메뉴 건너뛰기




Volumn 19, Issue 5, 2015, Pages 737-757

Spatial Information Divergence: Using Global and Local Indices to Compare Geographical Masks Applied to Crime Data

Author keywords

[No Author keywords available]

Indexed keywords

SENSITIVE DATA;

EID: 84943353686     PISSN: 13611682     EISSN: 14679671     Source Type: Journal    
DOI: 10.1111/tgis.12125     Document Type: Article
Times cited : (29)

References (60)
  • 2
  • 3
    • 85153161536 scopus 로고    scopus 로고
    • Article 29 'Opinion 13/2011 on Geolocation Services on Smart Mobile Devices'. Article 29 Data Protection Working Party, 881/11/EN WP 185, 16 May 2011
    • Article 29 2011 'Opinion 13/2011 on Geolocation Services on Smart Mobile Devices'. Article 29 Data Protection Working Party, 881/11/EN WP 185, 16 May 2011 (available at http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2011/wp185_en.pdf)
    • (2011)
  • 6
    • 33644962496 scopus 로고    scopus 로고
    • Using software agents to preserve individual health data confidentiality in micro-scale geographical analyses
    • Boulos M N K, Cai Q, Padget J A, and Rushton G 2006 Using software agents to preserve individual health data confidentiality in micro-scale geographical analyses. Journal of Biomedical Informatics 39: 160-170
    • (2006) Journal of Biomedical Informatics , vol.39 , pp. 160-170
    • Boulos, M.N.K.1    Cai, Q.2    Padget, J.A.3    Rushton, G.4
  • 7
    • 85103704041 scopus 로고    scopus 로고
    • The dimensions of locational privacy
    • In Miller H J (ed) . Berlin, Springer
    • Bridwell S A 2007 The dimensions of locational privacy. In Miller H J (ed) Societies and Cities in the Age of Instant Access. Berlin, Springer: 209-225
    • (2007) Societies and Cities in the Age of Instant Access , pp. 209-225
    • Bridwell, S.A.1
  • 8
    • 84856463650 scopus 로고    scopus 로고
    • Privacy invasive geo-mashups: Privacy 2.0 and the limits of first generation information privacy laws
    • Burdon M 2010 Privacy invasive geo-mashups: Privacy 2.0 and the limits of first generation information privacy laws. University of Illinois Journal of Law, Technology and Policy 1: 1-50
    • (2010) University of Illinois Journal of Law, Technology and Policy , vol.1 , pp. 1-50
    • Burdon, M.1
  • 9
    • 38149010558 scopus 로고    scopus 로고
    • On the effectiveness of changing pseudonyms to provide location privacy in VANETs
    • In Molva R, Tsudik G, and Westhoff D (eds) Berlin, Springer-Verlag Lecture Notes in Computer Science
    • Buttyán L, Holczer T, and Vajda I 2007 On the effectiveness of changing pseudonyms to provide location privacy in VANETs. In Molva R, Tsudik G, and Westhoff D (eds) Security and Privacy in Ad-hoc and Sensor Networks. Berlin, Springer-Verlag Lecture Notes in Computer Science Vol. 3813: 129-141
    • (2007) Security and Privacy in Ad-hoc and Sensor Networks , vol.3813 , pp. 129-141
    • Buttyán, L.1    Holczer, T.2    Vajda, I.3
  • 12
    • 0142077827 scopus 로고    scopus 로고
    • When is a hotspot a hotspot? A procedure for creating statistically robust hotspot maps of crime
    • In Kidner D, Higgs G, and White S (eds) . London, Taylor and Francis
    • Chainey S, Reid S, Stuart N 2002 When is a hotspot a hotspot? A procedure for creating statistically robust hotspot maps of crime. In Kidner D, Higgs G, and White S (eds) Socio-economic Applications of Geographic Information Science. London, Taylor and Francis: 21-36
    • (2002) Socio-economic Applications of Geographic Information Science , pp. 21-36
    • Chainey, S.1    Reid, S.2    Stuart, N.3
