{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T23:25:12Z","timestamp":1775258712151,"version":"3.50.1"},"publisher-location":"Cham","reference-count":146,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319981604","type":"print"},{"value":"9783319981611","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98161-1_8","type":"book-chapter","created":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T15:59:02Z","timestamp":1540569542000},"page":"195-228","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy in Geospatial Applications and Location-Based Social Networks"],"prefix":"10.1007","author":[{"given":"Igor","family":"Bilogrevic","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,27]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"M. Abadi, A. Chu, I. Goodfellow, H. B. McMahan, I. Mironov, K. Talwar, and L. Zhang. Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pages 308\u2013318. ACM, 2016.","DOI":"10.1145\/2976749.2978318"},{"issue":"11","key":"8_CR2","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MSP.2013.86","volume":"4","author":"A Acquisti","year":"2013","unstructured":"A. Acquisti, I. Adjerid, and L. Brandimarte. Gone in 15 seconds: The limits of privacy transparency and control. IEEE Security & Privacy, 4(11):72\u201374, 2013.","journal-title":"IEEE Security & Privacy"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"A. Acquisti and R. Gross. Imagined communities: Awareness, information sharing, and privacy on the facebook. In International workshop on privacy enhancing technologies, pages 36\u201358. Springer, 2006.","DOI":"10.1007\/11957454_3"},{"issue":"15","key":"8_CR4","doi-asserted-by":"publisher","first-page":"1486","DOI":"10.1056\/NEJMlim035027","volume":"348","author":"G J Annas","year":"2003","unstructured":"G. J. Annas. Hipaa regulations-a new era of medical-record privacy? New England Journal of Medicine, 348(15):1486\u20131490, 2003.","journal-title":"New England Journal of Medicine"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"S. B. Barnes. A privacy paradox: Social networking in the united states. First Monday, 11(9), 2006.","DOI":"10.5210\/fm.v11i9.1394"},{"issue":"3","key":"8_CR6","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1108\/ITP-10-2014-0232","volume":"28","author":"V Benson","year":"2015","unstructured":"V. Benson, G. Saridakis, and H. Tennakoon. Information disclosure of social media users: does control over personal information, user awareness and security notices matter? Information Technology & People, 28(3):426\u2013441, 2015.","journal-title":"Information Technology & People"},{"issue":"3","key":"8_CR7","first-page":"199","volume":"3","author":"M Bezzi","year":"2010","unstructured":"M. Bezzi. An information theoretic approach for privacy metrics. Transactions on Data Privacy, 3(3):199\u2013215, 2010.","journal-title":"Transactions on Data Privacy"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"G. Bicz\u00f3k and P. H. Chia. Interdependent privacy: Let me share your data. In International Conference on Financial Cryptography and Data Security, pages 338\u2013353. Springer, 2013.","DOI":"10.1007\/978-3-642-39884-1_29"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"I. Bilogrevic, M. Jadliwala, I. L\u00e1m, I. Aad, P. Ginzboorg, V. Niemi, L. Bindschaedler, and J.-P. Hubaux. Big brother knows your friends: on privacy of social communities in pervasive networks. In International Conference on Pervasive Computing, pages 370\u2013387. Springer Berlin Heidelberg, 2012.","DOI":"10.1007\/978-3-642-31205-2_23"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"I. Bilogrevic and M. Ortlieb. If you put all the pieces together\u2026: Attitudes towards data combination and sharing across services and companies. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pages 5215\u20135227. ACM, 2016.","DOI":"10.1145\/2858036.2858432"},{"issue":"1","key":"8_CR11","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1080\/15420353.2015.1009609","volume":"11","author":"A J Blatt","year":"2015","unstructured":"A. J. Blatt. The benefits and risks of volunteered geographic information. Journal of Map & Geography Libraries, 11(1):99\u2013104, 2015.","journal-title":"Journal of Map & Geography Libraries"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"A. J. Blatt. Data privacy and ethical uses of volunteered geographic information. In Health, Science, and Place, pages 49\u201359. Springer, 2015.","DOI":"10.1007\/978-3-319-12003-4_5"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"D. Boneh, E. Kushilevitz, R. Ostrovsky, and W. E. Skeith III. Public key encryption that allows pir queries. In Annual International Cryptology Conference, pages 50\u201367. Springer, 2007.","DOI":"10.1007\/978-3-540-74143-5_4"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"J. A. Bovenberg, B. M. Knoppers, A. Hansell, and K. de Hoogh. Exposing participants? population biobanks go geo. European Journal of Human Genetics, 2015.","DOI":"10.1038\/ejhg.2015.43"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"T. Burghardt, E. Buchmann, J. M\u00fcller, and K. B\u00f6hm. Understanding user preferences and awareness: Privacy mechanisms in location-based services. In OTM Confederated International Conferences\u201d On the Move to Meaningful Internet Systems\u201d, pages 304\u2013321. Springer, 2009.","DOI":"10.1007\/978-3-642-05148-7_21"},{"key":"8_CR16","unstructured":"J. Cabalona. Gowalla Is Officially Shut Down."