{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T02:46:10Z","timestamp":1775270770013,"version":"3.50.1"},"reference-count":45,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2018,11,13]],"date-time":"2018-11-13T00:00:00Z","timestamp":1542067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100010665","name":"H2020 Marie Sk\u0142odowska-Curie Actions","doi-asserted-by":"publisher","award":["642332"],"award-info":[{"award-number":["642332"]}],"id":[{"id":"10.13039\/100010665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJGI"],"abstract":"<jats:p>An individual\u2019s location data is very sensitive geoinformation. While its disclosure is necessary, e.g., to provide location-based services (LBS), it also facilitates deep insights into the lives of LBS users as well as various attacks on these users. Location privacy threats can be mitigated through privacy regulations such as the General Data Protection Regulation (GDPR), which was introduced recently and harmonises data privacy laws across Europe. While the GDPR is meant to protect users\u2019 privacy, the main problem is that it does not provide explicit guidelines for designers and developers about how to build systems that comply with it. In order to bridge this gap, we systematically analysed the legal text, carried out expert interviews, and ran a nine-week-long take-home study with four developers. We particularly focused on user-facing issues, as these have received little attention compared to technical issues. Our main contributions are a list of aspects from the legal text of the GDPR that can be tackled at the user interface level and a set of guidelines on how to realise this. Our results can help service providers, designers and developers of applications dealing with location information from human users to comply with the GDPR.<\/jats:p>","DOI":"10.3390\/ijgi7110442","type":"journal-article","created":{"date-parts":[[2018,11,14]],"date-time":"2018-11-14T02:42:41Z","timestamp":1542163361000},"page":"442","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Complying with Privacy Legislation: From Legal Text to Implementation of Privacy-Aware Location-Based Services"],"prefix":"10.3390","volume":"7","author":[{"given":"Mehrnaz","family":"Ataei","sequence":"first","affiliation":[{"name":"Institute for Geoinformatics, University of Muenster, Heisenbergstrasse 2, 48161 Muenster, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5087-8776","authenticated-orcid":false,"given":"Auriol","family":"Degbelo","sequence":"additional","affiliation":[{"name":"Institute for Geoinformatics, University of Muenster, Heisenbergstrasse 2, 48161 Muenster, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4199-8976","authenticated-orcid":false,"given":"Christian","family":"Kray","sequence":"additional","affiliation":[{"name":"Institute for Geoinformatics, University of Muenster, Heisenbergstrasse 2, 48161 Muenster, Germany"}]},{"given":"Vitor","family":"Santos","sequence":"additional","affiliation":[{"name":"NOVA IMS Information Management School, University Nova Lisboa, 1070-312 Lisbon, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2018,11,13]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1007\/s00779-008-0212-5","article-title":"A survey of computational location privacy","volume":"13","author":"Krumm","year":"2009","journal-title":"Personal Ubiquitous Comput."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1080\/17489725.2011.637969","article-title":"You are where you\u2019ve been: The privacy implications of location and tracking technologies","volume":"5","author":"Clarke","year":"2011","journal-title":"J. Locat. Based Serv."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Lin, Y.W. (The Conversation, 2018). # DeleteFacebook is still feeding the beast\u2013But there are ways to overcome surveillance capitalism, The Conversation.","DOI":"10.64628\/AB.jn36hsnk6"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1080\/17489725.2011.642820","article-title":"The social and behavioural implications of location-based services","volume":"5","author":"Michael","year":"2011","journal-title":"J. Locat. Based Serv."},{"key":"ref_5","unstructured":"European Union (2016). Commission Regulation 2016\/679 of 27 Apr. 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95\/46\/EC (General Data Protection Regulation), 2016 O.J. (L 119) 1 (EU) (General Data Protection Regulation), European Union."