LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Alrayes, Fatma; Abdelmoty, Alia (2014)
Publisher: IARIA
Languages: English
Types: Article
Subjects: HM, QA75
User location data collected on Geo-Social Networking\ud applications (GeoSNs) can be used to enhance the services\ud provided by such applications. However, personal location information\ud can potentially be utilised for undesirable purposes\ud that can compromise users’ privacy. This paper presents a study\ud of privacy implications of location-based information provision\ud and collection on user awareness and behaviour when using\ud GeoSNs. The dimensions of the problem are analysed and\ud used to guide an analytical study of some representative data\ud sets from such applications. The results of the data analysis\ud demonstrate the extent of potential personal information that may\ud be derived from the location information. In addition, a survey is\ud undertaken to examine user awareness, concerns and subsequent\ud attitude and behaviour given knowledge of the possible derived\ud information. The results clearly demonstrate users’ needs for\ud improving their knowledge, access and visibility of their data sets\ud as well as for means to control and manage their location data.\ud Future work needs to investigate the current state of personal\ud data management on GeoSNs and how their interfaces may be\ud improved to satisfy the highlighted users’ needs and to protect\ud their privacy.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] F. Alrayes and A. Abdelmoty, “Privacy concerns in location-based social networks,” in GEOProcessing 2014: The Sixth International Conference on Advanced Geographic Information Systems, Applications, and Services. IARIA, 2014, pp. 105-114.
    • [2] C. Vicente, D. Freni, C. Bettini, and C. Jensen, “Location-related privacy in geo-social networks,” IEEE Internet Computing, vol. 15, no. 3, 2011, pp. 20-27.
    • [3] D. Riboni, L. Pareschi, and C. Bettini, “Privacy in georeferenced context-aware services: a survey,” in Privacy in Location-Based Applications. Springer Verlag, 2009, pp. 151-172.
    • [4] S. Gambs, O. Heen, and C. Potin, “A comparative privacy analysis of geosocial networks,” in SPRINGL '11 Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2011, pp. 33-40.
    • [5] R. Shokri, G. Theodorakopoulos, J.-Y. Le Boudec, and J.-P. Hubaux, “Quantifying location privacy,” in IEEE Symposium on Security and Privacy, 2011, pp. 247-262.
    • [6] J. Tsai, P. Kelley, P. Drielsma, L. Cranor, J. Hong, and N. Sadeh, “Who's viewed you? the impact of feedback in a mobile location-sharing application,” in CHI '09, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2009, pp. 2003-2012.
    • [7] N. Sadeh, J. Hong, L. Cranor, I. Fette, P. Kelley, M. Prabaker, and J. Rao, “Understanding and capturing peoples privacy policies in a mobile social networking application,” Personal and Ubiquitous Computing, vol. 13, no. 6, 2008, pp. 401-412.
    • [8] H. Gao, J. Hu, T. Huang, J. Wang, and Y. Chen, “Security issues in online social networks,” Internet Computing, IEEE, vol. 15, no. 4, 2011, pp. 56-63.
    • [9] J. Nagy and P. Pecho, “Social networks security,” in Emerging Security Information, Systems and Technologies, 2009. SECURWARE'09. Third International Conference on. IEEE, 2009, pp. 321-325.
    • [10] P. Joshi and C.-C. Kuo, “Security and privacy in online social networks: A survey,” in Multimedia and Expo (ICME), 2011 IEEE International Conference on. IEEE, 2011, pp. 1-6.
    • [11] S. Patil and J. Lai, “Who gets to know what when: configuring privacy permissions in an awareness application,” in Proceedings of the SIGCHI conference on human factors in computing systems (CHI 2005), 2005, pp. 101-110.
    • [12] P. Kelley, M. Benisch, L. Cranor, and N. Sadeh, “When are users comfortable sharing locations with advertisers?” in Proceedings of the 2011 annual conference on Human factors in computing systems - CHI '11, 2011, pp. 2449-2452.
    • [13] A. Brush, J. Krumm, and J. Scott, “Exploring end user preferences for location obfuscation, location-based services, and the value of location,” in Proceedings of the 12th ACM international conference on Ubiquitous computing - Ubicomp '10, 2010, pp. 95-104.