  • 13
    • 65349156663 scopus 로고    scopus 로고
    • The utility of hotspot mapping for predicting spatial patterns of crime
    • Chainey S, Tompson L, and Uhlig S 2008 The utility of hotspot mapping for predicting spatial patterns of crime. Security Journal 21: 4-28
    • (2008) Security Journal , vol.21 , pp. 4-28
    • Chainey, S.1    Tompson, L.2    Uhlig, S.3
  • 14
    • 66549090154 scopus 로고    scopus 로고
    • Preserving user location privacy in mobile data management infrastructures
    • In Danezis G and Golle P (eds) . Berlin, Springer-Verlag Lecture Notes in Computer Science
    • Cheng R, Zhang Y, Bertino E, and Prabhakar S 2006 Preserving user location privacy in mobile data management infrastructures. In Danezis G and Golle P (eds) Privacy Enhancing Technologies. Berlin, Springer-Verlag Lecture Notes in Computer Science Vol. 4258: 393-412
    • (2006) Privacy Enhancing Technologies , vol.4258 , pp. 393-412
    • Cheng, R.1    Zhang, Y.2    Bertino, E.3    Prabhakar, S.4
  • 15
    • 85153155178 scopus 로고    scopus 로고
    • Crime Analysis for Problem Solvers: In 60 Small Steps. Washington, DC, Office of Community Oriented Policing
    • Clarke R V and Eck J E 2005 Crime Analysis for Problem Solvers: In 60 Small Steps. Washington, DC, Office of Community Oriented Policing
    • (2005)
    • Clarke, R.V.1    Eck, J.E.2
  • 16
    • 84886492438 scopus 로고    scopus 로고
    • Application of geographic perturbation methods to residential locations in the Oregon Household Activity Survey
    • Clifton K J and Gehrke S R 2013 Application of geographic perturbation methods to residential locations in the Oregon Household Activity Survey. Transportation Research Record 2354: 40-50
    • (2013) Transportation Research Record , vol.2354 , pp. 40-50
    • Clifton, K.J.1    Gehrke, S.R.2
  • 17
    • 85153164392 scopus 로고    scopus 로고
    • Challenges in Flexible Aggregation of Pervasive Data. Redmond, WA, IBM Research Division 1
    • Cohen N H, Purakayastha A, Turek J, Wong L, and Yeh D 2001 Challenges in Flexible Aggregation of Pervasive Data. Redmond, WA, IBM Research Division 1
    • (2001)
    • Cohen, N.H.1    Purakayastha, A.2    Turek, J.3    Wong, L.4    Yeh, D.5
  • 18
    • 84855903702 scopus 로고    scopus 로고
    • Location privacy: Who protects?
    • Cottrill C D 2011 Location privacy: Who protects? URISA Journal 23(2): 49-61
    • (2011) URISA Journal , vol.23 , Issue.2 , pp. 49-61
    • Cottrill, C.D.1
  • 19
    • 0041020068 scopus 로고
    • Matrix masking methods for disclosure limitation in microdata
    • Cox L H 1994 Matrix masking methods for disclosure limitation in microdata. Survey Methodology 20: 165-169
    • (1994) Survey Methodology , vol.20 , pp. 165-169
    • Cox, L.H.1
  • 20
    • 79957855837 scopus 로고    scopus 로고
    • Crime in urban post-disaster environments: A methodological framework from New Orleans
    • Curtis A and Mills J W 2011 Crime in urban post-disaster environments: A methodological framework from New Orleans. Urban Geography 32: 488-510
    • (2011) Urban Geography , vol.32 , pp. 488-510
    • Curtis, A.1    Mills, J.W.2
  • 21
    • 0343207211 scopus 로고
    • U-statistic hierarchical clustering
    • D'andrade R 1978 U-statistic hierarchical clustering. Psychometrika 4: 58-67
    • (1978) Psychometrika , vol.4 , pp. 58-67
    • D'andrade, R.1
  • 22
    • 33646156642 scopus 로고    scopus 로고
    • Simulation of obfuscation and negotiation for location privacy
    • In Cohn A G and Mark D M (eds) . Berlin, Springer-Verlag Lecture Notes in Computer Science
