{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T20:53:58Z","timestamp":1774644838522,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,9,26]],"date-time":"2010-09-26T00:00:00Z","timestamp":1285459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,9,26]]},"DOI":"10.1145\/1864349.1864381","type":"proceedings-article","created":{"date-parts":[[2010,9,28]],"date-time":"2010-09-28T17:41:50Z","timestamp":1285695710000},"page":"95-104","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":93,"title":["Exploring end user preferences for location obfuscation, location-based services, and the value of location"],"prefix":"10.1145","author":[{"given":"A.J. Bernheim","family":"Brush","sequence":"first","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"John","family":"Krumm","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"James","family":"Scott","sequence":"additional","affiliation":[{"name":"Microsoft Research, Cambridge, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2010,9,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2007.83"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1411759.1411762"},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. Interact","author":"Barkhuus L.","year":"2003","unstructured":"}} Barkhuus , L. and Dey , A. K . Location-Based Services for Mobile Telephony: a study of users' privacy concerns . Proc. Interact 2003 , 207--212. }}Barkhuus, L. and Dey, A. K. Location-Based Services for Mobile Telephony: a study of users' privacy concerns. Proc. Interact 2003, 207--212."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11853565_14"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/500286.500292"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1054985"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179601.1179621"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. 4th Workshop on the Economics of Information Security","author":"Danezis G.","year":"2005","unstructured":"}} Danezis , G. , Lewis , S. and Anderson , R . How Much is Location Privacy Worth ? Proc. 4th Workshop on the Economics of Information Security . Harvard University , 2005 . }}Danezis, G., Lewis, S. and Anderson, R. How Much is Location Privacy Worth? Proc. 4th Workshop on the Economics of Information Security. Harvard University, 2005."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci2103_2"},{"key":"e_1_3_2_1_11_1","volume-title":"Dynamic & Mobile GIS: Investigating Change in Space and Time","author":"Duckham M.","year":"2006","unstructured":"}}1 Duckham , M. and Kulik , L . Location privacy and location-aware computing , In Dynamic & Mobile GIS: Investigating Change in Space and Time , CRC Press , 2006 , 34--51. }}1Duckham, M. and Kulik, L. Location privacy and location-aware computing, In Dynamic & Mobile GIS: Investigating Change in Space and Time, CRC Press, 2006, 34--51."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0900282106"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01516-8_26"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-32004-3_19"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315266"},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. UAI-2005","author":"Horvitz E.","unstructured":"}} Horvitz , E. , Apacible , J. , Sarin , R. and Liao , L . Prediction, Expectation, and Surprise: Methods, Designs, and Study of a Deployed Traffic Forecasting Service , Proc. UAI-2005 . }}Horvitz, E., Apacible, J., Sarin, R. and Liao, L. Prediction, Expectation, and Surprise: Methods, Designs, and Study of a Deployed Traffic Forecasting Service, Proc. UAI-2005."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11551201_13"},{"key":"e_1_3_2_1_19_1","volume-title":"Using Bluetooth to capture passenger trips on public transport buses. arXiv:0806.0874","author":"Kostakos V.","year":"2008","unstructured":"}} Kostakos , V. Using Bluetooth to capture passenger trips on public transport buses. arXiv:0806.0874 , 2008 . }}Kostakos, V. Using Bluetooth to capture passenger trips on public transport buses. arXiv:0806.0874, 2008."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1758156.1758167"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0212-5"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11853565_15"},{"key":"e_1_3_2_1_23_1","unstructured":"}}Langheinrich M. Privacy in Ubiquitous Computing. In: Ubiqutious Computing Fundamentals Edited by John Krumm 96--156.  }}Langheinrich M. Privacy in Ubiquitous Computing. In: Ubiqutious Computing Fundamentals Edited by John Krumm 96--156."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2007.01.006"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456409"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"key":"e_1_3_2_1_28_1","volume-title":"Proc. TPRC.","author":"Shilton K.","year":"2009","unstructured":"}} Shilton , K. , Burke , J. , Estrin , D. , Hansen , M. , Govindan , R. , & Kang , J. Designing the Personal Data Stream: Enabling Participatory Privacy in Mobile Personal Sensing . Proc. TPRC. September 2009 . }}Shilton, K., Burke, J., Estrin, D., Hansen, M., Govindan, R., & Kang, J. Designing the Personal Data Stream: Enabling Participatory Privacy in Mobile Personal Sensing. Proc. TPRC. September 2009."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1620545.1620548"},{"key":"e_1_3_2_1_30_1","volume-title":"Proc. TPRC","author":"Tsai J.","year":"2009","unstructured":"}} Tsai , J. , Kelley , P. , Cranor , L. , and Sadeh , N . Location-Sharing Technologies: Privacy Risks and Controls . Proc. TPRC 2009 . }}Tsai, J., Kelley, P., Cranor, L., and Sadeh, N. Location-Sharing Technologies: Privacy Risks and Controls. Proc. TPRC 2009."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1519005"}],"event":{"name":"Ubicomp '10: The 2010 ACM Conference on Ubiquitous Computing","location":"Copenhagen Denmark","acronym":"Ubicomp '10","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGCHI ACM Special Interest Group on Computer-Human Interaction","University of Florida University of Florida"]},"container-title":["Proceedings of the 12th ACM international conference on Ubiquitous computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1864349.1864381","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1864349.1864381","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:53Z","timestamp":1750246793000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1864349.1864381"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9,26]]},"references-count":30,"alternative-id":["10.1145\/1864349.1864381","10.1145\/1864349"],"URL":"https:\/\/doi.org\/10.1145\/1864349.1864381","relation":{},"subject":[],"published":{"date-parts":[[2010,9,26]]},"assertion":[{"value":"2010-09-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}