{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T19:55:49Z","timestamp":1725998149414},"publisher-location":"Cham","reference-count":91,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319981604"},{"type":"electronic","value":"9783319981611"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98161-1_3","type":"book-chapter","created":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T19:59:02Z","timestamp":1540583942000},"page":"35-69","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy in Location-Sensing Technologies"],"prefix":"10.1007","author":[{"given":"Andreas","family":"Solti","sequence":"first","affiliation":[]},{"given":"Sushant","family":"Agarwal","sequence":"additional","affiliation":[]},{"given":"Sarah","family":"Spiekermann-Hoff","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,27]]},"reference":[{"key":"3_CR1","unstructured":"ISO\/IEC 29100:2011 - Information technology \u2013 Security techniques \u2013 Privacy framework. 2011."},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"G. D. Abowd, A. K. Dey, P. J. Brown, N. Davies, M. Smith, and P. Steggles. Towards a better understanding of context and context-awareness. In International Symposium on Handheld and Ubiquitous Computing, pages 304\u2013307. Springer, 1999.","DOI":"10.1007\/3-540-48157-5_29"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"S. Adler, S. Schmitt, K. Wolter, and M. Kyas. A survey of experimental evaluation in indoor localization research. In Indoor Positioning and Indoor Navigation (IPIN), 2015 International Conference on, pages 1\u201310. IEEE, 2015.","DOI":"10.1109\/IPIN.2015.7346749"},{"issue":"6","key":"3_CR4","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1109\/TKDE.2005.99","volume":"17","author":"G Adomavicius","year":"2005","unstructured":"G. Adomavicius and A. Tuzhilin. Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE transactions on knowledge and data engineering, 17(6):734\u2013749, 2005.","journal-title":"IEEE transactions on knowledge and data engineering"},{"issue":"5","key":"3_CR5","doi-asserted-by":"publisher","first-page":"1359","DOI":"10.1109\/TNET.2010.2040087","volume":"18","author":"M Afanasyev","year":"2010","unstructured":"M. Afanasyev, T. Chen, G. M. Voelker, and A. C. Snoeren. Usage patterns in an urban WiFi network. IEEE\/ACM Trans. Netw., 18(5):1359\u20131372, 2010.","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"3_CR6","unstructured":"K. Albrecht and L. C. McIntyre. Scandal: Wal-mart, p &g involved in secret RFID testing, consumers against supermarket privacy invasion and numbering (caspian). Retreived on 10-01-2017 from http:\/\/www.spychips.com\/press-releases\/broken-arrow.html ."},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Y. Andreu-Cabedo, P. Castellano, S. Colantonio, G. Coppini, R. Favilla, D. Germanese, G. Giannakakis, D. Giorgi, M. Larsson, P. Marraccini, et al. Mirror mirror on the wall an intelligent multisensory mirror for well-being self-assessment. In 2015 IEEE International Conference on Multimedia and Expo (ICME), pages 1\u20136. IEEE, 2015.","DOI":"10.1109\/ICME.2015.7177468"},{"key":"3_CR8","unstructured":"Anonymous. Silverpush launches cross-device ad targeting with unique audio beacon technology. Retrieved on 14-01-2017 from http:\/\/www.steamfeed.com\/silverpush-launches-cross-device-ad-targeting-with-unique-audio-beacon-technology\/ ."},{"key":"3_CR9","unstructured":"Article 29 Data Protection Working Party. Opinion 05\/2014 on Anonymisation Techniques, 2014."},{"key":"3_CR10","unstructured":"Article 29 Data Protection Working Party. Opinion 06\/2014 on Notion of legitimate interests of the data controller under Article 7 of Directive 95\/46\/EC, 2014."