{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T19:45:22Z","timestamp":1777146322983,"version":"3.51.4"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2010,12,7]],"date-time":"2010-12-07T00:00:00Z","timestamp":1291680000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1007\/s00779-010-0346-0","type":"journal-article","created":{"date-parts":[[2010,12,6]],"date-time":"2010-12-06T05:02:08Z","timestamp":1291611728000},"page":"679-694","source":"Crossref","is-referenced-by-count":113,"title":["Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs"],"prefix":"10.1007","volume":"15","author":[{"given":"Michael","family":"Benisch","sequence":"first","affiliation":[]},{"given":"Patrick Gage","family":"Kelley","sequence":"additional","affiliation":[]},{"given":"Norman","family":"Sadeh","sequence":"additional","affiliation":[]},{"given":"Lorrie Faith","family":"Cranor","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,12,7]]},"reference":[{"key":"346_CR1","doi-asserted-by":"crossref","unstructured":"Barkhuus L, Brown B, Bell M, Hall M, Sherwood S, Chalmers M (2008) From awareness to repartee: sharing location within social groups. In: Proceedings of the conference on human factors in computing systems (CHI)","DOI":"10.1145\/1357054.1357134"},{"key":"346_CR2","unstructured":"Barkhuus L, Dey A (2003) Location-based services for mobile telephony: a study of users\u2019 privacy concerns. In: Proceedings of the international conference on human-computer interaction (INTERACT)"},{"key":"346_CR3","unstructured":"Benisch M, Sadeh N, Sandholm T (2008) A theory of expressiveness in mechanisms. In: Proceedings of the national conference on artificial intelligence (AAAI)"},{"key":"346_CR4","unstructured":"Benisch M, Sadeh N, Sandholm T (2009) Methodology for designing reasonably expressive mechanisms with application to ad auctions. In: Proceedings of the international joint conference on artificial intelligence (IJCAI)"},{"key":"346_CR5","doi-asserted-by":"crossref","unstructured":"Burghardt T, Buchmann E, M\u00fcller J, B\u00f6hm K (2009) Understanding user preferences and awareness: privacy mechanisms in location-based services. In: Proceedings of the onthemove conferences (OTM)","DOI":"10.1007\/978-3-642-05148-7_21"},{"key":"346_CR6","doi-asserted-by":"crossref","unstructured":"Connelly K, Khalil A, Liu Y (2007) Do I do what I say? Observed versus stated privacy preferences. In: Proceedings of the international conference on human-computer interaction (INTERACT)","DOI":"10.1007\/978-3-540-74796-3_61"},{"key":"346_CR7","doi-asserted-by":"crossref","unstructured":"Consolovo S, Smith I, Matthews T, LaMarca A, Tabert J, Powledge P (2005) Location disclosure to social relations: why, when, and what people want to share. In: Proceedings of the conference on human factors in computing systems (CHI)","DOI":"10.1145\/1054972.1054985"},{"key":"346_CR8","doi-asserted-by":"crossref","unstructured":"Cornwell J, Fette I, Hsieh G, Prabaker M, Rao J, Tang K, Vaniea K, Bauer L, Cranor L, Hong J, McLaren B, Reiter M, Sadeh N (2007) User-controllable security and privacy for pervasive computing. In: Proceedings of the workshop on mobile computing systems and applications","DOI":"10.1109\/HotMobile.2007.9"},{"issue":"7196","key":"346_CR9","first-page":"779","volume":"453","author":"MC Gonzalez","year":"2008","unstructured":"Gonzalez MC, Hidalgo CA, Barabasi A-L (2008) Understanding individual human mobility patterns. Nature 453(7196):779\u2013782","journal-title":"Nat Biotechnol"},{"key":"346_CR10","unstructured":"K Group (2009) BIA\u2019s The Kelsey Group Forecasts U.S. mobile local search advertising revenues to reach $1.3B in 2013. http:\/\/www.kelseygroup.com\/press"},{"issue":"3","key":"346_CR11","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MPRV.2006.55","volume":"5","author":"J Hightower","year":"2006","unstructured":"Hightower J, LaMarca A, Smith IE (2006) Practical lessons from place lab. IEEE Pervasive Comput 5(3):32\u201339","journal-title":"IEEE Pervasive Comput"},{"key":"346_CR12","unstructured":"Huang S, Proulx F, Ratti C (2007) iFIND: a Peer-to-Peer application for real-time location monitoring on the MIT campus. In: International conference on computers in urban planning and urban management (CUPUM)"},{"key":"346_CR13","doi-asserted-by":"crossref","unstructured":"Iachello G, Smith I, Consolovo S, Abowd G, Hughes J, Howard J, Potter F, Scott J, Sohn T, Hightower J, LaMarca A (2005) Control, deception, and communication: evaluating the deployment of a location-enhanced messaging service. In: Proceedings of the international conference on ubiquitous computing (UbiComp)","DOI":"10.1007\/11551201_13"},{"key":"346_CR14","doi-asserted-by":"crossref","unstructured":"Kelley