Online social sports networks as crime facilitators
© Stottelaar et al.; licensee Springer 2014
Received: 12 October 2013
Accepted: 12 May 2014
Published: 22 August 2014
Emerging technologies such as broadband services and mobile and wireless technologies create not only benefits for the community but also risks (Choo, Smith, McCusker 78: iii, 2007). The implications of these developments should be evaluated to make any necessary changes to policing, policy and legislation. This study investigates the risk of disclosure of confidential information via online public exercise routes. The study identified in particular whether a) people inadvertently disclose their home address more often indirectly via online sports tracking networks than directly via other means and whether b) gender and age play a role in this disclosure. In addition, an analysis of the temporal characteristics of runs was performed to establish the window of opportunity for a home burglary and whether running is temporally predictable by hour of day or day of week. A total of 513 RunKeeper users were selected from the Dutch cities of Enschede and Nijmegen. 231 runners (45.03%) were located via RunKeeper and 122 (23.78%) via other Internet (i.e. non-social sports network) sources. It was found that a statistical difference exists between the indirect and direct disclosure of addresses; more runners disclose their home address via online sports tracking networks than via other sources. Furthermore, it was found that age played a role in the direct disclosure of addresses but not in the indirect disclosure. Older users more often disclosed their home address directly than younger ones. Conversely, gender plays a role in the indirect disclosure but not in the direct disclosure. Men more often disclosed their home address indirectly than women. Regarding temporal characteristics, it was found that the window of opportunity for a burglary is approximately 1 hour. Furthermore, the ‘within subject’ analysis suggests that the starting hour of the run is the most predictable temporal characteristic, followed by the duration of the run and the day of the week. This research ultimately shows the extent to which the unique combination of spatial and temporal information available in online sports tracking networks can enable criminals to predict where a potential target lives and when he or she will be out running.
KeywordsLeisure Online social sports networks Situational crime prevention Spatio-temporal analysis Home address location
According to the ‘routine activity approach’ (Cohen and Felson ), three elements must converge in space and in time for crime to take place: a) a suitable target (person or product), b) a likely offender and c) absence of a capable guardian. People can facilitate their victimization by deliberately, negligently or unconsciously placing themselves at special risk even when they do not take an ‘active’ part in the crime (Sparks ). Hindelang et al. ()’s ‘lifestyle-exposure theory of personal victimization’ complements the previous views. This theory argues that victimization risk is a function of lifestyle, and in particular, that patterns of leisure expose people to victimization opportunities. Both the part of the population that reports spending leisure time online and the total time spent online have been increasing since 2008. However, the internet is changing leisure patterns since the total leisure time remains constant (Wallsten ). This study investigates whether the online publishing of running activities on sports social networks increases runners’ vulnerability to crime in general, and home burglary in particular.
Protecting personal information is important to prevent victimization. Specific privacy concerns of online social networking include inadvertent disclosure of personal information, damaged reputation due to rumours and gossip, unwanted contact and harassment or stalking, surveillance-like structures due to backtracking functions (i.e. retracing actions), use of personal data by third-parties, hacking, and identity theft (Boyd and Ellison ). According to the Federal Bureau of Investigation (), predators, hackers, business competitors, and foreign state personnel troll social networking sites looking for information or people to target. News items and police websites often report that on-line sites such as Google Earth Street View, Facebook and Twitter are being used by burglars to target homes and businesses (e.g. Douglas County Sheriff ). Several sources have reported that many convicted burglars think that other burglars use social networks to identify targets (e.g. Distinctive Doors ). Moreover, a survey of 69 former burglars indicated that checking social media status is a favourite way of identifying target burglary homes (Edith Cowan University , McMillan ). This seems to indicate that it is no longer the case that burglars are opportunistic and operate only on-the-ground, but that there are also technologically-savvy ones who operate in a more premeditative manner. In addition, it indicates that social media is used for the planning of a wide range of crimes.
Several studies (Ibrahim , Tufekci , Waters and Ackerman ) found that online social network users constantly balance perceived privacy risks and expected benefits. The most important benefit of online networks is probably the social capital resulting from creating and maintaining interpersonal relationships and friendship (Ellison et al. ). Studies reveal a ‘privacy paradox’ which is the disparity between reported privacy attitudes and observed privacy behaviours. In a study of online social network use and privacy, for example, those with Facebook profiles had greater concerns about strangers obtaining personal information about them than those who didn’t have such profiles. However, among those with profiles, there was no relationship between participants’ privacy concerns and the likelihood of them providing this information on the website (Stutzman and Kramer-Duffield ).