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1126\/science.aaa4603","article-title":"What the \u201cright to be forgotten\u201d means for privacy in a digital age","volume":"347","author":"Newman","year":"2015","journal-title":"Science"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Huang, H., Gartner, G., Krisp, J.M., Raubal, M., and Van de Weghe, N. (2018). Location based services: Ongoing evolution and research agenda. J. Locat. Based Serv., 1\u201331.","DOI":"10.5194\/ica-abs-1-125-2019"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1111\/1540-4560.00072","article-title":"Social and political dimensions of privacy","volume":"59","author":"Westin","year":"2003","journal-title":"J. Soc. Issues"},{"key":"ref_9","unstructured":"Solove, D. (2008). Understanding Privacy, Harvard University Press."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1087","DOI":"10.2307\/3481326","article-title":"Conceptualizing privacy","volume":"90","author":"Solove","year":"2002","journal-title":"Cal. Law Rev."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1111\/tgis.12305","article-title":"A geoprivacy manifesto","volume":"22","author":"McKenzie","year":"2018","journal-title":"Trans. GIS"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Sarjakoski, T., Santos, M.Y., and Sarjakoski, L.T. (2016). Geo-privacy beyond coordinates. Geospatial Data in a Changing World\u2014Selected Papers of the 19th AGILE Conference on Geographic Information Science, Springer.","DOI":"10.1007\/978-3-319-33783-8"},{"key":"ref_13","unstructured":"Fawaz, K., Feng, H., and Shin, K.G. (2015, January 12\u201314). Anatomization and protection of mobile apps\u2019 location privacy threats. Proceedings of the 24th USENIX Security Symposium (USENIX Security 15), Washington, DC, USA."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Billen, R., Joao, E., and Forrest, D. (2006). Location privacy and location-aware computing. Dynamic and Mobile GIS: Investigating Changes in Space and Time, CRC Press. Chapter 3.","DOI":"10.1201\/9781420008609"},{"key":"ref_15","unstructured":"R\u00fcping, A., Eckstein, J., and Schwanninger, C. (2001, January 4\u20138). Patterns for personalized web applications. Proceedings of the 6th European Conference on Pattern Languages of Programms (EuroPLoP \u20192001), Irsee, Germany."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1145\/1278201.1278202","article-title":"Privacy-enhanced personalization","volume":"50","author":"Kobsa","year":"2007","journal-title":"Commun. ACM"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1108\/ITP-12-2012-0156","article-title":"The regulatory considerations and ethical dilemmas of location-based services (LBS): A literature review","volume":"27","author":"Abbas","year":"2014","journal-title":"Inf. Technol. People"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/MTAS.2007.335564","article-title":"Control, trust, privacy, and security: evaluating location-based services","volume":"26","author":"Perusco","year":"2007","journal-title":"IEEE Technol. Soc. Mag."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Layton, R., and Celant, S. (2017). How the GDPR compares to best practices for privacy, accountability and trust. SSRN Electron. J., 1\u201323.","DOI":"10.2139\/ssrn.2944358"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Raschke, P., Axel, K., Drozd, O., and Kirrane, S. (2017). Designing a GDPR-Compliant and Usable Privacy Dashboard, Springer.","DOI":"10.1007\/978-3-319-92925-5_14"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Lindqvist, J. (2017). New challenges to personal data processing agreements: Is the GDPR fit to deal with contract, accountability and liability in a world of the Internet of Things?. Int. J. Law Inf. Technol., 45\u201363.","DOI":"10.1093\/ijlit\/eax024"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","article-title":"k-anonymity: A model for protecting privacy","volume":"10","author":"Sweeney","year":"2002","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","article-title":"Location privacy in pervasive computing","volume":"2","author":"Beresford","year":"2003","journal-title":"IEEE Pervasive Comput."},{"key":"ref_24","unstructured":"Mokbel, M.F., Chow, C.Y., and Aref, W.G. (2006, January 12\u201315). The new casper: Query processing for location services without compromising privacy. Proceedings of the 32nd International Conference on Very Large Data Bases, Seoul, Korea."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"e3437","DOI":"10.1002\/dac.3437","article-title":"Pseudonym changing strategy with multiple mix zones for trajectory privacy protection in road networks","volume":"31","author":"Memon","year":"2018","journal-title":"Int. J. Commun. Syst."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"e3312","DOI":"10.1002\/dac.3312","article-title":"Search me if you can: Multiple mix zones with location privacy protection for mapping services","volume":"30","author":"Memon","year":"2017","journal-title":"Int. J. Commun. Syst."},{"key":"ref_27","unstructured":"Langheinrich, M. (October, January 29). A privacy awareness system for ubiquitous computing environments. Proceedings of the International Conference on Ubiquitous Computing, G\u00f6teborg, Sweden."