Security and privacy in device-to-device (D2D) communication: A review
Device-to-device (D2D) communication presents a new paradigm in mobile networking to
facilitate data exchange between physically proximate devices. The development of D2D is …
facilitate data exchange between physically proximate devices. The development of D2D is …
Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs
We present a 3-week user study in which we tracked the locations of 27 subjects and asked
them to rate when, where, and with whom they would have been comfortable sharing their …
them to rate when, where, and with whom they would have been comfortable sharing their …
[HTML][HTML] Using Twitter data in urban green space research: A case study and critical evaluation
HV Roberts - Applied Geography, 2017 - Elsevier
Highlights•A method of crowdsourcing in urban green space using Twitter is proposed.•A
case study is presented detailing some information received using this method.•Events in …
case study is presented detailing some information received using this method.•Events in …
A privacy preserving method using privacy enhancing techniques for location based services
WJ Buchanan, Z Kwecka, E Ekonomou - Mobile Networks and Applications, 2013 - Springer
The move towards service-oriented architectures and the increasing usage of mobile
devices to access such services are two of the major changes in modern computing …
devices to access such services are two of the major changes in modern computing …
When are users comfortable sharing locations with advertisers?
As smartphones and other mobile computing devices have increased in ubiquity, advertisers
have begun to realize a more effective way of targeting users and a promising area for …
have begun to realize a more effective way of targeting users and a promising area for …
Can you see me now? Location, visibility and the management of impressions on foursquare
S Guha, J Birnholtz - Proceedings of the 15th international conference …, 2013 - dl.acm.org
Location based social networking applications enable people to share their location with
friends for social purposes by" checking in" to places they visit. Prior research suggests that …
friends for social purposes by" checking in" to places they visit. Prior research suggests that …
Location-based services deployment and demand: a roadmap model
K Petrova, B Wang - Electronic Commerce Research, 2011 - Springer
The advancements in mobile, wireless and positioning technologies have enabled
applications and services such as route guiding and emergency call-out assistance. These …
applications and services such as route guiding and emergency call-out assistance. These …
Users Behavior in Location‐Aware Services: Digital Natives versus Digital Immigrants
M Furini - Advances in Human‐Computer Interaction, 2014 - Wiley Online Library
Location‐aware services may expose users to privacy risks as they usually attach user's
location to the generated contents. Different studies have focused on privacy in location …
location to the generated contents. Different studies have focused on privacy in location …
[PDF][PDF] A Study on Situational Awareness Security and Privacy of Wearable Health Monitoring Devices.
XJA Bellekens, K Nieradzinska… - Int. J. Cyber …, 2016 - researchgate.net
Situational Awareness provides a user centric approach to security and privacy. The human
factor is often recognised as the weakest link in security, therefore situational perception and …
factor is often recognised as the weakest link in security, therefore situational perception and …
[PDF][PDF] Understandable learning of privacy preferences through default personas and suggestions
As mobile and social networking applications continue to proliferate, they also increasingly
rely on the collection of an ever wider range of contextual attributes, location being a prime …
rely on the collection of an ever wider range of contextual attributes, location being a prime …