},{"issue":"6","key":"3_CR11","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1016\/j.clsr.2007.09.005","volume":"23","author":"J Ayoade","year":"2007","unstructured":"J. Ayoade. Roadmap to solving security and privacy concerns in rfid systems. Computer Law & Security Review, 23(6):555\u2013561, 2007.","journal-title":"Computer Law & Security Review"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"M. Azizyan, I. Constandache, and R. Roy Choudhury. Surroundsense: mobile phone localization via ambience fingerprinting. In Proceedings of the 15th annual international conference on Mobile computing and networking, pages 261\u2013272. ACM, 2009.","DOI":"10.1145\/1614320.1614350"},{"issue":"4","key":"3_CR13","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/MC.2002.993780","volume":"35","author":"R Bajaj","year":"2002","unstructured":"R. Bajaj, S. L. Ranaweera, and D. P. Agrawal. GPS: location-tracking technology. Computer, 35(4):92\u201394, 2002.","journal-title":"Computer"},{"issue":"4","key":"3_CR14","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1504\/IJAHUC.2007.014070","volume":"2","author":"M Baldauf","year":"2007","unstructured":"M. Baldauf, S. Dustdar, and F. Rosenberg. A survey on context-aware systems. International Journal of Ad Hoc and Ubiquitous Computing, 2(4):263\u2013277, 2007.","journal-title":"International Journal of Ad Hoc and Ubiquitous Computing"},{"issue":"1","key":"3_CR15","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"A R Beresford","year":"2003","unstructured":"A. R. Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive computing, 2(1):46\u201355, 2003.","journal-title":"IEEE Pervasive computing"},{"key":"3_CR16","unstructured":"A. Bibby. Invasion of the privacy snatchers. Financial Times, January, 9, 2006."},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"R. R. Burke. The third wave of marketing intelligence. In Retailing in the 21st Century, pages 113\u2013125. Springer, 2006.","DOI":"10.1007\/3-540-28433-8_8"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"J. D. Cai. Business intelligence by connecting real-time indoor location to sales records. In International Conference on Web-Age Information Management, pages 817\u2013823. Springer, 2014.","DOI":"10.1007\/978-3-319-08010-9_87"},{"issue":"2","key":"3_CR19","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1108\/07363760510589235","volume":"22","author":"M T Capizzi","year":"2005","unstructured":"M. T. Capizzi and R. Ferguson. Loyalty trends for the twenty\u2013first century. Journal of Consumer Marketing, 22(2):72\u201380, 2005.","journal-title":"Journal of Consumer Marketing"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"G. Castelli, A. Rosi, M. Mamei, and F. Zambonelli. A simple model and infrastructure for context-aware browsing of the world. In Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom\u201907), pages 229\u2013238. IEEE, 2007.","DOI":"10.1109\/PERCOM.2007.4"},{"key":"3_CR21","unstructured":"A. Cavoukian. Privacy guidelines for RFID information systems (RFID privacy guidelines), 2006. Information and Privacy Comissioner\/Ontario, Toronto."},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"A. Chattopadhyay and A. R. Harish. Analysis of low range indoor location tracking techniques using passive UHF RFID tags. In 2008 IEEE Radio and Wireless Symposium, 2008.","DOI":"10.1109\/RWS.2008.4463501"},{"issue":"10","key":"3_CR23","doi-asserted-by":"publisher","first-page":"8611","DOI":"10.1016\/j.eswa.2012.01.192","volume":"39","author":"I Cil","year":"2012","unstructured":"I. Cil. Consumption universes based supermarket layout through association rule mining and multidimensional scaling. Expert Systems with Applications, 39(10):8611\u20138625, 2012.","journal-title":"Expert Systems with Applications"},{"key":"3_CR24","unstructured":"P. Cohan. How nordstrom uses WiFi to spy on shoppers. Retreived on 13-01-2017 from http:\/\/www.forbes.com\/sites\/petercohan\/2013\/05\/09\/how-nordstrom-and-home-depot-use-wifi-to-spy-on-shoppers\/#2421d0ec3bf9 ."