{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:48:02Z","timestamp":1742914082870,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":36,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789400751842"},{"type":"electronic","value":"9789400751705"}],"license":[{"start":{"date-parts":[[2012,10,12]],"date-time":"2012-10-12T00:00:00Z","timestamp":1350000000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,10,12]],"date-time":"2012-10-12T00:00:00Z","timestamp":1350000000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-94-007-5170-5_9","type":"book-chapter","created":{"date-parts":[[2012,11,22]],"date-time":"2012-11-22T19:14:18Z","timestamp":1353611658000},"page":"203-222","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Roadmap for Privacy Protection in Mobile Sensing Applications"],"prefix":"10.1007","author":[{"given":"Delphine","family":"Christin","sequence":"first","affiliation":[]},{"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,10,12]]},"reference":[{"key":"9_CR1","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/322796.322806","volume":"42","author":"A Adams","year":"1999","unstructured":"Adams, Anne, and Martina A. Sasse. 1999. Users are not the enemy. Communications of the ACM 42: 40\u201346.","journal-title":"Communications of the ACM"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Ca\u0301ceres, Ram\u00f3n, Landon Cox, Harold Lim, Amre Shakimov, and Alexander Varshavsky. 2009. Virtual individual servers as privacy-preserving proxies for mobile devices. In Proceedings of the 1st ACM workshop on networking, systems, and applications for mobile handhelds (MobiHeld), 37\u201342, Barcelona, Spain.","DOI":"10.1145\/1592606.1592616"},{"key":"9_CR3","unstructured":"Christin, Delphine, and Matthias Hollick. 2011. We must move \u2013 We will move: On mobile phones as sensing platforms. In Proceedings of the 10th GI\/ITG KuVS Fachgespr\u00e4ch Drahtlose Sensornetze (FGSN), 25\u201328, Paderborn, Germany."},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"1928","DOI":"10.1016\/j.jss.2011.06.073","volume":"84","author":"D Christin","year":"2011","unstructured":"Christin, Delphine, Andreas Reinhardt, Salil S. Kanhere, and Matthias Hollick. 2011a. A survey on privacy in mobile participatory sensing applications. Journal of Systems and Software 84: 1928\u20131946.","journal-title":"Journal of Systems and Software"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Christin, Delphine, Julien Guillemet, Andreas Reinhardt, Matthias Hollick, and Salil S. Kanhere. 2011b. Privacy-preserving collaborative path hiding for participatory sensing applications. In Proceedings of the 8th IEEE international conference on mobile ad-hoc and sensor systems (MASS), 341\u2013350, Valencia, Spain.","DOI":"10.1109\/MASS.2011.41"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Das, Tathagata, Prashant Mohan, Venkat Padmanabhan, Ramachandran Ramjee, and Asankhaya Sharma. 2010. PRISM: Platform for remote sensing using smartphones. In Proceedings of the 8th ACM international conference on mobile systems, applications, and services (MobiSys), 63\u201376, San Francisco, California, USA.","DOI":"10.1145\/1814433.1814442"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Derawi, Mohammad O., Claudia Nickel, Patrick Bours, and Christoph Busch. 2010. Unobtrusive user-authentication on mobile phones using biometric gait. In Proceeding of the 6th IEEE international conference on intelligent information hiding and multimedia signal processing (IIH-MSP), 306\u2013311, Darmstadt, Germany.","DOI":"10.1109\/IIHMSP.2010.83"},{"key":"9_CR8","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/69.979982","volume":"14","author":"J Domingo-Ferrer","year":"2002","unstructured":"Domingo-Ferrer, Josep, and Josep M. Mateo-Sanz. 2002. Practical data-oriented microaggregation for statistical disclosure control. IEEE Transactions on Knowledge and Data Engineering 14: 189\u2013201.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Dong, Yi F., Salil S. Kanhere, Chun T. Chou, and Nirupama Bulusu. 2008. Automatic collection of fuel prices from a network of mobile cameras. In Proceedings of the 4th IEEE international conference on distributed computing in sensor systems (DCOSS), 140\u2013156, Santorini Island, Greece.","DOI":"10.1007\/978-3-540-69170-9_10"},{"key":"9_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1653760.1653766","volume":"6","author":"SB Eisenman","year":"2009","unstructured":"Eisenman, Shane B., Emiliano Miluzzo, Nicholas D. Lane, Ronald A. Peterson, Gahng-Seop Ahn, and Andrew T. Campbell. 