This HTML5 document contains 47 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n19http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
n22http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F00216224%3A14330%2F09%3A00067151%21RIV14-MSM-14330___/
dctermshttp://purl.org/dc/terms/
n20http://localhost/temp/predkladatel/
n15http://purl.org/net/nknouf/ns/bibtex#
n18http://linked.opendata.cz/resource/domain/vavai/projekt/
n6http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n21http://linked.opendata.cz/ontology/domain/vavai/
n17https://schema.org/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n13http://bibframe.org/vocab/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n14http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n4http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n12http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n9http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n16http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n11http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n8http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F00216224%3A14330%2F09%3A00067151%21RIV14-MSM-14330___
rdf:type
skos:Concept n21:Vysledek
dcterms:description
The value attached to privacy has become a common notion in the press, featuring frequent stories of people selling sensitive personal information for a couple of dollars. Syverson argues~\cite{PaulWEIS03} that we should incorporate the risk of data misuse into our reasoning about privacy valuations. Yet there are doubts as to whether people can, and do, value their privacy correctly and appropriately. Privacy is a complex notion and as such it is very difficult to valuate it taking into account its full complexity. In this experiment we consider one aspect of privacy, namely location privacy, that can be compromised through mobile phone network data. We performed a European-wide study to assess the value that people attach to their location privacy using tools from experimental psychology and economics. We present the first results here. The value attached to privacy has become a common notion in the press, featuring frequent stories of people selling sensitive personal information for a couple of dollars. Syverson argues~\cite{PaulWEIS03} that we should incorporate the risk of data misuse into our reasoning about privacy valuations. Yet there are doubts as to whether people can, and do, value their privacy correctly and appropriately. Privacy is a complex notion and as such it is very difficult to valuate it taking into account its full complexity. In this experiment we consider one aspect of privacy, namely location privacy, that can be compromised through mobile phone network data. We performed a European-wide study to assess the value that people attach to their location privacy using tools from experimental psychology and economics. We present the first results here.
dcterms:title
The Value of Location Information: A European-Wide Study The Value of Location Information: A European-Wide Study
skos:prefLabel
The Value of Location Information: A European-Wide Study The Value of Location Information: A European-Wide Study
skos:notation
RIV/00216224:14330/09:00067151!RIV14-MSM-14330___
n3:aktivita
n9:S n9:P
n3:aktivity
P(LA09016), S
n3:dodaniDat
n8:2014
n3:domaciTvurceVysledku
n6:4292715 n6:3123529
n3:druhVysledku
n16:D
n3:duvernostUdaju
n4:S
n3:entitaPredkladatele
n22:predkladatel
n3:idSjednocenehoVysledku
348412
n3:idVysledku
RIV/00216224:14330/09:00067151
n3:jazykVysledku
n12:eng
n3:klicovaSlova
location; privacy; value; study
n3:klicoveSlovo
n14:value n14:location n14:privacy n14:study
n3:kontrolniKodProRIV
[D1BE6FD1BE06]
n3:mistoKonaniAkce
Cambridge, UK
n3:mistoVydani
Heidelberg
n3:nazevZdroje
Security Protocols - 14th International Workshop
n3:obor
n11:IN
n3:pocetDomacichTvurcuVysledku
2
n3:pocetTvurcuVysledku
4
n3:projekt
n18:LA09016
n3:rokUplatneniVysledku
n8:2009
n3:tvurceVysledku
Cvrček, Daniel Kumpošt, Marek Matyáš, Václav Danezis, George
n3:typAkce
n19:WRD
n3:zahajeniAkce
2006-03-27+02:00
s:issn
0302-9743
s:numberOfPages
10
n13:doi
10.1007/978-3-642-04904-0_15
n15:hasPublisher
Springer, Lecture Notes in Computer Science (LNCS)
n17:isbn
9783642049033
n20:organizacniJednotka
14330