},{"issue":"4","key":"3_CR25","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s11416-013-0196-1","volume":"10","author":"M Cunche","year":"2014","unstructured":"M. Cunche. I know your MAC address: Targeted tracking of individual using Wi-Fi. Journal of Computer Virology and Hacking Techniques, 10(4):219\u2013227, 2014.","journal-title":"Journal of Computer Virology and Hacking Techniques"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Y.-A. De Montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel. Unique in the crowd: The privacy bounds of human mobility. Scientific reports, 3, 2013.","DOI":"10.1038\/srep01376"},{"issue":"5","key":"3_CR27","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1111\/j.1937-5956.2007.tb00284.x","volume":"16","author":"D Delen","year":"2007","unstructured":"D. Delen, B. C. Hardgrave, and R. Sharda. Rfid for better supply-chain management through enhanced information visibility. Production and Operations Management, 16(5):613\u2013624, 2007.","journal-title":"Production and Operations Management"},{"key":"3_CR28","unstructured":"L. Demir. Wi-Fi tracking : what about privacy. Master\u2019s thesis, M2 SCCI Security, Cryptologyand Coding of Information - UFR IMAG, Sept. 2013. https:\/\/hal.inria.fr\/hal-00859013 ."},{"issue":"1","key":"3_CR29","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s007790170019","volume":"5","author":"A K Dey","year":"2001","unstructured":"A. K. Dey. Understanding and using context. Personal Ubiquitous Comput., 5(1):4\u20137, Jan. 2001.","journal-title":"Personal Ubiquitous Comput."},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"M. Duckham and L. Kulik. A formal model of obfuscation and negotiation for location privacy. In International Conference on Pervasive Computing, pages 152\u2013170. Springer, 2005.","DOI":"10.1007\/11428572_10"},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"C. Dwork. Differential privacy: A survey of results. In International Conference on Theory and Applications of Models of Computation, pages 1\u201319. Springer, 2008.","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography Conference, pages 265\u2013284. Springer, 2006.","DOI":"10.1007\/11681878_14"},{"issue":"6","key":"3_CR33","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1108\/02635570510606950","volume":"105","author":"Eileen P. Kelly","year":"2005","unstructured":"Eileen P. Kelly G. Scott Erickson. RFID tags: commercial applications v. privacy rights. Industrial Management & Data Systems, 105(6):703\u2013713, 2005.","journal-title":"Industrial Management & Data Systems"},{"key":"3_CR34","unstructured":"European Emergency Number Association. Caller location in support of emergency services. EENA Operations Document, (2), 2014."},{"key":"3_CR35","doi-asserted-by":"crossref","unstructured":"Z. Farid, R. Nordin, and M. Ismail. Recent advances in wireless indoor localization techniques and system. Journal of Computer Networks and Communications, 2013, 2013.","DOI":"10.1155\/2013\/185138"},{"key":"3_CR36","unstructured":"B. Friedman, E. Felten, and L. I. Millett. Informed consent online: A conceptual model and design principles. University of Washington Computer Science & Engineering Technical Report 00\u201312\u20132, 2000."},{"key":"3_CR37","first-page":"2005","volume":"503\u2013530","author":"B Friedman","year":"2001","unstructured":"B. Friedman, P. Lin, and J. K. Miller. Informed consent by design. Security and Usability, (2001):503\u2013530, 2005.","journal-title":"Security and Usability"},{"issue":"3","key":"3_CR38","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSP.2005.78","volume":"3","author":"S L Garfinkel","year":"2005","unstructured":"S. L. Garfinkel, A. Juels, and R. Pappu. RFID privacy: An overview of problems and proposed solutions. IEEE Security & Privacy, 3(3):34\u201343, 2005.","journal-title":"IEEE Security & Privacy"},{"issue":"6","key":"3_CR39","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1137\/09076828X","volume":"41","author":"A Ghosh","year":"2012","unstructured":"A. Ghosh, T. Roughgarden, and M. Sundararajan. Universally