    • Duckham M and Kulik L 2005 Simulation of obfuscation and negotiation for location privacy. In Cohn A G and Mark D M (eds) Spatial Information Theory. Berlin, Springer-Verlag Lecture Notes in Computer Science Vol. 3693: 31-48
    • (2005) Spatial Information Theory , vol.3693 , pp. 31-48
    • Duckham, M.1    Kulik, L.2
  • 23
    • 33750243621 scopus 로고    scopus 로고
    • Location privacy and location-aware computing
    • In Drummond J, Billen R, Forrest D, and Joao E (eds) . Boca Raton, FL, CRC Press
    • Duckham M and Kulik L 2006 Location privacy and location-aware computing. In Drummond J, Billen R, Forrest D, and Joao E (eds) Dynamic and Mobile GIS: Investigating Change in Space and Time. Boca Raton, FL, CRC Press: 35-51
    • (2006) Dynamic and Mobile GIS: Investigating Change in Space and Time , pp. 35-51
    • Duckham, M.1    Kulik, L.2
  • 24
    • 84972531331 scopus 로고
    • Enhancing access to microdata while protecting confidentiality: Prospects for the future
    • Duncan G T and Pearson R W 1991 Enhancing access to microdata while protecting confidentiality: Prospects for the future. Statistical Science 6: 219-239
    • (1991) Statistical Science , vol.6 , pp. 219-239
    • Duncan, G.T.1    Pearson, R.W.2
  • 25
    • 85153144028 scopus 로고    scopus 로고
    • Mapping Crime: Understanding Hot Spots. Washington, DC, National Institute of Justice
    • Eck J E, Chainey S, Cameron J G, Leitner M, and Wilson R E 2005 Mapping Crime: Understanding Hot Spots. Washington, DC, National Institute of Justice
    • (2005)
    • Eck, J.E.1    Chainey, S.2    Cameron, J.G.3    Leitner, M.4    Wilson, R.E.5
  • 26
    • 0006478023 scopus 로고    scopus 로고
    • Finding crime hot spots through repeat address mapping
    • In Goldsmith V, McGuire P, Mollenkopf J H, and Ross T A (eds) . Thousand Oaks, CA, Sage Publications
    • Eck J E, Gersh J S, and Taylor C 2000 Finding crime hot spots through repeat address mapping. In Goldsmith V, McGuire P, Mollenkopf J H, and Ross T A (eds) Analyzing Crime Patterns: Frontiers of Practice. Thousand Oaks, CA, Sage Publications: 49-64
    • (2000) Analyzing Crime Patterns: Frontiers of Practice , pp. 49-64
    • Eck, J.E.1    Gersh, J.S.2    Taylor, C.3
  • 28
    • 84944811700 scopus 로고
    • The use of ranks to avoid the assumption of normality implicit in the analysis of variance
    • Friedman M 1937 The use of ranks to avoid the assumption of normality implicit in the analysis of variance. Journal of the American Statistical Association 32: 675-701
    • (1937) Journal of the American Statistical Association , vol.32 , pp. 675-701
    • Friedman, M.1
  • 31
    • 0000028350 scopus 로고    scopus 로고
    • Local spatial statistics: An overview
    • In Longley P and Batty M (eds) . Cambridge, UK, Geolnformation International
    • Getis A and Ord J K 1996 Local spatial statistics: An overview. In Longley P and Batty M (eds) Spatial Analysis: Modelling in a GIS Environment. Cambridge, UK, Geolnformation International.: 261-277
    • (1996) Spatial Analysis: Modelling in a GIS Environment , pp. 261-277
    • Getis, A.1    Ord, J.K.2
  • 32
    • 85018204196 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • In. Applications and Services, Ambleside, United Kingdom
    • Gruteser M and Grunwald D 2003 Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the First International Conference on Mobile Systems, Applications and Services, Ambleside, United Kingdom: 31-42
    • (2003) Proceedings of the First International Conference on Mobile Systems , pp. 31-42
