Corpus ID: 108624889

Location-Sharing Technologies: Privacy Risks and Controls

@article{Tsai2009LocationSharingTP,
  title={Location-Sharing Technologies: Privacy Risks and Controls},
  author={Janice Y. Tsai and Patrick Gage Kelley and L. Cranor and N. Sadeh},
  journal={Innovation Law & Policy eJournal},
  year={2009}
}
Due to the ability of cell phone providers to use cell phone towers to pinpoint users’ locations, federal E911 requirements, the increasing popularity of GPS-capabilities in cellular phones, and the rise of cellular phones for Internet use, a plethora of new applications have been developed that share users’ real-time location information online [26]. This paper evaluates users’ risk and benefit perceptions related to the use of these technologies and the privacy controls of existing location… Expand
172 Citations
Recommending privacy preferences in location-sharing services
"About your smartphone usage" — Privacy in location-based mobile participation
  • 3
User perceptions of privacy risks regarding location-based services
  • 2
Privacy theory in practice: designing a user interface for managing location privacy on mobile devices
  • 4
Privacy protection in location-sharing services
  • 5
  • PDF
A privacy-by-design approach to location sharing
  • 9
  • PDF
Understanding the Valuation of Location Privacy: a Crowdsourcing-Based Approach
  • 8
  • PDF
When are users comfortable sharing locations with advertisers?
  • 63
  • PDF
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 54 REFERENCES
Location-Based Services for Mobile Telephony: a Study of Users' Privacy Concerns
  • 406
  • PDF
Understanding and capturing people’s privacy policies in a mobile social networking application
  • 329
  • PDF
Context-aware telephony: privacy preferences and sharing patterns
  • 142
  • PDF
Who gets to know what when: configuring privacy permissions in an awareness application
  • 172
  • PDF
Social Disclosure of Place: From Location Technology to Communication Practices
  • 178
  • PDF
The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing
  • 22
  • PDF
Field Deployment of IMBuddy : A Study of Privacy Control and Feedback Mechanisms for Contextual IM
  • 61
  • PDF
...
1
2
3
4
5
...