{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T15:31:31Z","timestamp":1771860691707,"version":"3.50.1"},"reference-count":67,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2014,2,25]],"date-time":"2014-02-25T00:00:00Z","timestamp":1393286400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,2,25]]},"abstract":"<jats:sec>\n               <jats:title content-type=\"abstract-heading\">Purpose<\/jats:title>\n               <jats:p> \u2013 The purpose of this paper is to comprehensively review existing literature regarding the ethical dilemmas posed by location-based services (LBS) and their impact upon the adoption of a regulatory framework. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title>\n               <jats:p> \u2013 This paper employs a qualitative approach for reviewing LBS scholarship, in which existing knowledge is presented in narrative form and is critiqued thematically. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Findings<\/jats:title>\n               <jats:p> \u2013 In reviewing contemporary scholarship, the value of technical, social and environmental considerations is demonstrated. This encourages an understanding of the complexities, multiple interests and contextual factors that must be incorporated into the examination of LBS regulation in any social context. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title>\n               <jats:p> \u2013 Approximately 85 per cent of handsets now have a global positioning system chipset on board. LBS affect a great number of mobile users. This research will create awareness among users of the potential benefits and harms that can come from the (mis)use of the technology. It will also promote an awareness of the complexities surrounding LBS regulation, drawing attention to the importance of collaboration and involvement of LBS stakeholders in the regulatory process. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title>\n               <jats:p> \u2013 Defines the ethical dilemmas of LBS that influence regulatory choices through a review of applicable literature and proposes that future research simultaneously address technical, social and environmental factors relevant to LBS.<\/jats:p>\n            <\/jats:sec>","DOI":"10.1108\/itp-12-2012-0156","type":"journal-article","created":{"date-parts":[[2014,1,24]],"date-time":"2014-01-24T13:16:07Z","timestamp":1390569367000},"page":"2-20","source":"Crossref","is-referenced-by-count":43,"title":["The regulatory considerations and ethical dilemmas of location-based services (LBS)"],"prefix":"10.1108","volume":"27","author":[{"given":"Roba","family":"Abbas","sequence":"first","affiliation":[]},{"given":"Katina","family":"Michael","sequence":"additional","affiliation":[]},{"given":"MG","family":"Michael","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2021010303015897200_b1","unstructured":"Alanen, J.\n                and \n                  Autio, E.\n                (2003), \u201cChapter Ix. Mobile business services: a strategic perspective\u201d, in \n                  Mennecke, B.E.\n                and \n                  Strader, T.J.\n                (Eds), Mobile Commerc: Technology, Theory and Applications, Idea Group Publishing, Hershey, PA, pp. 162-184."},{"key":"key2021010303015897200_b2","unstructured":"Astroth, J.\n                (2003), \u201cChapter XV. Location-based services: criteria for adoption and solution deployment\u201d, in \n                  Mennecke, B.E.\n                and \n                  Strader, T.J.\n                (Eds), Mobile Commerce: Technology, Theory and Applications, Idea Group Publishing, Hershey,PA, pp. 268-278."},{"key":"key2021010303015897200_b223","unstructured":"Australian Communications and Media Authority\n                (2010), \u201cMobile phone technology and special features fact sheet\u201d, available at: www.acma.gov.au\/WEB\/STANDARD\/pc_PC_1713 (accessed 9 January 2012)."},{"key":"key2021010303015897200_b3","unstructured":"Aveyard, H.\n                (2010), Doing a Literature Review in Health and Social Care: A Practical Guide\/Helen Aveyard, McGraw-Hill\/Open University Press, Maidenhead, p. -."},{"key":"key2021010303015897200_b4","doi-asserted-by":"crossref","unstructured":"Barnes, S.J.