Geosurveillance, Location Privacy, and Personalization

2019 ◽  
Vol 38 (4) ◽  
pp. 484-499 ◽  
Author(s):  
Syagnik Banerjee

As connected consumers expand their digital footprint, firms are legally purchasing location data generated by apps, sold to intermediaries, and cleaned by analytics vendors for personalized targeting, advertising, and risk profiling. Data storage and flow across multiple sectors and states cause increased variability in agency jurisdiction, legal standards, and premise for legal recourse to privacy violations. To better inform industries, policy makers, and consumers in this rapidly changing environment, the author develops a new construct, location privacy, articulating the rich impact of geosurveillance on the consumer. Analysis of studies conducted using car GPS and wearable devices find that data service provider familiarity (known, unknown) and georeferencing style (environment, movement) affect location privacy concerns and the adoption likelihood of personalized driving and health insurance policies underwritten with disclosed location data. The article discusses implications about potential marketer liabilities and regulators’ roles in moderating the market’s concerns regarding geosurveillance.

2016 ◽  
Vol 2016 (4) ◽  
pp. 102-122 ◽  
Author(s):  
Kassem Fawaz ◽  
Kyu-Han Kim ◽  
Kang G. Shin

AbstractWith the advance of indoor localization technology, indoor location-based services (ILBS) are gaining popularity. They, however, accompany privacy concerns. ILBS providers track the users’ mobility to learn more about their behavior, and then provide them with improved and personalized services. Our survey of 200 individuals highlighted their concerns about this tracking for potential leakage of their personal/private traits, but also showed their willingness to accept reduced tracking for improved service. In this paper, we propose PR-LBS (Privacy vs. Reward for Location-Based Service), a system that addresses these seemingly conflicting requirements by balancing the users’ privacy concerns and the benefits of sharing location information in indoor location tracking environments. PR-LBS relies on a novel location-privacy criterion to quantify the privacy risks pertaining to sharing indoor location information. It also employs a repeated play model to ensure that the received service is proportionate to the privacy risk. We implement and evaluate PR-LBS extensively with various real-world user mobility traces. Results show that PR-LBS has low overhead, protects the users’ privacy, and makes a good tradeoff between the quality of service for the users and the utility of shared location data for service providers.


Author(s):  
Florian Fastenrath ◽  
Paul Marx ◽  
Achim Truger ◽  
Helena Vitt
Keyword(s):  

2021 ◽  
Vol 33 (4) ◽  
pp. 259-261
Author(s):  
Arthur Rizer ◽  
Dan King

For the past 50 plus years the United States has been debating the very nature of our criminal justice system. Are we too lenient? Are we too vindictive? Do we give too much power to our cops and prosecutors or too many protections to defendants? But maybe most important, is there a better way? Can we ensure we have both safety and dignity built into our system? These questions are extremely difficult for law makers to answer because of the moral implications involved with crime and punishment, but also because of one glaring weakness: data sharing and reporting. We simply do not have comprehensive data collection systems for policy makers to draw on to design interventions that can protect public safety and help heal community wounds. While there is no silver bullet that will fix these problems, we believe attention should be paid to: 1) fixing inconsistencies in key terms so data collection can be universal, 2) fixing the issues with delayed reporting so the data we have is up to date for researchers and policy makers, and 3) addressing issues with inadequate and inconsistent data storage so not only will the data be available but assessable to those who can use it to improve the system.


2018 ◽  
Vol 2018 ◽  
pp. 1-15 ◽  
Author(s):  
Ante Dagelić ◽  
Toni Perković ◽  
Bojan Vujatović ◽  
Mario Čagalj

User’s location privacy concerns have been further raised by today’s Wi-Fi technology omnipresence. Preferred Network Lists (PNLs) are a particularly interesting source of private location information, as devices are storing a list of previously used hotspots. Privacy implications of a disclosed PNL have been covered by numerous papers, mostly focusing on passive monitoring attacks. Nowadays, however, more and more devices no longer transmit their PNL in clear, thus mitigating passive attacks. Hidden PNLs are still vulnerable against active attacks whereby an attacker mounts a fake SSID hotspot set to one likely contained within targeted PNL. If the targeted device has this SSID in the corresponding PNL, it will automatically initiate a connection with the fake hotspot thus disclosing this information to the attacker. By iterating through different SSIDs (from a predefined dictionary) the attacker can eventually reveal a big part of the hidden PNL. Considering user mobility, executing active attacks usually has to be done within a short opportunity window, while targeting nontrivial SSIDs from user’s PNL. The existing work on active attacks against hidden PNLs often neglects both of these challenges. In this paper we propose a simple mathematical model for analyzing active SSID dictionary attacks, allowing us to optimize the effectiveness of the attack under the above constraints (limited window of opportunity and targeting nontrivial SSIDs). Additionally, we showcase an example method for building an effective SSID dictionary using top-N recommender algorithm and validate our model through simulations and extensive real-life tests.


