74,163 research outputs found

    Conflicts in the Use of Geographic Information

    Get PDF
    The use of geographic information technologies is pervasive throughout business, government, industry and the scientific community in the United States. Conflicts are arising on a daily basis for those using geographic information systems and their affiliated databases, for those implementing such systems, and for those designing the next generations of spatial information technologies. Balancing among competing interests and resolving conflicts involved in the use of these technologies are growing problems for numerous parties within society. Among the problem domains of greatest concern are those involving personal information privacy, intellectual property rights in geographic information, liability in the use of geographic data sets, public access to government geographic data sets, public goods aspects of geographic information in libraries, and sales of geographic information by government agencies. This research involves a pilot study that will evidence the extent to which conflicts are perceived to exist by those using and creating geographic information systems and by those who are the subjects contained within such systems. Researchers will develop and pilot web-based questionnaires to determine whether and to what extent interest and value choices differ among sampled groups of system developers, users, and data subjects within each of the major problem domains. Where significant differences are evidenced as existing among affected parties, researchers will develop conflict scenarios patterned after experiences witnessed in practice. The full range of geographic information conflict issues within each of the major problem domains will be fully explored and documented. The scenarios and the problems drawn from practice will set the methodological and substantive stage for follow on research in which potential solutions may be sought. Eventually, preferences for resolving specific conflicts will be determined and guiding principles will be suggested. Gathered data and scenarios developed during the pilot, as well as suggested principles to be developed and explored in future research, will form the foundation for broad-ranging moral and ethical discussions within the geographic information science community

    Mind your step! : How profiling location reveals your identity - and how you prepare for it

    Get PDF
    Location-based services (LBS) are services that position your mobile phone to provide some context-based service for you. Some of these services – called ‘location tracking’ applications - need frequent updates of the current position to decide whether a service should be initiated. Thus, internet-based systems will continuously collect and process the location in relationship to a personal context of an identified customer. This paper will present the concept of location as part of a person’s identity. I will conceptualize location in information systems and relate it to concepts like privacy, geographical information systems and surveillance. The talk will present how the knowledge of a person's private life and identity can be enhanced with data mining technologies on location profiles and movement patterns. Finally, some first concepts about protecting location information

    DiffTraj: Generating GPS Trajectory with Diffusion Probabilistic Model

    Full text link
    Pervasive integration of GPS-enabled devices and data acquisition technologies has led to an exponential increase in GPS trajectory data, fostering advancements in spatial-temporal data mining research. Nonetheless, GPS trajectories contain personal geolocation information, rendering serious privacy concerns when working with raw data. A promising approach to address this issue is trajectory generation, which involves replacing original data with generated, privacy-free alternatives. Despite the potential of trajectory generation, the complex nature of human behavior and its inherent stochastic characteristics pose challenges in generating high-quality trajectories. In this work, we propose a spatial-temporal diffusion probabilistic model for trajectory generation (DiffTraj). This model effectively combines the generative abilities of diffusion models with the spatial-temporal features derived from real trajectories. The core idea is to reconstruct and synthesize geographic trajectories from white noise through a reverse trajectory denoising process. Furthermore, we propose a Trajectory UNet (Traj-UNet) deep neural network to embed conditional information and accurately estimate noise levels during the reverse process. Experiments on two real-world datasets show that DiffTraj can be intuitively applied to generate high-fidelity trajectories while retaining the original distributions. Moreover, the generated results can support downstream trajectory analysis tasks and significantly outperform other methods in terms of geo-distribution evaluations

    Locational wireless and social media-based surveillance

    Get PDF
    The number of smartphones and tablets as well as the volume of traffic generated by these devices has been growing constantly over the past decade and this growth is predicted to continue at an increasing rate over the next five years. Numerous native features built into contemporary smart devices enable highly accurate digital fingerprinting techniques. Furthermore, software developers have been taking advantage of locational capabilities of these devices by building applications and social media services that enable convenient sharing of information tied to geographical locations. Mass online sharing resulted in a large volume of locational and personal data being publicly available for extraction. A number of researchers have used this opportunity to design and build tools for a variety of uses – both respectable and nefarious. Furthermore, due to the peculiarities of the IEEE 802.11 specification, wireless-enabled smart devices disclose a number of attributes, which can be observed via passive monitoring. These attributes coupled with the information that can be extracted using social media APIs present an opportunity for research into locational surveillance, device fingerprinting and device user identification techniques. This paper presents an in-progress research study and details the findings to date

