skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Auxiliary Location-Based Services for Persons with Disabilities: What do City Planners and Non-Profit Agencies Think?
Deploying auxiliary location-based services to complement GPS-based services has been a recent phenomenon to enable greater independence in navigation and wayfinding for persons with disabilities in unfamiliar environments. All work in this domain has been technical in nature with little known about the perceptions of city planners and non-profit agencies about the long-term sustainability and impact of such technologies on their communities. This work presents results and insights from a study on the perceptions of both city planners and non-profit agency personnel from a medium-sized city in the U.S.A about the importance of auxiliary location-based services and their potential impact.  more » « less
Award ID(s):
1737433
PAR ID:
10123205
Author(s) / Creator(s):
;
Date Published:
Journal Name:
The 21st International ACM SIGACCESS Conference on Computers and Accessibility
Page Range / eLocation ID:
621 to 623
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. City-wide free WiFi is one of the most common initiatives of smart city infrastructures. While city-wide free WiFi services are not subject to privacy-focused regulations and appeal to a broader demographic, how users perceive privacy in such services is unknown. This study explores perspectives of users in the United States regarding the privacy practices of such services as well as their expectations. We conducted surveys with 199 participants of US, consisting of those who had used such services (i.e., experienced users, n=99) and those who had not (i.e., potential users, n=100), assessing their satisfaction with the services, perceptions regarding data privacy practices of city-wide free WiFi services, and general expectations of privacy. We identify 14 key findings by analyzing the responses from participants. We found that participants are aware of the data collection and data sharing by the WiFi services and are uncomfortable with both but are still inclined to use the services as the need for WiFi outweighs privacy, as well as because of the significant trust they place in the services due to their non-profit and government-run nature. Our analysis provides actionable takeaways for researchers and practitioners, arguing for long-term privacy gains through a regulatory approach that treats city-wide WiFi as a utility, given the trust consumers place in it, and the overall tendency of consumers to trade-off privacy for WiFi access in this context. 
    more » « less
  2. In 2008, Gannon University was awarded a National Science Foundation S-STEM grant, known as SEECS (Scholars of Excellence in Engineering and Computer Science) which provided scholarship funding for academically talented students having financial need. Since then, the grant has been funded twice more; the current award period started in 2017 and will run until 2021. As a requirement for the SEECS program, all students must participate in a community-based design project, undertaken for a non-profit entity in the local region. This project is nominally a two-year effort, though some projects have taken longer to complete. Recently, a project has experienced several significant setbacks: 1) the original project sponsor decommitted at the end of the first year due to funding concerns; 2) the project location changed four times due to uncertain sponsor requirement and city regulations; 3) the design itself has required substantial alteration several times due to unexpected circumstances (largely due to sponsor issues.) After two and a half years, the project remains only about 50% complete, still requiring additional system level design, installation and testing. This team of SEECS students has been coping with each “sharp turn” of the project as well as may be expected. They have produced design sketches, prototypes, and conference presentations. Yet signs of confusion, frustration, and low motivation level have been observed among students and have been evidenced through student satisfaction surveys, which are administered to all SEECS students each semester. This work-in progress paper details the evolution of student perceptions of the validity of the project, compares that evolution to historic data obtained from previous design groups, and speculates about the cause/effect relationship between externally-imposed design changes and student perceptions. In particular, the effect of design changes on student enthusiasm and sense of purpose is to be examined. Preliminary conclusions and trends will be drawn from the study. The periodic evaluation, adjustment and intervention of advising will be suggested to guide students to fully benefit from such real-life project experience. 
    more » « less
  3. One of the most popular location privacy-preserving mechanisms applied in location-based services (LBS) is location obfuscation, where mobile users are allowed to report obfuscated locations instead of their real locations to services. Many existing obfuscation approaches consider mobile users that can move freely over a region. However, this is inadequate for protecting the location privacy of vehicles, as their mobility is restricted by external factors, such as road networks and traffic flows. This auxiliary information about external factors helps an attacker to shrink the search range of vehicles' locations, increasing the risk of location exposure. In this paper, we propose a vehicle traffic flow aware attack that leverages public traffic flow information to recover a vehicle's real location from obfuscated location. As a countermeasure, we then develop an adaptive strategy to obfuscate a vehicle's location by a "fake" trajectory that follows a realistic traffic flow. The fake trajectory is designed to not only hide the vehicle's real location but also guarantee the quality of service (QoS) of LBS. Our experimental results demonstrate that 1) the new threat model can accurately track vehicles' real locations, which have been obfuscated by two state-of-the-art algorithms, and 2) the proposed obfuscation method can effectively protect vehicles' location privacy under the new threat model without compromising QoS. 
    more » « less
  4. Much emphasis has been placed on how the affordances and layouts of an office setting can influence co-worker interactions and perceived team outcomes. Little is known, however, whether perceptions of teamwork and team conflict are affected when the location of work changes from the office to the home. To address this gap, we present findings from a ten-week,in situ study of 91 information workers from 27 US-based teams. We compare three distinct work locations---private and shared workspaces at home as well at the office---and explore how each location may impact individual perceptions of teamwork. While there was no significant association with participants' perceptions of teamwork, results revealed associations of work location with team conflict: participants who worked in a private room at home reported significantly lower team conflict compared to those working in the office. No difference was found for the office and the shared workspace. We further found that the influence of work location on team conflict interacted with job decision latitude and the level of task interdependence among co-workers. We discuss practical implications for full-time work from home (WFH) on teams. Our study adds an important environmental dimension to the literature on remote teaming, which in turn may help organizations as they consider, prepare, or implement more permanent WFH and/or hybrid work policies in the future. 
    more » « less
  5. As mobile devices become increasingly prevalent in society, the expected utility of such devices rises; arguably, the most impact comes from location-based services as they provide tremendous benefits to mobile users. These users also value privacy, i.e., keeping their locations and search queries private, but that is not easy to achieve. It has been previously proposed that user location privacy can be secured through the use of space filling curves due to their ability to preserve spatial proximity while hiding the actual physical locations. With a space filling curve, such as the Hilbert curve, an application that provides location-based services can allow the user to take advantage of those services without transmitting a physical location. Earlier research has uncovered vulnerabilities of such systems and proposed remedies. But those countermeasures were clearly aimed at reasonably large metropolitan areas. It was not clear if they were appropriate for small towns, which display sparsity of Points of Interest (POIs) and limited diversity in their categories. This paper studies the issue focusing on a small university town. 
    more » « less