1,287
Views
22
CrossRef citations to date
0
Altmetric
Special Issue: Big data in smart tourism: challenges, issues and opportunities

Breach of traveller privacy in location-based social media

, &
Pages 1825-1840 | Received 22 Mar 2018, Accepted 23 Nov 2018, Published online: 04 Dec 2018

References

  • Ahas, R., Aasa, A., Roose, A., Mark, Ü, & Silm, S. (2008). Evaluating passive mobile positioning data for tourism surveys: An Estonian case study. Tourism Management, 29(3), 469–486. doi: 10.1016/j.tourman.2007.05.014
  • Anuar, F. I., & Gretzel, U. (2011, January 26–28). Privacy concerns in the context of location based services for tourism. Proceedings of Information and Communication Technologies in Tourism Conference (pp. 229–248), Innsbruck.
  • Beinat, E. (2001). Privacy and location-based services: Stating the policies clearly. Geoinformatics, 4, 14–17.
  • Birenboim, A., Anton-Clave, S., Russo, A. P., & Shoval, N. (2013). Temporal activity patterns of theme park visitors. Tourism Geographies, 15(4), 601–619. doi: 10.1080/14616688.2012.762540
  • Brandt, T., Bendler, J., & Neumann, D. (2017). Social media analytics and value creation in urban smart tourism ecosystems. Information & Management, 54(6), 703–713. doi: 10.1016/j.im.2017.01.004
  • Chua, A., Servillo, L., Marcheggiani, E., & Vande, M. A. (2016). Mapping cilento: Using geotagged social media data to characterize tourist flows in southern italy. Tourism Management, 57, 295–310. doi: 10.1016/j.tourman.2016.06.013
  • Clarke, R. (2001). Person location and person tracking - technologies, risks and policy implications. Information Technology & People, 14(2), 206–231. doi: 10.1108/09593840110695767
  • Claster, W., Ghotbi, N., & Shanmuganathan, S. (2015). Gathering medical tourism information through algorithmic text analysis of tweets. In M. Cooper, K. Vafadari, & M. Hieda (Eds.), Current issues and emerging trends in medical tourism (pp. 173–188). Hershey, PA: Medical Information Science Reference.
  • Frikken, K. B., & Golle, P. (2006, October 30). Private social network analysis: How to assemble pieces of a graph privately. Proceedings of the 5th ACM workshop on Privacy in electronic society (pp. 89–98), Alexandria, VA.
  • Gao, S., Ma, J., Sun, C., & Li, X. (2014). Balancing trajectory privacy and data utility using a personalized anonymization model. Journal of Network and Computer Applications, 38, 125–134. doi: 10.1016/j.jnca.2013.03.010
  • Junglas, I., & Spitzmuller, C. (2006, June 26–27). Personality traits and privacy perceptions: An empirical study in the context of location-based services. Proceedings of the International Conference on Mobile Business (pp. 36–36), Copenhagen.
  • Kotiloglu, S., Lappas, T., Pelechrinis, K., & Repoussis, P. P. (2017). Personalized multi-period tour recommendations. Tourism Management, 62, 76–88. doi: 10.1016/j.tourman.2017.03.005
  • Leung, X. Y., Wang, F., Wu, B., Bai, B., Stahura, K. A., & Xie, Z. (2012). A social network analysis of overseas tourist movement patterns in Beijing: The impact of the Olympic Games. International Journal of Tourism Research, 14(5), 469–484. doi: 10.1002/jtr.876
  • Li, J., Xu, L., Tang, L., Wang, S., & Li, L. (2018). Big data in tourism research: A literature review. Tourism Management, 68, 301–323. doi: 10.1016/j.tourman.2018.03.009
  • Lindqvist, J., Cranshaw, J., Wiese, J., Hong, J., & Zimmerman, J. (2011, May 7–12). I’m the mayor of my house: Examining why people use foursquare - a social-driven location sharing application. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 2409–2418), Vancouver, BC.
  • Liu, Y., & Shi, J. (2017). How inter-city high-speed rail influences tourism arrivals: Evidence from social media check-in data. Current Issues in Tourism. doi: 10.1080/13683500.2017.1349080
  • Malik, M. B., Ghazi, M. A., & Ali, R. (2012, November 22–25). Privacy preserving data mining techniques: Current scenario and future prospects. Proceedings of the Third International Conference on Computer and Communication Technology (pp. 26–32). Allahabad.
  • Mezzour, G., Perrig, A., Gligor, V., & Papadimitratos, P. (2009, December 12–14). Privacy preserving relationship path discovery in social networks. Proceedings of the 8th International Conference on Cryptology and Network Security (pp. 189–208). Kanazawa.
  • Narayanan, A., & Shmatikov, V. (2009, May 17–20). De-anonymizing social networks. Proceedings of the 30th IEEE Symposium on Security and Privacy (pp. 173–187). Oakland, CA.
  • Onder, I., Koerbitz, W., & Hubmann-Haidvogel, A. (2016). Tracing tourists by their digital footprints. Journal of Travel Research, 55(5), 566–573. doi: 10.1177/0047287514563985
  • Orellana, D., Bregt, A. K., Ligtenberg, A., & Wachowicz, M. (2012). Exploring visitor movement patterns in natural recreational areas. Tourism Management, 33(3), 672–682. doi: 10.1016/j.tourman.2011.07.010
