{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T01:58:40Z","timestamp":1774144720876,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T00:00:00Z","timestamp":1367452800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000269","name":"Economic and Social Research Council","doi-asserted-by":"publisher","award":["ES\/G00496X\/1"],"award-info":[{"award-number":["ES\/G00496X\/1"]}],"id":[{"id":"10.13039\/501100000269","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,5,2]]},"DOI":"10.1145\/2464464.2501852","type":"proceedings-article","created":{"date-parts":[[2013,7,16]],"date-time":"2013-07-16T14:06:58Z","timestamp":1373983618000},"page":"405-412","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Location tracking via social networking sites"],"prefix":"10.1145","author":[{"given":"Lisa","family":"Thomas","sequence":"first","affiliation":[{"name":"Northumbria University"}]},{"given":"Pam","family":"Briggs","sequence":"additional","affiliation":[{"name":"Northumbria University"}]},{"given":"Linda","family":"Little","sequence":"additional","affiliation":[{"name":"Northumbria University"}]}],"member":"320","published-online":{"date-parts":[[2013,5,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.163"},{"key":"e_1_3_2_1_2_1","volume-title":"Understanding Attitudes and Predicting Social Behavior. Englewood Cliffs: Prentice-Hall","author":"Ajzen I.","year":"1980","unstructured":"Ajzen, I., & Fishbein, M. (1980). Understanding Attitudes and Predicting Social Behavior. Englewood Cliffs: Prentice-Hall."},{"key":"e_1_3_2_1_3_1","unstructured":"BBC news. (2012). Privacy backlash over Girls Around Me mobile app. BBC News. Retrieved April 3 2012 from http:\/\/www.bbc.co.uk\/news\/technology-17582975"},{"key":"e_1_3_2_1_4_1","volume-title":"PC World Business Center. Retrieved","author":"Bradley T.","year":"2011","unstructured":"Bradley, T. (2011). Caution: Should You Share Your Location on Facebook? PC World Business Center. Retrieved March 22, 2012, from http:\/\/www.pcworld.com\/businesscenter\/article\/239068\/caution_should_you_share_your_location_on_facebook.html"},{"key":"e_1_3_2_1_5_1","volume-title":"Retrieved Febuary 01","author":"CTIA-The Wireless Association","year":"2010","unstructured":"CTIA-The Wireless Association. (2010). Best Practices and Guidelines for Location-Based Services. Retrieved Febuary 01, 2013, from http:\/\/www.ctia.org\/business_resources\/wic\/index.cfm\/AID\/11300"},{"key":"e_1_3_2_1_6_1","volume-title":"5th International AAAI Conference on Weblogs and Social Media (ICWSM) (Vol.","author":"Cheng Z.","year":"2011","unstructured":"Cheng, Z., Caverlee, J., Lee, K., & Sui, D. Z. (2011). Exploring millions of footprints in location sharing services. 5th International AAAI Conference on Weblogs and Social Media (ICWSM) (Vol. 2010). Retrieved from http:\/\/www.aaai.org\/ocs\/index.php\/ICWSM\/ICWSM11\/paper\/download\/2783\/3292"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2424321.2424419"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868470.1868484"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.2307\/249008"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868470.1868485"},{"key":"e_1_3_2_1_11_1","volume-title":"Americas Conference on Information Systems.","author":"Dwyer C.","year":"2007","unstructured":"Dwyer, C., Hiltz, S., & Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. Americas Conference on Information Systems."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-010-9220-z"},{"key":"e_1_3_2_1_13_1","volume-title":"Understanding individual human mobility patterns. Nature, 1--12.","author":"Gonzalez M.","year":"2008","unstructured":"Gonzalez, M., Hidalgo, C., & Barabasi, A. (2008). Understanding individual human mobility patterns. Nature, 1--12. Retrieved from http:\/\/www.nature.com\/nature\/journal\/vaop\/ncurrent\/full\/nature06958.html"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"e_1_3_2_1_15_1","volume-title":"Foursquare Nearing 1 Million Check-ins Per Day. Retrieved","author":"Grove J.","year":"2010","unstructured":"Grove, J. (2010). Foursquare Nearing 1 Million Check-ins Per Day. Retrieved March 9, 2012, from http:\/\/mashable.com\/2010\/05\/28\/foursquare-checkins\/"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397747"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2345316.2345334"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357213"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJMC.2007.012787"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2005.47"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02291575"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2008.01432.x"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979295"},{"key":"e_1_3_2_1_24_1","volume-title":"Privacy management on social media sites. Pew Internet Project","author":"Madden M.","year":"2012","unstructured":"Madden, M. (2012). Privacy management on social media sites. Pew Internet Project."