This document summarizes a study on users' privacy concerns regarding location-based services on mobile phones. The study compared position-aware services, which use a device's knowledge of its own location, to location-tracking services, which rely on other parties tracking a user's location. While users found both types of services equally useful, location-tracking services generated more privacy concerns. The study concluded development should focus on position-aware services but location-tracking could succeed if users can easily turn location-tracking off.
Face to-face proximity estimation using bluetooth on smartphonesshanofa sanu
We provide project guidance for final year MTech, BTech, MSc, MCA, ME, BE, BSc, BCA & Diploma students in Electronics, Computer Science, Information Technology, Instrumentation, Electrical & Electronics, Power electronics, Mechanical, Automobile etc. We provide live project assistance and will make the students involve throughout the project. We specialize in Matlab, VLSI, CST, JAVA, .NET, ANDROID, PHP, NS2, EMBEDDED, ARDUINO, ARM, DSP, etc based areas. We research in Image processing, Signal Processing, Wireless communication, Cloud computing, Data mining, Networking, Artificial Intelligence and several other areas. We provide complete support in project completion, documentation and other works related to project.Success is a lousy teacher. It seduces smart people into thinking they can't lose.we have better knowledge in this field and updated with new innovative technologies.
Call me at: 9037291113.
Sybian Technologies Pvt Ltd
Final Year Projects & Real Time live Projects
JAVA(All Domains)
DOTNET(All Domains)
ANDROID
EMBEDDED
VLSI
MATLAB
Project Support
Abstract, Diagrams, Review Details, Relevant Materials, Presentation,
Supporting Documents, Software E-Books,
Software Development Standards & Procedure
E-Book, Theory Classes, Lab Working Programs, Project Design & Implementation
24/7 lab session
Final Year Projects For BE,ME,B.Sc,M.Sc,B.Tech,BCA,MCA
PROJECT DOMAIN:
Cloud Computing
Networking
Network Security
PARALLEL AND DISTRIBUTED SYSTEM
Data Mining
Mobile Computing
Service Computing
Software Engineering
Image Processing
Bio Medical / Medical Imaging
Contact Details:
Sybian Technologies Pvt Ltd,
No,33/10 Meenakshi Sundaram Building,
Sivaji Street,
(Near T.nagar Bus Terminus)
T.Nagar,
Chennai-600 017
Ph:044 42070551
Mobile No:9790877889,9003254624,7708845605
Mail Id:sybianprojects@gmail.com,sunbeamvijay@yahoo.com
Representing and Evaluating Social Context on Mobile DevicesKris Mihalic
Divert: Mother-in-law
Representing and Evaluating Social Context on Mobile Devices
Kris Mihalic, Manfred Tscheligi
ICT&S Center, University of Salzburg, Austria
MobileHCI 2007, Singapore
Development of durian leaf disease detection on Android device IJECEIAES
Durian is exceedingly abundant in the Philippines, providing incomes for smallholder farmers. But amidst these things, durian is still vulnerable to different plant diseases that can cause significant economic loss in the agricultural industry. The conventional way of dealing plant disease detection is through naked-eye observation done by experts. To control such diseases using the old method is extensively laborious, time-consuming and costly especially in dealing with large fields. Hence, the proponent’s objective of this study is to create a standalone mobile app for durian leaf disease detection using the transfer learning approach. In this approach, the chosen network MobileNets, is pre-trained with a large scale of general datasets namely ImageNet to effective function as a generic template for visual processing. The pre-trained network transfers all the learned parameters and set as a feature extractor for the target task to be executed. Four health conditions are addressed in this study, 10 per classification with a total of 40 samples tested to evaluate the accuracy of the system. The result showed 90% in overall accuracy for detecting algalspot, cercospora, leaf discoloration and healthy leaf.
Face to-face proximity estimation using bluetooth on smartphonesshanofa sanu
We provide project guidance for final year MTech, BTech, MSc, MCA, ME, BE, BSc, BCA & Diploma students in Electronics, Computer Science, Information Technology, Instrumentation, Electrical & Electronics, Power electronics, Mechanical, Automobile etc. We provide live project assistance and will make the students involve throughout the project. We specialize in Matlab, VLSI, CST, JAVA, .NET, ANDROID, PHP, NS2, EMBEDDED, ARDUINO, ARM, DSP, etc based areas. We research in Image processing, Signal Processing, Wireless communication, Cloud computing, Data mining, Networking, Artificial Intelligence and several other areas. We provide complete support in project completion, documentation and other works related to project.Success is a lousy teacher. It seduces smart people into thinking they can't lose.we have better knowledge in this field and updated with new innovative technologies.
Call me at: 9037291113.
Sybian Technologies Pvt Ltd
Final Year Projects & Real Time live Projects
JAVA(All Domains)
DOTNET(All Domains)
ANDROID
EMBEDDED
VLSI
MATLAB
Project Support
Abstract, Diagrams, Review Details, Relevant Materials, Presentation,
Supporting Documents, Software E-Books,
Software Development Standards & Procedure
E-Book, Theory Classes, Lab Working Programs, Project Design & Implementation
24/7 lab session
Final Year Projects For BE,ME,B.Sc,M.Sc,B.Tech,BCA,MCA
PROJECT DOMAIN:
Cloud Computing
Networking
Network Security
PARALLEL AND DISTRIBUTED SYSTEM
Data Mining
Mobile Computing
Service Computing
Software Engineering
Image Processing
Bio Medical / Medical Imaging
Contact Details:
Sybian Technologies Pvt Ltd,
No,33/10 Meenakshi Sundaram Building,
Sivaji Street,
(Near T.nagar Bus Terminus)
T.Nagar,
Chennai-600 017
Ph:044 42070551
Mobile No:9790877889,9003254624,7708845605
Mail Id:sybianprojects@gmail.com,sunbeamvijay@yahoo.com
Representing and Evaluating Social Context on Mobile DevicesKris Mihalic
Divert: Mother-in-law
Representing and Evaluating Social Context on Mobile Devices
Kris Mihalic, Manfred Tscheligi
ICT&S Center, University of Salzburg, Austria
MobileHCI 2007, Singapore
Development of durian leaf disease detection on Android device IJECEIAES
Durian is exceedingly abundant in the Philippines, providing incomes for smallholder farmers. But amidst these things, durian is still vulnerable to different plant diseases that can cause significant economic loss in the agricultural industry. The conventional way of dealing plant disease detection is through naked-eye observation done by experts. To control such diseases using the old method is extensively laborious, time-consuming and costly especially in dealing with large fields. Hence, the proponent’s objective of this study is to create a standalone mobile app for durian leaf disease detection using the transfer learning approach. In this approach, the chosen network MobileNets, is pre-trained with a large scale of general datasets namely ImageNet to effective function as a generic template for visual processing. The pre-trained network transfers all the learned parameters and set as a feature extractor for the target task to be executed. Four health conditions are addressed in this study, 10 per classification with a total of 40 samples tested to evaluate the accuracy of the system. The result showed 90% in overall accuracy for detecting algalspot, cercospora, leaf discoloration and healthy leaf.
