-
1
-
-
77957037068
-
Geomasking sensitive health data and privacy protection: An evaluation using an E911 database
-
Allshouse W B, Fitch M K, Hampton K H, Gesink D C, Doherty I A, Leone P A, Serre M L, and Miller W C 2010 Geomasking sensitive health data and privacy protection: An evaluation using an E911 database. Geocarto International 25: 443-452
-
(2010)
Geocarto International
, vol.25
, pp. 443-452
-
-
Allshouse, W.B.1
Fitch, M.K.2
Hampton, K.H.3
Gesink, D.C.4
Doherty, I.A.5
Leone, P.A.6
Serre, M.L.7
Miller, W.C.8
-
3
-
-
85153161536
-
-
Article 29 'Opinion 13/2011 on Geolocation Services on Smart Mobile Devices'. Article 29 Data Protection Working Party, 881/11/EN WP 185, 16 May 2011
-
Article 29 2011 'Opinion 13/2011 on Geolocation Services on Smart Mobile Devices'. Article 29 Data Protection Working Party, 881/11/EN WP 185, 16 May 2011 (available at http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2011/wp185_en.pdf)
-
(2011)
-
-
-
6
-
-
33644962496
-
Using software agents to preserve individual health data confidentiality in micro-scale geographical analyses
-
Boulos M N K, Cai Q, Padget J A, and Rushton G 2006 Using software agents to preserve individual health data confidentiality in micro-scale geographical analyses. Journal of Biomedical Informatics 39: 160-170
-
(2006)
Journal of Biomedical Informatics
, vol.39
, pp. 160-170
-
-
Boulos, M.N.K.1
Cai, Q.2
Padget, J.A.3
Rushton, G.4
-
7
-
-
85103704041
-
The dimensions of locational privacy
-
In Miller H J (ed) . Berlin, Springer
-
Bridwell S A 2007 The dimensions of locational privacy. In Miller H J (ed) Societies and Cities in the Age of Instant Access. Berlin, Springer: 209-225
-
(2007)
Societies and Cities in the Age of Instant Access
, pp. 209-225
-
-
Bridwell, S.A.1
-
8
-
-
84856463650
-
Privacy invasive geo-mashups: Privacy 2.0 and the limits of first generation information privacy laws
-
Burdon M 2010 Privacy invasive geo-mashups: Privacy 2.0 and the limits of first generation information privacy laws. University of Illinois Journal of Law, Technology and Policy 1: 1-50
-
(2010)
University of Illinois Journal of Law, Technology and Policy
, vol.1
, pp. 1-50
-
-
Burdon, M.1
-
9
-
-
38149010558
-
On the effectiveness of changing pseudonyms to provide location privacy in VANETs
-
In Molva R, Tsudik G, and Westhoff D (eds) Berlin, Springer-Verlag Lecture Notes in Computer Science
-
Buttyán L, Holczer T, and Vajda I 2007 On the effectiveness of changing pseudonyms to provide location privacy in VANETs. In Molva R, Tsudik G, and Westhoff D (eds) Security and Privacy in Ad-hoc and Sensor Networks. Berlin, Springer-Verlag Lecture Notes in Computer Science Vol. 3813: 129-141
-
(2007)
Security and Privacy in Ad-hoc and Sensor Networks
, vol.3813
, pp. 129-141
-
-
Buttyán, L.1
Holczer, T.2
Vajda, I.3
-
12
-
-
0142077827
-
When is a hotspot a hotspot? A procedure for creating statistically robust hotspot maps of crime
-
In Kidner D, Higgs G, and White S (eds) . London, Taylor and Francis
-
Chainey S, Reid S, Stuart N 2002 When is a hotspot a hotspot? A procedure for creating statistically robust hotspot maps of crime. In Kidner D, Higgs G, and White S (eds) Socio-economic Applications of Geographic Information Science. London, Taylor and Francis: 21-36
-
(2002)
Socio-economic Applications of Geographic Information Science
, pp. 21-36
-
-
Chainey, S.1
Reid, S.2
Stuart, N.3
-
13
-
-
65349156663
-
The utility of hotspot mapping for predicting spatial patterns of crime
-
