-
1
-
-
84939610208
-
Design principles for spatio-temporally enabled pim tools: A qualitative analysis of trip planning
-
Springer
-
A. Abdalla, P. Weiser, and A. U. Frank. Design principles for spatio-temporally enabled pim tools: A qualitative analysis of trip planning. In Geographic Information Science at the Heart of Europe, pages 323-336. Springer, 2013.
-
(2013)
Geographic Information Science at the Heart of Europe
, pp. 323-336
-
-
Abdalla, A.1
Weiser, P.2
Frank, A.U.3
-
2
-
-
78651514411
-
The hitchhikers guide to the galaxy
-
D. Adams. The hitchhikers guide to the galaxy. Del Rey, 1995.
-
(1995)
Del Rey
-
-
Adams, D.1
-
3
-
-
32544444999
-
Geographic information technologies and personal privacy
-
M. P. Armstrong and A. J. Ruggles. Geographic information technologies and personal privacy. Cartographica, 40(4):63-73, 2006.
-
(2006)
Cartographica
, vol.40
, Issue.4
, pp. 63-73
-
-
Armstrong, M.P.1
Ruggles, A.J.2
-
4
-
-
33646153058
-
Protecting privacy against location-based personal identification
-
W. Jonker and M. Petković, editors, Springer Berlin Heidelberg
-
C. Bettini, X. Wang, and S. Jajodia. Protecting privacy against location-based personal identification. In W. Jonker and M. Petković, editors, Secure Data Management, volume 3674 of Lecture Notes in Computer Science, pages 185-199. Springer Berlin Heidelberg, 2005.
-
(2005)
Secure Data Management, Volume 3674 of Lecture Notes in Computer Science
, pp. 185-199
-
-
Bettini, C.1
Wang, X.2
Jajodia, S.3
-
6
-
-
84888301236
-
The digital persona and its application to data surveillance. The Information Society
-
R. Clarke. The digital persona and its application to data surveillance. The Information Society: An International Journal, 10(2):77-92, 1994.
-
(1994)
An International Journal
, vol.10
, Issue.2
, pp. 77-92
-
-
Clarke, R.1
-
9
-
-
84919435939
-
Privacy considerations for internet protocols
-
A. Cooper, H. Tschofenig, B. Aboba, J. Peterson, J. Morris, M. Hansen, and R. Smith. Privacy considerations for internet protocols. Technical report, Internet Architecture Board (IAB), 2013.
-
(2013)
Technical Report Internet Architecture Board (IAB)
-
-
Cooper, A.1
Tschofenig, H.2
Aboba, B.3
Peterson, J.4
Morris, J.5
Hansen, M.6
Smith, R.7
-
10
-
-
78649593082
-
Ontologies of geographic information
-
Dec.
-
H. Couclelis. Ontologies of geographic information. Int. J. Geogr. Inf. Sci., 24(12):1785-1809, Dec. 2010.
-
(2010)
Int. J. Geogr. Inf. Sci.
, vol.24
, Issue.12
, pp. 1785-1809
-
-
Couclelis, H.1
-
12
-
-
0006997228
-
Rethinking privacy in a geocoded world
-
M. R. Curry. Rethinking privacy in a geocoded world. Geographical Information Systems, 2:757-766, 1999.
-
(1999)
Geographical Information Systems
, vol.2
, pp. 757-766
-
-
Curry, M.R.1
-
15
-
-
84871383572
-
How companies learn your secrets
-
C. Duhigg. How companies learn your secrets. The New York Times, 2012.
-
(2012)
The New York Times
-
-
Duhigg, C.1
-
19
-
-
57149129292
-
Private queries in location based services: Anonymizers are not necessary
-
ACM
-
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan. Private queries in location based services: anonymizers are not necessary. In Proceedings of the 2008 ACM SIGMOD international conference on Management of data, pages 121-132. ACM, 2008.
-
Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data
, vol.2008
, pp. 121-132
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.-L.5
-
21
-
-
0029515588
-
The instrumental rationality of geodemographic systems
-
April
-
J. Goss. "we know who you are and we know where you live": The instrumental rationality of geodemographic systems. Economic Geography, 72(2):171-198, April 1995.
-
(1995)
Economic Geography
, vol.72
, Issue.2
, pp. 171-198
-
-
Goss, J.1
-
22
-
-
84905233920
-
Can you engineer privacy?