A one decade survey of autonomous mobile robot systems IJECEIAES
Recently, autonomous mobile robots have gained popularity in the modern world due to their relevance technology and application in real world situations. The global market for mobile robots will grow significantly over the next 20 years. Autonomous mobile robots are found in many fields including institutions, industry, business, hospitals, agriculture as well as private households for the purpose of improving day-to-day activities and services. The development of technology has increased in the requirements for mobile robots because of the services and tasks provided by them, like rescue and research operations, surveillance, carry heavy objects and so on. Researchers have conducted many works on the importance of robots, their uses, and problems. This article aims to analyze the control system of mobile robots and the way robots have the ability of moving in real-world to achieve their goals. It should be noted that there are several technological directions in a mobile robot industry. It must be observed and integrated so that the robot functions properly: Navigation systems, localization systems, detection systems (sensors) along with motion and kinematics and dynamics systems. All such systems should be united through a control unit; thus, the mission or work of mobile robots are conducted with reliability.
Effects of mobility models and nodes distribution on wireless sensors networksijasuc
Wireless sensor networks (WSN) is an important future technology, in several applications in military,
health, environment and industries. Currently the integration of social and sensor is very important by
considering the characteristics of social networks in designing wireless sensor networks WSN for
improvement such as (number of messages from source to destination, radius of coverage, connectivity, and
spreading). This area has not received much attention and few researches focus on the performance
evaluation. In this paper we have studied the impact of different mobility and distribution models which is a
variable one should define which model is best for the infrastructure given their differences, also study
include the exact effect of nodes distribution and analyzed by calculation the number of messages of 12
cases to get a real performance evaluation under different conditions and same routing techniques. This
work provides us a greater understanding and clear an idea of the effect of mobility plus distribution.
Multi-objective NSGA-II based community detection using dynamical evolution s...IJECEIAES
Community detection is becoming a highly demanded topic in social networking-based applications. It involves finding the maximum intraconnected and minimum inter-connected sub-graphs in given social networks. Many approaches have been developed for community’s detection and less of them have focused on the dynamical aspect of the social network. The decision of the community has to consider the pattern of changes in the social network and to be smooth enough. This is to enable smooth operation for other community detection dependent application. Unlike dynamical community detection Algorithms, this article presents a non-dominated aware searching Algorithm designated as non-dominated sorting based community detection with dynamical awareness (NDS-CD-DA). The Algorithm uses a non-dominated sorting genetic algorithm NSGA-II with two objectives: modularity and normalized mutual information (NMI). Experimental results on synthetic networks and real-world social network datasets have been compared with classical genetic with a single objective and has been shown to provide superiority in terms of the domination as well as the convergence. NDS-CD-DA has accomplished a domination percentage of 100% over dynamic evolutionary community searching DECS for almost all iterations.
PROVIDING PRIVACY-AWARE INCENTIVES IN MOBILE SENSING SYSTEMSNexgen Technology
TO GET THIS PROJECT COMPLETE SOURCE ON SUPPORT WITH EXECUTION PLEASE CALL BELOW CONTACT DETAILS
MOBILE: 9791938249, 0413-2211159, WEB: WWW.NEXGENPROJECT.COM,WWW.FINALYEAR-IEEEPROJECTS.COM, EMAIL:Praveen@nexgenproject.com
NEXGEN TECHNOLOGY provides total software solutions to its customers. Apsys works closely with the customers to identify their business processes for computerization and help them implement state-of-the-art solutions. By identifying and enhancing their processes through information technology solutions. NEXGEN TECHNOLOGY help it customers optimally use their resources.
We are providing training on IEEE 2016-17 projects for Ph.D Scalars, M.Tech, B.E, MCA, BCA and Diploma students for
all branches for their academic projects.
For more details call us or watsapp us @ 7676768124 0r 9545252155
Email your base papers to "adritsolutions@gmail.co.in"
We are providing IEEE projects on
1) Cloud Computing, Data Mining, BigData Projects Using JAva
2) Image Processing and Video Procesing (MATLAB) , Signal Processing
3) NS2 (Wireless Sensor, MANET, VANET)
4) ANDRIOD APPS
5) JAVA, JEE, J2EE, J2ME
6) Mechanical Design projects
7) Embedded Systems and IoT Projects
8) VLSI- Verilog Projects (ModelSim and Xilinx using FPGA)
For More details Please Visit us at
Adrit Solutions
Near Maruthi Mandir
#42/5, 18th Cross, 21st Main
Vijaynagar
Bangalore.
Abstract: Cloud computing is a latest trend and a hot topic in today global world. In which sources are provided to concern as local user on an on demand basically as usual it provides the path or means of internet. Mobile cloud computing is simply cloud computing throughout that at all smallest variety of devices could be involved as wireless equipment this paper concern multiple procedure and procedure for the mobile cloud computing . It developed every General mobile cloud computing solution and application specific solution. It also concern about the cloud computing in which mobile phones are used to browse the web, write e-mails, videos etc. Mobile phones are become the universal interface online services and cloud computing application general run local on mobile phones.
Comparative analysis of augmented datasets performances of age invariant face...journalBEEI
The popularity of face recognition systems has increased due to their non-invasive method of image acquisition, thus boasting the widespread applications. Face ageing is one major factor that influences the performance of face recognition algorithms. In this study, the authors present a comparative study of the two most accepted and experimented face ageing datasets (FG-Net and morph II). These datasets were used to simulate age invariant face recognition (AIFR) models. Four types of noises were added to the two face ageing datasets at the preprocessing stage. The addition of noise at the preprocessing stage served as a data augmentation technique that increased the number of sample images available for deep convolutional neural network (DCNN) experimentation, improved the proposed AIFR model and the trait aging features extraction process. The proposed AIFR models are developed with the pre-trained Inception-ResNet-v2 deep convolutional neural network architecture. On testing and comparing the models, the results revealed that FG-Net is more efficient over Morph with an accuracy of 0.15%, loss function of 71%, mean square error (MSE) of 39% and mean absolute error (MAE) of -0.63%.