    • [14] K. Tang, J. Hong, and D. Siewiorek, “Understanding how visual representations of location feeds affect end-user privacy concerns,” in Proceedings of the 13th international conference on Ubiquitous computing - UbiComp '11, 2011, pp. 207-216.
    • [15] J. Lindqvist, J. Cranshaw, J. Wiese, J. Hong, and J. Zimmerman, “I'm the mayor of my house: examining why people use foursquare-a socialdriven location sharing application,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '11, 2011, pp. 2409-2418.
    • [16] [17] [18] [19] [20] [21] L. Jin, X. Long, and J. Joshi, “Towards understanding residential privacy by analyzing users' activities in Foursquare,” in Proceedings of the 2012 ACM Workshop on Building analysis datasets and gathering experience returns for security - BADGERS '12, 2012, pp. 25-32.
    • Z. Cheng, J. Caverlee, and K. Lee, “You are where you tweet: a contentbased approach to geo-locating Twitter users,” in Proceedings of the 19th ACM international conference on Information and Knowledge Management CIKM '10, 2010, pp. 759-768.
    • T. Pontes, M. Vasconcelos, J. Almeida, P. Kumaraguru, and V. Almeida, “We know where you live?: privacy characterization of foursquare behavior,” in UbiComp '12 Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012, pp. 898-905.
    • A. Sadilek, H. Kautz, and J. Bigham, “Finding your friends and following them to where you are,” in Proceedings of the fifth ACM international conference on Web Search and Data Mining, WSDM '12, 2012, pp. 723-732.
    • H. Gao, J. Tang, and H. Liu, “Exploring social-historical ties on location-based social networks,” in Proceedings of the Sixth International AAAI Conference on Weblogs and Social Media, 2012, pp. 1140- 121.
    • --, “gSCorr: modeling geo-social correlations for new check-ins on location-based social networks,” in Proceedings of the 21st ACM international Conference on Information and Knowledge Management, CIKM '12, 2012, pp. 1582-1586.
    • D. Crandall, L. Backstrom, D. Cosley, S. Suri, D. Huttenlocher, and J. Kleinberg, “Inferring social ties from geographic coincidences,” in [23] [24] [25] [26] [27] [28] Proceedings of the National Academy of Sciences of the United States of America, vol. 107, no. 52, 2010, pp. 22 436-22 441.
    • S. Scellato, A. Noulas, R. Lambiotte, and C. Mascolo, “Socio-spatial properties of online location-based social networks,” in ICWSM, 2011, pp. 329-336.
    • S. Scellato, A. Noulas, and C. Mascolo, “Exploiting place features in link prediction on location-based social networks categories and subject descriptors,” in Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, 2011, pp. 1046- 1054.
    • D. Dearman and K. Truong, “Identifying the activities supported by locations with community-authored content,” in Proceedings of the 12th ACM international conference on Ubiquitous computing, 2010, pp. 23- 32.
    • A. Noulas, S. Scellato, C. Mascolo, and M. Pontil, “An empirical study of geographic user activity patterns in foursquare,” in ICWSM, 2011, pp. 70-73.
    • Z. Cheng, J. Caverlee, K. Lee, and D. Sui, “Exploring millions of footprints in location sharing services,” in ICWSM, vol. 2010, 2011, pp. 81-88.
    • D. Preotiuc-Pietro and T. Cohn, “Mining user behaviours: a study of check-in patterns in location based social networks,” Web Science, 2013.
    • [29] “Instgram location endpoints,” Nov. 2014. [Online]. Available: http://instagram.com/developer/endpoints/locations/# A. Popescu, G. Grefenstette, and P.-A. Moe¨llic, “Gazetiki: automatic creation of a geographical gazetteer,” in ACM/IEEE Joint Conference on Digital Libraries. ACM, 2008, pp. 85-93.
    • [31] “Foursqure terms of use,” Nov. 2014. [Online]. Available: https: //foursquare.com/legal/terms
    • [32] “Twitter terms of use,” Nov. 2014. [Online]. Available: https: //twitter.com/tos
    • [33] “R project,” Nov. 2014. [Online]. Available: http://www.r-project.org [34] “World domination summit,” Nov. 2014. [Online]. Available: http: //worlddominationsummit.com/faq/#primary-content
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article