Abstract
The use of location data has greatly benefited from the availability of location-based services, the popularity of social networks, and the accessibility of public location data sets. However, in addition to providing users with the ability to obtain accurate driving directions or the convenience of geo-tagging friends and pictures, location is also a very sensitive type of data, as attested by more than a decade of research on different aspects of privacy related to location data.
In this chapter, we focus on two domains that rely on location data as their core component: Geospatial applications (such as thematic maps and crowdsourced geo-information) and location-based social networks. We discuss the increasing relevance of geospatial applications to the current location-aware services, and we describe relevant concepts such as volunteered geographic information, geo-surveillance and how they relate to privacy. Then, we focus on a subcategory of geospatial applications, location-based social networks, and we introduce the different entities (such as users, services and providers) that are involved in such networks, and we characterize their role and interactions. We present the main privacy challenges and we discuss the approaches that have been proposed to mitigate privacy risks in location-based social networks. Finally, we conclude with a discussion of open research questions and promising directions that will contribute to improve privacy for users of location-based social networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
http://www.merriam-webster.com/dictionary/cartography, last retrieved Dec. 4, 2016.
- 2.
https://www.census.gov/geo/maps-data/maps/thematic.html, last retrieved Dec. 4, 2016.
- 3.
http://unstats.un.org/unsd/demographic/sources/census/wphc/default.htm, last retrieved Dec. 4, 2016.
- 4.
http://www.census.gov/data/data-tools.html, last retrieved Dec. 4, 2016.
- 5.
http://earthexplorer.usgs.gov/, last retrieved Dec. 4, 2016.
- 6.
https://www.google.com/earth/, last retrieved Dec. 4, 2016.
- 7.
https://www.bing.com/maps/, last retrieved Dec. 4, 2016.
- 8.
https://www.arcgis.com/features/index.html, last retrieved Dec. 4, 2016.
- 9.
https://www.openstreetmap.org/, last retrieved Dec. 4, 2016.
- 10.
http://wikimapia.org/, last retrieved Dec. 4, 2016.
- 11.
http://www.openstreetmap.org/, last retrieved Dec. 4, 2016.
- 12.
https://www.dhs.gov/radio-frequency-identification-rfid-what-it, last retrieved Dec. 4, 2016.
- 13.
http://guides.lib.uw.edu/c.php?g=341594&p=2304475, last retrieved Dec. 6, 2016.
- 14.
https://www.police.uk/, last retrieved Dec 7, 2016.
- 15.
https://www.hipaa.com/hipaa-protected-health-information-what-does-phi-include/, last retrieved Dec. 4, 2016.
- 16.
https://www.google.com/trends/, last retrieved Dec 7, 2016.
- 17.
https://epic.org/privacy/flutrends/EPIC_ltr_FluTrends_11-08.pdf, last retrieved Dec 7, 2016.
- 18.
http://www.classmates.com/, last retrieved on Dec. 14, 2016.
- 19.
http://www.friendster.com/, last retrieved on Dec. 14, 2016. Friendster is no longer active as of Jun. 14, 2015.
- 20.
- 21.
https://myspace.com/, last retrieved Dec. 14, 2016.
- 22.
https://www.facebook.com/, last retrieved Dec. 14, 2016.
- 23.
http://mashable.com/2012/03/11/gowalla-shuts-down/#sBOot7U3xSqf, last retrieved Dec. 14, 2016. Gowalla is no longer active as of 2012.
- 24.
https://foursquare.com/, last retrieved Dec 14, 2016.
- 25.
https://www.fitbit.com/, last retrieved Dec 16, 2016.
- 26.
https://www.torproject.org/, last retrieved Dec. 16, 2016.
- 27.
https://cloud.google.com/prediction/, https://aws.amazon.com/machine-learning/, last retrieved Dec. 17, 2016.
References
M. Abadi, A. Chu, I. Goodfellow, H. B. McMahan, I. Mironov, K. Talwar, and L. Zhang. Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pages 308–318. ACM, 2016.