utility-maximizing privacy mechanisms. SIAM Journal on Computing, 41(6):1673\u20131693, 2012.","journal-title":"SIAM Journal on Computing"},{"key":"3_CR40","doi-asserted-by":"crossref","unstructured":"M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st international conference on Mobile systems, applications and services, pages 31\u201342. ACM, 2003.","DOI":"10.1145\/1066116.1189037"},{"issue":"1","key":"3_CR41","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/SURV.2009.090103","volume":"11","author":"Y Gu","year":"2009","unstructured":"Y. Gu, A. Lo, and I. Niemegeers. A survey of indoor positioning systems for wireless personal networks. IEEE Communications surveys & tutorials, 11(1):13\u201332, 2009.","journal-title":"IEEE Communications surveys & tutorials"},{"issue":"2","key":"3_CR42","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/MC.2004.1266301","volume":"37","author":"M Hazas","year":"2004","unstructured":"M. Hazas, J. Scott, and J. Krumm. Location-aware computing comes of age. IEEE Computer, 37(2):95\u201397, 2004.","journal-title":"IEEE Computer"},{"issue":"2","key":"3_CR43","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/MC.2004.1266301","volume":"37","author":"M Hazas","year":"2004","unstructured":"M. Hazas, J. Scott, and J. Krumm. Location-aware computing comes of age. Computer, 37(2):95\u201397, 2004.","journal-title":"Computer"},{"key":"3_CR44","unstructured":"Information technology \u2013 Security techniques-Information security risk management. Standard, International Organization for Standardization, Geneva, CH, 2008."},{"issue":"2","key":"3_CR45","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A Juels","year":"2006","unstructured":"A. Juels. RFID security and privacy: A research survey. IEEE journal on selected areas in communications, 24(2):381\u2013394, 2006.","journal-title":"IEEE journal on selected areas in communications"},{"key":"3_CR46","unstructured":"Kalyan S. Pasupathy, Thomas R. Hellmich. How RFID technology improves hospital care, 31-12-2015. Retreived on 14-01-2017 from https:\/\/hbr.org\/2015\/12\/how-rfid-technology-improves-hospital-care ."},{"key":"3_CR47","doi-asserted-by":"crossref","unstructured":"G. Karjoth and P. A. Moskowitz. Disabling RFID tags with visible confirmation: clipped tags are silenced. In Proceedings of the 2005 ACM workshop on Privacy in the electronic society, pages 27\u201330. ACM, 2005.","DOI":"10.1145\/1102199.1102205"},{"key":"3_CR48","unstructured":"V. Kopytoff. For retailers, tracking shoppers brings new insights. Retreived on 13-01-2017 from https:\/\/www.technologyreview.com\/s\/520811\/stores-sniff-out-smartphones-to-follow-shoppers\/ ."},{"key":"3_CR49","unstructured":"D. Kravets. Tracking school children with RFID tags? it\u2019s all about the benjamins. Retreived on 14-01-2017 from https:\/\/www.wired.com\/2012\/09\/rfid-chip-student-monitoring\/ ."},{"key":"3_CR50","unstructured":"J. Krumm, editor. Ubiquitous computing fundamentals. CRC Press, 2016."},{"issue":"4","key":"3_CR51","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1287\/mksc.16.4.295","volume":"16","author":"P Kumar","year":"1997","unstructured":"P. Kumar, M. U. Kalwani, and M. Dada. The impact of waiting time guarantees on customers\u2019 waiting experiences. Marketing science, 16(4):295\u2013314, 1997.","journal-title":"Marketing science"},{"key":"3_CR52","doi-asserted-by":"crossref","unstructured":"A. LaMarca, Y. Chawathe, S. Consolvo, J. Hightower, I. E. Smith, J. Scott, T. Sohn, J. Howard, J. Hughes, F. Potter, J. Tabert, P. Powledge, G. Borriello, and B. N. Schilit. Place lab: Device positioning using radio beacons in the wild. In Pervasive Computing, Third International Conference, PERVASIVE 2005, Munich, Germany, May 8-13, 2005, Proceedings, pages 116\u2013133, 2005.","DOI":"10.1007\/11428572_8"},{"issue":"6","key":"3_CR53","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/s00779-008-0213-4","volume":"13","author":"M