},{"issue":"11","key":"8_CR17","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/MCOM.2013.6658662","volume":"51","author":"B Carbunar","year":"2013","unstructured":"B. Carbunar, M. Rahman, and N. Pissinou. A survey of privacy vulnerabilities and defenses in geosocial networks. IEEE Communications Magazine, 51(11):114\u2013119, 2013.","journal-title":"IEEE Communications Magazine"},{"issue":"3","key":"8_CR18","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1093\/police\/pas006","volume":"6","author":"S Chainey","year":"2012","unstructured":"S. Chainey and L. Tompson. Engagement, empowerment and transparency: publishing crime statistics using online crime mapping. Policing, 6(3):228\u2013239, 2012.","journal-title":"Policing"},{"key":"8_CR19","unstructured":"C. Chan. Robbers Checked Facebook Status Updates To See When People Weren\u2019t Home."},{"key":"8_CR20","unstructured":"Y. Chen and H. Kobayashi. Signal strength based indoor geolocation. In Communications, 2002. ICC 2002. IEEE International Conference on, volume 1, pages 436\u2013439. IEEE, 2002."},{"key":"8_CR21","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1016\/j.trc.2015.04.005","volume":"56","author":"C D Cottrill","year":"2015","unstructured":"C. D. Cottrill et al. Location privacy preferences: A survey-based analysis of consumer awareness, trade-off and decision-making. Transportation Research Part C: Emerging Technologies, 56:132\u2013148, 2015.","journal-title":"Transportation Research Part C: Emerging Technologies"},{"issue":"2","key":"8_CR22","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1559\/152304003100011108","volume":"30","author":"J W Crampton","year":"2003","unstructured":"J. W. Crampton. Cartographic rationality and the politics of geosurveillance and security. Cartography and Geographic Information Science, 30(2):135\u2013148, 2003.","journal-title":"Cartography and Geographic Information Science"},{"key":"8_CR23","volume-title":"Mapping: A critical introduction to cartography and GIS, volume 11","author":"J W Crampton","year":"2011","unstructured":"J. W. Crampton. Mapping: A critical introduction to cartography and GIS, volume 11. John Wiley & Sons, 2011."},{"key":"8_CR24","first-page":"194","volume":"6","author":"R Dayarathna","year":"2011","unstructured":"R. Dayarathna. Taxonomy for information privacy metrics. J. Int\u2019l Com. L. & Tech., 6:194, 2011.","journal-title":"J. Int\u2019l Com. L. & Tech."},{"key":"8_CR25","unstructured":"C. Dempsey. Privacy in gis issues, 2008."},{"key":"8_CR26","unstructured":"S. N. Desk. How many CCTV Cameras are there globally?, June 2015."},{"key":"8_CR27","unstructured":"B. Dickinson. Infographic: 80% of robbers check Twitter, Facebook, Google Street View."},{"issue":"3","key":"8_CR28","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1002\/ejsp.2049","volume":"45","author":"T Dienlin","year":"2015","unstructured":"T. Dienlin and S. Trepte. Is the privacy paradox a relic of the past? an in-depth analysis of privacy attitudes and privacy behaviors. European Journal of Social Psychology, 45(3):285\u2013297, 2015.","journal-title":"European Journal of Social Psychology"},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"W. Dong, V. Dave, L. Qiu, and Y. Zhang. Secure friend discovery in mobile social networks. In INFOCOM, 2011 Proceedings IEEE, pages 1647\u20131655. IEEE, 2011.","DOI":"10.1109\/INFCOM.2011.5934958"},{"key":"8_CR30","doi-asserted-by":"publisher","first-page":"16024","DOI":"10.1038\/npjgenmed.2016.24","volume":"1","author":"S O Dyke","year":"2016","unstructured":"S. O. Dyke, E. S. Dove, and B. M. Knoppers. Sharing health-related data: a privacy test? NPJ Genomic Medicine, 1:16024, 2016.","journal-title":"NPJ Genomic Medicine"},{"issue":"4","key":"8_CR31","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s00779-005-0046-3","volume":"10","author":"N Eagle","year":"2006","unstructured":"N. Eagle and A. S. Pentland. Reality mining: sensing complex social systems. Personal and ubiquitous computing, 10(4):255\u2013268, 2006.","journal-title":"Personal and ubiquitous computing"},{"issue":"4","key":"8_CR32","doi-asserted-by":"publisher","first-page":"2296","DOI":"10.1109\/COMST.2015.2453434","volume":"17","author":"E Erdin","year":"2015","unstructured":"E. Erdin, C. Zachor, and M. H. Gunes. How to find hidden users: a survey of attacks on anonymity networks. IEEE Communications Surveys & Tutorials, 17(4):2296\u20132316, 2015.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"8_CR33","unstructured":"Facebook. Help Center - Location Privacy."},{"key":"8_CR34","unstructured":"Facebook. Privacy Settings and Tools."},{"key":"8_CR35","unstructured":"Facebook. Facebook Reports Second Quarter 2016 Results, 2016."},{"key":"8_CR36","unstructured":"Facebook. Stats, facebook newsroom, 2016."