    • Gruteser, M.1    Grunwald, D.2
  • 34
    • 34748886657 scopus 로고    scopus 로고
    • PAST: Paleontological statistics software package for education and data analysis
    • Harper D and Ryan P 2001 PAST: Paleontological statistics software package for education and data analysis. Palaeontology Electronica 4: 1-9
    • (2001) Palaeontology Electronica , vol.4 , pp. 1-9
    • Harper, D.1    Ryan, P.2
  • 35
    • 84861224177 scopus 로고    scopus 로고
    • Protecting location privacy in mobile geoservices using fuzzy inference systems
    • Hashemi M and Malek M R 2012 Protecting location privacy in mobile geoservices using fuzzy inference systems. Computers, Environment and Urban Systems 36: 311-320
    • (2012) Computers, Environment and Urban Systems , vol.36 , pp. 311-320
    • Hashemi, M.1    Malek, M.R.2
  • 37
    • 59249083345 scopus 로고    scopus 로고
    • Inference attacks on location tracks
    • Krumm J 2007 Inference attacks on location tracks. Pervasive Computing 6: 127-143
    • (2007) Pervasive Computing , vol.6 , pp. 127-143
    • Krumm, J.1
  • 39
    • 3042735336 scopus 로고    scopus 로고
    • Protection of geoprivacy and accuracy of spatial information: How effective are geographical masks?
    • Kwan M P, Casas I, and Schmitz B C 2004 Protection of geoprivacy and accuracy of spatial information: How effective are geographical masks? Cartographica 39(2): 15-28
    • (2004) Cartographica , vol.39 , Issue.2 , pp. 15-28
    • Kwan, M.P.1    Casas, I.2    Schmitz, B.C.3
  • 40
    • 54449102046 scopus 로고    scopus 로고
    • Rapid GIS-based profiling of West Nile virus transmission: Defining environmental factors associated with an urban-suburban outbreak in Northeast Ohio, USA
    • LaBeaud A D, Gorman A-M, Koonce J, Kippes C, McLeod J, Lynch J, Gallagher T, King C H, and Mandalakas A M 2008 Rapid GIS-based profiling of West Nile virus transmission: Defining environmental factors associated with an urban-suburban outbreak in Northeast Ohio, USA. Geospatial Health 2: 215
    • (2008) Geospatial Health , vol.2 , pp. 215
    • LaBeaud, A.D.1    Gorman, A.-M.2    Koonce, J.3    Kippes, C.4    McLeod, J.5    Lynch, J.6    Gallagher, T.7    King, C.H.8    Mandalakas, A.M.9
  • 42
    • 33745481888 scopus 로고    scopus 로고
    • Cartographic guidelines for geographically masking the locations of confidential point data
    • Leitner M and Curtis A 2004 Cartographic guidelines for geographically masking the locations of confidential point data. Cartographic Perspectives 49: 22-39
    • (2004) Cartographic Perspectives , vol.49 , pp. 22-39
    • Leitner, M.1    Curtis, A.2
  • 43
    • 33749865807 scopus 로고    scopus 로고
    • A first step towards a framework for presenting the location of confidential point data on maps: Results of an empirical perceptual study
    • Leitner M and Curtis A 2006 A first step towards a framework for presenting the location of confidential point data on maps: Results of an empirical perceptual study. International Journal of Geographical Information Science 20: 813-822
    • (2006) International Journal of Geographical Information Science , vol.20 , pp. 813-822
    • Leitner, M.1    Curtis, A.2
  • 44
    • 33745792614 scopus 로고    scopus 로고
    • CrimeStat: A spatial statistics program for the analysis of crime incident locations
    • In. Fredericksburg, Virginia
    • Levine N 1999 CrimeStat: A spatial statistics program for the analysis of crime incident locations. In Proceedings of the Fourth International Conference on Geocomputation, Fredericksburg, Virginia
