References
- Acquisti, A., and J. Grossklags. 2004. Privacy attitudes and privacy behavior. In Economics of information security, ed. L. J. Camp and S. Lewis, 165–78. Boston: Springer. doi: 10.1007/1-4020-8090-5_13.
- Armstrong, M. P., G. Rushton, and D. L. Zimmerman. 1999. Geographically masking health data to preserve confidentiality. Statistics in Medicine 18 (5):497–525. doi: 10.1002/(SICI)1097-0258(19990315)18:5<497::AID-SIM45>3.0.CO;2-#.
- Barry, K. 2018. Will your smartphone replace your car key? Consumer Reports, April 5. Accessed April 8, 2019. https://www.consumerreports.org/automotive-technology/will-your-smartphone-replace-your-car-key-virtual-key/.
- Beldad, A., and M. Citra Kusumadewi. 2015. Here’s my location, for your information: The impact of trust, benefits, and social influence on location sharing application use among Indonesian university students. Computers in Human Behavior 49:102–10. doi: 10.1016/j.chb.2015.02.047.
- Brunton, F., and H. Nissenbaum. 2015. Obfuscation: A user’s guide for privacy and protest. Cambridge, MA: The MIT Press.
- Clarke, K. C. 2015. A multiscale masking method for point geographic data. International Journal of Geographical Information Science 30 (2):300–315. doi: 10.1080/13658816.2015.1085540.
- Council of Advisors on Science and Technology. 2014. Big data and privacy: A technological perspective. Accessed July 21, 2018. https://bigdatawg.nist.gov/pdf/pcast_big_data_and_privacy_-_may_2014.pdf.
- Cox, J. 2019. Hundreds of bounty hunters had access to AT&T, T-Mobile, and Sprint customer location data for years. Motherboard, February 6. Accessed March 19, 2019. https://motherboard.vice.com/en_us/article/43z3dn/hundreds-bounty-hunters-att-tmobile-sprint-customer-location-data-years.
- Crawford, K. 2014. The anxieties of big data. Accessed March 19, 2019. https://thenewinquiry.com/the-anxieties-of-big-data/.
- Curry, M. 1997. Digital people, digital places: Rethinking privacy in a world of geographic information. Ethics & Behavior 7 (3):253–63. doi: 10.1207/s15327019eb0703_7.
- Danezis, G., S. Lewis, and R. Anderson. 2005. How much is location privacy worth? Proceedings of the Workshop on the Economics of Information Security Series (WEIS) 5:1–13.
- Dobson, J. E., and P. F. Fisher. 2003. Geoslavery. IEEE Technology and Society Magazine 22 (1):47–52. doi: 10.1109/MTAS.2003.1188276.
- Dobson, J. E., and P. F. Fisher. 2007. The panopticon’s changing geography. Geographical Review 97 (3):307–23. doi: 10.1111/j.1931-0846.2007.tb00508.x.
- Duckham, M., and L. Kulik. 2006. Location privacy and location-aware computing. In Dynamic & mobile GIS: Investigating change in space and time, ed. R. Billen, E. Joao, and D. Forrest, 35–51. Boca Raton, FL: CRC Press.
- Dwork, C. 2006. Differential privacy. In Proceedings of the 33rd International Colloquium on Automata, Languages and Programming, ed. M. Bugliese, M. Preneel, V. Sassone, and I. Wegener, 1–12. Berlin: Springer. doi: 10.1007/11787006_1.
- Economic Research Service. 2010. Rural–Urban Commuting Area (RUCA) codes. Accessed July 21, 2018. https://www.ers.usda.gov/data-products/rural-urban-commuting-area-codes/documentation/.
- European Union. 2016. General Data Protection Regulation (EU) 2016/679.
- File, T., and R. Camille. 2014. Computer and Internet use in the United States: 2013. Washington, DC: U.S. Census Bureau. Accessed July 21, 2018. http://www.census.gov/content/dam/Census/library/publications/2014/acs/acs-28.pdf.
- Goss, J. 1995. We know who you are and we know where you live: The instrumental rationality of geodemographic systems. Economic Geography 71 (2):171–98. doi: 10.2307/144357.
- Hampton, K. H., M. K. Fitch, W. B. Allshouse, I. A. Doherty, D. C. Gesink, P. A. Leone, M. L. Serre, and W. C. Miller. 2010. Mapping health data: Improved privacy protection with donut method geomasking. American Journal of Epidemiology 172 (9):1062–69. doi: 10.1093/aje/kwq248.
- Harris, R. 2016. Quantitative geography: The basics. London: Sage.
- Hern, A. 2014. What is Apple’s iBeacon? The Guardian, January 13. Accessed March 19, 2019. https://www.theguardian.com/technology/2014/jan/13/what-is-apple-ibeacon-retail-tracking.
