{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T02:01:19Z","timestamp":1750039279857,"version":"3.37.3"},"reference-count":94,"publisher":"Informa UK Limited","issue":"12","license":[{"start":{"date-parts":[[2021,11,26]],"date-time":"2021-11-26T00:00:00Z","timestamp":1637884800000},"content-version":"unspecified","delay-in-days":175,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Canada First Research Excellence Fund \/ Global Water Futures"},{"DOI":"10.13039\/501100000155","name":"Social Sciences and Humanities Research Council of Canada","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100000155","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Geographical Information Science"],"published-print":{"date-parts":[[2021,12,2]]},"DOI":"10.1080\/13658816.2021.1931236","type":"journal-article","created":{"date-parts":[[2021,6,5]],"date-time":"2021-06-05T00:27:39Z","timestamp":1622852859000},"page":"2540-2566","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":14,"title":["Decentralized geoprivacy: leveraging social trust on the distributed web"],"prefix":"10.1080","volume":"35","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7350-0055","authenticated-orcid":false,"given":"Majid","family":"Hojati","sequence":"first","affiliation":[{"name":"Department of Geography & Environmental Studies, Wilfrid Laurier University, Waterloo, Ontario, Canada"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Carson","family":"Farmer","sequence":"additional","affiliation":[{"name":"Textile.io, Victoria, BC, Canada"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1061-9045","authenticated-orcid":false,"given":"Rob","family":"Feick","sequence":"additional","affiliation":[{"name":"School of Planning, University of Waterloo, Waterloo, Ontario, Canada"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Colin","family":"Robertson","sequence":"additional","affiliation":[{"name":"Department of Geography & Environmental Studies, Wilfrid Laurier University, Waterloo, Ontario, Canada"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"301","published-online":{"date-parts":[[2021,6,4]]},"reference":[{"volume-title":"2018 3rd International Conference on Smart and Sustainable Technologies (SpliTech). Split, Croatia","year":"2018","author":"Alessi M.","key":"cit0001"},{"key":"cit0002","first-page":"787","volume-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI \u201915","author":"Almuhimedi H.","year":"2015"},{"issue":"3","key":"cit0003","first-page":"62","volume":"7","author":"Alrayes F.","year":"2014","journal-title":"International Journal on Advances in Security"},{"key":"cit0004","doi-asserted-by":"publisher","DOI":"10.1177\/1473871615581216"},{"key":"cit0005","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-0258(19990315)18:5<497::AID-SIM45>3.0.CO;2-#"},{"key":"cit0006","unstructured":"Auxer, B. et al. 2019. Americans and privacy: concerned, confused and feeling lack of control over their personal information. Nov. Available from: https:\/\/www.pewresearch.org\/internet\/2019\/11\/15\/americans-and-privacy-concerned-confused-and-feeling-lack-of-control-over-their-personal-information\/."},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3571-0_8"},{"key":"cit0008","unstructured":"Benet, J., 2014. Ipfs-content addressed, versioned, p2p file system. arXiv preprint arXiv:1407.3561."},{"key":"cit0009","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-010-0346-0"},{"issue":"37","key":"cit0010","volume":"3","author":"Buterin V.","year":"2014","journal-title":"White Paper"},{"journal-title":"Information & Privacy Commissioner Ontario, Canada","year":"2009","author":"Cavoukian A.","key":"cit0011"},{"key":"cit0012","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2650"},{"key":"cit0013","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.57"},{"key":"cit0014","doi-asserted-by":"publisher","DOI":"10.1145\/1183471.1183500"},{"key":"cit0015","doi-asserted-by":"publisher","DOI":"10.1007\/s10707-009-0099-y"},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.1080\/13658816.2015.1085540"},{"key":"cit0017","doi-asserted-by":"publisher","DOI":"10.1177\/0002764204268987"},{"key":"cit0018","doi-asserted-by":"publisher","DOI":"10.1016\/S0277-9536(00)00295-1"},{"key":"cit0019","doi-asserted-by":"publisher","DOI":"10.1080\/13658816.2016.1172314"},{"key":"cit0020","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2018.02.014"},{"key":"cit0021","doi-asserted-by":"publisher","DOI":"10.1177\/2053951716648346"},{"volume-title":"Good data","year":"2019","author":"Daly A.","key":"cit0022"},{"key":"cit0023","doi-asserted-by":"publisher","DOI":"10.1080\/13658816.2014.996567"},{"volume-title":"3rd International Conference on Information Society Technology and Management","year":"2013","author":"Dimitrijevi D.","key":"cit0024"},{"key":"cit0025","unstructured":"DocNow. 