{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T19:55:46Z","timestamp":1725998146093},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319981604"},{"type":"electronic","value":"9783319981611"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98161-1_1","type":"book-chapter","created":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T15:59:02Z","timestamp":1540569542000},"page":"1-9","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Introduction to Mobility Data Privacy"],"prefix":"10.1007","author":[{"given":"Aris","family":"Gkoulalas-Divanis","sequence":"first","affiliation":[]},{"given":"Claudio","family":"Bettini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,27]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"G. Acs and C. Castelluccia. A case study: Privacy preserving release of spatio-temporal density in Paris. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD \u201914, pages 1679\u20131688. ACM, 2014.","DOI":"10.1145\/2623330.2623361"},{"issue":"4","key":"1_CR2","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MPRV.2011.44","volume":"10","author":"R A Becker","year":"2011","unstructured":"R. A. Becker, R. Caceres, K. Hanson, J. M. Loh, S. Urbanek, A. Varshavsky, and C. Volinsky. A tale of one city: Using cellular network data for urban planning. IEEE Pervasive Computing, 10(4):18\u201326, 2011.","journal-title":"IEEE Pervasive Computing"},{"issue":"4","key":"1_CR3","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MIC.2008.90","volume":"12","author":"A T Campbell","year":"2008","unstructured":"A. T. Campbell, S. B. Eisenman, N. D. Lane, E. Miluzzo, R. A. Peterson, H. Lu, X. Zheng, M. Musolesi, K. Fodor, and G. S. Ahn. The rise of people-centric sensing. IEEE Internet Computing, 12(4):12\u201321, 2008.","journal-title":"IEEE Internet Computing"},{"key":"1_CR4","doi-asserted-by":"publisher","first-page":"8956","DOI":"10.1109\/ACCESS.2017.2695525","volume":"5","author":"L Chen","year":"2017","unstructured":"L. Chen, S. Thombre, K. J\u00e4rvinen, E. S. Lohan, A. Al\u00d6\u00e9n-Savikko, H. Lepp\u00e4koski, M. Z. H. Bhuiyan, S. Bu-Pasha, G. N. Ferrara, S. Honkala, J. Lindqvist, L. Ruotsalainen, P. Korpisaari, and H. Kuusniemi. Robustness, security and privacy in location-based services for future IoT: A survey. IEEE Access, 5:8956\u20138977, 2017.","journal-title":"IEEE Access"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Y.-A. de Montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel. Unique in the crowd: The privacy bounds of human mobility. Nature Scientific Reports, 3, 2013.","DOI":"10.1038\/srep01376"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"M. Douriez, H. Doraiswamy, J. Freire, and C. T. Silva. Anonymizing nyc taxi data: Does it matter? In 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA), pages 140\u2013148, 2016.","DOI":"10.1109\/DSAA.2016.21"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"C. Dwork. Differential privacy. In Proceedings of the 33rd International Conference on Automata, Languages and Programming - Volume Part II, ICALP\u201906, pages 1\u201312. Springer-Verlag, 2006.","DOI":"10.1007\/11787006_1"},{"key":"1_CR8","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In S. Halevi and T. Rabin, editors, Theory of Cryptography, pages 265\u2013284. Springer Berlin Heidelberg, 2006."},{"key":"1_CR9","unstructured":"S. Ejsing-Duun. Location-based games: From screen to street. PhD thesis, Department of Communication and Psychology, Aalborg, University in Copenhagen, 2011."},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"M. Gerlach and F. Guttler. Privacy in vanets using changing pseudonyms - ideal and real. In 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring, pages 2521\u20132525, 2007.","DOI":"10.1109\/VETECS.2007.519"},{"issue":"1","key":"1_CR11","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/1412734.1412739","volume":"10","author":"A Gkoulalas-Divanis","year":"2008","unstructured":"A. Gkoulalas-Divanis and V. S. Verykios. A privacy-aware trajectory tracking query engine. SIGKDD Explor. Newsl., 10(1):40\u201349, 2008.","journal-title":"SIGKDD Explor. Newsl."},{"issue":"6","key":"1_CR12","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1109\/MCOM.2008.4539481","volume":"46","author":"H Hartenstein","year":"2008","unstructured":"H. Hartenstein and L. P. Laberteaux. A tutorial survey on vehicular ad hoc networks. IEEE Communications Magazine, 46(6):164\u2013171, 2008.","journal-title":"IEEE Communications Magazine"},{"issue":"3","key":"1_CR13","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.1109\/COMST.2014.2371813","volume":"17","author":"X Hu","year":"2015","unstructured":"X. Hu, T. H. S. Chu, V. C. M. Leung, E. C. H. Ngai, P. Kruchten, and H. C. B. Chan. A survey on mobile social networks: Applications, platforms, system architectures, and future research directions. IEEE Communications Surveys Tutorials, 17(3):1557\u20131581, 2015.","journal-title":"IEEE Communications Surveys Tutorials"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"L. Kazemi and C. Shahabi. Geocrowd: Enabling query answering with spatial crowdsourcing. In Proceedings of the 20th International Conference on Advances in Geographic Information Systems, SIGSPATIAL \u201912, pages 189\u2013198. ACM, 