{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T08:58:40Z","timestamp":1770973120091,"version":"3.50.1"},"reference-count":65,"publisher":"Informa UK Limited","issue":"2","funder":[{"DOI":"10.13039\/501100000269","name":"ESRC \u2013 Retail Business Datasafe","doi-asserted-by":"publisher","award":["ES\/L011840\/1"],"award-info":[{"award-number":["ES\/L011840\/1"]}],"id":[{"id":"10.13039\/501100000269","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Geographical Information Science"],"published-print":{"date-parts":[[2020,2,1]]},"DOI":"10.1080\/13658816.2019.1587616","type":"journal-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T06:21:18Z","timestamp":1552890078000},"page":"325-343","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":29,"title":["Estimating real-time high-street footfall from Wi-Fi probe requests"],"prefix":"10.1080","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2607-496X","authenticated-orcid":false,"given":"Balamurugan","family":"Soundararaj","sequence":"first","affiliation":[{"name":"Department of Geography, University College London, London, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4552-5989","authenticated-orcid":false,"given":"James","family":"Cheshire","sequence":"additional","affiliation":[{"name":"Department of Geography, University College London, London, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4727-6384","authenticated-orcid":false,"given":"Paul","family":"Longley","sequence":"additional","affiliation":[{"name":"Department of Geography, University College London, London, UK"}]}],"member":"301","published-online":{"date-parts":[[2019,3,17]]},"reference":[{"key":"CIT0001","volume-title":"Australasian Transport Research Forum (ATRF) 14. Brisbane, Queensland, Australia","author":"Abbott-Jard M.","year":"2013"},{"key":"CIT0002","unstructured":"Abedi, N., Bhaskar, A., and Chung, E., 2013. Bluetooth and Wi-Fi mac address based crowd data collection and monitoring: benefits, challenges and enhancement."},{"key":"CIT0003","volume-title":"Seeing like a city","author":"Amin A.","year":"2017"},{"key":"CIT0004","first-page":"265","volume-title":"Proceedings of the 13th ACM Internet measurement conference","author":"Barbera M.V.","year":"2013"},{"key":"CIT0005","first-page":"395","volume-title":"Computing, Networking and Communications (ICNC), 2015 International Conference on","author":"Bloessl B.","year":"2015"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2012.09.009"},{"key":"CIT0007","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1145\/1460412.1460455","volume-title":"Proceedings of the 6th ACM conference on Embedded network sensor systems","author":"Campbell A.T.","year":"2008"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1088\/1751-8113\/41\/22\/224015"},{"key":"CIT0009","unstructured":"CDRC, 2016. Smart street sensor project. goo.gl\/E4tR8o. [Online; accessed 31-January-2018]."},{"key":"CIT0010","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1145\/2942358.2942373","volume-title":"Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing","author":"Cheng L.","year":"2016"},{"key":"CIT0011","first-page":"1","volume-title":"Military Communications Conference (MILCOM), 2012","author":"Cheng N.","year":"2012"},{"key":"CIT0012","unstructured":"Combs, G. and Contributors, 2018. Wireshark - network protocol analyzer. https:\/\/www.wireshark.org\/about.html."},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-013-0196-1"},{"key":"CIT0014","first-page":"1","volume-title":"World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012 IEEE International Symposium on a","author":"Cunche M.","year":"2012"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2013.04.001"},{"key":"CIT0016","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/2611264.2611266","volume-title":"Proceedings of the 2014 workshop on physical analytics","author":"Demir L.","year":"2014"},{"key":"CIT0017","first-page":"1","volume-title":"Computer Communications, IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on","author":"Di Luzio A.","year":"2016"},{"key":"CIT0018","first-page":"16","volume-title":"USENIX Security Symposium","volume":"3","author":"Franklin J.","year":"2006"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766517"},{"key":"CIT0020","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1145\/2638728.2641312","volume-title":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication","author":"Fukuzaki Y.","year":"2014"},{"key":"CIT0021","doi-asserted-by":"crossref","first-page":"1519","DOI":"10.1145\/2800835.2801623","volume-title":"Adjunct Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers","author":"Fukuzaki Y.","year":"2015"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.3390\/data4010008"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1038\/nature06958"},{"key":"CIT0024","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/1378600.1378607","volume-title":"Proceedings of the 6th international conference on Mobile systems, applications, and services","author":"Greenstein B.","year":"2008"},{"key":"CIT0025","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1145\/938985.938995","volume-title":"Proceedings of the 9th annual international conference on Mobile computing and networking","author":"He T.","year":"2003"},{"key":"CIT0026","volume-title":"Agent-based models of geographical systems","author":"Heppenstall A.J.","year":"2011"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1145\/3264925"},{"key":"CIT0028","first-page":"1","volume-title":"IEEE Std 802.11-2016 (Revision of IEEE Std 802.11-2012)","author":"IEEE","year":"2016"},{"key":"CIT0029","first-page":"638","volume-title":"International Work-Conference on Artificial Neural Networks","author":"Kawaguchi N.","year":"2009"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1016\/j.compenvurbsys.2017.01.011"},{"key":"CIT0031","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1007\/11428572_8","volume-title":"International Conference on Pervasive Computing","author":"LaMarca