\n                (2002), \u201cThe mobile commerce value chain: analysis and future developments\u201d, International Journal of Information Management, Vol. 22 No. 2, pp. 91-108.","DOI":"10.1016\/S0268-4012(01)00047-0"},{"key":"key2021010303015897200_b5","doi-asserted-by":"crossref","unstructured":"Basit, T.N.\n                (2003), \u201cManual or electronic? The role of coding in qualitative data analysis\u201d, Educational Research, Vol. 45 No. 2, pp. 143-154.","DOI":"10.1080\/0013188032000133548"},{"key":"key2021010303015897200_b6","unstructured":"Bauer, H.H.\n               , \n                  Barnes, S.J.\n               , \n                  Reichardt, T.\n                and \n                  Neumann, M.M.\n                (2005), \u201cDriving the consumer acceptance of mobile marketing: a theoretical framework and empirical study\u201d, Journal of Electronic Commerce Research, Vol. 6 No. 3, pp. 181-192."},{"key":"key2021010303015897200_b8","doi-asserted-by":"crossref","unstructured":"Buetow, S.\n                (2010), \u201cThematic analysis and its reconceptualization as \u2018Saliency Analysis\u2019\u201d, Journal of Health Services Research & Policy, Vol. 15 No. 12, pp. 123-125.","DOI":"10.1258\/jhsrp.2009.009081"},{"key":"key2021010303015897200_b9","doi-asserted-by":"crossref","unstructured":"Casal, C.R.\n                (2004), \u201cImpact of location-aware services on the privacy\/security balance\u201d, Info: The Journal of Policy, Regulation and Strategy for Telecommunications, Information and Media, Vol. 6 No. 2, pp. 105-111.","DOI":"10.1108\/14636690410542108"},{"key":"key2021010303015897200_b10","unstructured":"Cavoukian, A.\n                (2009), \u201cPrivacy by design: the answer to overcoming negative externalities arising from poor management of personal data\u201d, Presentation, Trust Economics Workshop, London, 23 June, pp. 1-30."},{"key":"key2021010303015897200_b222","unstructured":"Cho, G.\n                (1988), Geographic Information Systems and the Law: Mapping the Legal Frontiers, John Wiley & Sons, Chichester, 337pp."},{"key":"key2021010303015897200_b11","doi-asserted-by":"crossref","unstructured":"Clarke, R.\n                (1988), \u201cInformation technology and dataveillance\u201d, Communications of the ACM, Vol. 31 No. 5, pp. 498-512.","DOI":"10.1145\/42411.42413"},{"key":"key2021010303015897200_b12","unstructured":"Clarke, R.\n                (2001a), \u201cIntroducing pits and pets: technologies affecting privacy\u201d, available at: www.rogerclarke.com\/DV\/PITsPETs.html (accessed 23 October 2011)."},{"key":"key2021010303015897200_b13","doi-asserted-by":"crossref","unstructured":"Clarke, R.\n                (2001b), \u201cPerson location and person tracking \u2013 technologies, risks and policy implications\u201d, Information Technology & People, Vol. 14 No. 2, pp. 206-231.","DOI":"10.1108\/09593840110695767"},{"key":"key2021010303015897200_b14","unstructured":"Clarke, R.\n                (2007), \u201cChapter 3. What \u2018Uberveillance\u2019 is and what to do about it\u201d, in \n                  Michael, K.\n                and \n                  Michael, M.G.\n                (Eds), The Second Workshop on the Social Implications of National Security (from Dataveillance to Uberveillance and the Realpolitik of the Transparent Society), University of Wollongong, IP Location-Based Services Research Program (Faculty of Informatics) and Centre for Transnational Crime Prevention (Faculty of Law), Wollongong, pp. 27-46."},{"key":"key2021010303015897200_b15","doi-asserted-by":"crossref","unstructured":"Cleff, E.B.\n                (2010), \u201cEffective approaches to regulate mobile advertising: moving towards a coordinated legal, self-regulatory and technical response\u201d, Computer Law & Security Review, Vol. 26 No. 2, pp. 158-169.","DOI":"10.1016\/j.clsr.2009.11.009"},{"key":"key2021010303015897200_b16","unstructured":"DCITA\n                (2006), Review of the Regulation of Content Delivered over Convergent Devices, DCITA, available at: www.archive.dbcde.gov.au\/2008\/01\/review_of_the_regulation_of_content_delivered_over_convergent_devices (accessed 12 December 2009)."},{"key":"key2021010303015897200_b17","doi-asserted-by":"crossref","unstructured":"De Hert, P.\n               , \n                  Gutwirth, S.\n               , \n                  Moscibroda, A.\n               , \n                  Wright, D.\n                and \n                  Fuster, G.G.