Who Owns a User's Location?
Who Owns a User's Location?
By: Pascal Stolz
Jun. 7, 2001 12:34 PM
As location-based wireless Internet services become more advanced, so does end-user security and privacy technology. The notion that an application or business can "track" a mobile user is creating major privacy concerns.
The wireless Web, labeled by many as "The First Big Market Opportunity of the 21st Century," has driven developers and businesses to "mobilize" their services, implementing new ideas for the delivery of content to wireless devices and generating additional revenues. However, today's wireless Web applications are simple ports of utility-based Internet applications (e-mail, headlines, and skinny stock quotes) that do not leverage the differentiating factor between one mobile user and another - location. Neither do these applications capitalize on what wired networks will never possess - mobility.
Rendered possible by the convergence of technologies, including wireless, Internet, and mobile locating technologies, a new world of applications is poised to enamor consumers and businesses: location-based services. To enable such services, the actual physical location of a user has to be revealed and the risk of misuse and abuse has the industry and federal regulatory bodies seriously looking at concerns over users' location privacy. At the same time technology providers are anticipating the regulatory requirements and are developing state-of-the-art systems to bring visionary perspectives to real-world hurdles.
This article explores the current market conditions as they relate to location-based services (technology and perspective), provides a brief overview of the current legislative initiatives and, most important, offers an explanation of the technology solutions being deployed to put users in control of their location information.
Location-Based Services Defined
This new generation of applications, labeled Location Precise Services (LPS), is now emerging as one of the most exciting topics in mobile communications. LPS involves a software process that utilizes the geophysical location of the mobile device as part of its algorithm for generating presentation content. The software and mobile network infrastructure requirements of LPS are fundamentally different from those required to support traditional mobile applications.
The first element to consider in LPS is the locating technologies used to identify the location of the user. The most basic level of user location capabilities is to simply extract from a carrier's network the cell tower identification that's routing the call, then geocode that cell tower location and provide a relative precise location of the user. Depending on density and number of cell towers, the level of service accuracy may vary widely.
Because the response time to emergency police and fire department calls is critical, the FCC has mandated that carriers implement more precise technology than cell tower ID for locating their wireless customers. To meet these precision requirements, a multitude of technologies are being tested and deployed.
The E911 mandate makes a distinction between embedded GPS solutions and network-based locating methods whereby GPS solutions must be accurate to 50 meters while network-based methods have a less stringent requirement of 150 meters. GPS methods use signals generated from 24 government satellites orbiting the Earth to determine the position of the mobile device. While accurate to a few meters, GPS signals are difficult to receive indoors. Another disadvantage to GPS solutions, from a carrier's perspective, is that the user is required to purchase a new mobile phone equipped with GPS technology. Many carriers may be averse to risking "churn," as a customer purchasing a new phone might switch carriers.
Network-based methods present an alternative to GPS. At a very high level, network-based solutions involve triangulating the radio emission of the phone or using radio frequency multipath "fingerprinting" to identify the most likely position of the radiating source. Providers of multipath method solutions offer significant performance advantages over triangulation, particularly in urban environments, with reported accuracy of 30 meters being quoted by major manufacturers of multipath systems. While still less accurate than GPS, and perhaps more expensive for the carrier to deploy, network-based methods work on existing wireless phones, which means a massive locatable user base and reduced churn for the carrier.
With the development of locating technology, it's clear that the critical attribute in the wireless value chain will be the ability to pinpoint, in real time, the location of users so as to create this new world of offers, services, and mobile-commerce (m-commerce) and location-commerce (l-commerce) opportunities. Many analysts are forecasting that LPS will be the "killer app" of the wireless Internet.
And Privacy in All of That?
The CTIA adopted the following wireless privacy guidelines in October to be presented to the FCC and the FTC:
Pull vs Push Services
These limitations have driven applications developers and businesses to explore proactive push services, whereby content is delivered automatically to the mobile user. These solutions afford the mobile user the continued convenience of a small and familiar device without the inconvenience of inputting information each time a location-based service is requested. We can also easily envision a future in which the mobile user is also a point of interest, thus enabling the dynamic creation of location-based communities of interest. An application of this concept is a dating service whereby users with compatible attributes are notified of one another's profiles, particularly when these two individuals are near each another.
Third-generation LPS has the capability to proactively initiate services without the user making an explicit request. Such self-initiating services are said to operate in push or "trigger" mode. A trigger is therefore a condition arising in part from the geophysical location of the mobile device and in part as a result of conditions that are met to fire an action based on user-defined rules.
Trigger mode services will overcome many of the current problems with mobile applications, which include general user aversion to making even a simple request via keypad or stylus. These services have the beauty of providing the user with relevant information and services when and where the user needs them without the user having to ask.
Inherent to proactive systems is the risk of mobile users being spammed with information that's not of interest to them, quickly raising privacy issues and concerns. Therefore, combining present regulatory concerns and a visionary perspective is critical for any software process development to ensure compliance and user satisfaction.
To address privacy issues, providers of services will have to go well beyond the simple posting and mandatory obedience of privacy policies. The first step in the process is to clearly understand the audience and the needs of that audience. We can easily envision three types of LPS users with specific attitudes toward their location information, either as a general rule or as a function of specific applications, including (1) "never-on location information," (2) "never-off location information," and (3) "let-me-choose how to disclose my location information." This latter category will further be divided into a "user initiated" versus "user programmed" (let-me-choose how to disclose my location information) scenario.
As the users in the never-on category will only benefit from location-based services in a pull mode request, it can easily be assumed that privacy concerns will less likely affect those users as they'll be required to initiate a location request when and where they need it.
Therefore, the major privacy concern with regard to LPS revolves around the notion of push services rather than pull services.
As experienced in the Internet world, a category of users will elect a never-off location information as they will trade that functionality for perceived added benefits such as free-services (be it voice and or data minutes, access to applications, etc.). Also, certain demographic studies tend to show that Gen-X and Gen-Y users are less concerned about privacy issues, valuing the never-off access capabilities far more than the perceived risk of location-information abuse.
However, it seems that the overwhelming majority of users will maximize their wireless experience by selecting option (3), let-me-choose how to disclose my location information. Operating under an overall umbrella of "opt-in" conditions, these users will find added relevance and personalization from the ability to influence how their location information is accessed by various applications.
Put Users in Control
For example, each time a user's location has been updated, either because the user moved to a new location or the user requested a location update, GXpert assesses and decides which services can "see the user." After learning the user's preferences and privacy parameters, GXpert can become a valuable assistant to the mobile user. When the user is commuting to work, GXpert checks the traffic and allows the traffic application to contact the user only when there's a traffic jam ahead. The traffic application is automatically invoked by GXpert when the user begins the commute. At no other time will the traffic be checked unless the user gives GXpert instructions to do so. Under another scenario or application, when a user is out on the town on a Saturday night, other members of his or her "opt-in" dating service can "view" the user's location, but only because the user has given permission to GXpert to do so. GXpert invokes LPS according to the user's best interests.
When new services become available and users subscribe, GXpert will ask if users want their location disclosed to these new services and in which manner, allowing them to define the rules.
How Does It Work?
Reader Feedback: Page 1 of 1
Latest Cloud Developer Stories
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
SYS-CON Featured Whitepapers
Most Read This Week