Location-Based Services and Privacy in Airports

  • John Paulin Hansen
  • Alexandre Alapetite
  • Henning Boje Andersen
  • Lone Malmborg
  • Jacob Thommesen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5726)

Abstract

This paper reports on a study of privacy concerns related to location-based services in an airport, where users who volunteer for the service will be tracked for a limited period and within a limited area. Reactions elicited from travellers at a field trial showed 60% feeling to some or to a large degree more secure with the system in operation. To provide a background for the privacy study we also describe services provided by the tracking facility and the infrastructure behind it as well as the design and evaluation activities we used. Based on project results including a large number of comments from passengers, we discuss factors influencing passengers’ acceptance and appreciation of location-based services in airports.

Keywords

Location-based services Mobile services Tracking Technology acceptance Privacy Transport 

References

  1. 1.
    Lederer, S., Mankoff, J., Dey, A.K.: Who wants to know what when? privacy preference determinants in ubiquitous computing. In: CHI 2003 Extended Abstracts on Human Factors in Computing Systems. CHI 2003, pp. 724–725. ACM, New York (2003)Google Scholar
  2. 2.
    SPOPOS, http://www.spopos.dk (confirmed April 12, 2009)
  3. 3.
    SITA/air transport world passenger self-service survey, http://www.sita.aero/files/resources/SITA_PSS_2008.pdf (confirmed April 12, 2009)
  4. 4.
    IATA – International Air Transport Association, Simplifying the Business, http://iata.org/stb/ (confirmed April 12, 2009)
  5. 5.
    Raper, J., Gartner, G., Karimi, H., Rizo, C.: A critical evaluation of location based services and their potential. Journal of Location Based Services 1(1), 5–45 (2007)CrossRefGoogle Scholar
  6. 6.
    Kaasinen, E.: User needs for location-aware mobile services. Personal Ubiquitous Computing 7(1), 70–79 (2003)CrossRefGoogle Scholar
  7. 7.
    Fried, C.: Privacy. Yale Law Journal 77(3), 475–493 (1968)CrossRefGoogle Scholar
  8. 8.
    Introna, L.D.: Privacy and the Computer: Why We Need Privacy in the Information Society. Metaphilosophy 28(3), 259–275 (1997)CrossRefGoogle Scholar
  9. 9.
    Adey, P.: Secured and Sorted Mobilities: Examples from the Airport. Surveillance & Society 1(4), 500–519 (2004)Google Scholar
  10. 10.
    Tsai, J.Y., Kelley, P., Drielsma, P., Cranor, L.F., Hong, J., Sadeh, N.: Who’s viewed you?: the impact of feedback in a mobile location-sharing application. In: Proceedings of the 27th international Conference on Human Factors in Computing Systems. CHI 2009, pp. 2003–2012. ACM, New York (2009)Google Scholar
  11. 11.
    Brown, B., Taylor, A., Izadi, S., Sellen, A., Kaye, J.: Locating Family Values: A Field Trail of the Whereabouts Clock. In: Proc. of Ubi Comp 2007, pp. 354–371. Springer, Godalming (2007)CrossRefGoogle Scholar
  12. 12.
    Barkhuus, L., Dey, A.K.: Location-based services for mobile telephony: a study of users’ privacy concerns. In: Proceedings of INTERACT 2003, 9th IFIP TC13 International Conference on Human-Computer Interaction, pp. 709–712 (2003)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2009

Authors and Affiliations

  • John Paulin Hansen
    • 1
  • Alexandre Alapetite
    • 2
  • Henning Boje Andersen
    • 2
  • Lone Malmborg
    • 1
  • Jacob Thommesen
    • 2
  1. 1.IT University of CopenhagenCopenhagen SDenmark
  2. 2.Department of Management EngineeringTechnical University of DenmarkKongensDenmark

Personalised recommendations