},{"key":"8_CR37","unstructured":"Fitbit. What should i know about my fitbit badges?, 2016."},{"key":"8_CR38","unstructured":"M. Foucault. Discipline and punish: The birth of the prison. Vintage, 1977."},{"key":"8_CR39","volume-title":"The Foucault effect: Studies in governmentality","author":"M Foucault","year":"1991","unstructured":"M. Foucault, G. Burchell, C. Gordon, and P. Miller. The Foucault effect: Studies in governmentality. University of Chicago Press, 1991."},{"key":"8_CR40","doi-asserted-by":"crossref","unstructured":"D. Freni, C. Ruiz Vicente, S. Mascetti, C. Bettini, and C. S. Jensen. Preserving location and absence privacy in geo-social networks. In Proceedings of the 19th ACM international conference on Information and knowledge management, pages 309\u2013318. ACM, 2010.","DOI":"10.1145\/1871437.1871480"},{"key":"8_CR41","doi-asserted-by":"crossref","unstructured":"M. Furini. Users behavior in location-aware services: Digital natives versus digital immigrants. Advances in Human-Computer Interaction, 2014, 2014.","DOI":"10.1155\/2014\/678165"},{"key":"8_CR42","doi-asserted-by":"crossref","unstructured":"G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan. Private queries in location based services: anonymizers are not necessary. In Proceedings of the 2008 ACM SIGMOD international conference on Management of data, pages 121\u2013132. ACM, 2008.","DOI":"10.1145\/1376616.1376631"},{"key":"8_CR43","volume-title":"Foundations of cryptography: volume 2, basic applications","author":"O Goldreich","year":"2009","unstructured":"O. Goldreich. Foundations of cryptography: volume 2, basic applications. Cambridge university press, 2009."},{"key":"8_CR44","doi-asserted-by":"crossref","unstructured":"P. Golle and K. Partridge. On the anonymity of home\/work location pairs. In International Conference on Pervasive Computing, pages 390\u2013397. Springer, 2009.","DOI":"10.1007\/978-3-642-01516-8_26"},{"issue":"4","key":"8_CR45","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s10708-007-9111-y","volume":"69","author":"M F Goodchild","year":"2007","unstructured":"M. F. Goodchild. Citizens as sensors: the world of volunteered geography. GeoJournal, 69(4):211\u2013221, 2007.","journal-title":"GeoJournal"},{"key":"8_CR46","unstructured":"Google. Google My Account."},{"key":"8_CR47","unstructured":"Google. The Next Chapter for Flu Trends."},{"key":"8_CR48","doi-asserted-by":"crossref","unstructured":"M. Gruteser and B. Hoh. On the anonymity of periodic location samples. In International Conference on Security in Pervasive Computing, pages 179\u2013192. Springer, 2005.","DOI":"10.1007\/978-3-540-32004-3_19"},{"key":"8_CR49","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1613\/jair.4200","volume":"49","author":"B Han","year":"2014","unstructured":"B. Han, P. Cook, and T. Baldwin. Text-based twitter user geolocation prediction. Journal of Artificial Intelligence Research, 49:451\u2013500, 2014.","journal-title":"Journal of Artificial Intelligence Research"},{"key":"8_CR50","doi-asserted-by":"crossref","unstructured":"F. Harvey. To volunteer or to contribute locational information? towards truth in labeling for crowdsourced geographic information. In Crowdsourcing Geographic Knowledge, pages 31\u201342. Springer, 2013.","DOI":"10.1007\/978-94-007-4587-2_3"},{"key":"8_CR51","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/j.trc.2014.04.003","volume":"44","author":"S Hasan","year":"2014","unstructured":"S. Hasan and S. V. Ukkusuri. Urban activity pattern classification using topic models from online geo-location data. Transportation Research Part C: Emerging Technologies, 44:363\u2013381, 2014.","journal-title":"Transportation Research Part C: Emerging Technologies"},{"issue":"5","key":"8_CR52","doi-asserted-by":"publisher","first-page":"e0124819","DOI":"10.1371\/journal.pone.0124819","volume":"10","author":"Samiul Hasan","year":"2015","unstructured":"S. Hasan and S. V. Ukkusuri. Location contexts of user check-ins to model urban geo life-style patterns. PloS one, 10(5):e0124819, 2015.","journal-title":"PLOS ONE"},{"key":"8_CR53","doi-asserted-by":"publisher","first-page":"10","DOI":"10.3389\/fict.2016.00010","volume":"3","author":"S Hasan","year":"2016","unstructured":"S. Hasan, S. V. Ukkusuri, and X. Zhan. Understanding social influence in activity-location choice and life-style patterns using geo-location data from social media. Frontiers in ICT, 3:10, 2016.","journal-title":"Frontiers in ICT"},{"key":"8_CR54","doi-asserted-by":"publisher","DOI":"10.1201\/9781420013283","volume-title":"Complete guide to security and privacy metrics: measuring regulatory compliance, operational resilience, and ROI","author":"D S Herrmann","year":"2007","unstructured":"D. S. Herrmann. Complete guide to security and privacy metrics: measuring regulatory compliance, operational resilience, and ROI. CRC Press, 2007."},{"key":"8_CR55","unstructured":"H. Hodson. Baidu uses millions of users\u2019 location data to make predictions, 2016."