• Corpus ID: 127253007

Protecting personal privacy in using geographic information systems

@article{Onsrud1994ProtectingPP,
  title={Protecting personal privacy in using geographic information systems},
  author={Harlan Onsrud and Jeffrey Johnson and Xavier Lopez},
  journal={Photogrammetric Engineering and Remote Sensing},
  year={1994},
  volume={60},
  pages={1083-1096}
}
Personal privacy is a social issue of increasing relevance to the geographic information system (GIS) community. The power of GIS processing and the crossmatching of geographic datasets with other datasets are raising strong privacy concerns. This article discusses current practices and trends in the collection, maintenance, and dissemination of personal information by government and industry through the use of GIS and related technologies. It reviews the development of legal rights in privacy… 

Musings on privacy issues in health research involving disaggregate geographic data about individuals

A novel, 'one stop shop' case-based reasoning framework is proposed to streamline the provision of clear and individualised guidance for the design and approval of new research projects (involving geographical identifiers about individuals), including crisp recommendations on which specific privacy-preserving solutions and approaches would be suitable in each case.

Is privacy still an issue in the era of big data? — Location disclosure in spatial footprints

This study shows that home and work places may be inferred from georeferenced tweets of heavy Twitter users and invites more research on perception of geoprivacy.

Security and privacy for geospatial data: concepts and research directions

The objective of this paper is to discuss the technical challenges raised by the unique requirements of secure geospatial data management and to suggest a comprehensive framework for security and privacy for geosp spatial data and GIS.

Evaluating Conflicts in the Use and Development of Geographic Information Systems

Use of geographic information systems is increasing in governments, commercial companies, and by individual users. With such pervasive use of GIs there has been surprisingly little investigation of

The Myth of Location Privacy in the United States: Surveyed Attitude Versus Current Practices

In the United States, legal steps have been taken to protect personal privacy, which is viewed as an individual's fundamental right. Location privacy (i.e., protection of personal and location

Participatory Geographic Information Systems Within a Crowdsourcing Environment, With Special Reference to Volunteered Geographic Information

Crowdsourcing facilitates PGIS to become a powerful practice that can be leveraged to collect geographic data over extensive landscapes and often in near real time.

Access of Public and Private Agencies to the Information Managed by Land Registration Systems

In the transition countries of Eastern and Southern Europe and the Former Soviet Union, the introduction of market-oriented economies has been accompanied by a considerable increase in the amount of

14 The dimensions of locational privacy

Mutual advancements in wireless communications and geospatial technologies are creating real-time, pervasive tracking environments capable of capturing detailed information about individual

Cybersecurity at the Local Government Level: Balancing Demands for Transparency and Privacy Rights

An e-survey of Florida county government officials measures how cross-pressured they are, identifies the types of information about individuals and government employees that are the most difficult to protect, and examines the interest groups (public, private, and nonprofit) that act as watchdogs.

“Scrambling” geo-referenced data to protect privacy induces bias in distance estimation

Privacy concerns regarding the sharing of spatially referenced household data have induced researchers and survey agencies to “scramble” geographic information by adding random spatial errors to true
...

References

SHOWING 1-10 OF 78 REFERENCES

Private Rights, Public Wrongs: The Computer and Personal Privacy

This book examines trends that affect citizen's privacy, now that computer files with information on credit and overall financial status are easily accessible, and not always accurate. The

In support of a data protection board in the United States

"How Did They Get My Name?": An Exploratory Investigation of Consumer Attitudes Toward Secondary Information Use

This study addresses what differentiates consumers who object to certain uses of personal information from those who do not object and suggests theory related to categorization of strategic issues as positive-negative with outcomes that are controllable/uncontrollable provides a basis for understanding differences in the ways individuals perceive practices involving personal information.

Privacy issues in the information age: What corporations need to know

Privacy for Sale: How Computerization Has Made Everyone's Private Life an Open Secret

A startling expose and analysis of the demise of privacy in the age of the computer, and what the authors must do, as individuals and as a nation, to begin to regain control of their private lives.

The underpinnings of privacy protection

T he concept of privacy as a separate right was first articulated over 100 years ago when then attorney Louis Brandeis and Samuel Warren wrote an article in the Harvard Law Review urging recognition

Reviewing Privacy In an Information Society

of Pennsylvania Law School on October 28, 1985. The University of Pennsylvania Law Review would like to thank Hermann Knott and Franz Tepper, 1987 LL.M. candidates at the University of Pennsylvania

Public Lives and the Limits of Privacy

The general topic of this symposium—the interplay between public careers and private lives in the selection of presidential candidates—is important. Many debates around dinner tables undoubtedly

Handbook of personal data protection

  • W. Madsen
  • Political Science, Environmental Science
  • 1992
Foreword - Introduction - PART 1 - The Importance of Data Protection in the Information Age - Western European Initiatives - East European Data Protection: Unique Experiences - United States: First

Using the new ACM code of ethics in decision making

The new ACM describe situations calling for ethical duct, was adopted in 1972 and folCode of Ethics and Professional Condecision making, and the latest ACM duct follows this philosophy.
...