The increasing use of electronic forms of communication presents
new opportunities in the study of mental health, including the
ability to investigate the manifestations of psychiatric diseases un-
obtrusively and in the setting of patients’ daily lives. A pilot study to
explore the possible connections between bipolar affective disorder
and mobile phone usage was conducted. In this study, participants
were provided a mobile phone to use as their primary phone. This
phone was loaded with a custom keyboard that collected metadata
consisting of keypress entry time and accelerometer movement.
Individual character data with the exceptions of the backspace key
and space bar were not collected due to privacy concerns. We pro-
pose an end-to-end deep architecture based on late fusion, named
DeepMood, to model the multi-view metadata for the prediction
of mood scores. Experimental results show that 90.31% prediction
accuracy on the depression score can be achieved based on session-
level mobile phone typing dynamics which is typically less than
one minute. It demonstrates the feasibility of using mobile phone
metadata to infer mood disturbance and severity
In the networking field, Internet of Things (IoT) can be referred to technological e-learning advancements. It is seen that through the internet, nowadays it becomes easier to be connected with the real world affairs by being acknowledges about the all-around happenings. Even everyone is aware about communicating with each other all over world. ‘Things’ can be specified as the objects which are connected through internet.Over the internet, the specific kind of interconnection of different things can serve its capability through the information which can be utilized in receiving and sending of evaluated data. It is said to be specialized in almost every field that can be determined in numerous manner for implementing wide range of applications format. Wide ranges can be mentioned aseducation, business, transportation, agriculture, healthcare and management. In a generalized manner, in this article specifically and mainly the discussion is being held over the Internet of Things (IoT). Specific emphasis on E-learning is said to be implemented as a source of information applied for its readers. By the utilization of smart learning as the IOT the smart techniques can also be represented shown by e-learning methods. by Vishal Dineshkumar Soni 2019. IOT connected with e-learning . International Journal on Integrated Education. 2, 5 (Oct. 2019), 273-277. DOI:https://doi.org/10.31149/ijie.v2i5.496. https://journals.researchparks.org/index.php/IJIE/article/view/496/477 https://journals.researchparks.org/index.php/IJIE/article/view/496
With the rise of Web 2.0, Twitter has become a tool of choice for universities looking to increase their digital footprint. However there is not much guidance given into the protections of these tweets or the secure integration of Twitter into other Web 2.0 applications. As the debate for cyber threat continue to increase, these tweets must be protected and delivered in a manner that protects the sender. Explored in this report are the methods in which Twitter and its data can be exploited for nefarious use.
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...ijma
Internet of Things applications such as environmental monitoring and healthcare may involve multimedia
communications from IoT devices to humans for decision-making. Therefore, the quality of delivered
multimedia should be in good perceived quality. Higher video quality results into higher energy consumptions due to encoding and decoding processes and as a result, will affect the performance of IoT devices due to their inherent energy constraints. This paper presents the impact of video encoding
parameters as non-network parameters on the energy consumption of IoT devices. The experimental results from Cooja simulator show that the videos with high bitrates and low frame rates consume more power than videos with low bitrates and high frame rates. It was also found that video content type affects energy consumption. Finally, this paper proposes a power model that takes into account video parameters such as
bit rate, frame rate and content types. The proposed model can play a vital role in video quality adaptation in multimedia communication over IoT devices.
Privacy Preservation And Data Security In Location Based ServicesEditorJST
In this paper, a solution for privacy preservation and data security is presented. Privacy over the internet can be defined as the ability to decide what information one discloses or withholds about a person over the internet, who can access such information and for what reason a person’s information may or may not be accessed. The problem is stated as follows: (i) a client needs to inquire a database which contains some authorized and sensitive data and does not want to disclose himself to the server because of privacy concerns (ii) the owner of the database i.e the server, does not want to simply give out its data to all users. The server needs to have some control over its information, since the information is its asset. In this paper, a two stage approach is proposed to achieve secure solution for both user and the server. The first step is accomplished using Oblivious Transfer and second step is accomplished using Data Retrieval phase. And, a security model has been devised, which includes encryption and hashing algorithm for providing data security.
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11DaliaCulbertson719
Proceedings on Privacy Enhancing Technologies ; 2016 (3):96–116
Chad Spensky, Jeffrey Stewart, Arkady Yerukhimovich, Richard Shay, Ari Trachtenberg, Rick
Housley, and Robert K. Cunningham
SoK: Privacy on Mobile Devices – It’s Complicated
Abstract: Modern mobile devices place a wide variety
of sensors and services within the personal space of their
users. As a result, these devices are capable of transpar-
ently monitoring many sensitive aspects of these users’
lives (e.g., location, health, or correspondences). Users
typically trade access to this data for convenient appli-
cations and features, in many cases without a full appre-
ciation of the nature and extent of the information that
they are exposing to a variety of third parties. Never-
theless, studies show that users remain concerned about
their privacy and vendors have similarly been increas-
ing their utilization of privacy-preserving technologies
in these devices. Still, despite significant efforts, these
technologies continue to fail in fundamental ways, leav-
ing users’ private data exposed.
In this work, we survey the numerous components of
mobile devices, giving particular attention to those that
collect, process, or protect users’ private data. Whereas
the individual components have been generally well
studied and understood, examining the entire mobile de-
vice ecosystem provides significant insights into its over-
whelming complexity. The numerous components of this
complex ecosystem are frequently built and controlled
by different parties with varying interests and incen-
tives. Moreover, most of these parties are unknown to
the typical user. The technologies that are employed to
protect the users’ privacy typically only do so within
a small slice of this ecosystem, abstracting away the
greater complexity of the system. Our analysis suggests
that this abstracted complexity is the major cause of
many privacy-related vulnerabilities, and that a funda-
mentally new, holistic, approach to privacy is needed
going forward. We thus highlight various existing tech-
nology gaps and propose several promising research di-
rections for addressing and reducing this complexity.
Keywords: privacy-preserving technologies, mobile, An-
droid, iOS
DOI 10.1515/popets-2016-0018
Received 2015-11-30; revised 2016-03-01; accepted 2016-03-02.
Chad Spensky: University of California, Santa Barbara,
[email protected]
Jeffrey Stewart: MIT Lincoln Laboratory,
[email protected]
1 Introduction
The rapid proliferation of mobile devices has seen them
become integral parts of many users’ lives. Indeed, these
devices provide their users with a variety of increasingly
essential services (e.g., navigation, communication, and
Internet connectivity), as well as useful functionality
(e.g., entertainment and photography). To accommo-
date these services, modern mobile devices are equipped
with various sensors, capable of collecting extremely rich
information about their users and their surroundings.
Users and de ...