While basic contact information continues to top search lists, demand for social networking profiles and photos has grown considerably over time.
Young adults (i.e. ages 18-29) more often limit the amount of online information available about them than older adults.
Internet users are now more likely to search for social networking profiles than they are to search for information about someone’s professional accomplishments or interests.
Females are more likely to have a friends-only Facebook account than males.
With regards to address information, Acquisti and Gross () indicated that 24% of the Facebook users disclose their home address. Madden and Smith () reached a similar conclusion (i.e. personal address disclosure of 26%) and also found that 23% of the users were unaware whether their home address could be found online. The research by boyd and Hargittai () shows that people change their privacy settings more often than before. However, the authors consider that further research is needed to establish whether people fully understand the effect of the privacy setting changes they chose. These figures highlight that emerging technologies create not only benefits but also risks (Choo et al. ) and in particular, that information and communication technologies (ICT) lead to new crime opportunities. The Dutch Police (), for example, advises people to use social networks with caution and warns against sharing holiday information, photos or their current location. Although it is not wise to disclose personal information such as home address on the Internet, the figures show that this is common practice. This research answers the question of whether people unknowingly disclose address information indirectly more often using online social sport networks than directly via other online sources.
The rapid development of mobile applications has driven smartphone adoption. An example of a new type of smartphone-based mobile application is online sports tracking. This type of application is able to record data about exercises such as lifting counts during body building or recording the cycling or running speed on a map. The underlying technology behind the latter example is called geo-location. Geo-location uses data acquired from a radio or network connection enabled device to identify or describe the actual physical location. Despite its many benefits, geo-location does increase risk (ISACA ). Furthermore, when tracking allows somebody else’s location to be traced, it is a sensitive issue from a privacy point of view (Klerks and Kop ). The risk, security, privacy and ethical concerns of geo-location and tracking are most often discussed in the context of enterprises and less often in the context of leisure. Leisure is important because people in many countries nowadays have more time available for it (Aguiar and Hurst , Klerks and Kop , OECD ).
Examples of current sport applications include RunKeeper, Endemondo, Strava, MapMyFitness, Nike+, Zombies, Run! and SportsTracker. Such applications are largely used by runners and have created a social network where people store recorded workouts and share their favourite routes with others. This type of software can be download by anyone and installed on a wide range of computer systems (e.g. smartphones, tablets, laptops, desktops) but the GPS-enabled smartphone plays a key role since the route data is typically collected and uploaded onto the internet by means of this device. The user either creates a new account or connects using e.g. Facebook login information. Invitations for joining one’s network are sent out in a very similar manner as in Facebook or LinkedIn. This step is optional because the user can choose not to send invitations, which still gives him access to all the public routes of other runners. In the particular case of RunKeeper, and at the time of writing this, it was possible (but not compulsory) to list one’s location (e.g. city, country), the type of sport activity (e.g. running, swimming, cycling, skiing) and add a profile picture. The user could specify, based on the type of person (i.e. everyone, friends or nobody), the type of data (e.g. activities, activity maps, fitness reports, background activities, general body measurements) to be shared. It was also possible to prevent the user profile from showing up in search results. Another interesting feature from the security and privacy viewpoints was the option to connect to other sport or health-related applications.
Sports tracking applications introduce a new type of problem because the sharing of routes implies the disclosure of information about personal routine activities. The data available enables the identification not only of the route the runner followed but also of its temporal characteristics (i.e. when the run took place and its total duration). Runners are therefore disclosing the temporal pattern of their sport activities but because most of them start and stop their run at home, they also unwarily reveal their home address.
