Location-Based Services

Author(s):  
Ramaprasad Unni ◽  
Robert Harmon

Location-based services are expected to play an integral role in the mobile-commerce domain. Mobile network operators and service providers have the opportunity to add value and create additional revenue streams through a variety of personalized services based on location of individual wireless users. However, strategic thinking in this area is still evolving. Many issues surrounding location data such as ownership and their use by network operators and third parties, privacy concerns of consumers, and business models for these services are not well understood. This chapter provides (1) an overview of location-based wireless services and their related technologies, (2) an examination of the LBS value chain, and (3) strategic implications for network operators and service providers.

2016 ◽  
Vol 2016 (4) ◽  
pp. 102-122 ◽  
Author(s):  
Kassem Fawaz ◽  
Kyu-Han Kim ◽  
Kang G. Shin

AbstractWith the advance of indoor localization technology, indoor location-based services (ILBS) are gaining popularity. They, however, accompany privacy concerns. ILBS providers track the users’ mobility to learn more about their behavior, and then provide them with improved and personalized services. Our survey of 200 individuals highlighted their concerns about this tracking for potential leakage of their personal/private traits, but also showed their willingness to accept reduced tracking for improved service. In this paper, we propose PR-LBS (Privacy vs. Reward for Location-Based Service), a system that addresses these seemingly conflicting requirements by balancing the users’ privacy concerns and the benefits of sharing location information in indoor location tracking environments. PR-LBS relies on a novel location-privacy criterion to quantify the privacy risks pertaining to sharing indoor location information. It also employs a repeated play model to ensure that the received service is proportionate to the privacy risk. We implement and evaluate PR-LBS extensively with various real-world user mobility traces. Results show that PR-LBS has low overhead, protects the users’ privacy, and makes a good tradeoff between the quality of service for the users and the utility of shared location data for service providers.


2018 ◽  
Vol 7 (11) ◽  
pp. 442 ◽  
Author(s):  
Mehrnaz Ataei ◽  
Auriol Degbelo ◽  
Christian Kray ◽  
Vitor Santos

An individual’s location data is very sensitive geoinformation. While its disclosure is necessary, e.g., to provide location-based services (LBS), it also facilitates deep insights into the lives of LBS users as well as various attacks on these users. Location privacy threats can be mitigated through privacy regulations such as the General Data Protection Regulation (GDPR), which was introduced recently and harmonises data privacy laws across Europe. While the GDPR is meant to protect users’ privacy, the main problem is that it does not provide explicit guidelines for designers and developers about how to build systems that comply with it. In order to bridge this gap, we systematically analysed the legal text, carried out expert interviews, and ran a nine-week-long take-home study with four developers. We particularly focused on user-facing issues, as these have received little attention compared to technical issues. Our main contributions are a list of aspects from the legal text of the GDPR that can be tackled at the user interface level and a set of guidelines on how to realise this. Our results can help service providers, designers and developers of applications dealing with location information from human users to comply with the GDPR.


Author(s):  
Bardo Fraunholz ◽  
Chandana Unnithan ◽  
Jürgen Jung

With dynamic growth and acceptance of mobile devices, many innovative business applications are beginning to emerge. Tracking and tracing seems to be one of the popular applications which many organisations have initiated, often facilitated by location based services provided by mobile network operators. However, there are many issues associated with the provisioning of this application with current technologies and business models. Small and Medium-size Enterprises (SMEs) that make up a significant segment of businesses worldwide do not yet seem able to benefit widely from these services. In this chapter, we initially review current technologies/ applications and the issues associated with them, drawing from research and the experiences of a long term ongoing action research project with SMEs in the trade sector. Subsequently, we explore the opportunities offered by 3G services/business applications to SMEs, and provide a broad critical outlook on future opportunities for SMEs to benefit from 3G services.


2015 ◽  
Vol 24 (39) ◽  
pp. 9 ◽  
Author(s):  
Fernando Mendioroz-Cotelo ◽  
Álvaro Rendón-Gallón ◽  
Juan Carlos Corrales-Muñoz ◽  
Julián Andrés Rojas-Meléndez

<span>Telecommunication service providers such as Mobile Network Operators are currently under the vortex <span>arising from paradigm shifts imposed by the omnipresence of the Internet. The adoption of Service Oriented <span>Architecture and the shift to Next Generation Networks constitute some of the efforts of these organizations <span>at the conflence toward these new business models. This article introduces a review of the concepts behind <span>these proposals within Telco organizations, identifis gaps and discusses about the challenges that research <span>and development groups are facing in the Latin American context; obstacles to overcome for converging and <span>creating a synergic environment of common interests oriented to the innovation around the subject.</span></span></span></span></span></span><br /><br class="Apple-interchange-newline" /></span>


Author(s):  
Quynh Chi Truong ◽  
Anh Tuan Truong ◽  
Tran Khanh Dang

The rapid development of location-based services, which make use of the location information of the user, presents both opportunities and challenges. Users can benefit from these services; however, they must often disclose their location information, which may lead to privacy problems. In this regard, the authors propose a solution with a memorizing algorithm, using trusted middleware that organizes space in an adaptive grid where it cloaks the user’s location information in an anonymization area before sending it to the service providers. This newly introduced memorizing algorithm calculates on the spatial grid to decrease the overlapped areas as much as possible, which helps conceal users’ locations. This solution protects the user’s privacy while using the service, but also against data mining techniques with respect to their history location data. Experimental results with a user activities map establishes this theoretical analyses as well as the practical value of the proposed solution.