2020. Hydrator [computer software]. Available from: https:\/\/github.com\/docnow\/hydrator."},{"key":"cit0026","doi-asserted-by":"publisher","DOI":"10.1145\/2187980.2188041"},{"key":"cit0027","first-page":"35","volume":"3","author":"Duckham M.","year":"2006","journal-title":"Dynamic & Mobile GIS: Investigating Change in Space and Time"},{"key":"cit0028","unstructured":"European Data Protection Regulation. 2016. General data protection regulation (gdpr). European Parliament and Council of the European Union. Available from: https:\/\/gdpr-info.eu."},{"key":"cit0029","doi-asserted-by":"publisher","DOI":"10.1093\/biostatistics\/5.2.177"},{"key":"cit0030","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2151-7"},{"key":"cit0031","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-32-9915-3_25"},{"key":"cit0032","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2009.10.001"},{"key":"cit0033","doi-asserted-by":"crossref","unstructured":"Ghinita, G., Kalnis, P., and Skiadopoulos, S., 2007. Mobihide: a mobilea peer-to-peer system for anonymous location-based queries, Lecture Notes in Computer Science, Vol. 4605, Springer Berlin Heidelberg. 221\u2013238. doi:10.1007\/978-3-540-73540-3_13","DOI":"10.1007\/978-3-540-73540-3_13"},{"key":"cit0034","doi-asserted-by":"crossref","unstructured":"Goodchild, M.F. 2018. Big Geodata. in\u00a0Gis Applications for Socio-Economics and Humanity.\u00a0vol. 3, Elsevier Inc., pp. 19-25.\u00a0https:\/\/doi.org\/10.1016\/B978-0-12-409548-9.09595-6. Available from: https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B9780124095489095956","DOI":"10.1016\/B978-0-12-409548-9.09595-6"},{"key":"cit0035","unstructured":"The Gordon Foundation. 2018. Blockchain technology put to new use in freshwater health. Available from: https:\/\/gordonfoundation.ca\/resource\/blockchain-technology-put-to-new-use-in-freshwater-health\/."},{"key":"cit0036","doi-asserted-by":"crossref","unstructured":"Gudes, E. and Voloch, N., 2018. An information-flow control model for online social networks based on user-attribute credibility and connection-strength factors, Lecture Notes in Computer Science, Vol. 10879, Springer International Publishing, Beer Sheva, Israel. 55\u201367. doi:10.1007\/978-3-319-94147-9_5","DOI":"10.1007\/978-3-319-94147-9_5"},{"key":"cit0037","first-page":"178","volume-title":"Proceedings of the 9th International AAAI Conference on Web and Social Media (ICWSM)","author":"Hutton L.","year":"2015"},{"key":"cit0038","doi-asserted-by":"publisher","DOI":"10.1007\/978-88-470-1818-1_11"},{"key":"cit0039","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-017-9810-y"},{"key":"cit0040","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979299"},{"key":"cit0041","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-015-0029-1"},{"key":"cit0042","doi-asserted-by":"publisher","DOI":"10.1111\/tgis.12305"},{"key":"cit0043","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73540-3_14"},{"key":"cit0044","doi-asserted-by":"publisher","DOI":"10.1109\/PERSER.2005.1506394"},{"key":"cit0045","doi-asserted-by":"publisher","DOI":"10.1177\/1556264614544103"},{"key":"cit0046","doi-asserted-by":"publisher","DOI":"10.1177\/1556264618759877"},{"key":"cit0047","unstructured":"Lamsal, R., 2020. Coronavirus (covid-19) geo-tagged tweets dataset. Available from: https:\/\/ieee-dataport.org\/open-access\/coronavirus-covid-19-geo-tagged-tweets-dataset."},{"key":"cit0048","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9663.2010.00649.x"},{"key":"cit0049","doi-asserted-by":"publisher","DOI":"10.14714\/CP49.439"},{"key":"cit0050","doi-asserted-by":"crossref","unstructured":"Levy, S., Gudes, E., and Gal-Oz, N., 2016. Sharing-habits based privacy control in social networks, Lecture Notes in Computer Science, Vol. 9766, Springer International Publishing. 217\u2013232. doi:10.1007\/978-3-319-41483-6_16","DOI":"10.1007\/978-3-319-41483-6_16"},{"issue":"4","key":"cit0051","first-page":"1","volume":"3","author":"Liang S.","year":"2008","journal-title":"power"},{"key":"cit0052","first-page":"27","volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)","author":"Liu B.","year":"2016"},{"key":"cit0053","doi-asserted-by":"publisher","DOI":"10.1016\/j.cag.2015.08.005"},{"key":"cit0054","doi-asserted-by":"publisher","DOI":"10.1080\/17538947.2014.927597"},{"journal-title":"SSRN Electronic Journal","year":"2019","author":"Martin K.E.M.","key":"cit0055"},{"key":"cit0056","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_5"},{"key":"cit0057","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0150"},{"key":"cit0058","doi-asserted-by":"publisher","DOI":"10.15446\/ing.investig.v35n2.50339"},{"key":"cit0059","doi-asserted-by":"publisher","DOI":"10.1145\/2675682.2676399"},{"key":"cit0060","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.03.014"},{"key":"cit0061","unstructured":"Oppenheim, M., 2018. People are starting to trust \u201ctraditional\u201d media over social media, report finds. Jan. Available from: http:\/\/www.independent.co.uk\/news\/uk\/home-news\/edelman-trust-barometer-social-media-trust-declined-a8170816.html."