Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Annavaram M, Jacobson Q (2008) HangOut: a privacy preserving location-based social networking service. In: Proceedings of the workshop on mobile devices and urban sensing, St. Louis, USA
Beach A, Gartrell M, Han R (2009) Solutions to security and privacy issues in mobile social networking. In: International conference on computational science and engineering, Vancouver, pp 1036–1042
Bettini C, Wang SX, Jajodia S (2005) Protecting privacy against location-based personal identification. In: Proceedings of the secure data management, Trondheim, pp 185–199
Brooker D, Carey T, Warren I (2010) Middleware for social networking on mobile devices. In: 21st Australian software engineering conference (ASWEC), Auckland, pp 202–211
Butler J, Silberman P (2013) RAIDE: rootkit analysis identification and elimination. Address to download: http://www.blackhat.com/presentations/bh-usa-06/BH-US-06-Silberman.pdf. Retrieved 18 Apr 2013
Cuddy C, Glassman NR (2010) Location-Based services: Foursquare and Gowalla, should libraries play? J Electron Res Med Libr 7:336–343, 2010
Facebook (2013) Fact Sheet. Address to download: http://newsroom.fb.com/content/default.aspx?NewsAreaId=22. Retrieved 18 Apr 2013
Foursquare (2013). https://foursquare.com/. Retrieved 18 Apr 2013
Fusco SJ, Michael K, Michael MG (2010a) Using a social informatics framework to study the effects of location-based social networking on relationships between people: a review of literature. In: Michael K (ed) Proceedings of the IEEE international symposium on technology and society (ISTAS10), Wollongong. IEEE, Wollongong, pp 157–171
Fusco SJ, Michael K, Michael MG (2010b) Exploring the social implications of location based social networking: an inquiry into the perceived positive and negative impacts of using LBSN between friends. In: Giaglis G (ed) Proceedings of the 9th IEEE international conference on mobile business, Athens. IEEE, Athens
Fusco SJ, Michael K, Aloudat A, Abbas R (2011) Monitoring people using location-based social networking and its negative impact on trust: an exploratory contextual analysis of five types of “Friend” relationships. In: Miller K (ed) Proceedings of the IEEE symposium on technology and society 2011 (ISTAS11), Chicago. IEEE, Chicago
Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st international conference on mobile systems, applications and services -MobiSys, San Francisco, pp 31–42
Humphreys L (2007) Mobile social networks and social practice: a case study of Dodgeball. J Comput-Mediat Commun 13(1):341–360
Li N (2009) Analysis of a location-based social network. In: International conference on computational science and engineering (CSE ‘09), Vancouver, pp 263–270
Loopt (2012). https://www.loopt.com/. Retrieved 1 Oct 2012
PleaseRobMe (2013). http://pleaserobme.com. Retrieved 18 Apr 2013
Reese W, Beckland J (2011) Lost in geolocation – why consumers haven’t bought it and how marketers can fix it. Mobile Marketing Report, White Horse – Digital Future Group. Address to download: http://www.whitehorse.com/uploadedFiles/World/Reports/Lost%20in%20Geolocation%20Report%281%29.pdf.. Retrieved 1 Oct 2012
Sadeh N, Hong J, Cranor L, Fette I, Kelley P, Prabaker M, Rao J (2008) Understanding and capturing people’s privacy policies in a mobile social networking application. Pers Ubiquitous Comput 13(6):401–412
Samarati P (2001) Protecting respondents’ identities in microdata release. IEEE Trans Knowl Data Eng 13(6):1010–1027
Scellato S, Lambiote R, Noulas A, Mascolo C (2011) Socio-spatial properties of online location-based social networks. In: Proceedings of ICWSM, association for the advancement of artificial intelligence, Barcelona, pp 329–336
Sweeney L (2002) k-Anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl-Based Syst 10(5):557–570
The Search Agency (2010) Comprehensive guide to location-based social media. White Paper. Address to download: http://www.thesearchagency.com/sites/default/files/tsa_whitepaper_location_based_social.media.pdf. Retrieved 18 Apr 2013
Zalalichin Z, Efrati R, Cohen T (2010) The social networking corporate threat. Technical report, COMSEC Consulting – Information Security. Address to download: http://www.comsecglobal.com/FrameWork/Upload/The20Social%20Networking%20Corporate%20Threat%20-%20Comsec.pdf. Retrieved 18 Apr 2013
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media New York
About this entry
Cite this entry
Tzouramanis, T., Barbatsalou, K. (2014). Privacy Preservation and Location-Based Online Social Networking. In: Alhajj, R., Rokne, J. (eds) Encyclopedia of Social Network Analysis and Mining. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-6170-8_346
Download citation
DOI: https://doi.org/10.1007/978-1-4614-6170-8_346
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-6169-2
Online ISBN: 978-1-4614-6170-8
eBook Packages: Computer ScienceReference Module Computer Science and Engineering