Which Cloak Dresses You Best? - Comparing Location Cloaking Methods for Mobile Users

Susen Döbelt, Johann Schrammel (Vortragende:r), Manfred Tscheligi

Publikation: Beitrag in Buch oder TagungsbandBeitrag in Tagungsband mit PosterpräsentationBegutachtung

Abstract

Location cloaking methods enable the protection of private location data. Different temporal and spatial approaches to cloak a specific user location (e.g., k-anonymity) have been suggested. Besides the research focusing on functionality, little work has been done on how cloaking methods should be presented to the user. In practice common location referencing services force the user to either accept or deny exact positioning. Therefore, users are not enabled to regulate private location information on a granular level. To improve the usage of location cloaking methods and foster location privacy protection, we conducted a user study (N = 24) comparing different visualized cloaking methods. The results of our lab study revealed a preference for visualizations using already known and well understood real world entities. Thus, the usage of simple and real world concepts can contribute to the application of cloaking methods and subsequently to location privacy protection.
OriginalspracheEnglisch
TitelMobileHCI '17 Proceedings of the 19th International Conference on Human-Computer Interaction with Mobile Devices and Services
Seitenumfang8
DOIs
PublikationsstatusVeröffentlicht - 2017
VeranstaltungMobileHCI 2017 - 19th International Conference on Human-Computer Interaction with Mobile Devices and Services. Time to move on, up, in and out! -
Dauer: 4 Sept. 20177 Sept. 2017

Konferenz

KonferenzMobileHCI 2017 - 19th International Conference on Human-Computer Interaction with Mobile Devices and Services. Time to move on, up, in and out!
Zeitraum4/09/177/09/17

Research Field

  • Nicht definiert

Schlagwörter

  • Location privacy; mobile location sharing; location cloaking; location obfuscation; user study

Fingerprint

Untersuchen Sie die Forschungsthemen von „Which Cloak Dresses You Best? - Comparing Location Cloaking Methods for Mobile Users“. Zusammen bilden sie einen einzigartigen Fingerprint.

Diese Publikation zitieren