{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T11:54:47Z","timestamp":1770897287742,"version":"3.50.1"},"reference-count":49,"publisher":"Informa UK Limited","issue":"3-4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Location Based Services"],"published-print":{"date-parts":[[2018,10,2]]},"DOI":"10.1080\/17489725.2018.1511839","type":"journal-article","created":{"date-parts":[[2018,9,13]],"date-time":"2018-09-13T16:13:46Z","timestamp":1536855226000},"page":"141-178","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":16,"title":["Privacy theory in practice: designing a user interface for managing location privacy on mobile devices"],"prefix":"10.1080","volume":"12","author":[{"given":"Mehrnaz","family":"Ataei","sequence":"first","affiliation":[{"name":"Institute for Geoinformatics, University of Muenster, Muenster, Germany"}]},{"given":"Auriol","family":"Degbelo","sequence":"additional","affiliation":[{"name":"Institute for Geoinformatics, University of Muenster, Muenster, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4199-8976","authenticated-orcid":false,"given":"Christian","family":"Kray","sequence":"additional","affiliation":[{"name":"Institute for Geoinformatics, University of Muenster, Muenster, Germany"}]}],"member":"301","published-online":{"date-parts":[[2018,9,13]]},"reference":[{"issue":"12","key":"CIT0001","first-page":"42","volume":"22","author":"Abbas R.","year":"2015","journal-title":"International Review of Information Ethics"},{"key":"CIT0002","unstructured":"Assad, M., D. Carmichael, J. Kay, and B. Kummerfeld. 2007. \u201cGiving Users Control over Location Privacy.\u201d Paper presented at the Workshop on UbiComp Privacy, Technologies, Users, Policy, Innsbruck, Austria, September 16."},{"key":"CIT0003","doi-asserted-by":"crossref","unstructured":"Ataei, M., and C. Kray. 2017. \u201cEphemerality Is the New Black: A Novel Perspective on Location Data Management and Location Privacy in LBS\u201d. InProgress in Location-Based Services 2016: Lecture Notes in Geoinformation and Cartography, edited by G. Gartner and H. Huang, 357\u2013373. Cham: Springer.","DOI":"10.1007\/978-3-319-47289-8_18"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-010-0346-0"},{"key":"CIT0006","doi-asserted-by":"crossref","unstructured":"Beresford, A. R., and F. Stajano. 2004. \u201cMix Zones: User Privacy in Location-Aware Services.\u201d InProceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW \u201904), 127. Washington, DC: IEEE.","DOI":"10.1109\/PERCOMW.2004.1276918"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1145\/1864349.1864381"},{"issue":"2","key":"CIT0008","first-page":"1","volume":"3","author":"Cavoukian A.","year":"2010","journal-title":"Identity in the Information Society"},{"key":"CIT0009","first-page":"53","volume-title":"Symposium on Usable Privacy and Security (SOUPS) 2015","author":"Chanchary F.","year":"2015"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335358"},{"key":"CIT0011","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1145\/1772690.1772718","volume-title":"Proceedings of the 19th International Conference on World Wide Web","author":"Church K.","year":"2010"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1145\/42411.42413"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1080\/17489725.2011.637969"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1054985"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1145\/1165734.1165735"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11879-6_18"},{"key":"CIT0018","first-page":"35","volume-title":"Dynamic and Mobile GIS: Investigating Changes in Space and Time","author":"Duckham M.","year":"2006"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493433"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660270"},{"key":"CIT0021","first-page":"753","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Fawaz K.","year":"2015"},{"key":"CIT0022","volume-title":"Joint Workshop on Ubiquitous, Pervasive and Internet Mapping (Upimap2004)","author":"Gartner G.","year":"2004"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073008"},{"key":"CIT0024","first-page":"39","volume-title":"Symposium on Usable Privacy and Security (SOUPS) 2015","author":"Kang R.","year":"2015"},{"key":"CIT0025","first-page":"69","volume-title":"Tenth Symposium on Usable Privacy and Security, SOUPS 2014","author":"Korff S.","year":"2014"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0212-5"},{"key":"CIT0027","volume-title":"Privacy Indexes: A Survey of Westin\u2019s Studies","author":"Kumaraguru P.","year":"2005"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45809-3_19"},{"key":"CIT0029","first-page":"199","volume-title":"Tenth Symposium on Usable Privacy and Security, SOUPS 2014","author":"Lin J.","year":"2014"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-012-0610-6"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.3758\/BF03200735"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1111\/1540-4560.00071"},{"key":"CIT0033","volume-title":"Three Theories of Privacy: An Overview","author":"Margulis S. T.","year":"2011"},{"key":"CIT0034","unstructured":"Narayanan, A., N. Thiagarajan, M. Lakhani, M. Hamburg, D. Boneh, et al. 2011. \u201cLocation Privacy via Private Proximity Testing.\u201d Paper presented at the NDSS Symposium 2011, San Diego, CA, February 6-9."},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_6"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335363"},{"key":"CIT0037","volume-title":"A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management","author":"Pfitzmann A.","year":"2010"},{"key":"CIT0038","first-page":"17","volume-title":"13th International Conference on GeoInformatics","author":"Rinner C.","year":"2005"},{"key":"CIT0039","first-page":"1","volume-title":"Eleventh Symposium on Usable Privacy and Security (SOUPS 2015)","author":"Schaub F.","year":"2015"},{"issue":"4","key":"CIT0040","first-page":"47","volume":"1","author":"Scipioni M. P.","year":"2011","journal-title":"Journal Internet Services Information Secure"},{"key":"CIT0041","volume-title":"Designing the User Interface: Strategies for Effective Human-Computer Interaction","author":"Shneiderman B.","year":"2010"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1080\/17489725.2015.1027750"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/619767"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1145\/1864349.1864364"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1519005"},{"issue":"2","key":"CIT0047","first-page":"119","volume":"6","author":"Tsai J. Y.","year":"2010","journal-title":"A Journal of Law and Policy for the Information Society"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1080\/1352726042000263575"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1111\/1540-4560.00072"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1145\/2557500.2557504"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1145\/3139958.3140057"}],"container-title":["Journal of Location Based Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/17489725.2018.1511839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T05:54:02Z","timestamp":1751867642000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/17489725.2018.1511839"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,13]]},"references-count":49,"journal-issue":{"issue":"3-4","published-online":{"date-parts":[[2018,11,14]]},"published-print":{"date-parts":[[2018,10,2]]}},"alternative-id":["10.1080\/17489725.2018.1511839"],"URL":"https:\/\/doi.org\/10.1080\/17489725.2018.1511839","relation":{},"ISSN":["1748-9725","1748-9733"],"issn-type":[{"value":"1748-9725","type":"print"},{"value":"1748-9733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,13]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tlbs20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tlbs20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}