A. Acquisti, I. Adjerid, and L. Brandimarte. Gone in 15 seconds: The limits of privacy transparency and control. IEEE Security & Privacy, 4(11):72–74, 2013.
A. Acquisti and R. Gross. Imagined communities: Awareness, information sharing, and privacy on the facebook. In International workshop on privacy enhancing technologies, pages 36–58. Springer, 2006.
G. J. Annas. Hipaa regulations-a new era of medical-record privacy? New England Journal of Medicine, 348(15):1486–1490, 2003.
S. B. Barnes. A privacy paradox: Social networking in the united states. First Monday, 11(9), 2006.
V. Benson, G. Saridakis, and H. Tennakoon. Information disclosure of social media users: does control over personal information, user awareness and security notices matter? Information Technology & People, 28(3):426–441, 2015.
M. Bezzi. An information theoretic approach for privacy metrics. Transactions on Data Privacy, 3(3):199–215, 2010.
G. Biczók and P. H. Chia. Interdependent privacy: Let me share your data. In International Conference on Financial Cryptography and Data Security, pages 338–353. Springer, 2013.
I. Bilogrevic, M. Jadliwala, I. Lám, I. Aad, P. Ginzboorg, V. Niemi, L. Bindschaedler, and J.-P. Hubaux. Big brother knows your friends: on privacy of social communities in pervasive networks. In International Conference on Pervasive Computing, pages 370–387. Springer Berlin Heidelberg, 2012.
I. Bilogrevic and M. Ortlieb. If you put all the pieces together…: Attitudes towards data combination and sharing across services and companies. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pages 5215–5227. ACM, 2016.
A. J. Blatt. The benefits and risks of volunteered geographic information. Journal of Map & Geography Libraries, 11(1):99–104, 2015.
A. J. Blatt. Data privacy and ethical uses of volunteered geographic information. In Health, Science, and Place, pages 49–59. Springer, 2015.
D. Boneh, E. Kushilevitz, R. Ostrovsky, and W. E. Skeith III. Public key encryption that allows pir queries. In Annual International Cryptology Conference, pages 50–67. Springer, 2007.
J. A. Bovenberg, B. M. Knoppers, A. Hansell, and K. de Hoogh. Exposing participants? population biobanks go geo. European Journal of Human Genetics, 2015.
T. Burghardt, E. Buchmann, J. Müller, and K. Böhm. Understanding user preferences and awareness: Privacy mechanisms in location-based services. In OTM Confederated International Conferences” On the Move to Meaningful Internet Systems”, pages 304–321. Springer, 2009.
J. Cabalona. Gowalla Is Officially Shut Down.
B. Carbunar, M. Rahman, and N. Pissinou. A survey of privacy vulnerabilities and defenses in geosocial networks. IEEE Communications Magazine, 51(11):114–119, 2013.
S. Chainey and L. Tompson. Engagement, empowerment and transparency: publishing crime statistics using online crime mapping. Policing, 6(3):228–239, 2012.
C. Chan. Robbers Checked Facebook Status Updates To See When People Weren’t Home.
Y. Chen and H. Kobayashi. Signal strength based indoor geolocation. In Communications, 2002. ICC 2002. IEEE International Conference on, volume 1, pages 436–439. IEEE, 2002.
C. D. Cottrill et al. Location privacy preferences: A survey-based analysis of consumer awareness, trade-off and decision-making. Transportation Research Part C: Emerging Technologies, 56:132–148, 2015.
J. W. Crampton. Cartographic rationality and the politics of geosurveillance and security. Cartography and Geographic Information Science, 30(2):135–148, 2003.
J. W. Crampton. Mapping: A critical introduction to cartography and GIS, volume 11. John Wiley & Sons, 2011.
R. Dayarathna. Taxonomy for information privacy metrics. J. Int’l Com. L. & Tech., 6:194, 2011.
C. Dempsey. Privacy in gis issues, 2008.
S. N. Desk. How many CCTV Cameras are there globally?, June 2015.
B. Dickinson. Infographic: 80% of robbers check Twitter, Facebook, Google Street View.
T. Dienlin and S. Trepte. Is the privacy paradox a relic of the past? an in-depth analysis of privacy attitudes and privacy behaviors. European Journal of Social Psychology, 45(3):285–297, 2015.
