Anthony D, Kotz D, Henderson T (2007) Privacy in location-aware computing environments. IEEE Pervasive Comput 6(4):64–72
Article
Google Scholar
Arthur C (2011) iPhone keeps record of everywhere you go. The Guardian, Wednesday, 20 April
Balebako R, Leon PG, Mugan J, Acquisti A, Cranor LF, Sadeh N (2011) Nudging users towards privacy on mobile devices, in workshop on persuasion, influence, nudge and coercion through mobile devices (PINC). In: Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems (CHI EA '11), New York, NY, USA, ACM
Barkhuus L, Brown B, Bell M, Sherwood S, Hall M, Chalmers M (2008) From awareness to repartee: sharing location within social groups. In CHI’08, pp 497–506
Benisch M, Kelley P, Sadeh N, Cranor L (2010) Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs. Pers Ubiquit Comput 15(7):679–694
Google Scholar
Bilton N (2010) Price of facebook privacy? Start clicking. New York Times Article, New York
Google Scholar
Costa P, Almeida J, Pires L, van Sinderen M (2008) Evaluation of a rule-based approach for context-aware services. In: Global telecommunications conference, 2008. IEEE GLOBECOM 2008. IEEE, pp 1–5, 30 2008-Dec 4
Cranshaw J, Mugan J, Sadeh N (2011) User-controllable learning of location privacy policies with gaussian mixture models. In: Proceedings of the twenty-fifth conference on artificial intelligence (AAAI-11)
Dey A, Abowd G, Salber D (2001) A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications. Human Comput Interact 16(2–4):97–166
Google Scholar
Do TMT, Blom J, Gatica-Perez D (2011) Smartphone usage in the wild: a large-scale analysis of applications and context. In: Proceedings of the 13th international conference on multimodal interfaces, ICMI’11, pp 353–360. ACM
Duckham M, Kulik L (2005) A formal model of obfuscation and negotiation for location privacy. In: Gellersen H, Want R, Schmidt A (eds) Pervasive computing, (Lecture Notes in Computer Science), vol 3468. Springer, Berlin, pp 243–251
Gedik B, Liu L (2008) Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans Mobile Comput 7(1):1–18
Article
Google Scholar
Heipke C (2010) Crowdsourcing geospatial data. ISPRS J Photogramm Remote Sens 65(6):550–557. ISPRS Centenary Celebration Issue
Article
Google Scholar
Hesselman C, Eertink H, Wibbels M (2007) Privacy-aware context discovery for next generation mobile services. In: International symposium on applications and the internet workshops, 2007. SAINT workshops 2007. IEEE Computer Society 2007, Hiroshima, Japan, 15–19 January 2007. doi: http://www.computer.org/csdl/proceedings/saintw/2007/2757/00/27570003-abs.html
Hong JI, Landay JA (2004) An architecture for privacy-sensitive ubiquitous computing. In: Proceedings of the 2nd international conference on mobile systems, applications, and services, MobiSys ’04, pp 177–189, New York, NY, USA, ACM
Iachello G, Smith I, Consolovo S, Abowd G, Hughes J, Howard J, Potter F, Scott J, Sohn T, Hightower J, LaMarca A (2005) Control, deception, and communication: evaluating the deployment of a location-enhanced messaging service. In: Ubicomp’05, Springer, pp 213–231
Khalil A, Connelly K (2006) Context-aware telephony: privacy preferences and sharing patterns. In: CSCW’06
Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M (2007) L-diversity: privacy beyond k-anonymity. ACM Trans Knowl Discov Data (TKDD) 1(1):1–52
Google Scholar
Nissenbaum H (2004) Privacy as contextual integrity. Wash Law Rev Assoc 79:119–158
Google Scholar
Palen L, Dourish P (2003) Unpacking "privacy" for a networked world. In: CHI’03, pp 129–136, New York, NY, USA, ACM
Priedhorsky R, Terveen L (2008) The computational geowiki: what, why, and how. In: Proceedings of the 2008 ACM conference on computer supported cooperative work, CSCW’08, pp 267–276, New York, NY, USA, ACM
Roche S, Propeck-Zimmermann E, Mericskay B (2011) Geoweb and crisis management: issues and perspectives of volunteered geographic information. GeoJournal 1–20. doi:10.1007/s10708-011-9423-9
Sadeh N, Hong J, Cranor L, Fette I, Kelley P, Prabaker M, Rao J (2009) Understanding and capturing people’s privacy policies in a mobile social networking application. Pers Ubiquit Comput 13(16):401–412
Article
Google Scholar
Toch E (2011) Super-Ego: a framework for privacy-sensitive bounded context-awareness. In: Proceedings of the 5th ACM international workshop on context-awareness for self-managing systems (CASEMANS’11), August
Toch E, Cranshaw J, Drielsma PH, Tsai JY, Kelley PG, Springfield J, Cranor L, Hong J, Sadeh N (2010) Empirical models of privacy in location sharing. In: Proceedings of the 12th ACM international conference on ubiquitous computing, Ubicomp’10, pp 129–138, New York, NY, USA, ACM
Tuttlies V, Schiele G, Becker C (2009) End-user configuration for pervasive computing environments. In: International conference on complex, intelligent and software intensive systems, 2009. CISIS’09, pp 487 –493, March
Westin A (1967) Privacy and freedom. The Bodley Head, London
Google Scholar
Ye M, Yin P, Lee W-C, Lee D-L (2011) Exploiting geographical influence for collaborative point-of-interest recommendation. In: Proceedings of the 34th international ACM SIGIR conference on Research and development in Information Retrieval, SIGIR’11, pp 325–334, New York, NY, USA, ACM
Zheng VW, Zheng Y, Xie X, Yang Q (2010) Collaborative location and activity recommendations with gps history data. In: Proceedings of the 19th international conference on World wide web, WWW’10, New York, NY, USA. ACM, pp 1029–1038