No place to hide: a study of privacy concerns due to location sharing on geo-social networks

Article English OPEN
Alrayes, Fatma ; Abdelmoty, Alia (2014)
  • Publisher: IARIA
  • Subject: HM | QA75

User location data collected on Geo-Social Networking\ud applications (GeoSNs) can be used to enhance the services\ud provided by such applications. However, personal location information\ud can potentially be utilised for undesirable purposes\ud that can compromise users’ privacy. This paper presents a study\ud of privacy implications of location-based information provision\ud and collection on user awareness and behaviour when using\ud GeoSNs. The dimensions of the problem are analysed and\ud used to guide an analytical study of some representative data\ud sets from such applications. The results of the data analysis\ud demonstrate the extent of potential personal information that may\ud be derived from the location information. In addition, a survey is\ud undertaken to examine user awareness, concerns and subsequent\ud attitude and behaviour given knowledge of the possible derived\ud information. The results clearly demonstrate users’ needs for\ud improving their knowledge, access and visibility of their data sets\ud as well as for means to control and manage their location data.\ud Future work needs to investigate the current state of personal\ud data management on GeoSNs and how their interfaces may be\ud improved to satisfy the highlighted users’ needs and to protect\ud their privacy.
  • References (32)
    32 references, page 1 of 4

    [1] F. Alrayes and A. Abdelmoty, “Privacy concerns in location-based social networks,” in GEOProcessing 2014: The Sixth International Conference on Advanced Geographic Information Systems, Applications, and Services. IARIA, 2014, pp. 105-114.

    [2] C. Vicente, D. Freni, C. Bettini, and C. Jensen, “Location-related privacy in geo-social networks,” IEEE Internet Computing, vol. 15, no. 3, 2011, pp. 20-27.

    [3] D. Riboni, L. Pareschi, and C. Bettini, “Privacy in georeferenced context-aware services: a survey,” in Privacy in Location-Based Applications. Springer Verlag, 2009, pp. 151-172.

    [4] S. Gambs, O. Heen, and C. Potin, “A comparative privacy analysis of geosocial networks,” in SPRINGL '11 Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2011, pp. 33-40.

    [5] R. Shokri, G. Theodorakopoulos, J.-Y. Le Boudec, and J.-P. Hubaux, “Quantifying location privacy,” in IEEE Symposium on Security and Privacy, 2011, pp. 247-262.

    [6] J. Tsai, P. Kelley, P. Drielsma, L. Cranor, J. Hong, and N. Sadeh, “Who's viewed you? the impact of feedback in a mobile location-sharing application,” in CHI '09, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2009, pp. 2003-2012.

    [7] N. Sadeh, J. Hong, L. Cranor, I. Fette, P. Kelley, M. Prabaker, and J. Rao, “Understanding and capturing peoples privacy policies in a mobile social networking application,” Personal and Ubiquitous Computing, vol. 13, no. 6, 2008, pp. 401-412.

    [8] H. Gao, J. Hu, T. Huang, J. Wang, and Y. Chen, “Security issues in online social networks,” Internet Computing, IEEE, vol. 15, no. 4, 2011, pp. 56-63.

    [9] J. Nagy and P. Pecho, “Social networks security,” in Emerging Security Information, Systems and Technologies, 2009. SECURWARE'09. Third International Conference on. IEEE, 2009, pp. 321-325.

    [10] P. Joshi and C.-C. Kuo, “Security and privacy in online social networks: A survey,” in Multimedia and Expo (ICME), 2011 IEEE International Conference on. IEEE, 2011, pp. 1-6.

  • Metrics
    views in OpenAIRE
    views in local repository
    downloads in local repository

    The information is available from the following content providers:

    From Number Of Views Number Of Downloads
    Online Research @ Cardiff - IRUS-UK 0 72
Share - Bookmark