\u00a0Versichele, M., Backere,\u00a0F.D., Devos, D., Verstichel, S. and Weghe, N.V.D. 2015. Zone-it before IT zones you: A location-based digital notice board to build community while preserving privacy.\u00a0Journal of Location Based Services,\u00a09(1), pp. 16\u201332.","DOI":"10.1080\/17489725.2015.1027750"},{"key":"18_CR29","doi-asserted-by":"crossref","unstructured":"Sweeney, L., 2002. k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY. International Journal on Uncertainty, 10(5), pp. 557\u2013570.","DOI":"10.1142\/S0218488502001648"},{"key":"18_CR31","doi-asserted-by":"crossref","unstructured":"Toch, E. et al., 2010. Empirical models of privacy in location sharing. Proceedings of the 12th ACM international conference on Ubiquitous computing\u2014Ubicomp \u201910, (April 2016), p. 129. Available at: http:\/\/portal.acm.org\/citation.cfm?doid=1864349.1864364.","DOI":"10.1145\/1864349.1864364"},{"key":"18_CR32","unstructured":"Uber. 2016. https:\/\/www.uber.com. [ONLINE] Available at: https:\/\/uber.com. [Accessed 15 June 2016]."},{"key":"18_CR33","unstructured":"Waldo, J. et al. (2008), Engaging Privacy and Information Technology in a Digital Age. National Academies Press."},{"key":"18_CR34","doi-asserted-by":"crossref","unstructured":"Warren, Samuel D., and Louis D. Brandeis. \u201cThe right to privacy.\u201d Harvard law review (1890): 193\u2013220.","DOI":"10.2307\/1321160"},{"key":"18_CR35","doi-asserted-by":"crossref","unstructured":"Westin, A.F., 1968. Privacy and Freedom. American Sociological Review, 33(1), p. 173.","DOI":"10.2307\/2092293"},{"key":"18_CR36","doi-asserted-by":"crossref","unstructured":"Xu, H. & Gupta, S., 2009. The effects of privacy concerns and personal innovativeness on potential and experienced customers\u2019 adoption of location-based services. Electronic Markets, 19(2\u20133), pp. 137\u2013149.","DOI":"10.1007\/s12525-009-0012-4"},{"key":"18_CR37","doi-asserted-by":"crossref","unstructured":"Zhou, T., 2011. The impact of privacy concern on user adoption of location\u2010based services. Industrial Management & Data Systems, 111(2), pp. 212\u2013226.","DOI":"10.1108\/02635571111115146"}],"container-title":["Lecture Notes in Geoinformation and Cartography","Progress in Location-Based Services 2016"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47289-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T07:27:47Z","timestamp":1749626867000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-47289-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,13]]},"ISBN":["9783319472881","9783319472898"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47289-8_18","relation":{},"ISSN":["1863-2246","1863-2351"],"issn-type":[{"type":"print","value":"1863-2246"},{"type":"electronic","value":"1863-2351"}],"subject":[],"published":{"date-parts":[[2016,10,13]]},"assertion":[{"value":"13 October 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}