Chainey S, Tompson L, and Uhlig S 2008 The utility of hotspot mapping for predicting spatial patterns of crime. Security Journal 21: 4-28
-
(2008)
Security Journal
, vol.21
, pp. 4-28
-
-
Chainey, S.1
Tompson, L.2
Uhlig, S.3
-
14
-
-
66549090154
-
Preserving user location privacy in mobile data management infrastructures
-
In Danezis G and Golle P (eds) . Berlin, Springer-Verlag Lecture Notes in Computer Science
-
Cheng R, Zhang Y, Bertino E, and Prabhakar S 2006 Preserving user location privacy in mobile data management infrastructures. In Danezis G and Golle P (eds) Privacy Enhancing Technologies. Berlin, Springer-Verlag Lecture Notes in Computer Science Vol. 4258: 393-412
-
(2006)
Privacy Enhancing Technologies
, vol.4258
, pp. 393-412
-
-
Cheng, R.1
Zhang, Y.2
Bertino, E.3
Prabhakar, S.4
-
15
-
-
85153155178
-
-
Crime Analysis for Problem Solvers: In 60 Small Steps. Washington, DC, Office of Community Oriented Policing
-
Clarke R V and Eck J E 2005 Crime Analysis for Problem Solvers: In 60 Small Steps. Washington, DC, Office of Community Oriented Policing
-
(2005)
-
-
Clarke, R.V.1
Eck, J.E.2
-
16
-
-
84886492438
-
Application of geographic perturbation methods to residential locations in the Oregon Household Activity Survey
-
Clifton K J and Gehrke S R 2013 Application of geographic perturbation methods to residential locations in the Oregon Household Activity Survey. Transportation Research Record 2354: 40-50
-
(2013)
Transportation Research Record
, vol.2354
, pp. 40-50
-
-
Clifton, K.J.1
Gehrke, S.R.2
-
17
-
-
85153164392
-
-
Challenges in Flexible Aggregation of Pervasive Data. Redmond, WA, IBM Research Division 1
-
Cohen N H, Purakayastha A, Turek J, Wong L, and Yeh D 2001 Challenges in Flexible Aggregation of Pervasive Data. Redmond, WA, IBM Research Division 1
-
(2001)
-
-
Cohen, N.H.1
Purakayastha, A.2
Turek, J.3
Wong, L.4
Yeh, D.5
-
18
-
-
84855903702
-
Location privacy: Who protects?
-
Cottrill C D 2011 Location privacy: Who protects? URISA Journal 23(2): 49-61
-
(2011)
URISA Journal
, vol.23
, Issue.2
, pp. 49-61
-
-
Cottrill, C.D.1
-
19
-
-
0041020068
-
Matrix masking methods for disclosure limitation in microdata
-
Cox L H 1994 Matrix masking methods for disclosure limitation in microdata. Survey Methodology 20: 165-169
-
(1994)
Survey Methodology
, vol.20
, pp. 165-169
-
-
Cox, L.H.1
-
20
-
-
79957855837
-
Crime in urban post-disaster environments: A methodological framework from New Orleans
-
Curtis A and Mills J W 2011 Crime in urban post-disaster environments: A methodological framework from New Orleans. Urban Geography 32: 488-510
-
(2011)
Urban Geography
, vol.32
, pp. 488-510
-
-
Curtis, A.1
Mills, J.W.2
-
21
-
-
0343207211
-
U-statistic hierarchical clustering
-
D'andrade R 1978 U-statistic hierarchical clustering. Psychometrika 4: 58-67
-
(1978)
Psychometrika
, vol.4
, pp. 58-67
-
-
D'andrade, R.1
-
22
-
-
33646156642
-
Simulation of obfuscation and negotiation for location privacy
-
In Cohn A G and Mark D M (eds) . Berlin, Springer-Verlag Lecture Notes in Computer Science
-
Duckham M and Kulik L 2005 Simulation of obfuscation and negotiation for location privacy. In Cohn A G and Mark D M (eds) Spatial Information Theory. Berlin, Springer-Verlag Lecture Notes in Computer Science Vol. 3693: 31-48
-
(2005)
Spatial Information Theory
, vol.3693
, pp. 31-48
-
-
Duckham, M.1
Kulik, L.2
-
23
-
-
33750243621
-
Location privacy and location-aware computing
-
In Drummond J, Billen R, Forrest D, and Joao E (eds) . Boca Raton, FL, CRC Press
-