- Hill, K. 2016. How an internet mapping glitch turned a random Kansas farm into a digital hell. Accessed March 20, 2019. https://splinternews.com/how-an-internet-mapping-glitch-turned-a-random-kansas-f-1793856052.
- Hill, K. 2019. How cartographers for the U.S. military inadvertently created a house of horrors in South Africa. Accessed March 20, 2019. https://gizmodo.com/how-cartographers-for-the-u-s-military-inadvertently-c-1830758394.
- Kar, B., R. C. Crowsey, and J. J. Zale. 2012. The myth of location privacy in the United States: Surveyed attitude versus current practices. The Professional Geographer 65 (1):47–64. doi: 10.1080/00330124.2012.658725.
- Keßler, C., and G. McKenzie. 2018. A geoprivacy manifesto. Transactions in GIS 22 (1):3–19. doi: 10.1111/tgis.12305.
- Kitchin, R., and N. Tate. 2013. Conducting research in human geography: Theory, methodology and practice. London and New York: Routledge.
- Kofman, A. 2019. Silent shout. Real Life, January 7. Accessed March 19, 2019. https://reallifemag.com/silent-shout/.
- Kounadi, O., K. Bowers, and M. Leitner. 2014. Crime mapping on-line: Public perception of privacy issues. European Journal on Criminal Policy and Research 21 (1):167–90. doi: 10.1007/s10610-014-9248-4.
- Kwan, M.-P., I. Casas, and B. Schmitz. 2004. Protection of geoprivacy and accuracy of spatial information: How effective are geographical masks? Cartographica: The International Journal for Geographic Information and Geovisualization 39 (2):15–28. doi: 10.3138/X204-4223-57MK-8273.
- Leszczynski, A. 2015. Spatial big data and anxieties of control. Environment and Planning D: Society and Space 33 (6):965–84. doi: 10.1177/0263775815595814.
- Levine, D. S., and M. J. Strube. 2012. Environmental attitudes, knowledge, intentions and behaviors among college students. The Journal of Social Psychology 152 (3):308–26. doi: 10.1080/00224545.2011.604363.
- Li, J., C. Zhong, Z. Cao, W. Pei, and X. Zhou. 2013. Examining privacy concern in social-driven location sharing: An empirical study on Chinese popular SNSs. In Computer Software and Applications Conference (COMPSAC), 668–77. New York: IEEE. doi: 10.1109/COMPSAC.2013.106.
- Liao, S. 2017. Google admits it tracked user location data even when the setting was turned off. The Verge, November 21. Accessed July 21, 2018. https://www.theverge.com/2017/11/21/16684818/google-location-tracking-cell-tower-data-android-os-firebase-privacy.
- Lindqvist, J., J. Cranshaw, J. Wiese, J. Hong, and J. Zimmerman. 2011. I’m the mayor of my house: Examining why people use Foursquare—A social-driven location sharing application. In Proceedings of the 2011 Annual Conference on Human Factors in Computing Systems–CHI ’11, 2409–18. New York: ACM. doi: 10.1145/1978942.1979295.
- Madden, M., and L. Rainie. 2015. Americans’ attitudes about privacy, security and surveillance. Accessed July 21, 2018. http://www.pewinternet.org/2015/05/20/americans-attitudes-about-privacy-security-and-surveillance/.
- Marwick, A. E., and D. Boyd. 2014. Networked privacy: How teenagers negotiate context in social media. New Media & Society 16 (7):1051–67. doi: 10.1177/1461444814543995.
- McCarroll, D. 2016. Simple statistical tests for geography. Boca Raton, FL: CRC Press.
- Michalevsky, Y., G. Nakibly, A. Schulman, and D. Boneh. 2015. PowerSpy: Location tracking using mobile device power analysis. Paper presented at 24th USENIX Security Symposium, Washington, DC, August.
- Morgan, S., and J. Miller. 2002. Communicating about gifts of life: The effect of knowledge, attitudes, and altruism on behavior and behavioral intentions regarding organ donation. Journal of Applied Communication Research 30 (2):163–78. doi: 10.1080/00909880216580.
- National Science and Technology Council. 2016. National privacy research strategy. Accessed July 21, 2018. https://www.nitrd.gov/PUBS/NationalPrivacyResearchStrategy.pdf.
- Nissenbaum, H. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford, CA: Stanford University Press.
- Nolan, S. A., and T. Heinzen. 2010. Essentials of statistics for the behavioral sciences. New York: Worth.
- O’Connell, A. A. 2006. Logistic regression models for ordinal response variables. Thousand Oaks, CA: Sage.