    FISA Reform

    Get PDF
    Congress and the Executive Branch are poised to take up the issue of FISA reform in 2014. What has been missing from the discussion is a comprehensive view of ways in which reform could be given effect—i.e., a taxonomy of potential options. This article seeks to fill the gap. The aim is to deepen the conversation about abeyant approaches to foreign intelligence gathering, to allow fuller discussion of what a comprehensive package could contain, and to place initiatives that are currently under consideration within a broader, over-arching framework. The article begins by considering the legal underpinnings and challenges to the President\u27s Surveillance Program. It then examines how technology has altered the types of information available, as well as methods of transmission and storage. The article builds on this to develop a taxonomy for how a statutory approach to foreign intelligence gathering could be given force. It divides foreign intelligence gathering into two categories: front-end collection and back-end analysis and use. Each category contains a counterpoise structured to ensure the appropriate exercise of Congressionally-mandated authorities. For the front-end, this means balancing the manner of collection with requirements for approval. For the back-end, this means offsetting implementation with transparency and oversight. The article then considers the constituent parts of each category

    Localization to Enhance Security and Services in Wi-Fi Networks under Privacy Constraints

    Get PDF
    Developments of seamless mobile services are faced with two broad challenges, systems security and user privacy - access to wireless systems is highly insecure due to the lack of physical boundaries and, secondly, location based services (LBS) could be used to extract highly sensitive user information. In this paper, we describe our work on developing systems which exploit location information to enhance security and services under privacy constraints. We describe two complimentary methods which we have developed to track node location information within production University Campus Networks comprising of large numbers of users. The location data is used to enhance security and services. Specifically, we describe a method for creating geographic firewalls which allows us to restrict and enhance services to individual users within a specific containment area regardless of physical association. We also report our work on LBS development to provide visualization of spatio-temporal node distribution under privacy considerations

    Virtual Geodemographics: Repositioning Area Classification for Online and Offline Spaces

    Get PDF
    Computer mediated communication and the Internet has fundamentally changed how consumers and producers connect and interact across both real space, and has also opened up new opportunities in virtual spaces. This paper describes how technologies capable of locating and sorting networked communities of geographically disparate individuals within virtual communities present a sea change in the conception, representation and analysis of socioeconomic distributions through geodemographic analysis. We argue that through virtual communities, social networks between individuals may subsume the role of neighbourhood areas as the most appropriate units of analysis, and as such, geodemographics needs to be repositioned in order to accommodate social similarities in virtual, as well as geographical, space. We end the paper by proposing a new model for geodemographics which spans both real and virtual geographies

    Yahoo and Democracy on the Internet

    Get PDF
    This article examines the French court order requiring Yahoo to prevent French Internet users from accessing images of Nazi memorabilia available for auction on the company\u27s American web site. The article uses the French case to challenge the popular belief that an entirely borderless Internet favors democratic values. The article starts from the premise that while the Internet enables actors to reach a geographically dispersed audience, the Internet should not change the accountability of those actors for their conduct within national borders. The article shows that Yahoo\u27s extensive business in France justifies the application of France\u27s democratically chosen law and argues that the decision has important normative implications for pluralistic democracy on the global network. Namely, the decision promotes technical changes in the Internet architecture that empower democratic states to be able to enforce their freely chosen public policies within their territories. At the same time, the infrastructure changes will not enhance the ability of non-democratic states to pursue repressive policies within their territories in violation of international law. The article shows the French decision as a maturing of the Internet regulatory framework and argues that the policy rules embedded in the technical infrastructure must recognize values adopted by different states and must not be dictated by technical elites

    Privacy Issues of the W3C Geolocation API

    Full text link
    The W3C's Geolocation API may rapidly standardize the transmission of location information on the Web, but, in dealing with such sensitive information, it also raises serious privacy concerns. We analyze the manner and extent to which the current W3C Geolocation API provides mechanisms to support privacy. We propose a privacy framework for the consideration of location information and use it to evaluate the W3C Geolocation API, both the specification and its use in the wild, and recommend some modifications to the API as a result of our analysis
    • …
    corecore