GROUP '01 Proceedings of the 2001 International ACM SIGGROUP Conference on Supporting Group Work
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Location disclosure to social relations: why, when, & what people want to share
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A study on the value of location privacy
Proceedings of the 5th ACM workshop on Privacy in electronic society
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Learning and inferring transportation routines
Artificial Intelligence
Privacy in Location-Aware Computing Environments
IEEE Pervasive Computing
Preserving privacy in gps traces via uncertainty-aware path cloaking
Proceedings of the 14th ACM conference on Computer and communications security
Seeing our signals: combining location traces and web-based models for personal discovery
Proceedings of the 9th workshop on Mobile computing systems and applications
Identification via location-profiling in GSM networks
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Collective information practice: emploring privacy and security as social and cultural phenomena
Human-Computer Interaction
Who's viewed you?: the impact of feedback in a mobile location-sharing application
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
On the Anonymity of Home/Work Location Pairs
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
A survey of computational location privacy
Personal and Ubiquitous Computing
The commodification of location: dynamics of power in location-based systems
Proceedings of the 11th international conference on Ubiquitous computing
Inference attacks on location tracks
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
On the anonymity of periodic location samples
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
UbiComp'05 Proceedings of the 7th international conference on Ubiquitous Computing
Practical metropolitan-scale positioning for GSM phones
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
Predestination: inferring destinations from partial trajectories
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Caché: caching location-enhanced content to improve user privacy
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Pervasive'11 Proceedings of the 9th international conference on Pervasive computing
Taming information-stealing smartphone applications (on Android)
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Understanding how visual representations of location feeds affect end-user privacy concerns
Proceedings of the 13th international conference on Ubiquitous computing
A survey on privacy in mobile participatory sensing applications
Journal of Systems and Software
Privacy preservation in the dissemination of location data
ACM SIGKDD Explorations Newsletter
Super-Ego: a framework for privacy-sensitive bounded context-awareness
CASEMANS '11 Proceedings of the 5th ACM International Workshop on Context-Awareness for Self-Managing Systems
Symbolic finite state transducers: algorithms and applications
POPL '12 Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Finding your friends and following them to where you are
Proceedings of the fifth ACM international conference on Web search and data mining
The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
"Check out where I am!": location-sharing motivations, preferences, and practices
CHI '12 Extended Abstracts on Human Factors in Computing Systems
Building a dynamic and computational understanding of personal social networks
Proceedings of the 1st ACM workshop on Mobile systems for computational social science
Reasons, rewards, regrets: privacy considerations in location sharing as an interactive practice
Proceedings of the Eighth Symposium on Usable Privacy and Security
Democratizing ubiquitous computing: a right for locality
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Location-based crowdsourcing of hyperlocal news: dimensions of participation preferences
Proceedings of the 17th ACM international conference on Supporting group work
Exploring user preferences for privacy interfaces in mobile sensing applications
Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia
When privacy and utility are in harmony: towards better design of presence technologies
Personal and Ubiquitous Computing
Privacy manipulation and acclimation in a location sharing application
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Adaptive information-sharing for privacy-aware mobile social networks
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
The price is right?: economic value of location sharing
Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication
Redeem with privacy (RWP): privacy protecting framework for geo-social commerce
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Proceedings of International Conference on Advances in Mobile Computing & Multimedia
Hi-index | 0.00 |
Long-term personal GPS data is useful for many UbiComp services such as traffic monitoring and environmental impact assessment. However, inference attacks on such traces can reveal private information including home addresses and schedules. We asked 32 participants from 12 households to collect 2 months of GPS data, and showed it to them in visualizations. We explored if they understood how their individual privacy concerns mapped onto 5 location obfuscation schemes (which they largely did), which obfuscation schemes they were most comfortable with (Mixing, Deleting data near home, and Randomizing), how they monetarily valued their location data, and if they consented to share their data publicly. 21/32 gave consent to publish their data, though most households' members shared at different levels, which indicates a lack of awareness of privacy interrelationships. Grounded in real decisions about real data, our findings highlight the potential for end-user involvement in obfuscation of their own location data.