},{"issue":"4","key":"8_CR56","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MPRV.2006.69","volume":"5","author":"B Hoh","year":"2006","unstructured":"B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady. Enhancing security and privacy in traffic-monitoring systems. IEEE Pervasive Computing, 5(4):38\u201346, 2006.","journal-title":"IEEE Pervasive Computing"},{"key":"8_CR57","doi-asserted-by":"crossref","unstructured":"P. Hu, T. Mukherjee, A. Valliappan, and S. Radziszowski. Homomorphic proximity computation in geosocial networks. In Computer Communications Workshops (INFOCOM WKSHPS), 2016 IEEE Conference on, pages 616\u2013621. IEEE, 2016.","DOI":"10.1109\/INFCOMW.2016.7562150"},{"key":"8_CR58","doi-asserted-by":"crossref","unstructured":"Y. Huang, J. Katz, and D. Evans. Quid-pro-quo-tocols: Strengthening semi-honest protocols with dual execution. In 2012 IEEE Symposium on Security and Privacy, pages 272\u2013284. IEEE, 2012.","DOI":"10.1109\/SP.2012.43"},{"key":"8_CR59","doi-asserted-by":"crossref","unstructured":"M. Humbert, E. Ayday, J.-P. Hubaux, and A. Telenti. On non-cooperative genomic privacy. In International Conference on Financial Cryptography and Data Security, pages 407\u2013426. Springer, 2015.","DOI":"10.1007\/978-3-662-47854-7_24"},{"key":"8_CR60","unstructured":"ICO. Crime-mapping and geo-spatial crime data: Privacy and transparency principles., 2012."},{"key":"8_CR61","unstructured":"IDC. Worldwide Wearables Market Increases 67.2% Amid Seasonal Retrenchment, According to IDC."},{"issue":"6301","key":"8_CR62","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1126\/science.aaf7894","volume":"353","author":"N Jean","year":"2016","unstructured":"N. Jean, M. Burke, M. Xie, W. M. Davis, D. B. Lobell, and S. Ermon. Combining satellite imagery and machine learning to predict poverty. Science, 353(6301):790\u2013794, Aug. 2016.","journal-title":"Science"},{"key":"8_CR63","doi-asserted-by":"crossref","unstructured":"C. S. Jensen, H. Lu, and M. L. Yiu. Location privacy techniques in client-server architectures. In Privacy in location-based applications, pages 31\u201358. Springer, 2009.","DOI":"10.1007\/978-3-642-03511-1_2"},{"key":"8_CR64","first-page":"273","volume":"13","author":"D Jurgens","year":"2013","unstructured":"D. Jurgens. That\u2019s what friends are for: Inferring location in online social media platforms based on social relationships. ICWSM, 13:273\u2013282, 2013.","journal-title":"ICWSM"},{"key":"8_CR65","unstructured":"M. Kandias, L. Mitrou, V. Stavrou, and D. Gritzalis. Which side are you on? a new panopticon vs. privacy. In Security and Cryptography (SECRYPT), 2013 International Conference on, pages 1\u201313. IEEE, 2013."},{"key":"8_CR66","unstructured":"B. Kar and R. Ghose. Is my information private? geo-privacy in the world of social media. In GIO@ GIScience, pages 28\u201331, 2014."},{"key":"8_CR67","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1016\/j.chb.2015.08.016","volume":"54","author":"H-S Kim","year":"2016","unstructured":"H.-S. Kim. What drives you to check in on facebook? motivations, privacy concerns, and mobile phone involvement for location-based information sharing. Computers in Human Behavior, 54:397\u2013406, 2016.","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"8_CR68","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10708-013-9516-8","volume":"79","author":"R Kitchin","year":"2014","unstructured":"R. Kitchin. The real-time city? big data and smart urbanism. GeoJournal, 79(1):1\u201314, 2014.","journal-title":"GeoJournal"},{"key":"8_CR69","doi-asserted-by":"crossref","unstructured":"R. Kitchin. Data-driven, networked urbanism. In Data and the City workshop, 2015.","DOI":"10.2139\/ssrn.2641802"},{"key":"8_CR70","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.comcom.2015.07.017","volume":"73","author":"P Kotzanikolaou","year":"2016","unstructured":"P. Kotzanikolaou, C. Patsakis, E. Magkos, and M. Korakakis. Lightweight private proximity testing for geospatial social networks. Computer Communications, 73:263\u2013270, 2016.","journal-title":"Computer Communications"},{"issue":"1","key":"8_CR71","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/s10610-014-9248-4","volume":"21","author":"O Kounadi","year":"2015","unstructured":"O. Kounadi, K. Bowers, and M. Leitner. Crime Mapping On-line: Public Perception of Privacy Issues. European Journal on Criminal Policy and Research, 21(1):167\u2013190, Mar. 2015.","journal-title":"European Journal on Criminal Policy and Research"},{"issue":"6176","key":"8_CR72","doi-asserted-by":"publisher","first-page":"1203","DOI":"10.1126\/science.1248506","volume":"343","author":"D Lazer","year":"2014","unstructured":"D. Lazer, R. Kennedy, G. King, and A. Vespignani. The parable of google flu: traps in big data analysis. Science, 343(6176):1203\u20131205, 2014.","journal-title":"Science"},{"key":"8_CR73","unstructured":"J. H. Lee, S. Gao, K. Janowicz, and K. G. Goulias. Can twitter data be used to validate travel demand models? In IATBR 2015-WINDSOR, 2015."},{"key":"8_CR74","first-page":"1","volume":"1","author":"H Li","year":"2016","unstructured":"H. Li, H. Zhu, S. Du, X. Liang, and X. Shen. Privacy leakage of location sharing in mobile social networks: Attacks and defense. IEEE Transactions on Dependable and Secure Computing, (1):1\u20131, 2016.