A one decade survey of autonomous mobile robot systems IJECEIAES
Recently, autonomous mobile robots have gained popularity in the modern world due to their relevance technology and application in real world situations. The global market for mobile robots will grow significantly over the next 20 years. Autonomous mobile robots are found in many fields including institutions, industry, business, hospitals, agriculture as well as private households for the purpose of improving day-to-day activities and services. The development of technology has increased in the requirements for mobile robots because of the services and tasks provided by them, like rescue and research operations, surveillance, carry heavy objects and so on. Researchers have conducted many works on the importance of robots, their uses, and problems. This article aims to analyze the control system of mobile robots and the way robots have the ability of moving in real-world to achieve their goals. It should be noted that there are several technological directions in a mobile robot industry. It must be observed and integrated so that the robot functions properly: Navigation systems, localization systems, detection systems (sensors) along with motion and kinematics and dynamics systems. All such systems should be united through a control unit; thus, the mission or work of mobile robots are conducted with reliability.
Effects of mobility models and nodes distribution on wireless sensors networksijasuc
Wireless sensor networks (WSN) is an important future technology, in several applications in military,
health, environment and industries. Currently the integration of social and sensor is very important by
considering the characteristics of social networks in designing wireless sensor networks WSN for
improvement such as (number of messages from source to destination, radius of coverage, connectivity, and
spreading). This area has not received much attention and few researches focus on the performance
evaluation. In this paper we have studied the impact of different mobility and distribution models which is a
variable one should define which model is best for the infrastructure given their differences, also study
include the exact effect of nodes distribution and analyzed by calculation the number of messages of 12
cases to get a real performance evaluation under different conditions and same routing techniques. This
work provides us a greater understanding and clear an idea of the effect of mobility plus distribution.
Multi-objective NSGA-II based community detection using dynamical evolution s...IJECEIAES
Community detection is becoming a highly demanded topic in social networking-based applications. It involves finding the maximum intraconnected and minimum inter-connected sub-graphs in given social networks. Many approaches have been developed for community’s detection and less of them have focused on the dynamical aspect of the social network. The decision of the community has to consider the pattern of changes in the social network and to be smooth enough. This is to enable smooth operation for other community detection dependent application. Unlike dynamical community detection Algorithms, this article presents a non-dominated aware searching Algorithm designated as non-dominated sorting based community detection with dynamical awareness (NDS-CD-DA). The Algorithm uses a non-dominated sorting genetic algorithm NSGA-II with two objectives: modularity and normalized mutual information (NMI). Experimental results on synthetic networks and real-world social network datasets have been compared with classical genetic with a single objective and has been shown to provide superiority in terms of the domination as well as the convergence. NDS-CD-DA has accomplished a domination percentage of 100% over dynamic evolutionary community searching DECS for almost all iterations.
PROVIDING PRIVACY-AWARE INCENTIVES IN MOBILE SENSING SYSTEMSNexgen Technology
TO GET THIS PROJECT COMPLETE SOURCE ON SUPPORT WITH EXECUTION PLEASE CALL BELOW CONTACT DETAILS
MOBILE: 9791938249, 0413-2211159, WEB: WWW.NEXGENPROJECT.COM,WWW.FINALYEAR-IEEEPROJECTS.COM, EMAIL:Praveen@nexgenproject.com
NEXGEN TECHNOLOGY provides total software solutions to its customers. Apsys works closely with the customers to identify their business processes for computerization and help them implement state-of-the-art solutions. By identifying and enhancing their processes through information technology solutions. NEXGEN TECHNOLOGY help it customers optimally use their resources.
We are providing training on IEEE 2016-17 projects for Ph.D Scalars, M.Tech, B.E, MCA, BCA and Diploma students for
all branches for their academic projects.
For more details call us or watsapp us @ 7676768124 0r 9545252155
Email your base papers to "adritsolutions@gmail.co.in"
We are providing IEEE projects on
1) Cloud Computing, Data Mining, BigData Projects Using JAva
2) Image Processing and Video Procesing (MATLAB) , Signal Processing
3) NS2 (Wireless Sensor, MANET, VANET)
4) ANDRIOD APPS
5) JAVA, JEE, J2EE, J2ME
6) Mechanical Design projects
7) Embedded Systems and IoT Projects
8) VLSI- Verilog Projects (ModelSim and Xilinx using FPGA)
For More details Please Visit us at
Adrit Solutions
Near Maruthi Mandir
#42/5, 18th Cross, 21st Main
Vijaynagar
Bangalore.
Abstract: Cloud computing is a latest trend and a hot topic in today global world. In which sources are provided to concern as local user on an on demand basically as usual it provides the path or means of internet. Mobile cloud computing is simply cloud computing throughout that at all smallest variety of devices could be involved as wireless equipment this paper concern multiple procedure and procedure for the mobile cloud computing . It developed every General mobile cloud computing solution and application specific solution. It also concern about the cloud computing in which mobile phones are used to browse the web, write e-mails, videos etc. Mobile phones are become the universal interface online services and cloud computing application general run local on mobile phones.
Comparative analysis of augmented datasets performances of age invariant face...journalBEEI
The popularity of face recognition systems has increased due to their non-invasive method of image acquisition, thus boasting the widespread applications. Face ageing is one major factor that influences the performance of face recognition algorithms. In this study, the authors present a comparative study of the two most accepted and experimented face ageing datasets (FG-Net and morph II). These datasets were used to simulate age invariant face recognition (AIFR) models. Four types of noises were added to the two face ageing datasets at the preprocessing stage. The addition of noise at the preprocessing stage served as a data augmentation technique that increased the number of sample images available for deep convolutional neural network (DCNN) experimentation, improved the proposed AIFR model and the trait aging features extraction process. The proposed AIFR models are developed with the pre-trained Inception-ResNet-v2 deep convolutional neural network architecture. On testing and comparing the models, the results revealed that FG-Net is more efficient over Morph with an accuracy of 0.15%, loss function of 71%, mean square error (MSE) of 39% and mean absolute error (MAE) of -0.63%.
The increasing use of electronic forms of communication presents
new opportunities in the study of mental health, including the
ability to investigate the manifestations of psychiatric diseases un-
obtrusively and in the setting of patients’ daily lives. A pilot study to
explore the possible connections between bipolar affective disorder
and mobile phone usage was conducted. In this study, participants
were provided a mobile phone to use as their primary phone. This
phone was loaded with a custom keyboard that collected metadata
consisting of keypress entry time and accelerometer movement.