2012.","DOI":"10.1145\/2424321.2424346"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"F. Mahmud and H. Aris. State of mobile crowdsourcing applications: A review. In 2015 4th International Conference on Software Engineering and Computer Systems (ICSECS), pages 27\u201332, 2015.","DOI":"10.1109\/ICSECS.2015.7333118"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"N. Pelekis, A. Gkoulalas-Divanis, M. Vodas, D. Kopanaki, and Y. Theodoridis. Privacy-aware querying over sensitive trajectory data. In Proceedings of the 20th ACM International Conference on Information and Knowledge Management, CIKM \u201911, pages 895\u2013904. ACM, 2011.","DOI":"10.1145\/2063576.2063706"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"N. Pelekis, A. Gkoulalas-Divanis, M. Vodas, A. Plemenos, D. Kopanaki, and Y. Theodoridis. Private-HERMES: A benchmark framework for privacy-preserving mobility data querying and mining methods. In Proceedings of the 15th International Conference on Extending Database Technology, EDBT \u201912, pages 598\u2013601. ACM, 2012.","DOI":"10.1145\/2247596.2247675"},{"issue":"1","key":"1_CR18","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MPRV.2015.5","volume":"14","author":"F Schaub","year":"2015","unstructured":"F. Schaub, B. K\u00f6nings, and M. Weber. Context-adaptive privacy: Leveraging context awareness to support privacy decision making. IEEE Pervasive Computing, 14(1):34\u201343, 2015.","journal-title":"IEEE Pervasive Computing"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"B. Schilit, N. Adams, and R. Want. Context-aware computing applications. In 1994 First Workshop on Mobile Computing Systems and Applications, pages 85\u201390, 1994.","DOI":"10.1109\/WMCSA.1994.16"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"V. Sivaraman, J. Carrapetta, K. Hu, and B. G. Luxan. Hazewatch: A participatory sensor system for monitoring air pollution in sydney. In 38th Annual IEEE Conference on Local Computer Networks - Workshops, pages 56\u201364, 2013.","DOI":"10.1109\/LCNW.2013.6758498"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"C. E. Walters, M. M. Mesl\u00e9, and I. M. Hall. Modelling the global spread of diseases: A review of current practice and capability. Epidemics, 2018 (in press). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1755436517301135?via%3Dihub .","DOI":"10.1016\/j.epidem.2018.05.007"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"T. D. Wemegah and S. Zhu. Big data challenges in transportation: A case study of traffic volume count from massive radio frequency identification (RFID) data. In 2017 IEEE International Conference on the Frontiers and Advances in Data Science (FADS), pages 58\u201363, 2017.","DOI":"10.1109\/FADS.2017.8253194"},{"issue":"6104","key":"1_CR23","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1126\/science.1223467","volume":"338","author":"A Wesolowski","year":"2012","unstructured":"A. Wesolowski, N. Eagle, A. J. Tatem, D. L. Smith, A. M. Noor, R. W. Snow, and C. O. Buckee. Quantifying the impact of human mobility on malaria. Science (New York, N.Y.), 338(6104):267\u201370, 2012.","journal-title":"Science (New York, N.Y.)"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"H. Wu, S. Xiang, W. S. Ng, W. Wu, and M. Xue. HipStream: A privacy-preserving system for managing mobility data streams. In 2014 IEEE 15th International Conference on Mobile Data Management, volume 1, pages 360\u2013363, 2014.","DOI":"10.1109\/MDM.2014.54"},{"issue":"6","key":"1_CR25","doi-asserted-by":"publisher","first-page":"e0129257","DOI":"10.1371\/journal.pone.0129257","volume":"10","author":"Jizhe Xia","year":"2015","unstructured":"J. Xia, K. M. Curtin, W. Li, and Y. Zhao. A new model for a carpool matching service. PLoS One, 10(6), 2015.","journal-title":"PLOS ONE"},{"issue":"5\/6","key":"1_CR26","doi-asserted-by":"publisher","first-page":"3:1-3:12","DOI":"10.1147\/JRD.2014.2337552","volume":"58","author":"A. Yaeli","year":"2014","unstructured":"A. Yaeli, P. Bak, G. Feigenblat, S. Nadler, H. Roitman, G. Saadoun, H. J. Ship, D. Cohen, O. Fuchs, S. Ofek-Koifman, and T. Sandbank. Understanding customer behavior using indoor location analysis and visualization. IBM Journal of Research and Development, 58(5\/6):3: 1\u20133:12, 2014.","journal-title":"IBM Journal of Research and Development"},{"issue":"2","key":"1_CR27","doi-asserted-by":"publisher","first-page":"1327","DOI":"10.1109\/COMST.2016.2632427","volume":"19","author":"A Yassin","year":"2017","unstructured":"A. Yassin, Y. Nasser, M. Awad, A. Al-Dubai, R. Liu, C. Yuen, R. Raulefs, and E. Aboutanios. Recent advances in indoor localization: A survey on theoretical approaches and applications. IEEE Communications Surveys Tutorials, 19(2):1327\u20131346, 2017.","journal-title":"IEEE Communications Surveys Tutorials"}],"container-title":["Handbook of Mobile Data Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98161-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,28]],"date-time":"2019-10-28T17:10:29Z","timestamp":1572282629000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-98161-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319981604","9783319981611"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98161-1_1","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}