},{"key":"cit0062","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.04.013"},{"key":"cit0063","unstructured":"Partovi, A. et al. 2020. Ensuring privacy in location-based services: a model-based approach."},{"key":"cit0064","doi-asserted-by":"publisher","DOI":"10.1109\/IGARSS.2016.7729935"},{"key":"cit0065","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.29"},{"key":"cit0066","doi-asserted-by":"publisher","DOI":"10.1559\/152304003100011090"},{"volume-title":"Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression","year":"1998","author":"Samarati P.","key":"cit0067"},{"key":"cit0068","doi-asserted-by":"publisher","DOI":"10.1080\/13658816.2019.1567736"},{"key":"cit0069","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45738-3_6"},{"key":"cit0070","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2013.20"},{"key":"cit0071","doi-asserted-by":"publisher","DOI":"10.1080\/13658816.2015.1101767"},{"key":"cit0072","doi-asserted-by":"publisher","DOI":"10.1016\/j.landurbplan.2015.02.020"},{"key":"cit0073","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00253"},{"key":"cit0074","doi-asserted-by":"publisher","DOI":"10.1177\/0309132518772661"},{"key":"cit0075","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"cit0076","doi-asserted-by":"publisher","DOI":"10.4337\/9781784714789"},{"key":"cit0077","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2017.03.027"},{"key":"cit0078","unstructured":"Twitter. 2020. Twitter trends faqs. Available from: https:\/\/help.twitter.com\/en\/using-twitter\/twitter-trending-faqs."},{"volume-title":"Uber h3-js","year":"2020","author":"Uber","key":"cit0079"},{"key":"cit0080","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2103405"},{"key":"cit0081","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20951-3_14"},{"key":"cit0082","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33716-2_2"},{"key":"cit0083","doi-asserted-by":"publisher","DOI":"10.2747\/0272-3638.33.2.256"},{"key":"cit0084","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2010.13"},{"key":"cit0085","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1800290"},{"key":"cit0086","doi-asserted-by":"crossref","unstructured":"Yancey, W.E., Winkler, W.E., and Creecy, R.H. 2002. Disclosure risk assessment in perturbative microdata protection, Lecture Notes in Computer Science. Springer. 135\u2013152. doi:10.1007\/3-540-47804-3_11","DOI":"10.1007\/3-540-47804-3_11"},{"key":"cit0087","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497445"},{"key":"cit0088","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.185"},{"key":"cit0089","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2007.58"},{"key":"cit0090","doi-asserted-by":"publisher","DOI":"10.1145\/3139958.3140057"},{"key":"cit0091","doi-asserted-by":"publisher","DOI":"10.1080\/15230406.2015.1095655"},{"key":"cit0092","doi-asserted-by":"publisher","DOI":"10.1080\/19475683.2017.1280536"},{"key":"cit0093","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2009.4912774"},{"key":"cit0094","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.2004.1342682"}],"container-title":["International Journal of Geographical Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/13658816.2021.1931236","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T20:05:02Z","timestamp":1638302702000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/13658816.2021.1931236"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,4]]},"references-count":94,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2021,12,2]]}},"alternative-id":["10.1080\/13658816.2021.1931236"],"URL":"https:\/\/doi.org\/10.1080\/13658816.2021.1931236","relation":{},"ISSN":["1365-8816","1362-3087"],"issn-type":[{"type":"print","value":"1365-8816"},{"type":"electronic","value":"1362-3087"}],"subject":[],"published":{"date-parts":[[2021,6,4]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tgis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tgis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-08-18","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-05-13","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}