W. Dong, V. Dave, L. Qiu, and Y. Zhang. Secure friend discovery in mobile social networks. In INFOCOM, 2011 Proceedings IEEE, pages 1647–1655. IEEE, 2011.
S. O. Dyke, E. S. Dove, and B. M. Knoppers. Sharing health-related data: a privacy test? NPJ Genomic Medicine, 1:16024, 2016.
N. Eagle and A. S. Pentland. Reality mining: sensing complex social systems. Personal and ubiquitous computing, 10(4):255–268, 2006.
E. Erdin, C. Zachor, and M. H. Gunes. How to find hidden users: a survey of attacks on anonymity networks. IEEE Communications Surveys & Tutorials, 17(4):2296–2316, 2015.
Facebook. Help Center - Location Privacy.
Facebook. Privacy Settings and Tools.
Facebook. Facebook Reports Second Quarter 2016 Results, 2016.
Facebook. Stats, facebook newsroom, 2016.
Fitbit. What should i know about my fitbit badges?, 2016.
M. Foucault. Discipline and punish: The birth of the prison. Vintage, 1977.
M. Foucault, G. Burchell, C. Gordon, and P. Miller. The Foucault effect: Studies in governmentality. University of Chicago Press, 1991.
D. Freni, C. Ruiz Vicente, S. Mascetti, C. Bettini, and C. S. Jensen. Preserving location and absence privacy in geo-social networks. In Proceedings of the 19th ACM international conference on Information and knowledge management, pages 309–318. ACM, 2010.
M. Furini. Users behavior in location-aware services: Digital natives versus digital immigrants. Advances in Human-Computer Interaction, 2014, 2014.
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan. Private queries in location based services: anonymizers are not necessary. In Proceedings of the 2008 ACM SIGMOD international conference on Management of data, pages 121–132. ACM, 2008.
O. Goldreich. Foundations of cryptography: volume 2, basic applications. Cambridge university press, 2009.
P. Golle and K. Partridge. On the anonymity of home/work location pairs. In International Conference on Pervasive Computing, pages 390–397. Springer, 2009.
M. F. Goodchild. Citizens as sensors: the world of volunteered geography. GeoJournal, 69(4):211–221, 2007.
Google. Google My Account.
Google. The Next Chapter for Flu Trends.
M. Gruteser and B. Hoh. On the anonymity of periodic location samples. In International Conference on Security in Pervasive Computing, pages 179–192. Springer, 2005.
B. Han, P. Cook, and T. Baldwin. Text-based twitter user geolocation prediction. Journal of Artificial Intelligence Research, 49:451–500, 2014.
F. Harvey. To volunteer or to contribute locational information? towards truth in labeling for crowdsourced geographic information. In Crowdsourcing Geographic Knowledge, pages 31–42. Springer, 2013.
S. Hasan and S. V. Ukkusuri. Urban activity pattern classification using topic models from online geo-location data. Transportation Research Part C: Emerging Technologies, 44:363–381, 2014.
S. Hasan and S. V. Ukkusuri. Location contexts of user check-ins to model urban geo life-style patterns. PloS one, 10(5):e0124819, 2015.
S. Hasan, S. V. Ukkusuri, and X. Zhan. Understanding social influence in activity-location choice and life-style patterns using geo-location data from social media. Frontiers in ICT, 3:10, 2016.
D. S. Herrmann. Complete guide to security and privacy metrics: measuring regulatory compliance, operational resilience, and ROI. CRC Press, 2007.
H. Hodson. Baidu uses millions of users’ location data to make predictions, 2016.
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady. Enhancing security and privacy in traffic-monitoring systems. IEEE Pervasive Computing, 5(4):38–46, 2006.