-
Aug.
-
S. Gürses. Can you engineer privacy? Commun. ACM, 57(8):20-23, Aug. 2014.
-
(2014)
Commun ACM
, vol.57
, Issue.8
, pp. 20-23
-
-
Gürses, S.1
-
24
-
-
85017024646
-
We know where you are. and we are more and more sure what that means
-
K. D. Pimple, editor, Springer Netherlands
-
F. Harvey. We know where you are. and we are more and more sure what that means. In K. D. Pimple, editor, Emerging Pervasive Information and Communication Technologies (PICT), volume 11 of Law, Governance and Technology Series, pages 71-87. Springer Netherlands, 2014.
-
(2014)
Emerging Pervasive Information and Communication Technologies (PICT), Volume 11 of Law, Governance and Technology Series
, pp. 71-87
-
-
Harvey, F.1
-
25
-
-
84902602980
-
Experimental evidence of massive-scale emotional contagion through social networks
-
A. D. I. Kramer, J. E. Guillory, and J. T. Hancock. Experimental evidence of massive-scale emotional contagion through social networks. Proceedings of the National Academy of Sciences, 111(24):8788-8790, 2014.
-
(2014)
Proceedings of the National Academy of Sciences
, vol.111
, Issue.24
, pp. 8788-8790
-
-
Kramer, A.D.I.1
Guillory, J.E.2
Hancock, J.T.3
-
26
-
-
67650320950
-
A survey of computational location privacy
-
J. Krumm. A survey of computational location privacy. Personal and Ubiquitous Computing, 13(6):391-399, 2009.
-
(2009)
Personal and Ubiquitous Computing
, vol.13
, Issue.6
, pp. 391-399
-
-
Krumm, J.1
-
29
-
-
84924409110
-
Online social networks and terrorism: Threats and defenses
-
R. Chbeir and B. Al Bouna, editors, Springer Vienna
-
S. Mahmood. Online social networks and terrorism: Threats and defenses. In R. Chbeir and B. Al Bouna, editors, Security and Privacy Preserving in Social Networks, Lecture Notes in Social Networks, pages 73-94. Springer Vienna, 2013.
-
(2013)
Security and Privacy Preserving in Social Networks, Lecture Notes in Social Networks
, pp. 73-94
-
-
Mahmood, S.1
-
31
-
-
80051634906
-
Cost of reading privacy policies, the
-
A. M. McDonald and L. F. Cranor. Cost of reading privacy policies, the. ISJLP, 4:543, 2008.
-
(2008)
ISJLP
, vol.4
, pp. 543
-
-
McDonald, A.M.1
Cranor, L.F.2
-
33
-
-
77957594024
-
Broken promises of privacy: Responding to the surprising failure of anonymization
-
P. Ohm. Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review, 57:1701-1776, 2009.
-
(2009)
UCLA Law Review
, vol.57
, pp. 1701-1776
-
-
Ohm, P.1
-
34
-
-
84919435932
-
The SAGE Handbook of GIS and Society, chapter Cogito Ergo Mobilis Sum
-
SAGE Publications Ltd
-
M. Raubal. The SAGE Handbook of GIS and Society, chapter Cogito Ergo Mobilis Sum: The Impact of Location-based Services on Our Mobile Lives, pages 159-175. SAGE Publications Ltd, 2009.
-
(2009)
The Impact of Location-based Services on Our Mobile Lives
, pp. 159-175
-
-
Raubal, M.1
-
40
-
-
84919435931
-
Surveillance in the context of security and profit - The case of non-volunteered" geographic information
-
P. Weiser and A. Aballa. Surveillance in the context of security and profit - the case of "non-volunteered" geographic information. In 18. Fortbildungsseminar Geoinformationssysteme Muenchen, 2013.
-
(2013)
18. Fortbildungsseminar Geoinformationssysteme Muenchen
-
-
Weiser, P.1
Aballa, A.2
-
41
-
-
84885001021
-
Cognitive transactions-a communication model
-
Springer
-
P. Weiser and A. U. Frank. Cognitive transactions-a communication model. In Spatial Information Theory, pages 129-148. Springer, 2013.
-
(2013)
Spatial Information Theory
, pp. 129-148
-
-
Weiser, P.1
Frank, A.U.2
|