Security and privacy in device-to-device (D2D) communication: A review

M Haus, M Waqas, AY Ding, Y Li… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Device-to-device (D2D) communication presents a new paradigm in mobile networking to
facilitate data exchange between physically proximate devices. The development of D2D is …

Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs

M Benisch, PG Kelley, N Sadeh, LF Cranor - Personal and Ubiquitous …, 2011 - Springer
We present a 3-week user study in which we tracked the locations of 27 subjects and asked
them to rate when, where, and with whom they would have been comfortable sharing their …

[HTML][HTML] Using Twitter data in urban green space research: A case study and critical evaluation

HV Roberts - Applied Geography, 2017 - Elsevier
Highlights•A method of crowdsourcing in urban green space using Twitter is proposed.•A
case study is presented detailing some information received using this method.•Events in …

A privacy preserving method using privacy enhancing techniques for location based services

WJ Buchanan, Z Kwecka, E Ekonomou - Mobile Networks and Applications, 2013 - Springer
The move towards service-oriented architectures and the increasing usage of mobile
devices to access such services are two of the major changes in modern computing …

When are users comfortable sharing locations with advertisers?

PG Kelley, M Benisch, LF Cranor, N Sadeh - Proceedings of the SIGCHI …, 2011 - dl.acm.org
As smartphones and other mobile computing devices have increased in ubiquity, advertisers
have begun to realize a more effective way of targeting users and a promising area for …

Can you see me now? Location, visibility and the management of impressions on foursquare

S Guha, J Birnholtz - Proceedings of the 15th international conference …, 2013 - dl.acm.org
Location based social networking applications enable people to share their location with
friends for social purposes by" checking in" to places they visit. Prior research suggests that …

Location-based services deployment and demand: a roadmap model

K Petrova, B Wang - Electronic Commerce Research, 2011 - Springer
The advancements in mobile, wireless and positioning technologies have enabled
applications and services such as route guiding and emergency call-out assistance. These …

Users Behavior in Location‐Aware Services: Digital Natives versus Digital Immigrants

M Furini - Advances in Human‐Computer Interaction, 2014 - Wiley Online Library
Location‐aware services may expose users to privacy risks as they usually attach user's
location to the generated contents. Different studies have focused on privacy in location …

[PDF][PDF] A Study on Situational Awareness Security and Privacy of Wearable Health Monitoring Devices.

XJA Bellekens, K Nieradzinska… - Int. J. Cyber …, 2016 - researchgate.net
Situational Awareness provides a user centric approach to security and privacy. The human
factor is often recognised as the weakest link in security, therefore situational perception and …

[PDF][PDF] Understandable learning of privacy preferences through default personas and suggestions

J Mugan, T Sharma, N Sadeh - Institute for Software Research …, 2011 - jonathanmugan.com
As mobile and social networking applications continue to proliferate, they also increasingly
rely on the collection of an ever wider range of contextual attributes, location being a prime …