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"4","key":"8_CR75","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MPRV.2012.82","volume":"12","author":"H P Li","year":"2013","unstructured":"H. P. Li, H. Hu, and J. Xu. Nearby friend alert: Location anonymity in mobile geosocial networks. IEEE Pervasive Computing, 12(4):62\u201370, 2013.","journal-title":"IEEE Pervasive Computing"},{"key":"8_CR76","doi-asserted-by":"crossref","unstructured":"D. Lian and X. Xie. Collaborative activity recognition via check-in history. In Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Location-Based Social Networks, pages 45\u201348. ACM, 2011.","DOI":"10.1145\/2063212.2063230"},{"issue":"13","key":"8_CR77","doi-asserted-by":"publisher","first-page":"5705","DOI":"10.1016\/j.eswa.2015.02.057","volume":"42","author":"F Liu","year":"2015","unstructured":"F. Liu, D. Janssens, J. Cui, G. Wets, and M. Cools. Characterizing activity sequences using profile hidden markov models. Expert Systems with Applications, 42(13):5705\u20135722, 2015.","journal-title":"Expert Systems with Applications"},{"key":"8_CR78","doi-asserted-by":"crossref","unstructured":"Y. Liu, K. P. Gummadi, B. Krishnamurthy, and A. Mislove. Analyzing facebook privacy settings: user expectations vs. reality. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, pages 61\u201370. ACM, 2011.","DOI":"10.1145\/2068816.2068823"},{"key":"8_CR79","unstructured":"M. Madden. Americans Consider Certain Kinds of Data to be More Sensitive than Others, Nov. 2014."},{"key":"8_CR80","unstructured":"M. Madden, S. Fox, A. Smith, and J. Vitak. Digital Footprints: Online identity management and search in the age of transparency. Pew Internet & American Life Project Washington, DC, 2007."},{"key":"8_CR81","unstructured":"B. M. C. f. MailOnline. Ashley Madison members reveal the impact of last year\u2019s hack, Aug. 2016."},{"key":"8_CR82","doi-asserted-by":"crossref","unstructured":"A. Maiti, M. Jadliwala, J. He, and I. Bilogrevic. (smart) watch your taps: side-channel keystroke inference attacks using smartwatches. In Proceedings of the 2015 ACM International Symposium on Wearable Computers, pages 27\u201330. ACM, 2015.","DOI":"10.1145\/2802083.2808397"},{"key":"8_CR83","doi-asserted-by":"crossref","unstructured":"S. Mardenfeld, D. Boston, S. J. Pan, Q. Jones, A. Iamntichi, and C. Borcea. Gdc: Group discovery using co-location traces. In Social computing (SocialCom), 2010 IEEE second international conference on, pages 641\u2013648. IEEE, 2010.","DOI":"10.1109\/SocialCom.2010.99"},{"key":"8_CR84","unstructured":"M. Maron. How complete is OpenStreetMap?"},{"issue":"4","key":"8_CR85","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/s00778-010-0213-7","volume":"20","author":"S Mascetti","year":"2011","unstructured":"S. Mascetti, D. Freni, C. Bettini, X. S. Wang, and S. Jajodia. Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. The International Journal on Very Large Data Bases, 20(4):541\u2013566, 2011.","journal-title":"The International Journal on Very Large Data Bases"},{"key":"8_CR86","unstructured":"D. McCullagh. Microsoft\u2019s Web map exposes phone, PC locations, 2011."},{"key":"8_CR87","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compenvurbsys.2015.05.003","volume":"54","author":"G McKenzie","year":"2015","unstructured":"G. McKenzie and K. Janowicz. Where is also about time: A location-distortion model to improve reverse geocoding using behavior-driven temporal semantic signatures. Computers, Environment and Urban Systems, 54:1\u201313, 2015.","journal-title":"Computers, Environment and Urban Systems"},{"issue":"2","key":"8_CR88","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1080\/15420353.2012.663739","volume":"8","author":"P Meier","year":"2012","unstructured":"P. Meier. Crisis mapping in action: How open source software and global volunteer networks are changing the world, one map at a time. Journal of Map & Geography Libraries, 8(2):89\u2013100, 2012.","journal-title":"Journal of Map & Geography Libraries"},{"issue":"3","key":"8_CR89","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1002\/dir.20009","volume":"18","author":"G R Milne","year":"2004","unstructured":"G. R. Milne and M. J. Culnan. Strategies for reducing online privacy risks: Why consumers read (or don\u2019t read) online privacy notices. Journal of Interactive Marketing, 18(3):15\u201329, 2004.","journal-title":"Journal of Interactive Marketing"},{"key":"8_CR90","unstructured":"MIT. Real Time Rome."},{"key":"8_CR91","unstructured":"A. Narayanan, N. Thiagarajan, M. Lakhani, M. Hamburg, and D. Boneh. Location privacy via private proximity testing. In NDSS, 2011."},{"key":"8_CR92","unstructured":"B. News. Ice age star map discovered, 2000."},{"key":"8_CR93","doi-asserted-by":"crossref","unstructured":"J. D. Nielsen, J. I. Pagter, and M. B. Stausholm. Location privacy via actively secure private proximity testing. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012 IEEE International Conference on, pages 381\u2013386. IEEE, 2012.","DOI":"10.1109\/PerComW.2012.6197514"},{"key":"8_CR94","unstructured":"A. Noulas, M. Musolesi, M. Pontil, and C. Mascolo. Inferring interests from mobility and social interactions. In NIPS Workshop on Analyzing Networks and Learning with Graphs, pages 2\u201388, 2009."},{"key":"8_CR95","doi-asserted-by":"crossref","unstructured":"A.-M. Olteanu, K. Huguenin, R. Shokri, M. Humbert, and J.-P. Hubaux. Quantifying interdependent privacy risks with location data. IEEE Transactions on Mobile Computing, 2016.","DOI":"10.1109\/TMC.2016.2561281"},{"key":"8_CR96","doi-asserted-by":"crossref","unstructured":"E. Owusu, J. Han, S. Das, A. Perrig, and J. Zhang. Accessory: password inference using accelerometers on smartphones. In Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications, page 9. ACM, 2012.","DOI":"10.1145\/2162081.2162095"},{"key":"8_CR97","first-page":"2003","volume":"18","author":"R L Penslar","year":"1993","unstructured":"R. L. Penslar and J. Porter. Institutional review board guidebook. Retrieved July, 18:2003, 1993.","journal-title":"Retrieved July"},{"key":"8_CR98","unstructured":"Pew Research Center. More Americans using smartphones for getting directions, streaming TV, Jan. 2016."},{"key":"8_CR99","doi-asserted-by":"crossref","unstructured":"N. Polatidis, C. K. Georgiadis, E. Pimenidis, and E. Stiakakis. A method for privacy-preserving context-aware mobile recommendations. In International Conference on e-Democracy, pages 62\u201374. Springer, 2015.","DOI":"10.1007\/978-3-319-27164-4_5"},{"key":"8_CR100","unstructured":"K. Pomfret. Latitudes and attitudes: Zooming in on geospatial data, privacy and the law in the digital age. Centre for Spatial Law and Policy, 2013."},{"key":"8_CR101","first-page":"27","volume":"11","author":"J H Reiman","year":"1995","unstructured":"J. H. Reiman. Driving to the panopticon: A philosophical exploration of the risks to privacy posed by the highway technology of the future. Santa Clara Computer & High Tech. LJ, 11:27, 1995.","journal-title":"Santa Clara Computer & High Tech. LJ"},{"key":"8_CR102","doi-asserted-by":"crossref","unstructured":"L. Rossi and M. Musolesi. It\u2019s the way you check-in: identifying users in location-based social networks. In Proceedings of the second ACM conference on Online social networks, pages 215\u2013226. ACM, 2014.","DOI":"10.1145\/2660460.2660485"},{"key":"8_CR103","unstructured":"L. Rossi, M. Williams, C. Stich, and M. Musolesi. Privacy and the city: User identification and location semantics in location-based social networks. In Ninth International AAAI Conference on Web and Social Media, 2015."},{"key":"8_CR104","doi-asserted-by":"crossref","unstructured":"Z. Sahnoune, C. Y. Yep, and E. A\u00efmeur. Privacy issues in geosocial networks. In International Conference on Risks and Security of Internet and Systems, pages 67\u201382. Springer, 2014.","DOI":"10.1007\/978-3-319-17127-2_5"},{"issue":"11","key":"8_CR105","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MC.2015.346","volume":"48","author":"M Saini","year":"2015","unstructured":"M. Saini and A. El Saddik. Absence privacy loss. Computer, 48(11):102\u2013105, 2015.","journal-title":"Computer"},{"key":"8_CR106","doi-asserted-by":"crossref","unstructured":"D. Schoepe and A. Sabelfeld. Understanding and enforcing opacity. In 2015 IEEE 28th Computer Security Foundations Symposium, pages 539\u2013553. IEEE, 2015.","DOI":"10.1109\/CSF.2015.41"},{"issue":"1","key":"8_CR107","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MWC.2012.6155874","volume":"19","author":"K G Shin","year":"2012","unstructured":"K. G. Shin, X. Ju, Z. Chen, and X. Hu. Privacy protection for users of location-based services. IEEE Wireless Communications, 19(1):30\u201339, 2012.","journal-title":"IEEE Wireless Communications"},{"key":"8_CR108","unstructured":"R. Shokri, M. Stronati, and V. Shmatikov. Membership inference attacks against machine learning models. arXiv preprint arXiv:1610.05820, 2016."},{"key":"8_CR109","doi-asserted-by":"crossref","unstructured":"R. Shokri, G. Theodorakopoulos, J.-Y. Le Boudec, and J.-P. Hubaux. Quantifying location privacy. In 2011 IEEE Symposium on Security and Privacy, pages 247\u2013262. IEEE, 2011.","DOI":"10.1109\/SP.2011.18"},{"key":"8_CR110","doi-asserted-by":"crossref","unstructured":"L. \u0160ik\u0161nys, J. R. Thomsen, S. \u0160altenis, M. L. Yiu, and O. Andersen. A location privacy aware friend locator. In International Symposium on Spatial and Temporal Databases, pages 405\u2013410. Springer, 2009.","DOI":"10.1007\/978-3-642-02982-0_29"},{"key":"8_CR111","doi-asserted-by":"crossref","unstructured":"R. Soden and L. Palen. From crowdsourced mapping to community mapping: the post-earthquake work of openstreetmap haiti. In COOP 2014-Proceedings of the 11th International Conference on the Design of Cooperative Systems, 27\u201330 May 2014, Nice (France), pages 311\u2013326. Springer, 2014.","DOI":"10.1007\/978-3-319-06498-7_19"},{"key":"8_CR112","doi-asserted-by":"crossref","unstructured":"D. J. Solove. A taxonomy of privacy. University of Pennsylvania law review, pages 477\u2013564, 2006.","DOI":"10.2307\/40041279"},{"key":"8_CR113","doi-asserted-by":"crossref","unstructured":"H. Soroush, K. Sung, E. Learned-Miller, B. N. Levine, and M. Liberatore. Turning off gps is not enough: Cellular location leaks over the internet. In International Symposium on Privacy Enhancing Technologies Symposium, pages 103\u2013122. Springer, 2013.","DOI":"10.1007\/978-3-642-39077-7_6"},{"key":"8_CR114","unstructured":"A. Staff. Location Sharing Is Easier Than You Think, 2016."