2009. BikeNet: A mobile sensing system for cyclist experience mapping. ACM Transactions on Sensor Networks 6: 1\u201339.","journal-title":"ACM Transactions on Sensor Networks"},{"key":"9_CR11","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/978-1-4020-6914-7_8","volume-title":"Profiling the European citizen \u2013 Cross-disciplinary perspectives","author":"L Fritsch","year":"2008","unstructured":"Fritsch, Lothar. 2008. Profiling and location-based services. In Profiling the European citizen \u2013 Cross-disciplinary perspectives, ed. Mireille Hildebrandt and Serge Gutwirth, 147\u2013160. Dordrecht: Springer."},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Ganti, Raghu K., Nam Pham, Yu-En Tsai, and Tarek F. Abdelzaher. 2008. PoolView: Stream privacy for grassroots participatory sensing. In Proceedings of the 6th ACM conference on embedded network sensor systems (SenSys), 281\u2013294, Raleigh, NC, USA.","DOI":"10.1145\/1460412.1460440"},{"key":"9_CR14","doi-asserted-by":"publisher","first-page":"1266","DOI":"10.1016\/j.comcom.2009.08.012","volume":"33","author":"KL Huang","year":"2010","unstructured":"Huang, Kuan L., Salil S. Kanhere, and Hu Wen. 2010. Preserving privacy in participatory sensing systems. Computer Communications 33: 1266\u20131280.","journal-title":"Computer Communications"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Hull, Bret, Vladimir Bychkovsky, Yang Zhang, Kevin Chen, Michel Goraczko, Allen Miu, Eugene Shih, Hari Balakrishnan, and Samuel Madden. 2006. CarTel: A distributed mobile sensor computing system. In Proceedings of the 4th ACM international conference on embedded networked sensor systems (SenSys), 125\u2013138, Boulder, Colorado, USA.","DOI":"10.1145\/1182807.1182821"},{"key":"9_CR16","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MPRV.2009.79","volume":"8","author":"E Kanjo","year":"2009","unstructured":"Kanjo, Eiman, Jean Bacon, Peter Landschoff, and David Roberts. 2009. MobSens: Making smart phones smarter. IEEE Pervasive Computing 8: 50\u201357.","journal-title":"IEEE Pervasive Computing"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Krumm, John. 2007. Inference attacks on location tracks. In Proceedings of the 5th IEEE international conference on pervasive computing (Pervasive), 127\u2013143, Toronto, Canada.","DOI":"10.1007\/978-3-540-72037-9_8"},{"key":"9_CR18","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/11428572_8","volume":"3468","author":"A LaMarca","year":"2005","unstructured":"LaMarca, Anthony, Yatin Chawathe, Sunny Consolvo, Jeffrey Hightower, Ian Smith, James Scott, Tim Sohn, James Howard, Jeff Hughes, Fred Potter, Jason Tabert, Pauline Powledge, Gaetano Borriello, and Bill Schilit. 2005. Place lab: Device positioning using radio beacons in the wild. Pervasive Computing 3468: 116\u2013133.","journal-title":"Pervasive Computing"},{"key":"9_CR19","unstructured":"Langheinrich, Marc. 2005. Personal privacy in ubiquitous computing \u2013 Tools and system support. PhD dissertation, ETH Zurich, Zurich."},{"key":"9_CR20","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.elerap.2008.11.006","volume":"8","author":"M-C Lee","year":"2009","unstructured":"Lee, Ming-Chi. 2009. Factors influencing the adoption of internet banking: An integration of TAM and TPB with perceived risk and perceived benefit. Electronic Commerce Research and Applications 8: 130\u2013141.","journal-title":"Electronic Commerce Research and Applications"},{"key":"9_CR21","unstructured":"Liu, Ling. 2007. From data privacy to location privacy: Models and algorithms. In Proceedings of the 33rd international conference on very large data bases (VLBD), 1429\u20131430, Vienna, Austria."},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Maisonneuve, Nicolas, Matthias Stevens, Maria E. Niessen, and Luc Steels. 2009. NoiseTube: Measuring and mapping noise pollution with mobile phones. In Proceedings of the 4th \u00adinternational symposium on information technologies in environmental engineering (ITEE), 215\u2013228, Thessaloniki, Greece.","DOI":"10.1007\/978-3-540-88351-7_16"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Marquardt, Philip, Arunabh Verma, Henry Carter, and Patrick Traynor. 2011. (sp)iPhone: Decoding vibrations from nearby keyboards using mobile phone accelerometers. In Proceedings of the 18th ACM conference on computer and communications security (CCS), 551\u2013562, Chicago, Illinois, USA.","DOI":"10.1145\/2046707.2046771"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Miluzzo, Emiliano, Nicholas D. Lane, Kristo\u0301f Fodor, Ronald Peterson, Hong Lu, Mirco Musolesi, Shane B. Eisenman, Xiao Zheng, and Andrew T. Campbell. 