Duckham M and Kulik L 2006 Location privacy and location-aware computing. In Drummond J, Billen R, Forrest D, and Joao E (eds) Dynamic and Mobile GIS: Investigating Change in Space and Time. Boca Raton, FL, CRC Press: 35-51
-
(2006)
Dynamic and Mobile GIS: Investigating Change in Space and Time
, pp. 35-51
-
-
Duckham, M.1
Kulik, L.2
-
24
-
-
84972531331
-
Enhancing access to microdata while protecting confidentiality: Prospects for the future
-
Duncan G T and Pearson R W 1991 Enhancing access to microdata while protecting confidentiality: Prospects for the future. Statistical Science 6: 219-239
-
(1991)
Statistical Science
, vol.6
, pp. 219-239
-
-
Duncan, G.T.1
Pearson, R.W.2
-
25
-
-
85153144028
-
-
Mapping Crime: Understanding Hot Spots. Washington, DC, National Institute of Justice
-
Eck J E, Chainey S, Cameron J G, Leitner M, and Wilson R E 2005 Mapping Crime: Understanding Hot Spots. Washington, DC, National Institute of Justice
-
(2005)
-
-
Eck, J.E.1
Chainey, S.2
Cameron, J.G.3
Leitner, M.4
Wilson, R.E.5
-
26
-
-
0006478023
-
Finding crime hot spots through repeat address mapping
-
In Goldsmith V, McGuire P, Mollenkopf J H, and Ross T A (eds) . Thousand Oaks, CA, Sage Publications
-
Eck J E, Gersh J S, and Taylor C 2000 Finding crime hot spots through repeat address mapping. In Goldsmith V, McGuire P, Mollenkopf J H, and Ross T A (eds) Analyzing Crime Patterns: Frontiers of Practice. Thousand Oaks, CA, Sage Publications: 49-64
-
(2000)
Analyzing Crime Patterns: Frontiers of Practice
, pp. 49-64
-
-
Eck, J.E.1
Gersh, J.S.2
Taylor, C.3
-
28
-
-
84944811700
-
The use of ranks to avoid the assumption of normality implicit in the analysis of variance
-
Friedman M 1937 The use of ranks to avoid the assumption of normality implicit in the analysis of variance. Journal of the American Statistical Association 32: 675-701
-
(1937)
Journal of the American Statistical Association
, vol.32
, pp. 675-701
-
-
Friedman, M.1
-
31
-
-
0000028350
-
Local spatial statistics: An overview
-
In Longley P and Batty M (eds) . Cambridge, UK, Geolnformation International
-
Getis A and Ord J K 1996 Local spatial statistics: An overview. In Longley P and Batty M (eds) Spatial Analysis: Modelling in a GIS Environment. Cambridge, UK, Geolnformation International.: 261-277
-
(1996)
Spatial Analysis: Modelling in a GIS Environment
, pp. 261-277
-
-
Getis, A.1
Ord, J.K.2
-
32
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
In. Applications and Services, Ambleside, United Kingdom
-
Gruteser M and Grunwald D 2003 Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the First International Conference on Mobile Systems, Applications and Services, Ambleside, United Kingdom: 31-42
-
(2003)
Proceedings of the First International Conference on Mobile Systems
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
33
-
-
77958599554
-
Mapping health data: Improved privacy protection with donut method geomasking
-
Hampton K H, Fitch M K, Allshouse W B, Doherty I A, Gesink D C, Leone P A, Serre M L, and Miller W C 2010 Mapping health data: Improved privacy protection with donut method geomasking. American Journal of Epidemiology 172: 1062-1069
-
(2010)
American Journal of Epidemiology
, vol.172
, pp. 1062-1069
-
-
Hampton, K.H.1
Fitch, M.K.2
Allshouse, W.B.3
Doherty, I.A.4
Gesink, D.C.5
Leone, P.A.6
Serre, M.L.7
Miller, W.C.8
-
34
-
-
34748886657
-
PAST: Paleontological statistics software package for education and data analysis
-
Harper D and Ryan P 2001 PAST: Paleontological statistics software package for education and data analysis. Palaeontology Electronica 4: 1-9