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046558"},{"key":"e_1_3_2_1_26_1","volume-title":"How police have obtained iPhone, iPad tracking logs. CNET News: Privacy INC.","author":"McCullagh D.","year":"2011","unstructured":"McCullagh, D. (2011). How police have obtained iPhone, iPad tracking logs. CNET News: Privacy INC. Retrieved from http:\/\/news.cnet.com\/8301-31921_3-20056344-281.html"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1971519.1971579"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592451.1592455"},{"key":"e_1_3_2_1_29_1","volume-title":"Retrieved","author":"Parr B.","year":"2011","unstructured":"Parr, B. (2011). Foursquare Badges Now Level Up. Retrieved March 15, 2012, from http:\/\/mashable.com\/2011\/11\/14\/foursquare-badges-now-level-up\/"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1556460.1556500"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133806.2133819"},{"key":"e_1_3_2_1_32_1","volume-title":"Foursquare, Gowalla, and Facebook Places: Practical Uses for Location-Based Services. PC World.","author":"Sullivan M.","year":"2010","unstructured":"Sullivan, M. (2010). Foursquare, Gowalla, and Facebook Places: Practical Uses for Location-Based Services. PC World. Retrieved from http:\/\/www.pcworld.com\/article\/207978\/foursquare_gowalla_and_facebook_places_practical_uses_for_locationbased_services.html#tk.mod_rel"},{"key":"e_1_3_2_1_33_1","volume-title":"Intentions to Use Location-Based Services: Refining a Predictive Model and Understanding Contexts of Use. Thesis","author":"Thomas L.","year":"2011","unstructured":"Thomas, L. (2011). Intentions to Use Location-Based Services: Refining a Predictive Model and Understanding Contexts of Use. Thesis, Northumbria University."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868914.1868971"},{"key":"e_1_3_2_1_35_1","volume-title":"Girls Around Me leaves App Store amid \"stalking\" row. The Telegraph.","author":"Warman M.","year":"2012","unstructured":"Warman, M. (2012). Girls Around Me leaves App Store amid \"stalking\" row. The Telegraph. Retrieved from http:\/\/www.telegraph.co.uk\/technology\/news\/9180786\/Girls-Around-Me-leaves-App-Store-amid-stalking-row.html"},{"key":"e_1_3_2_1_36_1","article-title":"Twitter adds option to tweet location by name","author":"Whitney L.","year":"2010","unstructured":"Whitney, L. (2010). Twitter adds option to tweet location by name. CNET News. Retrieved January 28, 2013, from http:\/\/news.cnet.com\/8301-1023_3-20007727-93.html","journal-title":"CNET News. Retrieved"},{"key":"e_1_3_2_1_37_1","volume-title":"Three-quarters of smartphone owners use location-based services their location with friends. Pew Internet & American Life Project","author":"Zickuhr K.","year":"2012","unstructured":"Zickuhr, K. (2012). Three-quarters of smartphone owners use location-based services their location with friends. Pew Internet & American Life Project."},{"key":"e_1_3_2_1_38_1","volume-title":"28% of American adults use mobile and social location-based services","author":"Zickuhr K.","year":"2011","unstructured":"Zickuhr, K., & Smith, A. (2011). 28% of American adults use mobile and social location-based services. Pew Internet and American Life Center Report."}],"event":{"name":"WebSci '13: Web Science 2013","location":"Paris France","acronym":"WebSci '13","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the 5th Annual ACM Web Science Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2464464.2501852","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2464464.2501852","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T01:41:19Z","timestamp":1774143679000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2464464.2501852"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,2]]},"references-count":38,"alternative-id":["10.1145\/2464464.2501852","10.1145\/2464464"],"URL":"https:\/\/doi.org\/10.1145\/2464464.2501852","relation":{},"subject":[],"published":{"date-parts":[[2013,5,2]]},"assertion":[{"value":"2013-05-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}