PG, Benisch M, Sadeh N, Cranor LF (2010) When are users comfortable sharing locations with advertisers? Technical Report CMU-ISR-10-126, Carnegie Mellon University","DOI":"10.21236\/ADA532822"},{"key":"346_CR15","doi-asserted-by":"crossref","unstructured":"Lederer S, Mankoff J, Dey AK (2003) Who wants to know what when? Privacy preference determinants in ubiquitous computing. In: Proceedings of the conference on human factors in computing systems (CHI)","DOI":"10.1145\/765891.765952"},{"key":"346_CR16","doi-asserted-by":"crossref","unstructured":"Mazurek M, Arsenault J, Bresee J, Gupta N, Ion I, Johns C, Lee D, Liang Y, Olsen J, Salmon B, Shay R, Vaniea K, Bauer L, Cranor L, Ganger G, Reiter M (2010) Access control for home data sharing: attitudes, needs and practices. In: Proceedings of the conference on human factors in computing systems (CHI)","DOI":"10.1145\/1753326.1753421"},{"key":"346_CR17","unstructured":"Miller CC, Wortham J (2010) Technology aside, most people still decline to be located. http:\/\/www.nytimes.com\/2010\/08\/30\/technology\/30location.html"},{"key":"346_CR18","doi-asserted-by":"crossref","unstructured":"Patil S, Lai J (2005) Who gets to know what when: configuring privacy permissions in an awareness application. In: Proceedings of the conference on human factors in computing systems (CHI)","DOI":"10.1145\/1054972.1054987"},{"key":"346_CR19","doi-asserted-by":"crossref","unstructured":"Sadeh N, Gandon F, Kwon OB (2006) Ambient intelligence: the MyCampus experience. In: Vasilakos T, Pedrycz W (eds) Ambient intelligence and pervasive computing. ArTech House, Norwood","DOI":"10.21236\/ADA481799"},{"issue":"6","key":"346_CR20","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1007\/s00779-008-0214-3","volume":"13","author":"N Sadeh","year":"2009","unstructured":"Sadeh N, Hong J, Cranor L, Fette I, Kelley P, Prabaker M, Rao J (2009) Understanding and capturing people\u2019s privacy policies in a mobile social networking application. J Pers Ubiquit Comput 13(6):401\u2013412","journal-title":"J Pers Ubiquit Comput"},{"key":"346_CR21","doi-asserted-by":"crossref","unstructured":"Simon HA (1957) Models of man. Wiley, New York","DOI":"10.2307\/2550441"},{"key":"346_CR22","doi-asserted-by":"crossref","unstructured":"Smith I, Consolovo S, LaMarca A, Hightower J, Scott J, Sohn T, Hughes J, Iachello G, Abowd G (2005) Social disclosure of place: from location technology to communication practices. In: Lecture notes in computer science: pervasive computing, pp 134\u2013151","DOI":"10.1007\/11428572_9"},{"key":"346_CR23","doi-asserted-by":"crossref","unstructured":"Toch E, Cranshaw J, Drielsma PH, Tsai JY, Kelley PG, Springfield J, Cranor L, Hong J, Sadeh N (2010) Empirical models of privacy in location sharing. In: International conference on Ubiquitous Computing (UbiComp), Copenhagen, Denmark","DOI":"10.1145\/1864349.1864364"},{"key":"346_CR24","unstructured":"Tsai J, Kelley P, Cranor L, Sadeh N (2009) Location-sharing technologies: privacy risks and controls. In: Research conference on communication, information and internet policy (TPRC)"},{"key":"346_CR25","doi-asserted-by":"crossref","unstructured":"Tsai J, Kelley P, Drielsma PH, Cranor LF, Hong J, Sadeh N (2009) Who\u2019s viewed you? The impact of feedback in a mobile-location system. In: Proceedings of the conference on human factors in computing systems (CHI)","DOI":"10.1145\/1518701.1519005"},{"key":"346_CR26","doi-asserted-by":"crossref","unstructured":"Wang Y, Lin J, Annavaram M, Jacobson QA, Hong J, Krishnamachari B, Sadeh N (2009) A framework of energy efficient mobile sensing for automatic user state recognition. In: International conference on mobile systems, applications, and services (MobiSys)","DOI":"10.1145\/1555816.1555835"},{"key":"346_CR27","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1145\/128756.128759","volume":"10","author":"R Want","year":"1992","unstructured":"Want R, Falc\u00e3o V, Gibbons J (1992) The active badge location system. ACM Trans Inf Syst 10:91\u2013102","journal-title":"ACM Trans Inf Syst"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-010-0346-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-010-0346-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-010-0346-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T20:50:53Z","timestamp":1559854253000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-010-0346-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12,7]]},"references-count":27,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2011,10]]}},"alternative-id":["346"],"URL":"https:\/\/doi.org\/10.1007\/s00779-010-0346-0","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,12,7]]}}}