{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:47:47Z","timestamp":1725540467082},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642051470"},{"type":"electronic","value":"9783642051487"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-05148-7_21","type":"book-chapter","created":{"date-parts":[[2009,11,6]],"date-time":"2009-11-06T05:29:40Z","timestamp":1257485380000},"page":"304-321","source":"Crossref","is-referenced-by-count":11,"title":["Understanding User Preferences and Awareness: Privacy Mechanisms in Location-Based Services"],"prefix":"10.1007","author":[{"given":"Thorben","family":"Burghardt","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Erik","family":"Buchmann","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jens","family":"M\u00fcller","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Klemens","family":"B\u00f6hm","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"21_CR1","volume-title":"EC","author":"S. Spiekermann","year":"2001","unstructured":"Spiekermann, S., Grossklags, J., Berendt, B.: E-privacy in 2nd generation e-commerce: privacy preferences versus actual behavior. In: EC. ACM, New York (2001)"},{"key":"21_CR2","volume-title":"MobiSys","author":"M. Gruteser","year":"2003","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys. ACM, New York (2003)"},{"key":"21_CR3","volume-title":"ICDEW","author":"H. Kido","year":"2005","unstructured":"Kido, H., Yanagisawa, Y., Satoh, T.: Protection of location privacy using dummies for location-based services. In: ICDEW. IEEE, Los Alamitos (2005)"},{"key":"21_CR4","unstructured":"Gedik, B., Liu, L.: A customizable k-anonymity model for protecting location privacy. Technical report, Georgia Institute of Technology (2004)"},{"key":"21_CR5","unstructured":"Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: query processing for location services without compromising privacy. In: VLDB (2006)"},{"key":"21_CR6","unstructured":"European Parliament: Directive 2002\/58\/ec (2002)"},{"key":"21_CR7","unstructured":"Westin, A.F.: Privacy and Freedom. Bodley Head (April 1970)"},{"key":"21_CR8","volume-title":"HCI","author":"M.S. Ackerman","year":"2001","unstructured":"Ackerman, M.S.: The intellectual challenge of cscw: The gap between social requirements and technical feasibility. In: HCI. ACM, New York (2001)"},{"key":"21_CR9","unstructured":"Barkhuus, L., Dey, A.: Location-based services for mobile telephony: A study of users\u2019 privacy concerns. In: CHI INTERACT (2003)"},{"key":"21_CR10","volume-title":"SIGCHI","author":"S. Consolvo","year":"2005","unstructured":"Consolvo, S., Smith, I.E., et al.: Location disclosure to social relations: Why, when, & what people want to share. In: SIGCHI. ACM, New York (2005)"},{"key":"21_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1341012.1341062","volume-title":"GIS","author":"T. Xu","year":"2007","unstructured":"Xu, T., Cai, Y.: Location anonymity in continuous location-based services. In: GIS, pp. 1\u20138. ACM, New York (2007)"},{"key":"21_CR12","volume-title":"MDM","author":"M. Terrovitis","year":"2008","unstructured":"Terrovitis, M., Mamoulis, N.: Privacy preservation in the publication of trajectories. In: MDM. IEEE, Los Alamitos (2008)"},{"key":"21_CR13","volume-title":"CHI","author":"S. Lederer","year":"2003","unstructured":"Lederer, S., Mankoff, J., Dey, A.K.: Who wants to know what when? privacy preference determinants in ubiquitous computing. In: CHI. ACM, New York (2003)"},{"key":"21_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1007\/11428572_9","volume-title":"Pervasive Computing","author":"I. Smith","year":"2005","unstructured":"Smith, I., Consolvo, S., et al.: Social disclosure of place: From location technology to communication practice. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol.\u00a03468, pp. 134\u2013151. Springer, Heidelberg (2005)"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Wind, R., et al.: A testbed for the exploration of novel concepts in mobile service delivery. In: MDM (2007)","DOI":"10.1109\/MDM.2007.41"},{"key":"21_CR16","volume-title":"SIGCHI","author":"M. Ames","year":"2007","unstructured":"Ames, M., Naaman, M.: Why we tag: motivations for annotation in mobile and online media. In: SIGCHI. ACM, New York (2007)"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Gonzalez, M.C., Hidalgo, C.A., Barabasi, A.L.: Understanding individual human mobility patterns. Nature\u00a0453 (2008)","DOI":"10.1038\/nature06958"},{"key":"21_CR18","unstructured":"Babbie, E.R.: The Practice of Social Research, 10th edn. Academic Internet Publ. (2007)"},{"key":"21_CR19","volume-title":"HYPERTEXT","author":"C. Marlow","year":"2006","unstructured":"Marlow, C., et al.: Ht06, tagging paper, taxonomy, flickr, academic article, to read. In: HYPERTEXT. ACM, New York (2006)"},{"key":"21_CR20","volume-title":"SIGCHI","author":"D.R. Millen","year":"2006","unstructured":"Millen, D.R., Feinberg, J., Kerr, B.: Dogear: Social bookmarking in the enterprise. In: SIGCHI. ACM, New York (2006)"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems: OTM 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-05148-7_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T07:21:17Z","timestamp":1619767277000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-05148-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642051470","9783642051487"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-05148-7_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}