    • (1999) Proceedings of the Fourth International Conference on Geocomputation
    • Levine, N.1
  • 45
    • 33645912334 scopus 로고    scopus 로고
    • Crime mapping and the CrimeStat program
    • Levine N 2006 Crime mapping and the CrimeStat program. Geographical Analysis 38: 41-56
    • (2006) Geographical Analysis , vol.38 , pp. 41-56
    • Levine, N.1
  • 46
    • 84868924548 scopus 로고    scopus 로고
    • The "hottest" part of a hotspot: Comment on "The utility of hotspot mapping for predicting spatial patterns of crime"
    • Levine N 2008 The "hottest" part of a hotspot: Comment on "The utility of hotspot mapping for predicting spatial patterns of crime". Security Journal 21: 295-302
    • (2008) Security Journal , vol.21 , pp. 295-302
    • Levine, N.1
  • 47
    • 0002322469 scopus 로고
    • On a test of whether one of two random variables is stochastically larger than the other
    • Mann H B and Whitney D R 1947 On a test of whether one of two random variables is stochastically larger than the other. Annals of Mathematical Statistics 18: 50-60
    • (1947) Annals of Mathematical Statistics , vol.18 , pp. 50-60
    • Mann, H.B.1    Whitney, D.R.2
  • 50
    • 0035610888 scopus 로고    scopus 로고
    • Exploratory spatial data analysis techniques for examining urban crime implications for evaluating treatment
    • Murray A T, McGuffog I, Western J S, and Mullins P 2001 Exploratory spatial data analysis techniques for examining urban crime implications for evaluating treatment. British Journal of Criminology 41: 309-329
    • (2001) British Journal of Criminology , vol.41 , pp. 309-329
    • Murray, A.T.1    McGuffog, I.2    Western, J.S.3    Mullins, P.4
  • 51
    • 2342502819 scopus 로고    scopus 로고
    • Preserving privacy in environments with location-based applications
    • Myles G, Friday A, and Davies N 2003 Preserving privacy in environments with location-based applications. Pervasive Computing 2: 56-64
    • (2003) Pervasive Computing , vol.2 , pp. 56-64
    • Myles, G.1    Friday, A.2    Davies, N.3
  • 52
  • 55
    • 0024600727 scopus 로고
    • Hot spots of predatory crime: Routine activities and the criminology of place
    • Sherman L W, Gartin P, and Buerger M E 1989 Hot spots of predatory crime: Routine activities and the criminology of place. Criminology 27: 27-55
    • (1989) Criminology , vol.27 , pp. 27-55
    • Sherman, L.W.1    Gartin, P.2    Buerger, M.E.3
  • 57
    • 3142682218 scopus 로고    scopus 로고
    • Trajectories of crime at places: A longitudinal study of street segments in the city of Seattle
    • Weisburd D, Bushway S, Lum C, and Yang S M 2004 Trajectories of crime at places: A longitudinal study of street segments in the city of Seattle. Criminology 42: 283-322
    • (2004) Criminology , vol.42 , pp. 283-322
    • Weisburd, D.1    Bushway, S.2    Lum, C.3    Yang, S.M.4
  • 60
    • 84891448925 scopus 로고    scopus 로고
    • Determinants and spatial patterns of adult overweight and hypertension in a high HIV prevalence rural South African population
    • Zhou J, Lurie M N, Bärnighausen T, McGarvey S T, Newell M-L, and Tanser F 2012 Determinants and spatial patterns of adult overweight and hypertension in a high HIV prevalence rural South African population. Health and Place 18: 1300-1306
    • (2012) Health and Place , vol.18 , pp. 1300-1306
    • Zhou, J.1    Lurie, M.N.2    Bärnighausen, T.3    McGarvey, S.T.4    Newell, M.-L.5    Tanser, F.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.