P. Hu, T. Mukherjee, A. Valliappan, and S. Radziszowski. Homomorphic proximity computation in geosocial networks. In Computer Communications Workshops (INFOCOM WKSHPS), 2016 IEEE Conference on, pages 616–621. IEEE, 2016.
Y. Huang, J. Katz, and D. Evans. Quid-pro-quo-tocols: Strengthening semi-honest protocols with dual execution. In 2012 IEEE Symposium on Security and Privacy, pages 272–284. IEEE, 2012.
M. Humbert, E. Ayday, J.-P. Hubaux, and A. Telenti. On non-cooperative genomic privacy. In International Conference on Financial Cryptography and Data Security, pages 407–426. Springer, 2015.
ICO. Crime-mapping and geo-spatial crime data: Privacy and transparency principles., 2012.
IDC. Worldwide Wearables Market Increases 67.2% Amid Seasonal Retrenchment, According to IDC.
N. Jean, M. Burke, M. Xie, W. M. Davis, D. B. Lobell, and S. Ermon. Combining satellite imagery and machine learning to predict poverty. Science, 353(6301):790–794, Aug. 2016.
C. S. Jensen, H. Lu, and M. L. Yiu. Location privacy techniques in client-server architectures. In Privacy in location-based applications, pages 31–58. Springer, 2009.
D. Jurgens. That’s what friends are for: Inferring location in online social media platforms based on social relationships. ICWSM, 13:273–282, 2013.
M. Kandias, L. Mitrou, V. Stavrou, and D. Gritzalis. Which side are you on? a new panopticon vs. privacy. In Security and Cryptography (SECRYPT), 2013 International Conference on, pages 1–13. IEEE, 2013.
B. Kar and R. Ghose. Is my information private? geo-privacy in the world of social media. In GIO@ GIScience, pages 28–31, 2014.
H.-S. Kim. What drives you to check in on facebook? motivations, privacy concerns, and mobile phone involvement for location-based information sharing. Computers in Human Behavior, 54:397–406, 2016.
R. Kitchin. The real-time city? big data and smart urbanism. GeoJournal, 79(1):1–14, 2014.
R. Kitchin. Data-driven, networked urbanism. In Data and the City workshop, 2015.
P. Kotzanikolaou, C. Patsakis, E. Magkos, and M. Korakakis. Lightweight private proximity testing for geospatial social networks. Computer Communications, 73:263–270, 2016.
O. Kounadi, K. Bowers, and M. Leitner. Crime Mapping On-line: Public Perception of Privacy Issues. European Journal on Criminal Policy and Research, 21(1):167–190, Mar. 2015.
D. Lazer, R. Kennedy, G. King, and A. Vespignani. The parable of google flu: traps in big data analysis. Science, 343(6176):1203–1205, 2014.
J. H. Lee, S. Gao, K. Janowicz, and K. G. Goulias. Can twitter data be used to validate travel demand models? In IATBR 2015-WINDSOR, 2015.
H. Li, H. Zhu, S. Du, X. Liang, and X. Shen. Privacy leakage of location sharing in mobile social networks: Attacks and defense. IEEE Transactions on Dependable and Secure Computing, (1):1–1, 2016.
H. P. Li, H. Hu, and J. Xu. Nearby friend alert: Location anonymity in mobile geosocial networks. IEEE Pervasive Computing, 12(4):62–70, 2013.
D. Lian and X. Xie. Collaborative activity recognition via check-in history. In Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Location-Based Social Networks, pages 45–48. ACM, 2011.
F. Liu, D. Janssens, J. Cui, G. Wets, and M. Cools. Characterizing activity sequences using profile hidden markov models. Expert Systems with Applications, 42(13):5705–5722, 2015.
Y. Liu, K. P. Gummadi, B. Krishnamurthy, and A. Mislove. Analyzing facebook privacy settings: user expectations vs. reality. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, pages 61–70. ACM, 2011.
