User-Generated Content for Location-Based Services: A Review

User-generated content (UGC) has become one of the important ­elements in today’s Internet world. The proliferation of UGC has prompted many efforts to develop useful services using this freely available information. One of the domains of interest is in the field of location-based services (LBS). In this chapter, we present a review of LBS that leverage UGC. We illustrate the differences between conventional LBS and LBS that use UGC in order to highlight the implications of using UGC in LBS. In order to analyze how UGC has been used in LBS, a collection of existing UGC-based LBS have been identified and divided into two groups. It was found that some of the current systems were modeled under the assumption that most of the UGC contributors were honest in providing updates to the systems. However, this does not always correspond to the reality. Hence, the three fundamental requirements for successful UGC-based LBS deployments are discussed in this chapter. These requirements are information trust, user’s privacy protection, and information classification. The state-of-the-art solutions for fulfilling these requirements are listed and discussed. We strongly believe that the quality of UGC used by the system, the protection of contributor’s privacy, and the system’s response time are basic requirements for successful UGC-based LBS.

[1]  Chia Chun Shih,et al.  Mining the blogosphere to generate local cuisine hotspots for mobile map service , 2009, 2009 Fourth International Conference on Digital Information Management.

[2]  Dengfeng Li,et al.  The location privacy protection research in location-based service , 2010, 2010 18th International Conference on Geoinformatics.

[3]  Omer Rashid,et al.  Users Helping Users: User Generated Content to Assist Wheelchair Users in an Urban Environment , 2010, 2010 Ninth International Conference on Mobile Business and 2010 Ninth Global Mobility Roundtable (ICMB-GMR).

[4]  Miriam J. Metzger,et al.  The credibility of volunteered geographic information , 2008 .

[5]  Alec Wolman,et al.  Enabling new mobile applications with location proofs , 2009, HotMobile '09.

[6]  Robert R. Harmon,et al.  Location-based services: models for strategy development in M-commerce , 2003, PICMET '03: Portland International Conference on Management of Engineering and Technology Technology Management for Reshaping the World, 2003..

[7]  Mischa Brown Fix my street , 2013 .

[8]  Michael Kaminsky,et al.  SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.

[9]  H. Holone,et al.  Users Are Doing It For Themselves: Pedestrian Navigation With User Generated Content , 2007, The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2007).

[10]  Christoph Schlieder,et al.  Spatio-temporal proximity and social distance: a confirmation framework for social reporting , 2010, LBSN '10.

[11]  Margaret Martonosi,et al.  Location-based trust for mobile user-generated content: applications, challenges and implementations , 2008, HotMobile '08.

[12]  Leysia Palen,et al.  Twitter adoption and use in mass convergence and emergency events , 2009 .

[13]  John Krumm,et al.  User-Generated Content , 2008, IEEE Pervasive Comput..

[14]  E. Huffman,et al.  Social Media's New Role in Emergency Management , 2008 .

[15]  Koji Zettsu,et al.  Moving Phenomenon: Aggregation and Analysis of Geotime-Tagged Contents on the Web , 2009, W2GIS.

[16]  M. Goodchild Citizens as sensors: the world of volunteered geography , 2007 .

[17]  Steven Kay,et al.  Defending online reputation systems against collaborative unfair raters through signal modeling and trust , 2009, SAC '09.

[18]  Axel Bruns,et al.  PREPARING FOR AN AGE OF PARTICIPATORY NEWS , 2007 .

[19]  Petri Selonen,et al.  Bringing user-generated content from Internet services to mobile augmented reality clients , 2010, 2010 Cloud-Mobile Convergence for Virtual Reality Workshop (CMCVR 2010) Proceedings.

[20]  Shan Barkataki,et al.  Convergence of Web 2.0 and Semantic Web: A Semantic Tagging and Searching System for Creating and Searching Blogs , 2007 .

[21]  Alec Wolman,et al.  I am a sensor, and I approve this message , 2010, HotMobile '10.

[22]  Balachander Krishnamurthy,et al.  A few chirps about twitter , 2008, WOSN '08.

[23]  Scott A. Rotondo Trusted Computing Group , 2011, Encyclopedia of Cryptography and Security.

[24]  Tadayoshi Kohno An Interview with RFID Security Expert Ari Juels , 2008, IEEE Pervasive Computing.

[25]  Alan F. Smeaton,et al.  Automated Murmurs: The Social Mobile Tourist Application , 2009, 2009 International Conference on Computational Science and Engineering.

[26]  Bertrand De Longueville,et al.  "OMG, from here, I can see the flames!": a use case of mining location based social networks to acquire spatio-temporal data on forest fires , 2009, LBSN '09.

[27]  Antonina Dattolo,et al.  The role of tags for recommendation: A survey , 2010, 3rd International Conference on Human System Interaction.