- Puente, K. 2016. Maintenance man pleads guilty to using Instagram to burglarize 33 O.C. college students. The Orange County Register, September 20. Accessed July 21, 2018. https://www.ocregister.com/2016/09/20/maintenance-man-pleads-guilty-to-using-instagram-to-burglarize-33-oc-college-students/.
- Raine, L. 2016. The state of privacy in post-Snowden America. Accessed July 21, 2018. http://www.pewresearch.org/fact-tank/2016/09/21/the-state-of-privacy-in-america/.
- Ricker, B., N. Schuurman, and F. Kessler. 2015. Implications of smartphone usage on privacy and spatial cognition: Academic literature and public perceptions. GeoJournal 80 (5):637–52. doi: 10.1007/s10708-014-9568-4.
- Ruel, E. E., W. E. Wagner, and B. J. Gillespie. 2015. The practice of survey research: Theory and applications. Los Angeles: Sage.
- Scism, L. 2016. Car insurers find tracking devices are a tough sell. Wall Street Journal, January 10. Accessed July 21, 2018. http://www.wsj.com/articles/car-insurers-find-tracking-devices-are-a-tough-sell-1452476714.
- Seidl, D. E., and C. Allen. 2016. Unlisted: Variations in location sharing by Craigslist users. Albuquerque, NM: CaGIS. Accessed July 21, 2018. http://geo.gmu.edu/AutoCarto2016/Seidl_and_Allen.pdf.
- Seidl, D. E., P. Jankowski, and M.-H. Tsou. 2016. Privacy and spatial pattern preservation in masked GPS trajectory data. International Journal of Geographical Information Science 30 (4):785–800. doi: 10.1080/13658816.2015.1101767.
- Seidl, D. E., G. Paulus, P. Jankowski, and M. Regenfelder. 2015. Spatial obfuscation methods for privacy protection of household-level data. Applied Geography 63:253–63. doi: 10.1016/j.apgeog.2015.07.001.
- Shahani, A. 2014. Smartphones are used to stalk, control domestic abuse victims. All Tech Considered, National Public Radio, September 15. Accessed July 21, 2018. https://www.npr.org/sections/alltechconsidered/2014/09/15/346149979/smartphones-are-used-to-stalk-control-domestic-abuse-victims.
- Solove, D. J. 2007. “I’ve got nothing to hide” and other misunderstandings of privacy. San Diego Law Review 44:1–23.
- Swanlund, D., and N. Schuurman. 2016. Mechanism matters: Data production for geosurveillance. Annals of the American Association of Geographers 106 (5):1063–78. doi: 10.1080/24694452.2016.1188680.
- Swedberg, C. 2019. NFC makes smartphones the key to Hyundai’s new cars. RFID Journal, March 6. Accessed March 20, 2019. https://www.rfidjournal.com/articles/view?18381.
- Tavakol, M., and R. Dennick. 2011. Making sense of Cronbach’s alpha. International Journal of Medical Education 2:53–55. doi: 10.5116/ijme.4dfb.8dfd.
- Terdiman, D. 2009. Twitterverse working to confuse Iranian censors. Accessed July 1, 2019. https://www.cnet.com/news/twitterverse-working-to-confuse-iranian-censors/.
- van de Garde-Perik, E., P. Markopoulos, B. de Ruyter, B. Eggen, and W. Ijsselsteijn. 2008. Investigating privacy attitudes and behavior in relation to personalization. Social Science Computer Review 26 (1):20–43. doi: 10.1177/0894439307307682.
- Whitman, M. E., and H. J. Mattord. 2018. Principles of information security. South Melbourne, Australia: Cengage Learning.
- Yang, H., and H. Liu. 2014. Prior negative experience of online disclosure, privacy concerns, and regulatory support in Chinese social media. Chinese Journal of Communication 7 (1):40–59. doi: 10.1080/17544750.2013.816756.
- Zandbergen, P. A. 2014. Ensuring confidentiality of geocoded health data: Assessing geographic masking strategies for individual-level data. Advances in Medicine 2014:1–14. doi: 10.1155/2014/567049.
- Zhang, S., S. M. Freundschuh, K. Lenzer, and P. A. Zandbergen. 2016. The location swapping method for geomasking. Cartography and Geographic Information Science 44 (1):22–34. doi: 10.1080/15230406.2015.1095655.
- Zhao, B., and Q. Chen. 2017. Location spoofing in a location-based game: A case study of Pokémon Go. In Advances in cartography and GIScience, ed. M. P. Peterson, 21–32. Springer. doi: 10.1007/978-3-319-57336-6_2.
- Zhao, B., and D. Z. Sui. 2017. True lies in geospatial big data: Detecting location spoofing in social media. Annals of GIS 23 (1):1–14. doi: 10.1080/19475683.2017.1280536.