-
(2001)
Palaeontology Electronica
, vol.4
, pp. 1-9
-
-
Harper, D.1
Ryan, P.2
-
35
-
-
84861224177
-
Protecting location privacy in mobile geoservices using fuzzy inference systems
-
Hashemi M and Malek M R 2012 Protecting location privacy in mobile geoservices using fuzzy inference systems. Computers, Environment and Urban Systems 36: 311-320
-
(2012)
Computers, Environment and Urban Systems
, vol.36
, pp. 311-320
-
-
Hashemi, M.1
Malek, M.R.2
-
36
-
-
2342620647
-
Enabling context-aware and privacy-conscious user data sharing
-
In. Berkeley, California
-
Hull R, Kumar B, Lieuwen D, Patel-Schneider P F, Sahuguet A, Varadarajan S, and Vyas A 2004 Enabling context-aware and privacy-conscious user data sharing. In Proceedings of the Fifth IEEE International Conference on Mobile Data Management, Berkeley, California: 187-198
-
(2004)
Proceedings of the Fifth IEEE International Conference on Mobile Data Management
, pp. 187-198
-
-
Hull, R.1
Kumar, B.2
Lieuwen, D.3
Patel-Schneider, P.F.4
Sahuguet, A.5
Varadarajan, S.6
Vyas, A.7
-
37
-
-
59249083345
-
Inference attacks on location tracks
-
Krumm J 2007 Inference attacks on location tracks. Pervasive Computing 6: 127-143
-
(2007)
Pervasive Computing
, vol.6
, pp. 127-143
-
-
Krumm, J.1
-
39
-
-
3042735336
-
Protection of geoprivacy and accuracy of spatial information: How effective are geographical masks?
-
Kwan M P, Casas I, and Schmitz B C 2004 Protection of geoprivacy and accuracy of spatial information: How effective are geographical masks? Cartographica 39(2): 15-28
-
(2004)
Cartographica
, vol.39
, Issue.2
, pp. 15-28
-
-
Kwan, M.P.1
Casas, I.2
Schmitz, B.C.3
-
40
-
-
54449102046
-
Rapid GIS-based profiling of West Nile virus transmission: Defining environmental factors associated with an urban-suburban outbreak in Northeast Ohio, USA
-
LaBeaud A D, Gorman A-M, Koonce J, Kippes C, McLeod J, Lynch J, Gallagher T, King C H, and Mandalakas A M 2008 Rapid GIS-based profiling of West Nile virus transmission: Defining environmental factors associated with an urban-suburban outbreak in Northeast Ohio, USA. Geospatial Health 2: 215
-
(2008)
Geospatial Health
, vol.2
, pp. 215
-
-
LaBeaud, A.D.1
Gorman, A.-M.2
Koonce, J.3
Kippes, C.4
McLeod, J.5
Lynch, J.6
Gallagher, T.7
King, C.H.8
Mandalakas, A.M.9
-
42
-
-
33745481888
-
Cartographic guidelines for geographically masking the locations of confidential point data
-
Leitner M and Curtis A 2004 Cartographic guidelines for geographically masking the locations of confidential point data. Cartographic Perspectives 49: 22-39
-
(2004)
Cartographic Perspectives
, vol.49
, pp. 22-39
-
-
Leitner, M.1
Curtis, A.2
-
43
-
-
33749865807
-
A first step towards a framework for presenting the location of confidential point data on maps: Results of an empirical perceptual study
-
Leitner M and Curtis A 2006 A first step towards a framework for presenting the location of confidential point data on maps: Results of an empirical perceptual study. International Journal of Geographical Information Science 20: 813-822
-
(2006)
International Journal of Geographical Information Science
, vol.20
, pp. 813-822
-
-
Leitner, M.1
Curtis, A.2
-
44
-
-
33745792614
-
CrimeStat: A spatial statistics program for the analysis of crime incident locations
-
In. Fredericksburg, Virginia
-
Levine N 1999 CrimeStat: A spatial statistics program for the analysis of crime incident locations. In Proceedings of the Fourth International Conference on Geocomputation, Fredericksburg, Virginia