Individual character data with the exceptions of the backspace key
and space bar were not collected due to privacy concerns. We pro-
pose an end-to-end deep architecture based on late fusion, named
DeepMood, to model the multi-view metadata for the prediction
of mood scores. Experimental results show that 90.31% prediction
accuracy on the depression score can be achieved based on session-
level mobile phone typing dynamics which is typically less than
one minute. It demonstrates the feasibility of using mobile phone
metadata to infer mood disturbance and severity
In the networking field, Internet of Things (IoT) can be referred to technological e-learning advancements. It is seen that through the internet, nowadays it becomes easier to be connected with the real world affairs by being acknowledges about the all-around happenings. Even everyone is aware about communicating with each other all over world. ‘Things’ can be specified as the objects which are connected through internet.Over the internet, the specific kind of interconnection of different things can serve its capability through the information which can be utilized in receiving and sending of evaluated data. It is said to be specialized in almost every field that can be determined in numerous manner for implementing wide range of applications format. Wide ranges can be mentioned aseducation, business, transportation, agriculture, healthcare and management. In a generalized manner, in this article specifically and mainly the discussion is being held over the Internet of Things (IoT). Specific emphasis on E-learning is said to be implemented as a source of information applied for its readers. By the utilization of smart learning as the IOT the smart techniques can also be represented shown by e-learning methods. by Vishal Dineshkumar Soni 2019. IOT connected with e-learning . International Journal on Integrated Education. 2, 5 (Oct. 2019), 273-277. DOI:https://doi.org/10.31149/ijie.v2i5.496. https://journals.researchparks.org/index.php/IJIE/article/view/496/477 https://journals.researchparks.org/index.php/IJIE/article/view/496
With the rise of Web 2.0, Twitter has become a tool of choice for universities looking to increase their digital footprint. However there is not much guidance given into the protections of these tweets or the secure integration of Twitter into other Web 2.0 applications. As the debate for cyber threat continue to increase, these tweets must be protected and delivered in a manner that protects the sender. Explored in this report are the methods in which Twitter and its data can be exploited for nefarious use.
ANALYSIS AND MODELLING OF POWER CONSUMPTION IN IOT WITH VIDEO QUALITY COMMUNI...ijma
Internet of Things applications such as environmental monitoring and healthcare may involve multimedia
communications from IoT devices to humans for decision-making. Therefore, the quality of delivered
multimedia should be in good perceived quality. Higher video quality results into higher energy consumptions due to encoding and decoding processes and as a result, will affect the performance of IoT devices due to their inherent energy constraints. This paper presents the impact of video encoding
parameters as non-network parameters on the energy consumption of IoT devices. The experimental results from Cooja simulator show that the videos with high bitrates and low frame rates consume more power than videos with low bitrates and high frame rates. It was also found that video content type affects energy consumption. Finally, this paper proposes a power model that takes into account video parameters such as
bit rate, frame rate and content types. The proposed model can play a vital role in video quality adaptation in multimedia communication over IoT devices.
Privacy Preservation And Data Security In Location Based ServicesEditorJST
In this paper, a solution for privacy preservation and data security is presented. Privacy over the internet can be defined as the ability to decide what information one discloses or withholds about a person over the internet, who can access such information and for what reason a person’s information may or may not be accessed. The problem is stated as follows: (i) a client needs to inquire a database which contains some authorized and sensitive data and does not want to disclose himself to the server because of privacy concerns (ii) the owner of the database i.e the server, does not want to simply give out its data to all users. The server needs to have some control over its information, since the information is its asset. In this paper, a two stage approach is proposed to achieve secure solution for both user and the server. The first step is accomplished using Oblivious Transfer and second step is accomplished using Data Retrieval phase. And, a security model has been devised, which includes encryption and hashing algorithm for providing data security.
Proceedings on Privacy Enhancing Technologies ; 2016 (3)96–11DaliaCulbertson719
Proceedings on Privacy Enhancing Technologies ; 2016 (3):96–116
Chad Spensky, Jeffrey Stewart, Arkady Yerukhimovich, Richard Shay, Ari Trachtenberg, Rick
Housley, and Robert K. Cunningham
SoK: Privacy on Mobile Devices – It’s Complicated
Abstract: Modern mobile devices place a wide variety
of sensors and services within the personal space of their
users. As a result, these devices are capable of transpar-
ently monitoring many sensitive aspects of these users’
lives (e.g., location, health, or correspondences). Users
typically trade access to this data for convenient appli-
cations and features, in many cases without a full appre-
ciation of the nature and extent of the information that
they are exposing to a variety of third parties. Never-
theless, studies show that users remain concerned about
their privacy and vendors have similarly been increas-
ing their utilization of privacy-preserving technologies
in these devices. Still, despite significant efforts, these
technologies continue to fail in fundamental ways, leav-
ing users’ private data exposed.
In this work, we survey the numerous components of
mobile devices, giving particular attention to those that
collect, process, or protect users’ private data. Whereas
the individual components have been generally well
studied and understood, examining the entire mobile de-
vice ecosystem provides significant insights into its over-
whelming complexity. The numerous components of this
complex ecosystem are frequently built and controlled
by different parties with varying interests and incen-
tives. Moreover, most of these parties are unknown to
the typical user. The technologies that are employed to
protect the users’ privacy typically only do so within
a small slice of this ecosystem, abstracting away the
greater complexity of the system. Our analysis suggests
that this abstracted complexity is the major cause of
many privacy-related vulnerabilities, and that a funda-
mentally new, holistic, approach to privacy is needed
going forward. We thus highlight various existing tech-
nology gaps and propose several promising research di-
rections for addressing and reducing this complexity.
Keywords: privacy-preserving technologies, mobile, An-
droid, iOS
DOI 10.1515/popets-2016-0018
Received 2015-11-30; revised 2016-03-01; accepted 2016-03-02.
Chad Spensky: University of California, Santa Barbara,
[email protected]
Jeffrey Stewart: MIT Lincoln Laboratory,
[email protected]
1 Introduction
The rapid proliferation of mobile devices has seen them
become integral parts of many users’ lives. Indeed, these
devices provide their users with a variety of increasingly
essential services (e.g., navigation, communication, and
Internet connectivity), as well as useful functionality
(e.g., entertainment and photography). To accommo-
date these services, modern mobile devices are equipped
with various sensors, capable of collecting extremely rich
information about their users and their surroundings.
Users and de ...
IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...Rida Qayyum
Location-Based Services (LBS) System is rapidly growing due to radio communication services with wireless mobile devices having a positioning component in it. LBS System offers location-based services by knowing the actual user position. A mobile user uses LBS to access services relevant to their locations. In order to provide Point of Interest (POI), LBS confronts numerous privacy related challenges in three different formats including Non-Trusted Third Party (NTTP), Trusted Third Party (TTP), and Mobile Peer-to-Peer (P2P). The current study emphasized the TTP based LBS system where the Location server does not provide full privacy to mobile users. In TTP based LBS system, a user’s privacy is concerned with personal identity, location information, and time information. In order to accomplish privacy under these concerns, state-of-the-art existing mechanisms have been reviewed. Hence, the aim to provide a promising roadmap to research and development communities for the right selection of privacy approach has achieved by conducting a comparative survey of the TTP based approaches. Leading to these privacy attributes, the current study addressed the privacy challenge by proposing a new privacy protection model named “Improved Dummy Position” (IDP) that protects TIP (Time, Identity, and Position) attributes under TTP LBS System. In order to validate the privacy level, a comparative analysis has been conducted by implementing the proposed IDP model in the simulation tool, Riverbed Modeler academic edition. The different scenarios of changing query transferring rate evaluate the performance of the proposed model. Simulation results demonstrate that our IDP could be considered as a promising model to protect user’s TIP attributes in a TTP based LBS system due to better performance and improved privacy level. Further, the proposed model extensively compared with the existing work.
A Survey of Privacy-Preserving Algorithms for Finding meeting point in Mobile...IJERA Editor
Location privacy in Location Based Services (LBS) is the capability to protect the connection between user’s identity, uncertainty sources, servers and database, thereby restraining an impending attacker from conveniently linking users of LBS to convinced locations. Smart Phones have become most important gadget for maintaining the daily activities, highly interconnected urban population is also increasingly dependent on these gadgets to regulate and schedule their daily lives. These applications often depend on current location of user or a class of user. Use of Smart Mapping technology is also increasing in large area; this system provides an easy attainable online platform that can be used for accessing many services. This survey paper projects the privacy-preserving algorithm to find the most favorable meeting location for a class of users. GSM calculates the location of all users.
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBSIJNSA Journal
Recent advances in mobile communication and development of sophisticated equipments lead to the wide spread use of Location Based Services (LBS). A major concern for large-scale deployment of LBSs is the potential abuse of their client location data, which may imply sensitive personal information. Protecting location information of the mobile user is challenging because a location itself may reveal user identity. Several schemes have been proposed for location cloaking. In our paper, we propose a generic Enhanced Location Privacy Model (LPM), which describes the concept, the architecture, algorithms and the functionalities for location privacy in LBS. As per the architecture, the system ensures location privacy, without trusting anybody including the peers or LBS servers. The system is fully distributed and evaluation shows its efficiency and high level of privacy with QoS
Privacy - Preserving Reputation with Content Protecting Location Based Queriesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Secure Distributed Collection of Data Using Participator Sensing ParadigmIJERA Editor
Distributed collection of data has been made possible with the deployment of sensor devices across many
geographical areas. Mobile phone users who employ sensors to acquire local knowledge pertaining to
temperature, product pricing, transportation facilities and so on can participate in the network that is distributed
in nature. Such network can acquire varied knowledge from diversified geographical locations. This kind of
knowledge acquisition from across the globe is known as participatory sensing (PS). Of late it has become
ubiquitous and rigorous research is on this field. Cristofaro and Soriente studied the operations of PS recently
and came to know the fact that participation of mobile users is at risk when incentives or not considered and the
users’ privacy is at stake. Their framework could provide privacy besides improving the rate of mobile user
participation in PS. However, their solution can be enhanced with respect to query privacy in the operations of
PS. Towards this end we propose a framework that incorporates TLS security among the network so as to ensure
foolproof security in the distributed collection of data through participatory sensing.
Large scale geospatial analysis on mobile application usageEricsson
Several studies indicate that mobile usage habits can be affected by the user’s location, such as rural areas and points of interest (schools, airports).
Comments to FTC on Mobile Data PrivacyMicah Altman
FTC has been hosting a series of seminars on consumer privacy, on which it has requested comments. The most recent seminar explored privacy issues related to mobile device tracking. As the seminar summary points out ...
In most cases, this tracking is invisible to consumers and occurs with no consumer interaction. As a result, the use of these technologies raises a number of potential privacy concerns and questions.
The presentations raised an interesting and important combination of questions about how to promote business and economic innovation while protecting individual privacy. I have submitted a comment on these changes with some proposed recommendations.
To summarize (quoting from the submitted the comment):
Knowledge of an individual’s location history and associations with others has the potential to be used in a wide variety of harmful ways. ... [Furthermore], since all physical activity has a unique spatial and temporal context, location history provides a linchpin for integrating multiple sources of data that may describe an individual. Moreover, locational traces are difficult or impossible to render non-identifiable using traditional masking methods.
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...ijsptm
Protecting personal information privacy has become a controversial issue among online social network
providers and users. Most social network providers have developed several techniques to decrease threats
and risks to the users’ privacy. These risks include the misuse of personal information which may lead to
illegal acts such as identity theft. This study aims to measure the awareness of users on protecting their
personal information privacy, as well as the suitability of the privacy systems which they use to modify
privacy settings. Survey results show high percentage of the use of smart phones for web services but the
current privacy settings for online social networks need to be improved to support different type of mobile
phones screens. Because most users use their mobilephones for Internet services, privacy settings that are
compatible with mobile phones need to be developed. The method of selecting privacy settings should also
be simplified to provide users with a clear picture of the data that will be shared with others. Results of this
study can be used to develop a new privacy system which will help users control their personal information
easily from different devices, including mobile Internet devices and computers.
1. Copyright 2002, Intel Corporation, All rights reserved.
Location-Based Services for Mobile Telephony: a Study of Users’
Privacy Concerns
Louise Barkuus, and Anind Dey
IRB-TR-03-024
July, 2003
Proceedings of the INTERACT 2003, 9TH
IFIP TC13 International Conference on
Human-Computer Interaction
DISCLAIMER: THIS DOCUMENT IS PROVIDED TO YOU "AS IS" WITH NO WARRANTIES WHATSOEVER, INCLUDING ANY
WARRANTY OF MERCHANTABILITY NON-INFRINGEMENT, OR FITNESS FOR ANY PARTICULAR PURPOSE. INTEL AND
THE AUTHORS OF THIS DOCUMENT DISCLAIM ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY
PROPRIETARY RIGHTS, RELATING TO USE OR IMPLEMENTATION OF INFORMATION IN THIS DOCUMENT. THE
PROVISION OF THIS DOCUMENT TO YOU DOES NOT PROVIDE YOU WITH ANY LICENSE, EXPRESS OR IMPLIED, BY
ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS
2. Location-Based Services for Mobile Telephony: a study of
users’ privacy concerns
Louise Barkhuus & Anind Dey
The IT University of Copenhagen
Glentevej 67, 2400
Copenhagen, Denmark
barkhuus@itu.dk
Intel Research, Berkeley
2150 Shattuck Avenue, Suite 1300
Berkeley, CA, USA
anind@intel-research.net
Abstract: Context-aware computing often involves tracking peoples’ location. Many studies and applications
highlight the importance of keeping people’s location information private. We discuss two types of location-
based services; location-tracking services that are based on other parties tracking the user’s location and
position-aware services that rely on the device’s knowledge of its own location. We present an experimental case
study that examines people’s concern for location privacy and compare this to the use of location-based services.