},{"key":"8_CR115","unstructured":"D. T. Staff. The history of social networking, May 2016."},{"key":"8_CR116","unstructured":"B. Steele. NPR\u2019s Gravitas, Sept. 2002."},{"issue":"1","key":"8_CR117","doi-asserted-by":"publisher","first-page":"590","DOI":"10.1016\/j.chb.2010.10.017","volume":"27","author":"F Stutzman","year":"2011","unstructured":"F. Stutzman, R. Capra, and J. Thompson. Factors mediating disclosure in social network sites. Computers in Human Behavior, 27(1):590\u2013598, 2011.","journal-title":"Computers in Human Behavior"},{"key":"8_CR118","unstructured":"F. Stutzman, R. Gross, and A. Acquisti. Silent listeners: The evolution of privacy and disclosure on facebook. Journal of privacy and confidentiality, 4(2):2, 2013."},{"key":"8_CR119","doi-asserted-by":"publisher","DOI":"10.7208\/chicago\/9780226799759.001.0001","volume-title":"Maps and civilization: cartography in culture and society","author":"N J Thrower","year":"2008","unstructured":"N. J. Thrower. Maps and civilization: cartography in culture and society. University of Chicago Press, 2008."},{"issue":"2","key":"8_CR120","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1080\/15230406.2014.972456","volume":"42","author":"L Tompson","year":"2015","unstructured":"L. Tompson, S. Johnson, M. Ashby, C. Perkins, and P. Edwards. Uk open source crime data: accuracy and possibilities for research. Cartography and Geographic Information Science, 42(2):97\u2013111, 2015.","journal-title":"Cartography and Geographic Information Science"},{"key":"8_CR121","doi-asserted-by":"crossref","unstructured":"M.-T. Tran, I. Echizen, and A.-D. Duong. Binomial-mix-based location anonymizer system with global dummy generation to preserve user location privacy in location-based services. In Availability, Reliability, and Security, 2010. ARES\u201910 International Conference on, pages 580\u2013585. IEEE, 2010.","DOI":"10.1109\/ARES.2010.76"},{"key":"8_CR122","first-page":"119","volume":"6","author":"J Y Tsai","year":"2010","unstructured":"J. Y. Tsai, P. G. Kelley, L. F. Cranor, and N. Sadeh. Location-sharing technologies: Privacy risks and controls. ISJLP, 6:119, 2010.","journal-title":"ISJLP"},{"key":"8_CR123","unstructured":"U.S. Department of Commerce Economic and Statistics Administration, U.S. Census Bureau. Small area income and poverty estimates (saipe) program, 2014."},{"key":"8_CR124","doi-asserted-by":"crossref","unstructured":"A. Uteck. Ubiquitous computing and spatial privacy. Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society, pages 83\u2013101, 2009.","DOI":"10.1093\/oso\/9780195372472.003.0005"},{"key":"8_CR125","unstructured":"S. Utz and N. Kramer. The privacy paradox on social network sites revisited: The role of individual characteristics and group norms. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 3(2):2, 2009."},{"key":"8_CR126","unstructured":"VB Insight. Identity and marketing: Capturing, unifying, and using customer data to drive revenue growth | Insight | VentureBeat, 2015."},{"key":"8_CR127","unstructured":"VCloudNews. Every Day Big Data Statistics \u2013 2.5 Quintillion Bytes of Data Created Daily."},{"key":"8_CR128","doi-asserted-by":"crossref","unstructured":"C. R. Vicente, I. Assent, and C. S. Jensen. Effective privacy-preserving online route planning. In 2011 IEEE 12th International Conference on Mobile Data Management, volume 1, pages 119\u2013128. IEEE, 2011.","DOI":"10.1109\/MDM.2011.20"},{"issue":"3","key":"8_CR129","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MIC.2011.29","volume":"15","author":"C R Vicente","year":"2011","unstructured":"C. R. Vicente, D. Freni, C. Bettini, and C. S. Jensen. Location-related privacy in geo-social networks. IEEE Internet Computing, 15(3):20\u201327, 2011.","journal-title":"IEEE Internet Computing"},{"key":"8_CR130","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.ijhcs.2015.03.004","volume":"80","author":"B Vladlena","year":"2015","unstructured":"B. Vladlena, G. Saridakis, H. Tennakoon, and J. N. Ezingeard. The role of security notices and online consumer behaviour: An empirical study of social networking users. International Journal of Human-Computer Studies, 80:36\u201344, 2015.","journal-title":"International Journal of Human-Computer Studies"},{"key":"8_CR131","doi-asserted-by":"crossref","unstructured":"N. Vratonjic, K. Huguenin, V. Bindschaedler, and J.-P. Hubaux. How others compromise your location privacy: The case of shared public ips at hotspots. In International Symposium on Privacy Enhancing Technologies Symposium, pages 123\u2013142. Springer, 2013.","DOI":"10.1007\/978-3-642-39077-7_7"},{"key":"8_CR132","unstructured":"I. Wagner and D. Eckhoff. Technical privacy metrics: A systematic survey. arXiv preprint arXiv:1512.00327, 2015."