Langheinrich","year":"2009","unstructured":"M. Langheinrich. A survey of RFID privacy approaches. Personal and Ubiquitous Computing, 13(6):413\u2013421, 2009.","journal-title":"Personal and Ubiquitous Computing"},{"issue":"4","key":"3_CR54","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.ijresmar.2005.09.005","volume":"22","author":"J S Larson","year":"2005","unstructured":"J. S. Larson, E. T. Bradlow, and P. S. Fader. An exploratory look at supermarket shopping paths. International Journal of research in Marketing, 22(4):395\u2013414, 2005.","journal-title":"International Journal of research in Marketing"},{"key":"3_CR55","unstructured":"M. Levy, B. A. Weitz, and D. Grewal. Retailing management. Irwin\/McGraw-Hill New York, 1998."},{"issue":"6","key":"3_CR56","doi-asserted-by":"publisher","first-page":"1067","DOI":"10.1109\/TSMCC.2007.905750","volume":"37","author":"H Liu","year":"2007","unstructured":"H. Liu, H. Darabi, P. Banerjee, and J. Liu. Survey of wireless indoor positioning techniques and systems. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 37(6):1067\u20131080, Nov 2007.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)"},{"issue":"6","key":"3_CR57","doi-asserted-by":"publisher","first-page":"1067","DOI":"10.1109\/TSMCC.2007.905750","volume":"37","author":"H Liu","year":"2007","unstructured":"H. Liu, H. Darabi, P. P. Banerjee, and J. Liu. Survey of wireless indoor positioning techniques and systems. IEEE Trans. Systems, Man, and Cybernetics, Part C, 37(6):1067\u20131080, 2007.","journal-title":"IEEE Trans. Systems, Man, and Cybernetics, Part C"},{"key":"3_CR58","doi-asserted-by":"crossref","unstructured":"H. Liu, Y. Gan, J. Yang, S. Sidhom, Y. Wang, Y. Chen, and F. Ye. Push the limit of WiFi based localization for smartphones. In The 18th Annual International Conference on Mobile Computing and Networking, Mobicom\u201912, Istanbul, Turkey, August 22\u201326, 2012, pages 305\u2013316, 2012.","DOI":"10.1145\/2348543.2348581"},{"issue":"1","key":"3_CR59","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"Ashwin Machanavajjhala","year":"2007","unstructured":"A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD), 1(1):3, 2007.","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"key":"3_CR60","unstructured":"C. Martin. How beacons are changing the shopping experience. Harvard Bus. Rev, 2014."},{"issue":"2","key":"3_CR61","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/S0022-4359(01)00042-2","volume":"77","author":"A S Mattila","year":"2001","unstructured":"A. S. Mattila and J. Wirtz. Congruency of scent and music as a driver of in-store evaluations and behavior. Journal of retailing, 77(2):273\u2013289, 2001.","journal-title":"Journal of retailing"},{"issue":"3","key":"3_CR62","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1111\/j.1467-9833.2008.00433.x","volume":"39","author":"A Moore","year":"2008","unstructured":"A. Moore. Defining privacy. Journal of Social Philosophy, 39(3):411\u2013428, 2008.","journal-title":"Journal of Social Philosophy"},{"key":"3_CR63","doi-asserted-by":"crossref","unstructured":"D. Namiot. Context-aware browsing\u2013a practical approach. In 2012 Sixth International Conference on Next Generation Mobile Applications, Services and Technologies, pages 18\u201323. IEEE, 2012.","DOI":"10.1109\/NGMAST.2012.13"},{"key":"3_CR64","doi-asserted-by":"crossref","unstructured":"A. Narayanan and V. Shmatikov. Robust de-anonymization of large sparse datasets. In 2008 IEEE Symposium on Security and Privacy (sp 2008), pages 111\u2013125. IEEE, 2008.","DOI":"10.1109\/SP.2008.33"},{"key":"3_CR65","doi-asserted-by":"crossref","unstructured":"P. V. Nikitin, K. Rao, and S. Lazar. An overview of near field UHF RFID. In IEEE international Conference on RFID, volume 167. Citeseer, 2007.","DOI":"10.1109\/RFID.2007.346165"},{"key":"3_CR66","doi-asserted-by":"crossref","unstructured":"A. Novotny and S. Spiekermann. Personal information markets and privacy: a new model to solve the controversy. 