Access the full text.
Sign up today, get DeepDyve free for 14 days.
B. Malin (2005)
Betrayed By My Shadow: Learning Data Identity via Trail Matching
N. Eagle (2008)
Behavioral Inference across Cultures: Using Telephones as a Cultural LensIEEE Intelligent Systems, 23
(2008)
Finite State Machine Tutorial,
A. Evfimievski (2002)
Randomization in privacy preserving data miningSIGKDD Explor., 4
J. Reades, Francesco Calabrese, Andres Sevtsuk, C. Ratti (2007)
Cellular Census: Explorations in Urban Data CollectionIEEE Pervasive Computing, 6
L. Sweeney (2002)
Achieving k-Anonymity Privacy Protection Using Generalization and SuppressionInt. J. Uncertain. Fuzziness Knowl. Based Syst., 10
L. Barkhuus, A. Dey (2003)
Location-Based Services for Mobile Telephony: a Study of Users' Privacy Concerns
Marta González, César Hidalgo, A. Barabási (2008)
Understanding individual human mobility patternsNature, 453
C. Ratti, D. Frenchman, R. Pulselli, S. Williams (2006)
Mobile Landscapes: Using Location Data from Cell Phones for Urban AnalysisEnvironment and Planning B: Planning and Design, 33
J. Reades (2009)
Eigenplaces : analysing cities using the space ^ time structure of the mobile phone network
N. Eagle, A. Pentland (2009)
Eigenbehaviors: identifying structure in routineBehavioral Ecology and Sociobiology, 63
Marc Langheinrich (2002)
Privacy Invasions in Ubiquitous Computing
(2007)
Using Finite State Machines to Manage Customer Relations,
Baik Hoh, M. Gruteser (2005)
Protecting Location Privacy Through Path ConfusionFirst International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05)
M. Gruteser, Baik Hoh (2005)
On the Anonymity of Periodic Location Samples
M. Kwan, Irene Casas, Ben Schmitz (2004)
Protection of Geoprivacy and Accuracy of Spatial Information: How Effective Are Geographical Masks?Cartogr. Int. J. Geogr. Inf. Geovisualization, 39
John Krumm (2007)
Inference Attacks on Location Tracks
(2008)
Information Security Breaches Quadrupled in 2007,
C. Ardagna, M. Cremonini, S. Capitani, Di Vimercati, P. Samarati (2008)
Location privacy in pervasive computing
Francesco Calabrese, J. Reades, C. Ratti (2009)
Eigenplaces: Segmenting Space through Digital SignaturesIEEE Pervasive Comput., 9
Yilin Zhao (2002)
Standardization of mobile phone positioning for 3G systemsIEEE Commun. Mag., 40
R. Ahas, Ü. Mark (2005)
Location based services—new challenges for planning and public administration?Futures, 37
M. Duckham, L. Kulik, Athol Birtley (2006)
A Spatiotemporal Model of Strategies and Counter Strategies for Location Privacy Protection
P. Doyle, J. Lane, J. Theeuwes, L. Zayatz (2001)
Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies
F. Sanford (1970)
Information ExplosionNature, 225
During the last several years, researchers have begun to gain access to telecommunications data from cellular-network operators. This development heralds a methodological revolution in fields with complex and extensive data needs and the combination of continuous monitoring and real-time response would enable us to deploy increasingly intelligent infrastructure. However, when used as a research tool, the personal nature of the cellular phone raises new ethical questions regarding the trade-off between personal privacy and the public good. To date, models for mobile privacy have emerged primarily from the field of GPS studies. This article proposes a new approach, the use of Finite State Machines (FSMs), as a technique that is particularly suited to the specific computational and technical constraints of the cellular network.
Journal of Urban Technology – Taylor & Francis
Published: Apr 1, 2010
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.