A.","year":"2005"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5560598"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretconser.2016.02.007"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1007\/s12061-018-9250-1"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctvqhsn6"},{"key":"CIT0036","first-page":"1","volume-title":"Vehicular Technology Conference Fall (VTC 2010-Fall), 2010 IEEE 72nd","author":"Lu H.","year":"2010"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1080\/00045608.2015.1022089"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0054"},{"key":"CIT0039","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1145\/2991079.2991098","volume-title":"Proceedings of the 32nd Annual Conference on Computer Security Applications","author":"Martin J.","year":"2016"},{"key":"CIT0040","volume-title":"Location and space in social administration","author":"Massam B.H.","year":"1975"},{"key":"CIT0041","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/2939918.2939930","volume-title":"Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks","author":"Matte C.","year":"2016"},{"key":"CIT0042","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1031495.1031502","volume-title":"Proceedings of the 2nd international conference on Embedded networked sensor systems","author":"Moore D.","year":"2004"},{"key":"CIT0043","first-page":"157","volume-title":"Future Generation Communication Technology (FGCT), 2013 Second International Conference on","author":"Mowafi Y.","year":"2013"},{"key":"CIT0044","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1145\/2070942.2071023","volume-title":"Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems","author":"Musa A.","year":"2011"},{"key":"CIT0045","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1145\/2426656.2426685","volume-title":"Proceedings of the 10th ACM conference on embedded network sensor systems","author":"Musa A.","year":"2012"},{"key":"CIT0046","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1145\/2037556.2037602","volume-title":"Proceedings of the 12th annual international digital government research conference: digital government innovation in challenging times","author":"Nam T.","year":"2011"},{"key":"CIT0047","doi-asserted-by":"crossref","unstructured":"Pang, J. et al. 2007. 802.11 user fingerprinting. In: Proceedings of the 13th annual ACM international conference on Mobile computing and networking. ACM, 99\u2013110, Montr\u00e9al, Qu\u00e9bec, Canada.","DOI":"10.1145\/1287853.1287866"},{"key":"CIT0048","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1109\/MDM.2015.33","volume-title":"Mobile Data Management (MDM), 2015 16th IEEE International Conference on","volume":"1","author":"Pinelli F.","year":"2015"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/927940"},{"key":"CIT0050","first-page":"35","volume-title":"LoCA","volume":"2007","author":"Rekimoto J.","year":"2007"},{"key":"CIT0051","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1145\/1869983.1870015","volume-title":"Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems","author":"Rose I.","year":"2010"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0130824"},{"key":"CIT0053","first-page":"171","volume-title":"Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services","author":"Schauer L.","year":"2014"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1002\/geo2.7"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1126\/science.1177170"},{"key":"CIT0056","unstructured":"Soundararaj, B., 2018. Clicker - an Android app for counting pedestrian footfalls with accuracy. https:\/\/play.google.com\/store\/apps\/details?id=com.bala.manualcount."},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.1080\/00045600701734133"},{"key":"CIT0058","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1145\/2897845.2897883","volume-title":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","author":"Vanhoef M.","year":"2016"},{"key":"CIT0059","first-page":"254","volume-title":"Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing","author":"Venerandi A.","year":"2015"},{"key":"CIT0060","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/2939918.2939936","volume-title":"Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks","author":"Vo-Huu T.D.","year":"2016"},{"key":"CIT0061","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1145\/2971648.2971670","volume-title":"Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing","author":"Wang W.","year":"2016"},{"key":"CIT0062","doi-asserted-by":"publisher","DOI":"10.1094\/PDIS-02-13-0213-PDN"},{"key":"CIT0063","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1145\/1869983.1870012","volume-title":"Proceedings of the 8th ACM conference on Embedded Networked Sensor Systems","author":"Xi W.","year":"2010"},{"key":"CIT0064","doi-asserted-by":"publisher","DOI":"10.5121\/ijwmn.2013.5402"},{"key":"CIT0065","volume-title":"The IET International Conference on Wireless, Mobile and Multimedia Networks (ICWMMN 2006)","author":"Zarimpas V.","year":"2006"}],"container-title":["International Journal of Geographical Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/13658816.2019.1587616","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,15]],"date-time":"2021-01-15T07:05:48Z","timestamp":1610694348000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/13658816.2019.1587616"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,17]]},"references-count":65,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,2,1]]}},"alternative-id":["10.1080\/13658816.2019.1587616"],"URL":"https:\/\/doi.org\/10.1080\/13658816.2019.1587616","relation":{},"ISSN":["1365-8816","1362-3087"],"issn-type":[{"value":"1365-8816","type":"print"},{"value":"1362-3087","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,17]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tgis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tgis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2018-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-02-22","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-03-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}