2012.","DOI":"10.2139\/ssrn.2148885"},{"key":"3_CR67","first-page":"1701","volume":"57","author":"P Ohm","year":"2010","unstructured":"P. Ohm. Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA law review, 57:1701, 2010.","journal-title":"UCLA law review"},{"key":"3_CR68","unstructured":"R. Prasad and M. Ruggieri. Applied satellite navigation-using GPS, GALILEO and augmentation systems. 2005."},{"issue":"1","key":"3_CR69","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.jretai.2008.11.003","volume":"85","author":"Nancy M. Puccinelli","year":"2009","unstructured":"N. M. Puccinelli, R. C. Goodstein, D. Grewal, R. Price, P. Raghubir, and D. Stewart. Customer experience management in retailing: Understanding the buying process. Journal of Retailing, 85(1):15\u201330, 2009. Enhancing the Retail Customer Experience.","journal-title":"Journal of Retailing"},{"key":"3_CR70","unstructured":"V. Rastogi, D. Suciu, and S. Hong. The boundary between privacy and utility in data publishing. In Proceedings of the 33rd international conference on Very large data bases, pages 531\u2013542. VLDB Endowment, 2007."},{"key":"3_CR71","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-85820-3","volume-title":"Introduction to recommender systems handbook","author":"F Ricci","year":"2011","unstructured":"F. Ricci, L. Rokach, and B. Shapira. Introduction to recommender systems handbook. Springer, 2011."},{"key":"3_CR72","doi-asserted-by":"crossref","unstructured":"D. Y. Sha and L. Guo-Liang. Improving service quality of retail store by innovative digital content technology. In 2012 IEEE International Conference on Computer Science and Automation Engineering, pages 655\u2013660, June 2012.","DOI":"10.1109\/ICSESS.2012.6269552"},{"key":"3_CR73","doi-asserted-by":"crossref","unstructured":"D. J. Solove. A taxonomy of privacy. University of Pennsylvania law review, pages 477\u2013564, 2006.","DOI":"10.2307\/40041279"},{"key":"3_CR74","unstructured":"D. J. Solove. Understanding privacy. Harvard University Press, GWU Law School Public Law Research Paper, (420), May 2008."},{"issue":"4","key":"3_CR75","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/j.aei.2006.09.002","volume":"21","author":"J Song","year":"2007","unstructured":"J. Song, C. T. Haas, and C. H. Caldas. A proximity-based method for locating RFID tagged objects. Advanced Engineering Informatics, 21(4):367\u2013376, 2007.","journal-title":"Advanced Engineering Informatics"},{"issue":"4","key":"3_CR76","doi-asserted-by":"publisher","first-page":"723","DOI":"10.2307\/3857550","volume":"8","author":"R A Spinello","year":"1998","unstructured":"R. A. Spinello. Privacy rights in the information economy. Business Ethics Quarterly, 8(4):723\u2013742, 1998.","journal-title":"Business Ethics Quarterly"},{"key":"3_CR77","unstructured":"steinunn. Discover a museum with BLE app for indoor location \u2013 Video from Eldheimar, 2014. Retreived on 14-01-2017 from https:\/\/locatify.com\/blog\/discover-a-museum-with-ble-app-for-indoor-location-video-from-eldheimar\/ ."},{"issue":"05","key":"3_CR78","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"LATANYA SWEENEY","year":"2002","unstructured":"L. Sweeney. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05):557\u2013570, 2002.","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"3_CR79","doi-asserted-by":"crossref","unstructured":"K. P. Tang, P. Keyani, J. Fogarty, and J. I. Hong. Putting people in their place: An anonymous and privacy-sensitive approach to collecting sensed data in location-based applications. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI \u201906, pages 93\u2013102, New York, NY, USA, 2006. ACM.","DOI":"10.1145\/1124772.1124788"},{"key":"3_CR80","unstructured":"Z. Technologies. Analysis of iOS 8 MAC Randomization on Locationing. http:\/\/mpact.zebra.com\/documents\/iOS8-White-Paper.pdf , 2015. Zebra Whitepaper."