Abstract
User-generated content (UGC) has become one of the important elements in today’s Internet world. The proliferation of UGC has prompted many efforts to develop useful services using this freely available information. One of the domains of interest is in the field of location-based services (LBS). In this chapter, we present a review of LBS that leverage UGC. We illustrate the differences between conventional LBS and LBS that use UGC in order to highlight the implications of using UGC in LBS. In order to analyze how UGC has been used in LBS, a collection of existing UGC-based LBS have been identified and divided into two groups. It was found that some of the current systems were modeled under the assumption that most of the UGC contributors were honest in providing updates to the systems. However, this does not always correspond to the reality. Hence, the three fundamental requirements for successful UGC-based LBS deployments are discussed in this chapter. These requirements are information trust, user’s privacy protection, and information classification. The state-of-the-art solutions for fulfilling these requirements are listed and discussed. We strongly believe that the quality of UGC used by the system, the protection of contributor’s privacy, and the system’s response time are basic requirements for successful UGC-based LBS.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Verna, P. (2009). A spotlight on UGC participants. eMarketer.com. http://www.emarketer.com/Article.aspx?R=1006914. Accessed 17 July 2011.
Flanagin, A. J., & Metzger, M. J. (2008). The credibility of volunteered geographic information. GeoJournal, 72, 137–148. doi:10.1007/s10708-008-9188-y.
O’Reilly, T. (2005). What is Web 2.0 design patterns and business models for the next generation of software. http://oreilly.com/web2/archive/what-is-web-20.html. Accessed 17 July 2011.
John, K., Nigel, D., & Chandra, N. (2008). User-generated content. IEEE Pervasive Computing, 7(4), 10–11. doi:10.1109/MPRV.2008.85.
Goodchild, M. F. (2007). Citizens as sensors: The world of volunteered geography. GeoJournal, 69(4), 211–221. doi:10.1007/s10708-007-9111-y.
Flickr. http://www.flickr.com/. Accessed 17 July 2011.
Picasa. http://picasa.google.com/. Accessed 17 July 2011.
Google Maps API Family. http://code.google.com/apis/maps/index.html. Accessed 17 July 2011.
Open Street Map Project. http://www.openstreetmap.org/. Accessed 17 July 2011.
Lenders, V., Koukoumidism, E., Zhang, P., & Martonosi, M. (2008). Location-based trust for mobile user-generated content: applications, challenges and implementations. In Proceedings of the 9th Workshop on Mobile Computing Systems and Applications. New York: ACM. doi:10.1145/1411759.1411775.
Saroiu, S., & Wolman, A. (2009). Enabling new mobile applications with location proofs. In Proceedings of the 10th Workshop on Mobile Computing Systems and Applications. New York: ACM. doi:10.1145/1514411.1514414.
Unni, R., & Harmon, R. (2003, July). Location-based services: Models for strategy development in M-commerce. In International Conference on Management of Engineering and Technology, 2003, PICMET ’03 (pp. 416–424), Portland, OR. doi:10.1109/PICMET.2003.1222821.
Zhang, W., Cui, X., Li, D. F., Yuan, D. B., & Wang, M. R. (2010, June) The location privacy protection research in location-based service. In 18th International Conference on Geoinformatics, (pp. 1–4), Beijing, China. doi:10.1109/GEOINFORMATICS.2010.5568118.
Foursquare. https://foursquare.com/. Accessed 9 June 2011.
Twitter. http://twitter.com/. Accessed 9 June 2011.
Waze.com. http://www.waze.com/. Accessed 9 June 2011.
Huges, A. L., & Palen, L. (2009). Twitter adoption and use in mass convergence and emergency events. International Journal of Emergency Management, 6(3/4), 248–260. doi:10.1504/IJEM.2009.031564.
Prentice, S., & Huffman, E. (2008) Social media’s new role in emergency management. http://www.inl.gov/technicalpublications/Documents/3931947.pdf. Accessed 9 June 2011.
Gulf of Mexico Oil Spill. http://www.esri.com/services/disaster-response/gulf-oil-spill-2010/index.html. Accessed 9 June 2011.
ABI Research. (2008). User-generated content will be a key component of maps, navigation, and location-based services [News Article]. London: ABI Research. http://www.abiresearch.com/press/2834-User-Generated+Content+Will+Be+a+Key+Component+of+Maps,+Navigation,+and+Location-Based+Services. Accessed 9 June 2011.
Holone, H., Misund, G., & Holmstedt, H. (2007, September). Users are doing it for themselves: Pedestrian navigation with user generated content. In 1st International Conference on Next Generation Mobile Applications, Services and Technologies, 2007 (pp. 91–99), Cardiff, England. doi:10.1109/NGMAST.2007.4343406.
Rashid, O., Dunabr, A., Fisher, S., & Rutherford, J. (2010, June) Users helping users: User generated content to assist wheelchair users in an urban environment. In Ninth International Conference on Mobile Business and 2010 Ninth Global Mobility Roundtable (ICMB-GMR) (pp. 213–219), Athens, Greece. doi:10.1109/ICMB-GMR.2010.73.
Tom Tom Mapshare. http://www.tomtom.com/page/mapshare/. Accessed 9 June 2011.
Fix my street. http://www.fixmystreet.com/. Accessed 9 June 2011.