\n                (2009), \u201cLegal safeguards for privacy and data protection in ambient intelligence\u201d, Pers Ubiquit Comput, Vol. 13 No. 6, pp. 435-444.","DOI":"10.1007\/s00779-008-0211-6"},{"key":"key2021010303015897200_b18","unstructured":"Denzin, N.\n                and \n                  Lincoln, Y.S.\n                (2000), \u201cChapter 1. Introduction: the discipline and practice of qualitative research\u201d, in \n                  Denzin, N.\n                and \n                  Lincoln, Y.S.\n                (Eds), Handbook of Qualitative Research, Sage Publications, Thousand Oaks, CA, pp. 1-32."},{"key":"key2021010303015897200_b19","doi-asserted-by":"crossref","unstructured":"Dobson, J.E.\n                and \n                  Fisher, P.F.\n                (2003), \u201cGeoslavery\u201d, IEEE Technology and Society Magazine, Vol. 22 No. 1, pp. 47-52.","DOI":"10.1109\/MTAS.2003.1188276"},{"key":"key2021010303015897200_b20","unstructured":"ELBA Consortium\n                (2004), \u201cEuropean location based advertising\u201d, available at: www.e-lba.com (accessed 20 August 2009)."},{"key":"key2021010303015897200_b21","unstructured":"Elliot, G.\n                and \n                  Phillips, N.\n                (2004), Mobile Commerce and Wireless Computing Systems, Pearson Education Limited, Harlow, p. -."},{"key":"key2021010303015897200_b22","doi-asserted-by":"crossref","unstructured":"Fereday, J.\n                and \n                  Muir-Cochrane, E.\n                (2006), \u201cDemonstrating rigor using thematic analysis: a hybrid approach of inductive and deductive coding and theme development\u201d, International Journal of Qualitative Methods, Vol. 5 No. 1, pp. 1-11.","DOI":"10.1177\/160940690600500107"},{"key":"key2021010303015897200_b24","doi-asserted-by":"crossref","unstructured":"Fuscoa, S.J.\n               , \n                  Michael, K.\n               , \n                  Michael, M.G.\n                and \n                  Abbas, R\n                (2010), \u201cExploring the social implications of location based social networking: an inquiry into the perceived positive and negative impacts of using LBSN between friends\u201d, 9th International Conference on Mobile Business (ICMB2010), IEEE, Athens, pp. 230-237.","DOI":"10.1109\/ICMB-GMR.2010.35"},{"key":"key2021010303015897200_b25","unstructured":"Giaglis, G.M.\n               , \n                  Kourouthanassis, P.\n                and \n                  Tsamakos, A.\n                (2003), \u201cChapter Iv. Towards a classification framework for mobile location-based services\u201d, in \n                  Mennecke, B.E.\n                and \n                  Strader, T.J.\n                (Eds), Mobile Commerce: Technology, Theory and Applications, Idea Group Publishing, Hershey, PA, pp. 67-85."},{"key":"key2021010303015897200_b26","unstructured":"Grunwald, D.\n               , \n                  Beach, A.\n               , \n                  Bauer, K.\n               , \n                  Lv, Q.\n                and \n                  Sicker, D.\n                (2010), \u201cThe risks and regulation of location\u201d, 38th Research Conference on Communication, Information and Internet Policy, TPRC 2010, Arlington, VA, October 1-3, pp. 1-24, available at: http:\/\/papers.ssrn.com\/sol3\/Delivery.cfm\/SSRN_ID1989200_code1743069.pdf?abstractid=1989200&mirid=3 (accessed 7 January 2014)."},{"key":"key2021010303015897200_b27","doi-asserted-by":"crossref","unstructured":"Hildebrandt, M.\n                and \n                  Koops, B.J.\n                (2010), \u201cThe challenges of ambient law and legal protection in the profiling era\u201d, The Modern Law Review, Vol. 73 No. 3, pp. 428-460.","DOI":"10.1111\/j.1468-2230.2010.00806.x"},{"key":"key2021010303015897200_b28","doi-asserted-by":"crossref","unstructured":"Hyde, K.F.\n                (2000), \u201cRecognising deductive processes in qualitative research\u201d, Qualitative Market Research: An International Journal, Vol. 3 No. 2, pp. 82-90.","DOI":"10.1108\/13522750010322089"},{"key":"key2021010303015897200_b29","unstructured":"ICT Regulation Toolkit\n                (2012a), \u201c4.2 different approaches in implementing ICT regulation\u201d, available at: www.ictregulationtoolkit.org\/en\/Section.2085.html (accessed 23 April 2012)."