-
(1999)
Proceedings of the Fourth International Conference on Geocomputation
-
-
Levine, N.1
-
45
-
-
33645912334
-
Crime mapping and the CrimeStat program
-
Levine N 2006 Crime mapping and the CrimeStat program. Geographical Analysis 38: 41-56
-
(2006)
Geographical Analysis
, vol.38
, pp. 41-56
-
-
Levine, N.1
-
46
-
-
84868924548
-
The "hottest" part of a hotspot: Comment on "The utility of hotspot mapping for predicting spatial patterns of crime"
-
Levine N 2008 The "hottest" part of a hotspot: Comment on "The utility of hotspot mapping for predicting spatial patterns of crime". Security Journal 21: 295-302
-
(2008)
Security Journal
, vol.21
, pp. 295-302
-
-
Levine, N.1
-
47
-
-
0002322469
-
On a test of whether one of two random variables is stochastically larger than the other
-
Mann H B and Whitney D R 1947 On a test of whether one of two random variables is stochastically larger than the other. Annals of Mathematical Statistics 18: 50-60
-
(1947)
Annals of Mathematical Statistics
, vol.18
, pp. 50-60
-
-
Mann, H.B.1
Whitney, D.R.2
-
49
-
-
78650868674
-
Movement data anonymity through generalization
-
Monreale A, Andrienko G, Andrienko N, Giannotti F, Pedreschi D, Rinzivillo S, and Wrobel S 2010 Movement data anonymity through generalization. Transactions on Data Privacy 3: 91-121
-
(2010)
Transactions on Data Privacy
, vol.3
, pp. 91-121
-
-
Monreale, A.1
Andrienko, G.2
Andrienko, N.3
Giannotti, F.4
Pedreschi, D.5
Rinzivillo, S.6
Wrobel, S.7
-
50
-
-
0035610888
-
Exploratory spatial data analysis techniques for examining urban crime implications for evaluating treatment
-
Murray A T, McGuffog I, Western J S, and Mullins P 2001 Exploratory spatial data analysis techniques for examining urban crime implications for evaluating treatment. British Journal of Criminology 41: 309-329
-
(2001)
British Journal of Criminology
, vol.41
, pp. 309-329
-
-
Murray, A.T.1
McGuffog, I.2
Western, J.S.3
Mullins, P.4
-
51
-
-
2342502819
-
Preserving privacy in environments with location-based applications
-
Myles G, Friday A, and Davies N 2003 Preserving privacy in environments with location-based applications. Pervasive Computing 2: 56-64
-
(2003)
Pervasive Computing
, vol.2
, pp. 56-64
-
-
Myles, G.1
Friday, A.2
Davies, N.3
-
55
-
-
0024600727
-
Hot spots of predatory crime: Routine activities and the criminology of place
-
Sherman L W, Gartin P, and Buerger M E 1989 Hot spots of predatory crime: Routine activities and the criminology of place. Criminology 27: 27-55
-
(1989)
Criminology
, vol.27
, pp. 27-55
-
-
Sherman, L.W.1
Gartin, P.2
Buerger, M.E.3
-
57
-
-
3142682218
-
Trajectories of crime at places: A longitudinal study of street segments in the city of Seattle
-
Weisburd D, Bushway S, Lum C, and Yang S M 2004 Trajectories of crime at places: A longitudinal study of street segments in the city of Seattle. Criminology 42: 283-322
-
(2004)
Criminology
, vol.42
, pp. 283-322
-
-
Weisburd, D.1
Bushway, S.2
Lum, C.3
Yang, S.M.4
-
60
-
-
84891448925
-
Determinants and spatial patterns of adult overweight and hypertension in a high HIV prevalence rural South African population
-
Zhou J, Lurie M N, Bärnighausen T, McGarvey S T, Newell M-L, and Tanser F 2012 Determinants and spatial patterns of adult overweight and hypertension in a high HIV prevalence rural South African population. Health and Place 18: 1300-1306
-
(2012)
Health and Place
, vol.18
, pp. 1300-1306
-
-
Zhou, J.1
Lurie, M.N.2
Bärnighausen, T.3
McGarvey, S.T.4
Newell, M.-L.5
Tanser, F.6
|