We find that even though the perceived usefulness of the two different types of services is the same, location-
tracking services generate more concern for privacy than posit ion-aware services. We conclude that development
emphasis should be given to position-aware services but that location-tracking services have a potential for
success if users are given a simple option for turning the location-tracking off.
Keywords: Location-based services, context -aware computing, mobile telephony, human-computer interaction
1 Introduction
Context-aware computing describes applications,
often implemented for mobile devices that adapt to
environmental sensor information. Many of these
applications rely solely on location information as
their context and although some researchers claim
that too much attention is given to this type of
sensor information (Schmidt et al., 1999), it is
predicted that location-based services will be the
most common form of context -aware computing
(Ljungstrand, 2001). As mobile telephony becomes
increasingly common as a handheld computing
platform, location-tracking of mobile phones enables
location-based services to spread outside closed
environments. Location-tracking of customers by
mobile telephony providers via GSM and later GPS-
enabled services generates a need for addressing
privacy issues in relation to the building of location-
based technologies and services. We distinguish
between two types of location-based services:
location-tracking and position-aware (Snekkenes,
2001). Location-tracking services are services relying
on the tracking of peoples’ location by other parties
such as mobile telephony service providers, whereas
position-aware services are bas ed on the device’s
own knowledge of its position. Examples of the two
services include locating friends or family members
and updating the time when entering a new time
zone, respectively. By studying peoples’ concern for
and use of location-based services , it is our goal to
provide insight about the degree to which location-
based services are considered to be intrusive on
users’ privacy and whether location-tracking or
position-aware services generate more concern.
We present a case study that examines peoples’
concern for location privacy in relation to location-
based services. We presented each study participant
with four hypothetical location-based features (two
location-tracking and two position-aware services)
for their mobile phone, and studied their preferences
and concerns as well as their expected use of the
services. By comparing the findings, we found that
people are positive towards the location-based
services as long as they perceive them to be useful.
We also found that location-tracking services
generate more concern than position-based ones.
3. We first present related work in the area of
privacy and location-tracking. Second we present our
study and its design and third, we present the results
of the study. Finally we discuss these results and
conclude that development emphasis should be
given to position-aware services and that location-
tracking features should be implemented giving the
user control over who can track their location. Finally
we give suggestions for further research.
2 Related Work
Research within location-tracking in indoor
environments has been conducted for over a decade.
Early work such as the Active Location Badge
system (Want et al., 1992) uses infra-red technology
but other sensor technologies have been explored as
well (Hazas and Ward, 2002). Because we propose
location-based services limited to mobile phones,
however, the related work falls in the category of
outdoor location-tracking using GSM and GPS
technologies. This approach generates a different set
of privacy issues, since it is likely that people have
different concerns about being tracked by, for
example, their service provider than their employer.
2.1 Location-Based Services
The research focusing on location-based services is
vast and a number of these services have been
implemented and tested; for example the Guide
project (Cheverst et al., 2000) and Cyber Guide
(Abowd et al., 1997). Most of these applications use
the position-aware approach, meaning that an
application’s actions are based on its knowledge of
its own position. Location-tracking services, such as
safety-based ones, for children or the elderly, have
been developed (Marmasse and Schmandt, 2003).
Applications outside the research lab include ‘friend
finder’ services, which some mobile phone service
providers offer (AT&T, 2003).
2.2 Privacy and Location
According to much of the research in location-based
computing, privacy is an essential issue (Snekkenes,
2001; Bisdikian et al., 2001), and the subject is often
addressed in terms of how sensitive information is
kept secured in the application. Privacy is a general
concern, also for stationary application such as web-
based applications, and studies focusing on keeping
sensitive information safe are numerous. In this type
of research, most often identity is at the core of
privacy studies (Langheinrich, 2002). Identity has
several aspects to it and we consider a person’s
position to be a specific attribute of identity, like full
name and social security number. The major
difference between location and most other a ttributes
is that location changes continually and is mostly
relevant to mobile computing.
Where much research focuses on technology
that ensures the user a high level of privacy, there is
a lack of studies that really examine the underlying
need for privacy. Most studies base their research on
the common notion that a high degree of privacy is
essential to the users, but few present research
confirming this. The next section briefly looks into
the most relevant studies of user behaviour and
concern for privacy.
2.3 User Related Studies
Although some studies of users’ privacy and
identification preferences exist, none of them focus
solely on concerns about location-tracking or
positioning. One study examines people’s attitude to
online privacy; the focus is onhow comfortable they
are in revealing identity information to known or
unknown parties (Ackerman et al., 1999). The study
find that their concern for privacy depends on what
types of information they are asked to give up, but
also on the application's usefulness to the user.
Another study compares general privacy concerns in
different situations to the inquirer of the information
and finds that inquirer is a greater determinant for
what people want to reveal, than situation (Lederer et
al., 2002). The study most relevant to our notion of
location privacy, focuses on the social act of
rendezvousing and finds that for example ‘friend
finder’ features will potentially enhance people’s
everyday tasks (Colbert, 2001). The study also
indicates how participants were overly positive
about giving up their location information to a fairly
large group of pre-selected individuals, not unlike
our findings. Finally the study calls for research into
users’ perceived usefulness in exchange for giving
up their position, which is the focus of this study.
The limited number of studies of actual concern
for location privacy means that, while privacy issues
are considered essential to location-tracking, it needs
to be determined how great a concern, location-
based services actually are. We now present the
study we conducted with the goal of determining
peoples’ expected use and concerns about privacy
with respect to location-based services.
3 Research Method
Our study was conducted as an experimental case
study where 16 participants are given a 5-day journal
in which they answer pre-specified questions about
4. the usefulness and level of concern in using
presented location-based services. A subset of the
participants was interviewed after completing the
journal to elaborate on their entries. Because it was
not possible to implement all the proposed location-
based services, the study asks participants to
‘imagine’ the existence of the services. The services
are outlined in table 1; note that services A and B are
position-aware and servic es C and D are location-
tracking based. At the end of each day, our study
participants reported how many times they would
have used the service and to what degree it would
have been useful to them. Both variables were
measured on a Likert scale from 1 to 5. They also
reported whether they found the tracking of their
location intrusive. The journal also gave them the
option to elaborate on their ratings, which most of
the participants took advantage of. In addition, 5 of
the participants were interviewed to elaborate on
their concerns about location privacy.