},{"key":"key2021010303015897200_b30","unstructured":"ICT Regulation Toolkit\n                (2012b), \u201c4.2.1 legislative approach\u201d, available at: www.ictregulationtoolkit.org\/en\/Section.2086.html (accessed 23 April 2012)."},{"key":"key2021010303015897200_b31","unstructured":"ICT Regulation Toolkit\n                (2012c), \u201c4.2.2 regulatory approach\u201d, available at: www.ictregulationtoolkit.org\/en\/Section.2087.html (accessed 23 April 2012)."},{"key":"key2021010303015897200_b32","unstructured":"ICT Regulation Toolkit\n                (2012d), \u201c4.2.3 self-regulation process\u201d, available at: www.ictregulationtoolkit.org\/en\/Section.2088.html (accessed 23 April 2012)."},{"key":"key2021010303015897200_b33","unstructured":"Jacobsen, H.A.\n                (2004), \u201cChapter 4. Middleware for location-based services\u201d, in \n                  Schillar, J.\n                and \n                  Voisard, A.\n                (Eds), Location-Based Services, Morgan Kaufmann\/Elsevier, San Francisco, CA, pp. 83-114."},{"key":"key2021010303015897200_b34","doi-asserted-by":"crossref","unstructured":"Johnson, R.B.\n                and \n                  Onwuegbuzie, A.J.\n                (2004), \u201cMixed methods research: a research paradigm whose time has come\u201d, Educational Researcher, Vol. 33 No. 7, pp. 14-26.","DOI":"10.3102\/0013189X033007014"},{"key":"key2021010303015897200_b35","unstructured":"Kaplan, B.\n                and \n                  Maxwell, J.A.\n                (2005), \u201cChapter 2. Qualitative research methods for evaluating computer information systems\u201d, in \n                  Anderson, J.G.\n                and \n                  Aydin, C.E.\n                (Eds), Evaluating the Organizational Impact of Healthcare Information Systems, Springer Science+Business Media Inc, New York, NY, pp. 30-55."},{"key":"key2021010303015897200_b36","doi-asserted-by":"crossref","unstructured":"King, N.J.\n                and \n                  Jessen, P.W.\n                (2010), \u201cProfiling the mobile customer \u2013 is industry self-regulation adequate to protect consumer privacy when behavioural advertisers target mobile phones? \u2013 Part II\u201d, Computer Law & Security Review, Vol. 26 No. 6, pp. 595-612.","DOI":"10.1016\/j.clsr.2010.09.007"},{"key":"key2021010303015897200_b37","doi-asserted-by":"crossref","unstructured":"Kosta, E.\n               , \n                  Zibuschka, J.\n               , \n                  Scherner, T.\n                and \n                  Dumortier, J.\n                (2008), \u201cLegal considerations on privacy-enhancing location based services using prime technology\u201d, Computer Law & Security Report, Vol. 24 No. 2, pp. 139-146.","DOI":"10.1016\/j.clsr.2008.01.006"},{"key":"key2021010303015897200_b38","unstructured":"Krauss, S.E.\n                (2005), \u201cResearch paradigms and meaning making: a primer\u201d, The Qualitative Report, Vol. 10 No. 4, pp. 758-770."},{"key":"key2021010303015897200_b39","doi-asserted-by":"crossref","unstructured":"K\u00fcpper, A.\n                (2005), Location-Based Services: Fundamentals and Operation, Wiley, Chichester, p. -.","DOI":"10.1002\/0470092335"},{"key":"key2021010303015897200_b40","doi-asserted-by":"crossref","unstructured":"K\u00fcpper, A.\n                and \n                  Treu, G.\n                (2010), \u201cNext generation location-based services: merging positioning and Web 2.0\u201d, in \n                  Yang, L.T.\n               , \n                  Waluyo, A.B.\n               , \n                  Ma, J.\n               , \n                  Tan, L.\n                and \n                  Srinivasan, B.\n                (Eds), Mobile Intelligence, John Wiley & Sons Inc, Hoboken, NJ, pp. 213-236.","DOI":"10.1002\/9780470579398.ch10"},{"key":"key2021010303015897200_b41","unstructured":"Leenes, R.\n                and \n                  Koops, B.J.\n                (2005), \u201cCode\u2019: privacy's death or saviour?, International review of law computers & technology\u201d, Computers & Technology, Vol. 19 No. 3, pp. 329-340."},{"key":"key2021010303015897200_b42","unstructured":"Law, J.\n                and \n                  Hassard, J.\n                (1999), Actor Network Theory and After, in \n                  Law, J.\n                and \n                  Hassard, J.\n                (Eds), Blackwell Publishers\/The Sociological Review, Oxford, p. -."