  • Patil, S., Norcie, G., Kapadia, A., & Lee, A. (2012, May 5–10). “Check out where I am!”: Location-sharing motivations, preferences, and practices. Proceedings of Extended Abstracts on Human Factors in Computing Systems (pp. 1997–2002), Austin, TX.
  • Pedrana, M. (2014). Location-based services and tourism: Possible implications for destination. Current Issues in Tourism, 17(9), 753–762. doi: 10.1080/13683500.2013.868411
  • Raun, J., Ahas, R., & Tiru, M. (2016). Measuring tourism destinations using mobile tracking data. Tourism Management, 57, 202–212. doi: 10.1016/j.tourman.2016.06.006
  • Rodewig, C. (2012). Geotagging poses security risks. U.S Army. Retrieved from https://www.army.mil/article/75165/Geotagging_poses_security_risks
  • Saravanan, S., & Sadhu-Ramakrishnan, B. (2016). Preserving privacy in the context of location based services through location hider in mobile-tourism. Information Technology & Tourism, 16(2), 229–248. doi: 10.1007/s40558-016-0056-1
  • Shi, B., Zhao, J., & Chen, P.-J. (2017). Exploring urban tourism crowding in Shanghai via crowdsourcing geospatial data. Current Issues in Tourism, 20(11), 1186–1209. doi: 10.1080/13683500.2016.1224820
  • Shokri, R., Theodorakopoulos, G., Troncoso, C., Hubaux, J.-P., & Le-Boudec, J.-Y. (2012, October 16–18). Protecting location privacy: Optimal strategy against localization attacks. Proceedings of the 2012 ACM Conference on Computer and Communications Security (pp. 617–627), Raleigh, NC.
  • Sobolevsky, S., Bijic, I., Belyi, A., Sitko, I., Hawelka, B., Arias, J. M., & Ratti, C. (2015, June 27–July 2). Scaling of city attractiveness for foreign visitors through big data of human economical and social media activity. IEEE International Congress on Big Data (pp. 600–607). New York, NY.
  • Srivastava, J., Ahmad, M. A., Pathak, N., & Hsu, D. K. W. (2008, April 24–26). Data mining based social network analysis from online behavior. SIAM Conference on Data Mining, Atlanta, GA. Retrieved from http://siam.org/meetings/sdm08/TS1.pdf
  • Staddon, J. (2009, November 9). Finding “hidden” connections on LinkedIn an argument for more pragmatic social network privacy. Proceedings of the 2nd ACM workshop on Security and artificial intelligence (pp. 11–14), Chicago, IL.
  • Tan, P.-N., Steinbach, M., & Kumar, V. (2006). Introduction to data mining. New York: Addison Wesley.
  • Versichele, M., Groote, L.-D., Bouuaer, M. C., Neutens, T., Moerman, I., & Van de Weghe, N. (2014). Pattern mining in tourist attraction visits through association rule learning on bluetooth tracking data: A case study of ghent, belgium. Tourism Management, 44, 67–81. doi: 10.1016/j.tourman.2014.02.009
  • Vu, H. Q., Li, G., Law, R., & Ye, B. H. (2015). Exploring the travel behaviors of inbound tourists to Hong Kong using geotagged photos. Tourism Management, 46, 222–232. doi: 10.1016/j.tourman.2014.07.003
  • Vu, H. Q., Li, G., Law, R., & Zhang, Y. (2018a). Travel diaries analysis by sequential rule mining. Journal of Travel Research, 57(3), 399–413. doi: 10.1177/0047287517692446
  • Vu, H. Q., Li, G., Law, R., & Zhang, Y. (2018b). Tourist activity analysis by leveraging mobile social media data. Journal of Travel Research, 57(7), 883–898. doi: 10.1177/0047287517722232
  • Wolverton, T. (2018). Facebook is limiting developers’ access to user data, following Cambridge Analytica scandal. Business Insider Australia, Retrieved from https://www.businessinsider.com.au/facebook-api-changes-limited-access-user-data-2018-4?r=US&IR=T
  • Xu, H., & Teo, H.-H. (2004, December 9–12). Alleviating consumers privacy concerns in location based services: A psychological control perspective. Proceedings of the 25th International Conference on Information Systems (Article No. 64), Washington, DC.
  • Xu, H., Teo, H. H., & Tan, B. C. Y. (2005, December 11–14). Predicting the adoption of location-based services: The role of trust and perceived privacy risk. Proceedings of the 26th International Conference on Information Systems (Article No. 71), Las Vegas, NV.
  • Zheleva, E., & Getoor, L. (2009, April 20–24). To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles. Proceedings of the 18th International Conference on World Wide Web (pp. 531–540), Madrid.
  • Zheleva, E., Terzi, E., & Getoor, L. (2012). Privacy in Social Networks. Synthesis Lectures on Data Mining and Knowledge Discovery. San Rafael: Morgan & Claypool.
  • Zhou, B., Pei, J., & Luk, W. (2008). A brief survey on anonymization techniques for privacy preserving publishing of social network data. ACM SIGKDD Explorations Newsletter, 10(2), 12–22. doi: 10.1145/1540276.1540279
  • Zhu, T., Li, G., Zhou, W., & Yu, P. S. (2017a). Differentially private data publishing and analysis: A survey. IEEE Transactions on Knowledge and Data Engineering, 29(8), 1619–1638. doi: 10.1109/TKDE.2017.2697856
  • Zhu, T., Li, G., Zhou, W., & Yu, P. S. (2017b). Differential privacy and applications. Advances in information security 69. Cham: Springer, Cham.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.