Skip to main content

The dimensions of locational privacy

  • Chapter

Part of the book series: The GeoJournal Library ((GEJL,volume 88))

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Armstrong, M. P. (2002) Geographic information technologies and their potentially erosive effects on personal privacy. Studies in the Social Sciences, 27, 19–28.

    Article  Google Scholar 

  • Armstrong, M. P., Rushton, G. & Zimmermsn, D. L. (1999) Geographically masking health data to preserve confidentiality. Statistics in Medicine, 18, 497–525.

    Article  Google Scholar 

  • Beresford, A. R. & Stajano, F. (2003) Location privacy in pervasive computing. IEEE Pervasive Computing, 2, 46–55.

    Article  Google Scholar 

  • Bowdin, R. J. & SIM, A. B. (1992) The privacy bootstrap. Journal of Business and Economic Statistics, 10, 337–345.

    Article  Google Scholar 

  • Bridwell, S.A. (2004) Space-Time Masking Techniques for Privacy Protection in Location-Based Services. Paper presented at GIScience 2004, College Park, MD, October 20–23, 2004.

    Google Scholar 

  • Cassa, C. A., Grannis, S. J., Overhage, J. M. & Mandl, K. D. (2006) A context-sensitive approach to anonymizing spatial surveillance data: Impact on outbreak protection. Journal of the American Medical Information Association, 13, 160–165.

    Article  Google Scholar 

  • Choy, M., Kwan, M.-P. & Hong, V.-L. (2000) Distributed database design for mobile geographical applications. Journal of Database Management, 3–17.

    Google Scholar 

  • Cox, L. H. (1994) Matrix masking methods for disclosure limitation in microdata. Survey Methodology, 165–169.

    Google Scholar 

  • Cuellar, J. R. (2002) Location information privacy. In Sarikaya, B. (Ed.) Geographic Location in the Internet. Norwell:MA, Kluwer.

    Google Scholar 

  • Curry, M. R. (1997) The digital individual and the private realm. Annals of the Association of American Geographers, 87, 681–699.

    Article  Google Scholar 

  • Curry, M. R. (1998) Digital Place: Living with Geographic Information Technologies, London:U.K., Routledge.

    Google Scholar 

  • Dobson, J. E. & Fisher, P. F. (2003) Geoslavery. IEEE Technology and Society Magazine, 22, 47–52.

    Article  Google Scholar 

  • Duke-Williams, O. & Rees, P. (1998) Can Census Offices publish statistics for more than one small area geography? An analysis of the differencing problem in statistical disclosure. International Journal of Geographical Information Science, 579–605.

    Google Scholar 

  • Duckham, M. & Kulik, L. (2005a) A formal model of obfuscation and negotiation for location privacy. In Gellersen, H. W., Want, R. & Schmidt, A. (Eds.) Lecture Notes in Computer Science 3693. Springer.

    Google Scholar 

  • Duckham, M. & Kulik, L. (2005b) Simulation of obfuscation and negotiation for location privacy. In Mark, D. M. & Cohn, A. G. (Eds.) Lecture Notes in Computer Science 3693. Springer.

    Google Scholar 

  • Duncan, G. T. & Lambert, D. (1986) Disclosure-limited data dissemination. Journal of the American Statistical Society, 81, 10–18.

    Google Scholar 

  • Duncan, G. T. & Pearson, R. W. (1991) Enhancing access to microdata while protecting confidentiality. Statistical Science, 6, 219–232.

    Google Scholar 

  • Dykes, J. A. & Mountain, D. M. (2003) Seeking structure in records of spatio-temporal behavior: Visualization issues, efforts and application. Computational Statistics, 43, 581–603.

    Google Scholar 

  • Federal Committee on Statistical Methodology (2005) Statistical Policy Working Paper 22: Report on Statistical Disclosure Limitation Methodology. Available at: http://www.fcsm.gov/working-papers/spwp22.html.

    Google Scholar 

  • Goss, J. (1995) We know who you are and we know where you live: The instrumental rationality in geodemographic systems. Economic Geography, 71, 171–198.

    Article  Google Scholar 

  • Gruteser, M. & Grunwald, D. (2003) Anonymous usage of location-based services through spatial and tempral cloaking. International Conference on Mobile Systems, Applications and Services (MobiSys) San Francisco, CA.

    Google Scholar 

  • Hagerstrand, T. (1970) What about people in regional science? Papers of the Regional Science Association, 24, 7–21.

    Google Scholar 

  • Hjelm, J. (2002) Creating Location Services for the Wireless Web, New York:NY, John Wiley & Sons, Inc.