},{"key":"key2021010303015897200_b43","unstructured":"Lessig, L.\n                (1999), Code and Other Laws of Cyberspace, Basic Books, New York, NY, p. -."},{"key":"key2021010303015897200_b44","unstructured":"Lessig, L.\n                (2003), \u201cLaw regulating code regulating law\u201d, Loyola University Chicago Law Journal, Vol. 35 No. 1, pp. 1-14."},{"key":"key2021010303015897200_b45","doi-asserted-by":"crossref","unstructured":"Li, F.\n                and \n                  Whalley, J.\n                (2002), \u201cDeconstruction of the telecommunications industry: from value chains to value networks\u201d, Telecommunications Policy, Vol. 26 No. 9, pp. 451-472.","DOI":"10.1016\/S0308-5961(02)00056-3"},{"key":"key2021010303015897200_b46","unstructured":"Lopez, X.R.\n                (2004), \u201cChapter 6. Loction-based services\u201d, in \n                  Karimi, H.A.\n                and \n                  Hammand, A.\n                (Eds), Telegeoinformatics: Location-Based Computing and Services, CRC Press, Boca Raton, FL, pp. 171-188."},{"key":"key2021010303015897200_b47","doi-asserted-by":"crossref","unstructured":"Mayer, R.N.\n                (2003), \u201cTechnology, families, and privacy: can we know too much about our loved ones?\u201d, Journal of Consumer Policy, Vol. 26 No. 4, pp. 419-439.","DOI":"10.1023\/A:1026387109484"},{"key":"key2021010303015897200_b48","doi-asserted-by":"crossref","unstructured":"Michael, K.\n               , \n                  McNamee, A.\n                and \n                  Michael, M.G.\n                (2006), \u201cThe emerging ethics of humancentric GPS tracking and monitoring\u201d, International Conference on Mobile Business, IEEE Computer Society, Copenhagen, pp. 1-10.","DOI":"10.1109\/ICMB.2006.43"},{"key":"key2021010303015897200_b49","doi-asserted-by":"crossref","unstructured":"Nissenbaum, H.\n                (2009), Privacy in Context: Technology, Policy, and the Integrity of Social Life, Stanford University Press, Stanford, p. -.","DOI":"10.1515\/9780804772891"},{"key":"key2021010303015897200_b50","unstructured":"O\u2032Connor, P.J.\n                and \n                  Godar, S.H.\n                (2003), \u201cChapter Xiii. We know where you are: the ethics of Lbs advertising\u201d, in \n                  Mennecke, B.E.\n                and \n                  Strader, T.J.\n                (Eds), Mobile Commerce: Technology, Theory and Applications, Idea Group Publishing, Hershey, PA, pp. 245-261."},{"key":"key2021010303015897200_b51","unstructured":"Paavilainen, J.\n                (2001), Mobile Business Strategies: Understanding the Technologies and Opportunities, Wireless Press, London, p. -."},{"key":"key2021010303015897200_b52","doi-asserted-by":"crossref","unstructured":"Pagallo, U.\n                (2011), \u201cDesigning data protection safeguards ethically\u201d, Information 2011, Vol. 2 No. 2, pp. 247-265.","DOI":"10.3390\/info2020247"},{"key":"key2021010303015897200_b53","doi-asserted-by":"crossref","unstructured":"Perusco, L.\n                and \n                  Michael, K.\n                (2007), \u201cControl, trust, privacy, and security: evaluating location-based services\u201d, IEEE Technology and Society Magazine, Vol. 26 No. 1, pp. 4-16.","DOI":"10.1109\/MTAS.2007.335564"},{"key":"key2021010303015897200_b54","unstructured":"Perusco, L.\n               , \n                  Michael, K.\n                and \n                  Michael, M.G.\n                (2006), \u201cLocation-based services and the privacy-security dichotomy\u201d, Proceedings of the Third International Conference on Mobile Computing and Ubiquitous Networking, Information Processing Society of Japan, London, pp. 91-98."},{"key":"key2021010303015897200_b55","unstructured":"Quinn, M.J.\n                (2006), Ethics for the Information Age, 2nd ed., Pearson\/Addison-Wesley, Boston, MA, p. -."},{"key":"key2021010303015897200_b56","doi-asserted-by":"crossref","unstructured":"Raab, C.D.\n                and \n                  de Hert, P.\n                (2007), \u201cThe regulation of technology: policy tools and policy actors\u201d, TILT Law & Technology Working Paper Series, Tilburg University, Tilburg, available at: http:\/\/ssrn.com\/abstract=1030263 (accessed 14 November 2011).","DOI":"10.2139\/ssrn.1030263"},{"key":"key2021010303015897200_b57","unstructured":"R\u00fclke, A.