Service Description
Service A: Ringing
profiles in private
settings
The mobile phone ‘knows’ when
the user is in a meeting or in class
Service B: Ringing
profiles in public
settings
The mobile phone ‘knows’ when
the user enters a movie theater or
a restaurant
Service C: Lunch
service
A suggestion for lunch is pushed
by the retailer to the mobile
phone when the user is around a
restaurant or fast food place
Service D:
Localization of
predefined friends
The mobile phone can locate
predefined friends and alert the
user when they are within a
certain distance
Table 1: Location-Based Services.
3.1 Participants
The 16 participants were found among young mobile
phone owners and both students and non-students
were selected. Ages ranged between 19 and 35 with a
mean of 23.7. The number of years the participants
had owned a mobile phone varied from 6 months to 6
years with an average of 2.6 years.
4 Perceived Usefulness of
Services
The participants’ perceived usefulness of services
was measured by having the participants answer
how many times they would have used the different
services during the day, as well as directly asking the
participants to rate the usefulness of each service.
Finally, the services were presented again during the
interviews and discussed with participants.
Overall, participants found services A and D
(private ringing profile and localization of friends) to
be the most useful services and service C (lunch) to
be the least useful one. One service for each of our
two types was perceived as useful, whereas the other
two services were not viewed as being that useful, as
seen in table 2. The lunch service is seen as the most
intruding service where the private ringing profiles
are the least intrusive. Service D (localization of
friends) shows an unexpected positive correlation of
0.31 (significant to the .05 level), meaning that if the
participants found the service useful, they were also
likely to find it intrusive.
The self-reported level of use highly correlates
with the participants’ perceived usefulness. While
values for service A, B and D are correlated 0.56, 0.73
and 0.54, accordingly and are all statistically
significant to the .025 level, only values for service C
(lunch service) are not correlated. In general this
service was not used very much as seen in table 2.
Service Rated
useful-
ness
Rated
intrusi-
veness
Average
# of
daily use
Service A: Private
ringing profiles
3.75 2.1 1.5
Service B: Public
ringing profiles
2.6 2.2 0.4
Service C: Lunch
service
2.2 3.7 0.3
Service D:
Localization of
predefined friends
3.75 3.25 1.3
1= not useful at all, 5 = very useful
1= not intrusive, 5 = very intrusive
Table 2: Average rating of the services.
5 Concern for Privacy
Users’ concern about being tracked was assessed by
directly asking them if they found each service
intruding and if they would be worried about their
privacy while using such a service. This issue was
also discussed in the interviews.
We find that people, in general, are not overly
concerned about their privacy when using location-
based services. On a scale from 1 to 5, where 1 is ‘not
concerned’ and 5 is ‘highly concerned’, the
5. participants averaged 2.75 for all the services. Only 5
of the participants were ‘concerned’ or ‘highly
concerned’ about their privacy for the location-
tracking services, where 11 were either ‘not
concerned’, a ‘little concerned’ or ‘neutral’.
Evaluating the position-aware services, only 3
participants were ‘concerned’ or ‘highly concerned’
for their privacy, where 13 were ‘not concerned’, a
‘little concerned’ or ‘neutral’. The position-aware
services were also rated as less intrusive than the
location-tracking ones, supporting the notion that
people are more concerned when others can track
their location than when their mobile phone reacts to
its own location.
6 Discussion
Our results show that while some services are viewed
as highly useful, the level of intrusiveness and
concerns for privacy are much higher for location-
tracking than for position-aware based services.
Based on previous research, it was our initial
belief that concerns for privacy would be high.
Although few studies have examined people’s
concerns for location-tracking, the vast amount of
technologies focusing on keeping location
information safe lead to the impression that people
are not likely to adopt location-based services.
However, our results show that people are less
concerned about their location being tracked, as long
as they find the service useful.
7 Summary and further research
We have presented two types of location-based
services, location-tracking and position-aware
services. We then presented a case study that
examines people’s concern for privacy in relation to
location-based services and compared people’s
perceived usefulness of the two types of services.
We conclude that although people, in general,
consider both types to be equally useful, the
concerns for privacy are higher when the service is
based on other parties tracking the user’s location.
Because of this finding, we suggest that
development emphasis should initially be on the
more acceptable position-aware services.
Future research should focus on studies
involving implemented technology. Because our
study is based on hypothetical services, the findings
do not necessarily reflect users’ behaviour in a real
setting. Longitudinal studies should also be
conducted to assess if the use level is consistent or
mostly due to initial excitement. Finally, research
focusing on implementing technology to ensure
privacy, should consider looking into what level of
privacy is actually needed and desired by users.
References
Abowd, G. D. et al. (1997) Cyberguide, A mobile context-
aware tour guide. Wireless Networks, 3, pp 421-433.
AT & T (March, 2003), Find your Friend,
www.attws.com/mmode/features/findit
Ackerman, M. S. et al. (1999), Privacy in E-commerce:
Examining user scenarios and privacy preferences, in
Proceedings of Electronic Commerce, pp 1-8.
Bisdikian, C. et al. (2001), Enabling location-based
applications, in Mobile Commerce, pp 38-42.
Cheverst, K. et al. (2000), Experiences of developing and
deploying a context-aware tourist guide: the GUIDE
project, in Proceedings of Mobile Computing and
Networking, pp 20-31.
Colbert, M. (2001), A diary study of rendezvousing:
implications for position-aware computing and
communications for the general public, in Proceedings of
Supporting Group Work, pp 15-23.
Hazas, M. and Ward, A. (2002). A novel broadband
ultrasonic location system, in Proceedings of UbiComp
2002, pp 264-280.
Langheinrich, M. (2002). A privacy awareness system for
ubiquitous computing environments, in Proceedings of
UbiComp, pp 237-245.
Lederer, S., Mankoff, J. and Dey, A. K. (2003), Who wants
to know what when? Privacy preference determinants in
ubiquitous computing, in Proceedings of CHI ’03, pp
724-725.
Ljungstrand, P. (2001), Context awareness and mobile
phones, Personal & Ubiquitous Computing 5(1) 58-61.
Marmasse, N. and Schmandt, C. (2003). Safe & sound – a
wireless leash, in Proceedings of CHI 2003, extended
abstracts, pp 726-727.
Schmidt, A. et al. (1999), There is more to context than
location, Computer & Graphics, 23(6), pp 893-901.
Snekkenes, E. (2001), Concepts for personal location
privacy policies, in Proceedings of Electronic
Commerce, pp 48-57.
Want, R. et al. (1992), The active badge location system,
ACM Transaction on Information Systems, 10(1) 91-
102.