E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior
Proceedings of the 3rd ACM conference on Electronic Commerce
Who wants to know what when? privacy preference determinants in ubiquitous computing
CHI '03 Extended Abstracts on Human Factors in Computing Systems
Location disclosure to social relations: why, when, & what people want to share
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Dogear: Social bookmarking in the enterprise
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
HT06, tagging paper, taxonomy, Flickr, academic article, to read
Proceedings of the seventeenth conference on Hypertext and hypermedia
Protection of Location Privacy using Dummies for Location-based Services
ICDEW '05 Proceedings of the 21st International Conference on Data Engineering Workshops
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Why we tag: motivations for annotation in mobile and online media
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Location anonymity in continuous location-based services
Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems
Privacy Preservation in the Publication of Trajectories
MDM '08 Proceedings of the The Ninth International Conference on Mobile Data Management
The intellectual challenge of CSCW: the gap between social requirements and technical feasibility
Human-Computer Interaction
A Testbed for the Exploration of Novel Concepts in Mobile Service Delivery
MDM '07 Proceedings of the 2007 International Conference on Mobile Data Management
Social disclosure of place: from location technology to communication practices
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
ECDL'10 Proceedings of the 14th European conference on Research and advanced technology for digital libraries
Location-based services deployment and demand: a roadmap model
Electronic Commerce Research
When are users comfortable sharing locations with advertisers?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs
Personal and Ubiquitous Computing
Children and geotagged images: quantitative analysis for security risk assessment
International Journal of Electronic Security and Digital Forensics
Can you see me now?: location, visibility and the management of impressions on foursquare
Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services
Relative Location Oriented Mobile LBS
Proceedings of International Conference on Advances in Mobile Computing & Multimedia
A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services
Mobile Networks and Applications
Hi-index | 0.00 |
Location based services (LBS) let people retrieve and share information related to their current position. Examples are Google Latitude or Panoramio. Since LBS share user-related content, location information etc., they put user privacy at risk. Literature has proposed various privacy mechanisms for LBS. However, it is unclear which mechanisms humans really find useful, and how they make use of them. We present a user study that addresses these issues. To obtain realistic results, we have implemented a geotagging application on the web and on GPS cellphones, and our study participants use this application in their daily lives. We test five privacy mechanisms that differ in the awareness, mental effort and degree of informedness required from the users. Among other findings, we have observed that in situations where a single simple mechanism does not meet all privacy needs, people want to use simple and sophisticated mechanisms in combination. Further, individuals are concerned about the privacy of others, even when they do not value privacy for themselves.