\n               , \n                  Iyer, A.\n                and \n                  Chiasson, G.\n                (2003), \u201cChapter vii. The ecology of mobile commerce: charting a course for success using a value chain analysis\u201d, in \n                  Mennecke, B.E.\n                and \n                  Strader, T.J.\n                (Eds), Mobile Commerce: Technology, Theory and Applications, Idea Group Publishing, Hershey, PA, pp. 122-144."},{"key":"key2021010303015897200_b58","unstructured":"Salda\u00f1a, J.\n                (2013), The Coding Manual for Qualitative Researchers, 2nd ed., Sage Publications, London, p. -."},{"key":"key2021010303015897200_b59","unstructured":"Shiode, N.\n               , \n                  Li, C.\n               , \n                  Batty, M.\n               , \n                  Longley, P.\n                and \n                  Maguire, D.\n                (2004), \u201cChapter 12. The impact and penetration of location-based services\u201d, in \n                  Karimi, H.A.\n                and \n                  Hammand, A.\n                (Eds), Telegeoinformatics: Location-Based Computing and Services, CRC Press, Boca Raton, FL, pp. 349-366."},{"key":"key2021010303015897200_b60","unstructured":"Spiekermann, S.\n                (2004), \u201cChapter 1. General aspects of location-based services\u201d, in \n                  Schillar, J.\n                and \n                  Voisard, A.\n                (Eds), Location-Based Services, Morgan Kaufmann\/Elsevier, San Francisco, CA, pp. 9-26."},{"key":"key2021010303015897200_b61","unstructured":"Tavani, H.T.\n                (2007), Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology, John Wiley, Hoboken, NJ, p. -."},{"key":"key2021010303015897200_b62","unstructured":"Xu, H.\n                and \n                  Teo, H.H.\n                (2004), \u201cAlleviating consumers\u2019 privacy concerns in location-based services: a psychological control perspective\u201d, Twenty-Fifth International Conference on Information Systems, pp. 793-806."},{"key":"key2021010303015897200_b63","unstructured":"York University\n                (2010), \u201cTheories used in IS research\u201d, available at: www.fsc.yorku.ca\/york\/istheory\/wiki\/index.php\/Main_Page (accessed 1 February 2010)."},{"key":"key2021010303015897200_b64","unstructured":"Zhang, Y.\n                and \n                  Wildemuth, B.\n                (2009), \u201cQualitative content analysis\u201d, available at: www.ischool.utexas.edu\/\u223cyanz\/Content_analysis.pdf (accessed 7 January 2014)."},{"key":"key2021010303015897200_b65","doi-asserted-by":"crossref","unstructured":"Zhu, T.\n               , \n                  Wang, C.\n               , \n                  Jia, G.\n                and \n                  Huang, J.\n                (2010), \u201cToward context-aware location based services\u201d, 2010 International Conference on Electronics and Information Engineering (ICEIE 2010), pp. 409-413.","DOI":"10.1109\/ICEIE.2010.5559823"},{"key":"key2021010303015897200_frd1","unstructured":"Bridgman, P.\n                and \n                  Davis, G.\n                (2004), The Australian Policy Handbook, 3rd ed., Allen & Unwin, Crowes Nest, NSW, p. -."},{"key":"key2021010303015897200_frd2","unstructured":"FIDIS\n                (2007), \u201cD11.5: the legal framework for location-based services in Europe\u201d, available at: www.fidis.net\/ (accessed 12 November 2011)."}],"container-title":["Information Technology &amp; People"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/ITP-12-2012-0156","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ITP-12-2012-0156\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ITP-12-2012-0156\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:56:03Z","timestamp":1753394163000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/itp\/article\/27\/1\/2-20\/180887"}},"subtitle":["A literature review"],"short-title":[],"issued":{"date-parts":[[2014,2,25]]},"references-count":67,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,2,25]]}},"alternative-id":["10.1108\/ITP-12-2012-0156"],"URL":"https:\/\/doi.org\/10.1108\/itp-12-2012-0156","relation":{},"ISSN":["0959-3845"],"issn-type":[{"value":"0959-3845","type":"print"}],"subject":[],"published":{"date-parts":[[2014,2,25]]}}}