1973 ◽  
Vol 5 (2) ◽  
pp. 199-216 ◽  
Author(s):  
Edward J. Williams

For the past couple of decades the Latin Americans, like their brethren in Africa and Asia, have been hell-bent in search of ‘development’ or ‘modernization’. While the Latin Americans were on the firing line, scholars and policy-makers in both the rich nations and the poor nations were involved in setting out an intellectual framework for analyzing the developmental process. New concepts to explain the meaning of development were devised; innovative measurements to gauge the level of development were proposed; a new vocabulary to capture the nuances of development was put forth.


2018 ◽  
Vol 7 (11) ◽  
pp. 442 ◽  
Author(s):  
Mehrnaz Ataei ◽  
Auriol Degbelo ◽  
Christian Kray ◽  
Vitor Santos

An individual’s location data is very sensitive geoinformation. While its disclosure is necessary, e.g., to provide location-based services (LBS), it also facilitates deep insights into the lives of LBS users as well as various attacks on these users. Location privacy threats can be mitigated through privacy regulations such as the General Data Protection Regulation (GDPR), which was introduced recently and harmonises data privacy laws across Europe. While the GDPR is meant to protect users’ privacy, the main problem is that it does not provide explicit guidelines for designers and developers about how to build systems that comply with it. In order to bridge this gap, we systematically analysed the legal text, carried out expert interviews, and ran a nine-week-long take-home study with four developers. We particularly focused on user-facing issues, as these have received little attention compared to technical issues. Our main contributions are a list of aspects from the legal text of the GDPR that can be tackled at the user interface level and a set of guidelines on how to realise this. Our results can help service providers, designers and developers of applications dealing with location information from human users to comply with the GDPR.


2021 ◽  
Author(s):  
Julie Gustavel

Issues about informational privacy have emerged in tandem with the escalating increase in nformation stored in electronic formats. Data protection is a pressing issue not only because files of personal information are being kept in greater detail and for longer periods of time, but also because the data can be retrieved and compared or matched without delay, regardless of geography. While defenders of information technology cite efficiency and safety among the countervailing benefits, concerns from an increasingly tech-savvy public have introduced a sense of urgency to demand tough legislation. Although many studies have provided evidence of online privacy concerns, few have explored the nature of the concern in detail, especially in terms of government policy for our new online environment. Bill C-6, Canada's recent legislative action, has provided a practical basis from which to appraise governments' role in privacy protection. With this in mind, the paper will be divided into two parts. Part one will be undertaken to: (A) evaluate the arguments of critics as well as defenders of contemporary record-keeping practices and the philosophical conceptions of privacy, which underlie them; and, using these themes (B) provide a comprehensive assessment of the effectiveness of Bill C- 6, examining the ways in which policy makers have begun to treat privacy as both a commodity and a secondary adjunct to business activity. Part two of the paper, purposes a series of recommendations or, more specifically, a framework for Bill C-6 that would, more effectively, protect individual privacy from private entities, who collect online data.


2015 ◽  
Vol 34 (1) ◽  
pp. 85-114 ◽  
Author(s):  
Rui Graça Feijó

Xanana Gusmão recently mentioned that a “Second Maubere Miracle” is underway, implying that a major political reform will soon shake the roots of Timor-Leste's public administration. Decentralization, defined in a very broad sense, has been a constitutional mandate since independence, but successive governments have failed to engage this reform despite paying lip service to its necessity. This essay reviews the options before the policy makers – both in theoretical terms (distinguishing between the various definitions of decentralization) and in the pragmatic forms that have been contemplated so far – and discusses their implications for the process of rooting a modern democracy in the country both at the intermediate, district level and at the grassroots, suku (village) level. For this purpose, the essay brings together the author's own field research and the rich literature that has emerged in the recent past, including contributions by Timorese colleagues.


2011 ◽  
Vol 13 (2) ◽  
pp. 49-68
Author(s):  
Peter Eklund ◽  
Jeff Thom ◽  
Tim Wray ◽  
Edward Dou

This case discusses the architecture and application of privacy and trust issues in the Connected Mobility Digital Ecosystem (CMDE) for the University of Wollongong’s main campus community. The authors describe four mobile location-sensitive, context-aware applications (app(s)) that are designed for iPhones: a public transport passenger information app; a route-based private vehicle car-pooling app; an on-campus location-based social networking app; and a virtual art-gallery tour guide app. These apps are location-based and designed to augment user interactions within their physical environments. In addition, location data provided by the apps can be used to create value-added services and optimize overall system performance. The authors characterize this socio-technical system as a digital ecosystem and explain its salient features. Using the University of Wollongong’s campus and surrounds as the ecosystem’s community for the case studies, the authors present the architectures of these four applications (apps) and address issues concerning privacy, location-identity and uniform standards developed by the Internet Engineering Task Force (IETF).


Sign in / Sign up

Export Citation Format

Share Document