M. Madden. Americans Consider Certain Kinds of Data to be More Sensitive than Others, Nov. 2014.
M. Madden, S. Fox, A. Smith, and J. Vitak. Digital Footprints: Online identity management and search in the age of transparency. Pew Internet & American Life Project Washington, DC, 2007.
B. M. C. f. MailOnline. Ashley Madison members reveal the impact of last year’s hack, Aug. 2016.
A. Maiti, M. Jadliwala, J. He, and I. Bilogrevic. (smart) watch your taps: side-channel keystroke inference attacks using smartwatches. In Proceedings of the 2015 ACM International Symposium on Wearable Computers, pages 27–30. ACM, 2015.
S. Mardenfeld, D. Boston, S. J. Pan, Q. Jones, A. Iamntichi, and C. Borcea. Gdc: Group discovery using co-location traces. In Social computing (SocialCom), 2010 IEEE second international conference on, pages 641–648. IEEE, 2010.
M. Maron. How complete is OpenStreetMap?
S. Mascetti, D. Freni, C. Bettini, X. S. Wang, and S. Jajodia. Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. The International Journal on Very Large Data Bases, 20(4):541–566, 2011.
D. McCullagh. Microsoft’s Web map exposes phone, PC locations, 2011.
G. McKenzie and K. Janowicz. Where is also about time: A location-distortion model to improve reverse geocoding using behavior-driven temporal semantic signatures. Computers, Environment and Urban Systems, 54:1–13, 2015.
P. Meier. Crisis mapping in action: How open source software and global volunteer networks are changing the world, one map at a time. Journal of Map & Geography Libraries, 8(2):89–100, 2012.
G. R. Milne and M. J. Culnan. Strategies for reducing online privacy risks: Why consumers read (or don’t read) online privacy notices. Journal of Interactive Marketing, 18(3):15–29, 2004.
MIT. Real Time Rome.
A. Narayanan, N. Thiagarajan, M. Lakhani, M. Hamburg, and D. Boneh. Location privacy via private proximity testing. In NDSS, 2011.
B. News. Ice age star map discovered, 2000.
J. D. Nielsen, J. I. Pagter, and M. B. Stausholm. Location privacy via actively secure private proximity testing. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012 IEEE International Conference on, pages 381–386. IEEE, 2012.
A. Noulas, M. Musolesi, M. Pontil, and C. Mascolo. Inferring interests from mobility and social interactions. In NIPS Workshop on Analyzing Networks and Learning with Graphs, pages 2–88, 2009.
A.-M. Olteanu, K. Huguenin, R. Shokri, M. Humbert, and J.-P. Hubaux. Quantifying interdependent privacy risks with location data. IEEE Transactions on Mobile Computing, 2016.
E. Owusu, J. Han, S. Das, A. Perrig, and J. Zhang. Accessory: password inference using accelerometers on smartphones. In Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications, page 9. ACM, 2012.
R. L. Penslar and J. Porter. Institutional review board guidebook. Retrieved July, 18:2003, 1993.
Pew Research Center. More Americans using smartphones for getting directions, streaming TV, Jan. 2016.
N. Polatidis, C. K. Georgiadis, E. Pimenidis, and E. Stiakakis. A method for privacy-preserving context-aware mobile recommendations. In International Conference on e-Democracy, pages 62–74. Springer, 2015.
K. Pomfret. Latitudes and attitudes: Zooming in on geospatial data, privacy and the law in the digital age. Centre for Spatial Law and Policy, 2013.
J. H. Reiman. Driving to the panopticon: A philosophical exploration of the risks to privacy posed by the highway technology of the future. Santa Clara Computer & High Tech. LJ, 11:27, 1995.
L. Rossi and M. Musolesi. It’s the way you check-in: identifying users in location-based social networks. In Proceedings of the second ACM conference on Online social networks, pages 215–226. ACM, 2014.
L. Rossi, M. Williams, C. Stich, and M. Musolesi. Privacy and the city: User identification and location semantics in location-based social networks. In Ninth International AAAI Conference on Web and Social Media, 2015.