Cyber Crime ◽  
2013 ◽  
pp. 600-617
Author(s):  
Quynh Chi Truong ◽  
Anh Tuan Truong ◽  
Tran Khanh Dang

The rapid development of location-based services, which make use of the location information of the user, presents both opportunities and challenges. Users can benefit from these services; however, they must often disclose their location information, which may lead to privacy problems. In this regard, the authors propose a solution with a memorizing algorithm, using trusted middleware that organizes space in an adaptive grid where it cloaks the user’s location information in an anonymization area before sending it to the service providers. This newly introduced memorizing algorithm calculates on the spatial grid to decrease the overlapped areas as much as possible, which helps conceal users’ locations. This solution protects the user’s privacy while using the service, but also against data mining techniques with respect to their history location data. Experimental results with a user activities map establishes this theoretical analyses as well as the practical value of the proposed solution.


Author(s):  
Eunice Yeboah Afeti ◽  
Joshua Ofori Amanfo

Merchant adoption of mobile payments is facilitating new business models and changing the way merchants run their brick and mortar businesses. Despite the advantages of mobile payment adoption to the merchant, they still hesitate to adopt mobile payments. Thus, the study seeks to explore qualitatively through a case study the enablers and inhibitors to merchant adoption of mobile payments. The study identified that merchants are adopting mobile payments to facilitate new business models, to promote the disintermediation of traditional intermediaries, to offer different possibilities of growing their businesses, and to reduce transaction costs. Even though merchants believe that mobile payments adoption and use improve operational efficiency to their businesses, there are instances of fraud, particularly in the peer-to-peer transfer sector, data breaches, data security, and privacy concerns. Therefore, it is imperative for service providers of mobile payments to enhance technological issues regarding privacy protection that could enhance trust towards mobile payment adoption.


Author(s):  
Eunice Yeboah Afeti ◽  
Joshua Ofori Amanfo

Merchant adoption of mobile payments is facilitating new business models and changing the way merchants run their brick and mortar businesses. Despite the advantages of mobile payment adoption to the merchant, they still hesitate to adopt mobile payments. Thus, the study seeks to explore qualitatively through a case study the enablers and inhibitors to merchant adoption of mobile payments. The study identified that merchants are adopting mobile payments to facilitate new business models, to promote the disintermediation of traditional intermediaries, to offer different possibilities of growing their businesses, and to reduce transaction costs. Even though merchants believe that mobile payments adoption and use improve operational efficiency to their businesses, there are instances of fraud, particularly in the peer-to-peer transfer sector, data breaches, data security, and privacy concerns. Therefore, it is imperative for service providers of mobile payments to enhance technological issues regarding privacy protection that could enhance trust towards mobile payment adoption.


Author(s):  
Quynh Chi Truong ◽  
Anh Tuan Truong ◽  
Tran Khanh Dang

The rapid development of location-based services, which make use of the location information of the user, presents both opportunities and challenges. Users can benefit from these services; however, they must often disclose their location information, which may lead to privacy problems. In this regard, the authors propose a solution with a memorizing algorithm, using trusted middleware that organizes space in an adaptive grid where it cloaks the user’s location information in an anonymization area before sending it to the service providers. This newly introduced memorizing algorithm calculates on the spatial grid to decrease the overlapped areas as much as possible, which helps conceal users’ locations. This solution protects the user’s privacy while using the service, but also against data mining techniques with respect to their history location data. Experimental results with a user activities map establishes this theoretical analyses as well as the practical value of the proposed solution.


Author(s):  
Matthew Addis ◽  
Michael Boniface ◽  
Juri Papay ◽  
Arturo Servin ◽  
Zlatko Zlatev ◽  
...  

The complexity of determining resource provisioning policies for applications in such complex environments introduces significant inefficiencies in the cloud. Novel approaches are needed to efficiently model and analyse Quality of Service for such applications, especially those with real-time constraints. This chapter investigates some of the techniques that can be used to explore these trade-offs and to find business models where value can be provided at all stages in the value-chain. For example, how can an application user identify a set of service providers that provide the best solution to their workflow in combination? How much risk is involved, e.g. what is the probability and impact of a failure of a service provider to deliver the QoS they promise? How can Service Level Agreements be specified that provide the flexibility to accommodate variability in service use, yet don’t result in unnecessarily high cost to the consumer due to the service provider having to use massive over-provisioning of resources to ensure they can meet times of peak-load?


Sign in / Sign up

Export Citation Format

Share Document