Burglary can result from personal information disclosure. The disclosure of a runner’s home address as well as the temporal pattern of the sports activity facilitates crime. The relationship status on a social network such as Facebook or photos posted on Facebook or RunKeeper could be used to assess the likelihood that the person lives alone or accompanied. This is relevant because burglars prefer to avoid occupied homes (Bennett , Bennett and Wright , Hakim et al. , Rengert and Wasilchick , Waller and Okihiro , Winchester and Jackson ) which explains why the most vulnerable homes are those of single-persons, single-parents, and younger-occupants (Rengert and Wasilchick , Winchester and Jackson ). Although the duration of the absence from home strongly predicts burglary risk (Weisel ), many sources indicate that it takes burglars less than 10 minutes to break into a house and leave with the stolen items (e.g. Cusson , Safewise ). In the case of running, the capable guardian is likely to be away and the suitable target objects are most likely at home since mobile phones are among the few items carried during running. Clarke () discussed ‘hot products’ as items that attract attention and are targeted by thieves. Offenders focus on relatively few ‘hot products’, such as cars, laptop computers, DVD players, and mobile phones (Clarke and Eck ). The Internet and social networks in particular, provide a platform for identifying ‘hot products’. The Dutch Police () states that 80% of burglary is opportunistic (‘thieves have Facebook too’). For example, posting a photo of one’s new ultrabook computer and of the sports data via social media can make the runner’s house a suitable target. In contrast, posting a photograph of one’s expensive bicycle and of the sports data via social media might make the cyclist a suitable target to be robbed while out cycling. Internet searches reveal that in some countries it is common for cyclists to be forced to hand over their bicycles to criminals whilst out cycling (Miller ; Sapa ).
To the best of our knowledge, no research has been conducted about the potential of sports tracking apps as crime facilitators. However, there are two relevant general studies involving geo-location-enabled mobile applications. Dillon-Scott () concluded that the majority of respondents are concerned about sharing their location without consent (84%), having their personal information or identity stolen and suffering loss of privacy (83%). Similarly, GSMA () found that 92% of respondents in their survey want to be asked for their permission before sharing their location with a service or an application. ISACA () indicates, however, that a majority find that the risk and benefits of location-based applications and services are appropriately balanced, showing that although people are apprehensive about privacy-breaches, they are likely to share their location via sports tracking applications since they deem the risk involved to be acceptable.
What is the accuracy of an address identified on the basis of routes available on social sports networks and what is its implication in the Dutch urban context?
Are people more likely to disclose their address ‘indirectly’ (i.e. via running routes published on sports tracking networks) than ‘directly’ (i.e. by other sources such as Facebook, LinkedIn, Twitter, Yellow pages and company websites)?
Is there a relation between the runners’ age and gender and the disclosure of an address?
What is the window of opportunity for a burglary?
Is running temporally predictable?
Although studies exist about the relation between crime and online leisure activities, most relate to dating sites, chat rooms and Facebook. In addition, in many other studies the concept of ‘leisure’ is operationalized as ‘going out at night during weekends’ (e.g. Gottfredson ). The present research is therefore concerned with a different form of leisure activity (i.e. running). The contribution of this study is the insight into the new phenomenon of online social sports tracking networks and in particular, its potential as a crime facilitator. The general approach of the research is to look into the routine activities of the target rather than of the offender. In addition, this research developed an algorithm to determine a home address based on public running routes published on online social sport tracking networks.
The aim was to select a random sample of runners who use an online sports social network to record their running route. The runner characteristics measured were gender and age. For the sample size selection, this study followed Bartlett et al. ()’s suggestion to use Cochran’s equationsa.
Estimating the population of runners using sports tracking applications is difficult because the number of users per country is not listed in the websites. In addition, this research focuses on RunKeeper, which is a very popular application in The Netherlands, but there are other popular applications. According to Bottenburg (), in The Netherlands one in ten inhabitants run (refer to the section ‘Measures’ for the definition of ‘runner’). Given this figure and a combined population of Enschede, Nijmegen and the nearby cities Hengelo and Arnhem of approximately 550,000, the number of runners in this area was estimated at 55,000. Given an assumption of 1,000 RunKeeper users in these cities (which one might consider a conservative guess), the minimum sample size for the study is 250 runners. An assumption of 5,000 users would have yielded a sample size of 319 runners. Above 6,820 runners, the minimum sample size is 341 runners. It is worth noting that the cities of Hengelo and Arnhem fall within the search radius of Enschede and Nijmegen and are therefore taken into account in this population calculation.
To the best of our knowledge, there is no evidence that in The Netherlands running is geographically determined. Since running is easily accessible and location independent, it was assumed that the chosen cities were representative of The Netherlands as a whole.