},{"key":"8_CR133","unstructured":"M. Wall. Big Data: Are you ready for blast-off? BBC News, Mar. 2014."},{"issue":"5","key":"8_CR134","doi-asserted-by":"publisher","first-page":"193","DOI":"10.2307\/1321160","volume":"4","author":"Samuel D. Warren","year":"1890","unstructured":"S. D. Warren and L. D. Brandeis. The right to privacy. Harvard law review, pages 193\u2013220, 1890.","journal-title":"Harvard Law Review"},{"key":"8_CR135","unstructured":"J. Wartell and J. T. McEwen. Privacy in the information age: A guide for sharing crime maps and spatial data series: Research report. Institute for Law and Justice, U.S. Department of Justice, Office of Justice Programs, 2001."},{"issue":"1","key":"8_CR136","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1889681.1889688","volume":"2","author":"Danny Wyatt","year":"2011","unstructured":"D. Wyatt, T. Choudhury, J. Bilmes, and J. A. Kitts. Inferring colocation and conversation networks from privacy-sensitive audio with implications for computational social science. ACM Transactions on Intelligent Systems and Technology (TIST), 2(1):7, 2011.","journal-title":"ACM Transactions on Intelligent Systems and Technology"},{"issue":"1","key":"8_CR137","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/TSMC.2014.2327053","volume":"45","author":"D Yang","year":"2015","unstructured":"D. Yang, D. Zhang, V. W. Zheng, and Z. Yu. Modeling user activity preference by leveraging user spatial temporal characteristics in lbsns. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 45(1):129\u2013142, 2015.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"key":"8_CR138","doi-asserted-by":"crossref","unstructured":"J. Ye, Z. Zhu, and H. Cheng. What\u2019s your next move: User activity prediction in location-based social networks. In Proceedings of the SIAM International Conference on Data Mining. SIAM. SIAM, 2013.","DOI":"10.1137\/1.9781611972832.19"},{"issue":"4","key":"8_CR139","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1080\/1369118X.2013.777757","volume":"16","author":"A L Young","year":"2013","unstructured":"A. L. Young and A. Quan-Haase. Privacy protection strategies on facebook: The internet privacy paradox revisited. Information, Communication & Society, 16(4):479\u2013500, 2013.","journal-title":"Information, Communication & Society"},{"key":"8_CR140","unstructured":"M. Yutaka, O. Naoaki, I. Kiyoshi, et al. Inferring long-term user property based on users\u2019 location history. In Proceedings of the IJCAI. IJCAI, 2007."},{"issue":"s1","key":"8_CR141","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1111\/j.1467-9671.2009.01152.x","volume":"13","author":"P A Zandbergen","year":"2009","unstructured":"P. A. Zandbergen. Accuracy of iphone locations: A comparison of assisted gps, wifi and cellular positioning. Transactions in GIS, 13(s1):5\u201325, 2009.","journal-title":"Transactions in GIS"},{"key":"8_CR142","doi-asserted-by":"crossref","unstructured":"Z. Zhang, L. Zhou, X. Zhao, G. Wang, Y. Su, M. Metzger, H. Zheng, and B. Y. Zhao. On the validity of geosocial mobility traces. In Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, page 11. ACM, 2013.","DOI":"10.1145\/2535771.2535786"},{"key":"8_CR143","doi-asserted-by":"crossref","unstructured":"D. Zheng, T. Hu, Q. You, H. Kautz, and J. Luo. Towards lifestyle understanding: Predicting home and vacation locations from user\u2019s online photo collections. In Proceedings of the 9th International AAAI Conference on Web and Social Media, pages 553\u2013560, 2015.","DOI":"10.1609\/icwsm.v9i1.14591"},{"key":"8_CR144","doi-asserted-by":"crossref","unstructured":"Y. Zheng. Location-based social networks: Users. In Computing with spatial trajectories, pages 243\u2013276. Springer, 2011.","DOI":"10.1007\/978-1-4614-1629-6_8"},{"key":"8_CR145","doi-asserted-by":"crossref","unstructured":"G. Zhong, I. Goldberg, and U. Hengartner. Louis, lester and pierre: Three protocols for location privacy. In International Workshop on Privacy Enhancing Technologies, pages 62\u201376. Springer, 2007.","DOI":"10.1007\/978-3-540-75551-7_5"},{"issue":"2","key":"8_CR146","doi-asserted-by":"publisher","first-page":"7","DOI":"10.2202\/1948-4682.1069","volume":"2","author":"M Zook","year":"2010","unstructured":"M. Zook, M. Graham, T. Shelton, and S. Gorman. Volunteered geographic information and crowdsourcing disaster relief: a case study of the haitian earthquake. World Medical & Health Policy, 2(2):7\u201333, 2010.","journal-title":"World Medical & Health Policy"}],"container-title":["Handbook of Mobile Data Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98161-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T22:03:30Z","timestamp":1775253810000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-98161-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319981604","9783319981611"],"references-count":146,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98161-1_8","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}