},{"key":"3_CR81","unstructured":"The European Parliament And The Council Of The EU. Regulation (eu) 2016\/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/ec (general data protection regulation). Official Journal of the European Union, L119\/1, 2016."},{"key":"3_CR82","unstructured":"The European Parliament, the Council and the Commission. Eu directive 95\/46\/ec on the protection of individuals with regard to the processing of personal data and on the free movement of such data: Eu directive 95\/46\/ec. pages 0031\u20130050, 1995."},{"issue":"2","key":"3_CR83","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/j.jsis.2007.05.006","volume":"16","author":"F Thiesse","year":"2007","unstructured":"F. Thiesse. RFID, privacy and the perception of risk: A strategic framework. J. Strategic Inf. Sys., 16(2):214\u2013232, 2007.","journal-title":"J. Strategic Inf. Sys."},{"issue":"1","key":"3_CR84","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/TRO.2004.833793","volume":"21","author":"F Thomas","year":"2005","unstructured":"F. Thomas and L. Ros. Revisiting trilateration for robot localization. IEEE Trans. Robotics, 21(1):93\u2013101, 2005.","journal-title":"IEEE Trans. Robotics"},{"issue":"8","key":"3_CR85","first-page":"751","volume":"31","author":"J P Berg Van Den","year":"1999","unstructured":"J. P. Van Den Berg. A literature survey on planning and control of warehousing systems. IIE Transactions, 31(8):751\u2013762, 1999.","journal-title":"IIE Transactions"},{"issue":"1","key":"3_CR86","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MPRV.2006.2","volume":"5","author":"R Want","year":"2006","unstructured":"R. Want. An introduction to RFID technology. IEEE Pervasive Computing, 5(1):25\u201333, 2006.","journal-title":"IEEE Pervasive Computing"},{"key":"3_CR87","unstructured":"A. Wee. A supermarket without a checkout line-Amazon go, 2016. Zing Gadget http:\/\/en.zinggadget.com\/a-supermarket-without-a-checkout-line-amazon-go ."},{"key":"3_CR88","unstructured":"S. A. Weis. Security and privacy in radio-frequency identification devices. Master\u2019s thesis, Massachusetts Institute of Technology, 2003."},{"issue":"5\/6","key":"3_CR89","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1147\/JRD.2014.2337552","volume":"58","author":"A Yaeli","year":"2014","unstructured":"A. Yaeli, P. Bak, G. Feigenblat, S. Nadler, H. Roitman, G. Saadoun, H. J. Ship, D. Cohen, O. Fuchs, S. Ofek-Koifman, et al. Understanding customer behavior using indoor location analysis and visualization. IBM Journal of Research and Development, 58(5\/6):3\u20131, 2014.","journal-title":"IBM Journal of Research and Development"},{"issue":"3","key":"3_CR90","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1109\/MCOM.2015.7060497","volume":"53","author":"C Yang","year":"2015","unstructured":"C. Yang and H.-R. Shao. WiFi-based indoor positioning. IEEE Communications Magazine, 53(3):150\u2013157, 2015.","journal-title":"IEEE Communications Magazine"},{"key":"3_CR91","doi-asserted-by":"crossref","unstructured":"D. Zanetti, P. Sachs, and S. Capkun. On the practicality of UHF RFID fingerprinting: How real is the RFID tracking problem? In S. Fischer-H\u00fcbner and N. Hopper, editors, Privacy Enhancing Technologies - 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27\u201329, 2011. Proceedings, volume 6794 of Lecture Notes in Computer Science, pages 97\u2013116. Springer, 2011.","DOI":"10.1007\/978-3-642-22263-4_6"}],"container-title":["Handbook of Mobile Data Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98161-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,28]],"date-time":"2019-10-28T21:13:47Z","timestamp":1572297227000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-98161-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319981604","9783319981611"],"references-count":91,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98161-1_3","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}