2007
DOI: 10.1145/1230819.1241689
|View full text |Cite
|
Sign up to set email alerts
|

The right place at the right time

Abstract: Examining the use of network location in authentication and abuse prevention.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…Instead, they can do so through aggregation. 3. Note that mobile phones are less susceptible to the threat presented in this paper as they often access the Internet over cellular networks (e.g., 3G/4G) instead of Wi-Fi access points.…”
Section: Adversary and Threat Modelsmentioning
confidence: 97%
See 2 more Smart Citations
“…Instead, they can do so through aggregation. 3. Note that mobile phones are less susceptible to the threat presented in this paper as they often access the Internet over cellular networks (e.g., 3G/4G) instead of Wi-Fi access points.…”
Section: Adversary and Threat Modelsmentioning
confidence: 97%
“…As such, Google receives requests of the three types and consolidates all the information obtained [15]. The extent to which these services are used is exacerbated by their deep integration in the widely spread Android operating system, which frequently sends the devices' locations to Google services 3 . In addition, Google has an advertising network and thus has a strong incentive to obtain and monetize information about users' locations.…”
Section: Adversary and Threat Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…Location privacy is a particularly acute problem as location information is valuable to many parties, because much of information can be inferred from users' locations (e.g., users' interests and activities). Location information is essential for many online service providers [13], especially for those whose business models revolve around personalized services. A prominent example is online advertising, an ever-increasing business with large revenues (e.g., $22.4 billion in the US in 2011 [28]), as so-called location-specific ads based on the location information are significantly more appealing to users [20].…”
Section: Introductionmentioning
confidence: 99%
“…Many previous papers have discussed the usage of geolocation information in day-to-day applications. They vary in fields from law [22,43,44] through information security and fraud prevention [27,11] to various economic aspects [23,25]. However, not many works have focused on the accuracy of geolocation databases.…”
Section: Introductionmentioning
confidence: 99%