Z. Sahnoune, C. Y. Yep, and E. Aïmeur. Privacy issues in geosocial networks. In International Conference on Risks and Security of Internet and Systems, pages 67–82. Springer, 2014.
M. Saini and A. El Saddik. Absence privacy loss. Computer, 48(11):102–105, 2015.
D. Schoepe and A. Sabelfeld. Understanding and enforcing opacity. In 2015 IEEE 28th Computer Security Foundations Symposium, pages 539–553. IEEE, 2015.
K. G. Shin, X. Ju, Z. Chen, and X. Hu. Privacy protection for users of location-based services. IEEE Wireless Communications, 19(1):30–39, 2012.
R. Shokri, M. Stronati, and V. Shmatikov. Membership inference attacks against machine learning models. arXiv preprint arXiv:1610.05820, 2016.
R. Shokri, G. Theodorakopoulos, J.-Y. Le Boudec, and J.-P. Hubaux. Quantifying location privacy. In 2011 IEEE Symposium on Security and Privacy, pages 247–262. IEEE, 2011.
L. Šikšnys, J. R. Thomsen, S. Šaltenis, M. L. Yiu, and O. Andersen. A location privacy aware friend locator. In International Symposium on Spatial and Temporal Databases, pages 405–410. Springer, 2009.
R. Soden and L. Palen. From crowdsourced mapping to community mapping: the post-earthquake work of openstreetmap haiti. In COOP 2014-Proceedings of the 11th International Conference on the Design of Cooperative Systems, 27–30 May 2014, Nice (France), pages 311–326. Springer, 2014.
D. J. Solove. A taxonomy of privacy. University of Pennsylvania law review, pages 477–564, 2006.
H. Soroush, K. Sung, E. Learned-Miller, B. N. Levine, and M. Liberatore. Turning off gps is not enough: Cellular location leaks over the internet. In International Symposium on Privacy Enhancing Technologies Symposium, pages 103–122. Springer, 2013.
A. Staff. Location Sharing Is Easier Than You Think, 2016.
D. T. Staff. The history of social networking, May 2016.
B. Steele. NPR’s Gravitas, Sept. 2002.
F. Stutzman, R. Capra, and J. Thompson. Factors mediating disclosure in social network sites. Computers in Human Behavior, 27(1):590–598, 2011.
F. Stutzman, R. Gross, and A. Acquisti. Silent listeners: The evolution of privacy and disclosure on facebook. Journal of privacy and confidentiality, 4(2):2, 2013.
N. J. Thrower. Maps and civilization: cartography in culture and society. University of Chicago Press, 2008.
L. Tompson, S. Johnson, M. Ashby, C. Perkins, and P. Edwards. Uk open source crime data: accuracy and possibilities for research. Cartography and Geographic Information Science, 42(2):97–111, 2015.
M.-T. Tran, I. Echizen, and A.-D. Duong. Binomial-mix-based location anonymizer system with global dummy generation to preserve user location privacy in location-based services. In Availability, Reliability, and Security, 2010. ARES’10 International Conference on, pages 580–585. IEEE, 2010.
J. Y. Tsai, P. G. Kelley, L. F. Cranor, and N. Sadeh. Location-sharing technologies: Privacy risks and controls. ISJLP, 6:119, 2010.
U.S. Department of Commerce Economic and Statistics Administration, U.S. Census Bureau. Small area income and poverty estimates (saipe) program, 2014.
A. Uteck. Ubiquitous computing and spatial privacy. Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society, pages 83–101, 2009.
S. Utz and N. Kramer. The privacy paradox on social network sites revisited: The role of individual characteristics and group norms. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 3(2):2, 2009.
VB Insight. Identity and marketing: Capturing, unifying, and using customer data to drive revenue growth | Insight | VentureBeat, 2015.
VCloudNews. Every Day Big Data Statistics – 2.5 Quintillion Bytes of Data Created Daily.
C. R. Vicente, I. Assent, and C. S. Jensen. Effective privacy-preserving online route planning. In 2011 IEEE 12th International Conference on Mobile Data Management, volume 1, pages 119–128. IEEE, 2011.