2008. Sensing meets mobile social networks: The design, implementation and evaluation of the CenceMe application. In Proceedings of the 6th ACM con embedded network sensor systems (SenSys), 337\u2013350, Raleigh, NC, Carolina.","DOI":"10.1145\/1460412.1460445"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Mohan, Prashanth, Venkata N. Padmanabhan, and Ramachandran Ramjee. 2008. Nericell: Rich monitoring of road and traffic conditions using mobile smartphones. In Proceedings of the 6th ACM conference on embedded network sensor systems (SenSys), 323\u2013336, Raleigh, NC, Carolina.","DOI":"10.1145\/1460412.1460444"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Mun, Min, Sasank Reddy, Katie Shilton, Nathan Yau, and Jeff Burke. 2009. PEIR, the personal environmental impact report, as a platform for participatory sensing systems research. In Proceedings of the 7th ACM international conference on mobile systems, applications, and services (MobiSys), 55\u201368, Krak\u00f3w, Poland.","DOI":"10.1145\/1555816.1555823"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Rana, Rajib K., Chun T. Chou, Salil S. Kanhere, Nirupama Bulusu, and Wen Hu. 2010. Ear-Phone: An end-to-end participatory urban noise mapping system. In Proceedings of the 9th ACM\/IEEE international conference on information processing in sensor networks (IPSN), 105\u2013116, Stockholm, Sweden.","DOI":"10.1145\/1791212.1791226"},{"key":"9_CR28","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/1592761.1592778","volume":"52","author":"K Shilton","year":"2009","unstructured":"Shilton, Katie. 2009. Four billion little brothers?: Privacy, mobile phones, and ubiquitous data collection. Communications of the ACM 52: 48\u201353.","journal-title":"Communications of the ACM"},{"key":"9_CR29","unstructured":"Shilton, Katie, Jeff Burke, Deborah Estrin, Mark Hansen, and Mani B. Srivastava. 2008. Participatory privacy in urban sensing. In Proceedings of the international workshop on mobile devices and urban sensing (MODUS), 1\u20137, St. Louis, Missouri, USA."},{"key":"9_CR30","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.pmcj.2010.04.001","volume":"7","author":"M Shin","year":"2010","unstructured":"Shin, Minho, Cory Cornelius, Dan Peebles, Apu Kapadia, David Kotz, and Nikos Triandopoulos. 2010. AnonySense: A system for anonymous opportunistic sensing. Journal of Pervasive and Mobile Computing 7: 16\u201330.","journal-title":"Journal of Pervasive and Mobile Computing"},{"key":"9_CR31","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, Latanya. 2002. K-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness, and Knowledge-Based Systems 10: 557\u2013570.","journal-title":"International Journal of Uncertainty, Fuzziness, and Knowledge-Based Systems"},{"key":"9_CR32","unstructured":"Whitten, Alma, and J. D. Tygar. 1999. Why Johnny can\u2019t Encrypt: A usability evaluation of PGP 5.0. In Proceedings of the 8th USENIX security symposium (SSYM), 14\u201329, Washington, DC, USA."},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Zibuschka, Jan, Lothar Fritsch, Mike Radmacher, Tobias Scherner, and Kai Rannenberg. 2007. Enabling privacy of real-life LBS: A platform for flexible mobile service provisioning. In Proceedings of the 22nd IFIP TC-11 international information security conference (SEC), 325\u2013336, Sandton, South Africa.","DOI":"10.1007\/978-0-387-72367-9_28"},{"key":"9_CR34","unstructured":"Global GSM and 3GSM Mobile Connections. http:\/\/www.gsm.com. Accessed Feb 2012."},{"key":"9_CR35","unstructured":"iPhone 4S Technical Specifications. http:\/\/www.apple.com. Accessed Feb 2012."},{"key":"9_CR36","unstructured":"Sun SPOT Main Board Technical Datasheet. http:\/\/www.sunspotworld.com. Accessed Feb 2012."},{"key":"9_CR37","unstructured":"TelosB Datasheet. http:\/\/www.memsic.com. Accessed Feb 2012."}],"container-title":["European Data Protection: Coming of Age"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-007-5170-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T02:21:51Z","timestamp":1675218111000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-94-007-5170-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,12]]},"ISBN":["9789400751842","9789400751705"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-94-007-5170-5_9","relation":{},"subject":[],"published":{"date-parts":[[2012,10,12]]},"assertion":[{"value":"12 October 2012","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}