},{"key":"ref_28","unstructured":"Cavoukian, A. (2009). Privacy by Design: The 7 Foundational Principles. Implementation and Mapping of Fair Information Practices, Information and Privacy Commissioner of Ontario."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Ataei, M., Degbelo, A., and Kray, C. (2018). Privacy theory in practice: Designing a user interface for managing location privacy on mobile devices. J. Locat. Based Serv., 1\u201338.","DOI":"10.1080\/17489725.2018.1511839"},{"key":"ref_30","unstructured":"Mark, G., Fussell, S.R., Lampe, C., Schraefel, M.C., Hourcade, J.P., Appert, C., and Wigdor, D. (2017, January 6\u201311). What is interaction?. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI\u201917), Denver, CO, USA."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1111\/j.1365-2575.2012.00402.x","article-title":"Personal information privacy and emerging technologies","volume":"23","author":"Conger","year":"2013","journal-title":"Inf. Syst. J."},{"key":"ref_32","unstructured":"(2018, October 10). Wordart. Available online: https:\/\/wordart.com\/."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1277","DOI":"10.1177\/1049732305276687","article-title":"Three approaches to qualitative content analysis","volume":"15","author":"Hsieh","year":"2005","journal-title":"Qual. Health Res."},{"key":"ref_34","unstructured":"Bargiotti, L., Gielis, I., Verdegem, B., Breyne, P., Pignatelli, F., Smits, P., and Boguslawski, R. (2016). Guidelines for Public Administrations on Location Privacy, Publications Office of the European Union. Technical Report."},{"key":"ref_35","unstructured":"Centers for Medicare & Medicaid Services (2008). Selecting a Development Approach."},{"key":"ref_36","unstructured":"Shen, C., Jacob, R.J.K., and Balakrishnan, R. (2007, January 7\u201310). Evaluating user interface systems research. Proceedings of the 20th Annual ACM Symposium on User Interface Software and Technology (UIST\u201907), Newport, RI, USA."},{"key":"ref_37","unstructured":"Mandryk, R.L., Hancock, M., Perry, M., and Cox, A.L. (2018, January 21\u201326). Evaluation strategies for HCI toolkit research. Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI\u201918), Montreal, QC, Canada."},{"key":"ref_38","first-page":"29","article-title":"SUS: A Retrospective","volume":"8","author":"Brooke","year":"2013","journal-title":"J. Usability Stud."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Lewis, J.R., and Sauro, J. (2009, January 19\u201324). The factor structure of the system usability scale. Proceedings of the International Conference on Human Centered Design, San Diego, CA, USA.","DOI":"10.1007\/978-3-642-02806-9_12"},{"key":"ref_40","first-page":"4","article-title":"SUS-A quick and dirty usability scale","volume":"189","author":"Brooke","year":"1996","journal-title":"Usability Eval. Ind."},{"key":"ref_41","first-page":"114","article-title":"Determining what individual SUS scores mean: Adding an adjective rating scale","volume":"4","author":"Bangor","year":"2009","journal-title":"J. Usability Stud."},{"key":"ref_42","unstructured":"Poltrock, S.E., Simone, C., Grudin, J., Mark, G., and Riedl, J. (2012, January 11\u201315). A model for the design of interactive systems based on activity theory. Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work (CSCW\u201912), Seattle, WA, USA."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"470","DOI":"10.1145\/503112.503114","article-title":"The state of the art in automating usability evaluation of user interfaces","volume":"33","author":"Ivory","year":"2001","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_44","unstructured":"Schaub, F., Balebako, R., Durity, A.L., and Cranor, L.F. (2015, January 22\u201324). A design space for effective privacy notices. Proceedings of the Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), Ottawa, ON, Canada."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Memon, I., and Mirza, H.T. (2018). MADPTM: Mix zones and dynamic pseudonym trust management system for location privacy. Int. J. Commun. Syst., e3795.","DOI":"10.1002\/dac.3795"}],"container-title":["ISPRS International Journal of Geo-Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2220-9964\/7\/11\/442\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T01:49:56Z","timestamp":1775267396000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2220-9964\/7\/11\/442"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,13]]},"references-count":45,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2018,11]]}},"alternative-id":["ijgi7110442"],"URL":"https:\/\/doi.org\/10.3390\/ijgi7110442","relation":{},"ISSN":["2220-9964"],"issn-type":[{"value":"2220-9964","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,13]]}}}