C. R. Vicente, D. Freni, C. Bettini, and C. S. Jensen. Location-related privacy in geo-social networks. IEEE Internet Computing, 15(3):20–27, 2011.
B. Vladlena, G. Saridakis, H. Tennakoon, and J. N. Ezingeard. The role of security notices and online consumer behaviour: An empirical study of social networking users. International Journal of Human-Computer Studies, 80:36–44, 2015.
N. Vratonjic, K. Huguenin, V. Bindschaedler, and J.-P. Hubaux. How others compromise your location privacy: The case of shared public ips at hotspots. In International Symposium on Privacy Enhancing Technologies Symposium, pages 123–142. Springer, 2013.
I. Wagner and D. Eckhoff. Technical privacy metrics: A systematic survey. arXiv preprint arXiv:1512.00327, 2015.
M. Wall. Big Data: Are you ready for blast-off? BBC News, Mar. 2014.
S. D. Warren and L. D. Brandeis. The right to privacy. Harvard law review, pages 193–220, 1890.
J. Wartell and J. T. McEwen. Privacy in the information age: A guide for sharing crime maps and spatial data series: Research report. Institute for Law and Justice, U.S. Department of Justice, Office of Justice Programs, 2001.
D. Wyatt, T. Choudhury, J. Bilmes, and J. A. Kitts. Inferring colocation and conversation networks from privacy-sensitive audio with implications for computational social science. ACM Transactions on Intelligent Systems and Technology (TIST), 2(1):7, 2011.
D. Yang, D. Zhang, V. W. Zheng, and Z. Yu. Modeling user activity preference by leveraging user spatial temporal characteristics in lbsns. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 45(1):129–142, 2015.
J. Ye, Z. Zhu, and H. Cheng. What’s your next move: User activity prediction in location-based social networks. In Proceedings of the SIAM International Conference on Data Mining. SIAM. SIAM, 2013.
A. L. Young and A. Quan-Haase. Privacy protection strategies on facebook: The internet privacy paradox revisited. Information, Communication & Society, 16(4):479–500, 2013.
M. Yutaka, O. Naoaki, I. Kiyoshi, et al. Inferring long-term user property based on users’ location history. In Proceedings of the IJCAI. IJCAI, 2007.
P. A. Zandbergen. Accuracy of iphone locations: A comparison of assisted gps, wifi and cellular positioning. Transactions in GIS, 13(s1):5–25, 2009.
Z. Zhang, L. Zhou, X. Zhao, G. Wang, Y. Su, M. Metzger, H. Zheng, and B. Y. Zhao. On the validity of geosocial mobility traces. In Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, page 11. ACM, 2013.
D. Zheng, T. Hu, Q. You, H. Kautz, and J. Luo. Towards lifestyle understanding: Predicting home and vacation locations from user’s online photo collections. In Proceedings of the 9th International AAAI Conference on Web and Social Media, pages 553–560, 2015.
Y. Zheng. Location-based social networks: Users. In Computing with spatial trajectories, pages 243–276. Springer, 2011.
G. Zhong, I. Goldberg, and U. Hengartner. Louis, lester and pierre: Three protocols for location privacy. In International Workshop on Privacy Enhancing Technologies, pages 62–76. Springer, 2007.
M. Zook, M. Graham, T. Shelton, and S. Gorman. Volunteered geographic information and crowdsourcing disaster relief: a case study of the haitian earthquake. World Medical & Health Policy, 2(2):7–33, 2010.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Bilogrevic, I. (2018). Privacy in Geospatial Applications and Location-Based Social Networks. In: Gkoulalas-Divanis, A., Bettini, C. (eds) Handbook of Mobile Data Privacy . Springer, Cham. https://doi.org/10.1007/978-3-319-98161-1_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-98161-1_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-98160-4
Online ISBN: 978-3-319-98161-1
eBook Packages: Computer ScienceComputer Science (R0)