    Google Scholar 

  • Hull, R., Kumar, B., Lieuwen, D., Patel-Sheider, P. F., Sahugnet, A., Varadarajan, S. & Vyas, A. (2004) Enabling context-aware and privacy-concious user data sharing. 2004 IEEE International Conference on Mobile Data Management. Berkely:CA.

    Google Scholar 

  • Kwan, M.-P., Casas, I. & Schmitz, B. C. (2004) Protection of geoprivacy and accuracy of spatial information: How effective are geographical masks? Cartographica, 39, 15–28.

    Google Scholar 

  • Küpper, A. (2005) Location-Based Services: Fundamentals and Operation, Hoboken, N.J., John Wiley.

    Book  Google Scholar 

  • Lambert, D. (1993) Measures of disclosure risk and harm. Journal of Official Statistics, 9, 313–331.

    Google Scholar 

  • Leonhardi, A. & Rothermel, K. (2002) Protocols for updating highly accurate location information. In Sarikaya, B. (Ed.) Geographic Location in the Internet. Norwell:MA, Kluwer.

    Google Scholar 

  • Miller, H. J. (2005a) A measurement theory for time geography. Geographical Analysis, 37, 17–45.

    Article  Google Scholar 

  • Miller, H. J. (2005b) What about people in geographic information science? In Fisher, P. & Unwin, D. (Eds.) Re-Presenting Geographic Information Systems. John Wiley.

    Google Scholar 

  • Monmonier, M. (2002) Spying with Maps: Surveillance Technologies and the Future of Privacy, Chicago:IL, University of Chicago Press.

    Google Scholar 

  • Morris, J. B., JR. (2002) The elements of location tracking and privacy protection. In Sarikaya, B. (Ed.) Geographic Location in the Internet. Norwell:MA, Kluwer.

    Google Scholar 

  • Mountain, D. M. (2005) Visualizing, querying and summarizing individual spatio-temporal behaviour. In Dykes, J. A., Kraak, M. J. & Maceeachren, A. M. (Eds.) Exploring Geovisualization. London, Elsevier.

    Google Scholar 

  • Myles, G., Friday, A. & Davies, N. (2003) Preserving privacy in environments with location-based applications. IEEE Pervasive Computing, 2, 56–64.

    Article  Google Scholar 

  • Onsrud, H. J., Johnson, J. P. & Lopez, X. (1994) Protecting personal privacy in using Geographic Information Systems. Photogrammetric Engineeering and Remote Sensing, 60, 1083–1095.

    Google Scholar 

  • Paas, G. (1988) Disclosure risk and disclosure avoidance for microdata. Journal of Business and Economic Statistics, 6, 487–500.

    Article  Google Scholar 

  • Pfitzmann, A. & Köhntopp, M. (2001) Anonymity, unobservability, and pseudonymity—a proposal for terminology. In Federrath, H. (Ed.) Lecture Notes in Computer Science 2009. Springer.

    Google Scholar 

  • Pfoser, D. & Jensen, C. S. (1999) Capturing the uncertainty of moving-object representations. In Güting, R. H., Papadias, D. & Lochovsky, F. (Eds.) Lecture Notes in Computer Science 1651. Berlin, Springer.

    Google Scholar 

  • Pred, A. (1977) The choreography of existence: Comments on Hägerstand’s time-geography and its usefulness. Economic Geography, 53, 207–221.

    Article  Google Scholar 

  • Schiller, J. H. & Voisard, A. (Eds.) (2004) Location-Based Services, San Francisco, CA, Morgan Kaufmann.

    Google Scholar 

  • Smyth, C. S. (2001) Mining mobile trajectories. In Miller, H. J. & Han, J. (Eds.) Geographic Data Mining and Knowledge Discovery. London, Taylor and Francis.

    Google Scholar 

  • Spierkermann, S. (2004) General aspects of location-based services. In Schiller, J. & Voisard, A. (Eds.) Location-Based Services. New York:NY, Morgan Kaufman.

    Google Scholar 

  • Sweeney, L. (2002) k-anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-Based Systems, 10, 557–570.

    Article  Google Scholar 

  • Warner, S. L. (1965) Ranomized response: A survey technique for eliminating evasive answer bias. Journal of the American Statistical Association, 60, 63–69.

    Article  Google Scholar 

  • Westin, A. F. (1967) Privacy and Freedom, New York:NY, Atheneum.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer

About this chapter

Cite this chapter

Bridwell, S.A. (2007). The dimensions of locational privacy. In: Miller, H.J. (eds) Societies and Cities in the Age of Instant Access. The GeoJournal Library, vol 88. Springer, Dordrecht. https://doi.org/10.1007/1-4020-5427-0_14

Download citation

Publish with us

Policies and ethics