Google crisis response system. http://www.google.co.jp/intl/ja/crisisresponse/japanquake2011.html. Accessed 7 August 2011.
Kim, K. S., Zettsu, K., Kidawara, Y., & Kiyoki, Y. (2009). Moving phenomenon: Aggregation and analysis of geotime-tagged contents on the web. Web and Wireless Geographical Information Systems., 5886, 7–24. doi:10.1007/978-3-642-10601-9_2.
Freyne, J., Brennan, A. J., Smyth, B., Byrne, D., Smeaton, A. F., & Jones, G. J. F. (2009, August). Automated murmurs: The social mobile tourist application. In International Conference on Computational Science and Engineering, (CSE ‘09) (pp. 1021–1026), Vancouver, BC, Canada. doi:10.1109/CSE.2009.348.
Belimpasakis, P., Selonen, P., & Yu, Y. (2010). Bringing user-generated content from internet services to mobile augmented reality clients. In Cloud-Mobile Convergence for Virtual Reality Workshop (CMCVR), (pp. 14–17), Waltham, MA. doi:10.1109/CMCVR.2010.5560611.
Shih, C. C., Peng, T. C., & Lai, W. S. (2009, November). Mining the blogosphere to generate local cuisine hotspots for mobile map service. In Fourth International Conference on Digital Information Management, ICDIM 2009, (pp. 151–154), Ann Arbor, MI. doi:10.1109/ICDIM.2009.5356785.
Krishnamurthy, B., Gill, P., & Arlitt, M. (2008). A few chirps about twitter. In Proceedings of the First Workshop on Online Social Networks (pp. 19–24). New York: ACM. doi:10.1145/1397735.1397741.
Longueville, B. D., Smith, R. S., & Luraschi, G. (2009). OMG, from here, I can see the flames!: A use case of mining location based social networks to acquire spatio-temporal data on forest fires. In Proceedings of the 2009 International Workshop on Location Based Social Networks (pp. 73–80). New York: ACM. doi:10.1145/1629890.1629907.
The Ushahidi Project. http://www.ushahidi.com/. Accessed 3 August 2011.
The Japan Recovery Map. http://www.sinsai.info/ushahidi/. Accessed 3 August 2011.
Saroiu, S., & Wolman, A. (2010). I am a sensor, and I approve this message. In Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications. New York: ACM. doi:10.1145/1734583.1734593.
Twitter Help Center-About Verified Account. http://support.twitter.com/articles/119135-about-verified-accounts. Accessed 3 August 2011.
Amazon.com. http://www.amazon.com/gp/customer-reviews/guidelines/top-reviewers.html. Accessed 11 August 2011.
Schlieder, C., & Yanenko, O. (2010). Spatio-temporal proximity and social distance: A confirmation framework for social reporting. In Proceedings of the 2nd ACM SIGSPATIAL International Workshop on Location Based Social Networks (pp. 60–67). New York: ACM. doi:10.1145/1867699.1867711.
Deuze, M., Bruns, A., & Neuberger, C. (2007). Preparing for an age of participatory news. Journalism Practice, 1(3), 322–338. doi:10.1080/17512780701504864.
Yu, H., Kaminsky, M., Gibbons, B. P., & Flaxman, A. (2006). Sybilguard: Defending against sybil attacks via social networks. In Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pisa, Italy (pp. 267–278). New York: ACM. doi:10.1145/1159913.1159945.
Yang, Y. F., Sun, Y. L., Kay, S., & Yang, Q. (2009). Defending online reputation systems against collaborative unfair raters through signal modeling and trust. In Proceedings of the 24th ACM Symposium on Applied Computing, Honolulu, HI. New York: ACM. doi:10.1145/1529282.1529575.
Trusted Computing Group. (2003). Trusted Computing Platform Alliance (TCPA) main specification version 1.1b. http://www.trustedcomputinggroup.org/files/resource_files/64795356%131D09%133519-ADAB12F595B5FCDF/TCPA_Main_TCG_Architecture_v1_1b.pdf. Accessed 11 August 2011.
Facebook. https://www.facebook.com/help/?page=419. Accessed 11 August 2011.
Dattolo, A., Ferrara, F., &Tasso, C. (2010, May). The role of tags for recommendation: A survey. In Conference on Human System Interactions (HSI), (pp. 548–555), Rzeszow, Poland. doi:10.1109/HSI.2010.5514515.
Hope, G., Wang, T. G., & Barkataki, S. (2007). Convergence of web 2.0 and semantic web: a semantic tagging and searching system for creating and searching Blogs. In Proceedings of the International Conference on Semantic Computing, Washington, DC, USA (pp. 201–208). New York: ACM. doi:10.1109/ICSC.2007.27.
Swift River. http://ushahidi.com/products/swiftriver-platform. Accessed 11 August 2011.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media New York
About this chapter
Cite this chapter
Yap, L.F., Bessho, M., Koshizuka, N., Sakamura, K. (2012). User-Generated Content for Location-Based Services: A Review. In: Lazakidou, A. (eds) Virtual Communities, Social Networks and Collaboration. Annals of Information Systems, vol 15. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-3634-8_9
Download citation
DOI: https://doi.org/10.1007/978-1-4614-3634-8_9
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-3633-1
Online ISBN: 978-1-4614-3634-8
eBook Packages: Computer ScienceComputer Science (R0)