The RunKeeper search engine was first queried to show runners that had recorded at least one route. A random sample was then drawn to select the runners for the study. The sample consisted of 513 runners with a total of 15,471 routes (i.e. approximately 30 routes per runner). The unit of analysis of the address disclosure evaluation is the individual runner whilst the route constitutes the unit of analysis of the temporal evaluation. For the temporal analysis, the sample size was 14,444 since some routes had no timestamp.
points are both precise and accurate,
points are precise but inaccurate,
points are imprecise but accurate and,
points are neither precise nor accurate.
The variables ‘direct’ and ‘indirect disclosure of home address’ are categorical variables (i.e. no-yes). Dichotomous variables are used to describe personal characteristics i.e. ‘gender’ (i.e. male vs. female) and ‘age’ (i.e. under 35 vs. 35 or older). The duration of the run is measured in minutes. Regarding distance measurements for the algorithm development, the (continuous) variables used were a) distance in kilometres between the start and end point of a route and b) number of GPS points per kilometre.
Algorithm development, calibration and evaluation. The algorithm was developed to determine the home address of a runner based on his or her public running routes. The input for the algorithm is raw GPS data, grouped by runner. The algorithm classifies routes into suitable and unsuitable ones based on the quality of the GPS recording. In addition, it classifies the suitable routes into circular and non-circular. Spatial analysis of the start-finish points of circular routes was performed to identify the average point (i.e. predicted home location). The minimum distance thresholds and minimum routes per cluster were calibrated to yield the most reliable results (i.e. precision). If there are insufficient routes per cluster, non-circular routes having a starting point near the average point are added to the analysis. 18 volunteer runners participated in the evaluation of the algorithm and their 2012 routes were used to generate a map of their predicted home address. Subsequently, the runners were asked if this predicted location was accurate and to estimate the error. In other words, the first part of the analysis (i.e. cluster analysis) measures precision whilst the second part, involving the volunteer runners, measures accuracy. Refer to Appendix 1 for further details on the algorithm.
Selection of runners and routes. The search webpage of RunKeeper was used to select runners from the cities of Enschede and Nijmegen. Routes of 3, 4, 5, 7.5 and 10 kilometres were searched since these constitute typical running distances. The search for routes yielded 513 unique random usernames of runners (see Figure 3 for an example of a map showing the result of the search for routes of one runner, with individual runs depicted with different colours).
Home address and personal information search. The algorithm was applied to 513 runners to identify whether it succeeded or not in estimating a home address. To establish the age and gender of runners, the Runkeeper profile photos were assessed and a search was carried out by other means such as Facebook, Twitter, LinkedIn, the Yellow Pages and also company websites.
Three separate analyses were conducted for the address disclosure evaluation. The first one involved testing whether there were significant differences between direct and indirect disclosure of addresses. The ratio of indirect to direct disclosure was then calculated. The second one tested the relation between one type of disclosure (direct or indirect) and an independent variable (e.g. direct disclosure and age). For both the first and second analyses, cross tabulations and the Chi-square statistics were obtained. To make a straight-forward comparison between younger and older runners, the ratios of indirect to direct disclosure were computed. Similarly, the ratio of indirect to direct disclosure was calculated for females and males. The third analysis consisted of a multinomial logistic regression to model the disclosure of data based on both age and gender. The dependent variable consisted of 4 categories: a) no disclosure (used as reference category), b) indirect disclosure, c) direct disclosure and d) both indirect and direct. The output of the regression is a relative risk ratio (RRR) which is similar to the odds ratio used in logistic regression. The standard interpretation of the relative risk ratio is for a unit change in the independent variable, the relative risk ratio of the dependent variable m relative to the reference category is expected to change by a factor of the respective parameter estimate given that the variables in the model are held constant (Institute for Digital Research and Education ).
Runners that recorded only one route where not taken into account for the calculation of the ICC.
Disclosure of address
The validation work showed that the chosen algorithm thresholds are sufficient to yield accurate results. The average estimated error was 45 metres (S D=74,8). It is worth mentioning that simple consumer type GPS receivers, like the ones that are incorporated into smartphones, are only capable of measuring positional accuracy to within a few tens of metres. For example, Garmin () claims that their receivers are accurate to within 15 metres.
Direct and indirect address search results
Both Direct & Indirect
None (i.e. no disclosure)
Direct and indirect address search results based on age characteristics
Younger than 35
35 or older
Direct and indirect address search results based on gender
Multinomial logistic regression model
Other online sources
The window of opportunity for a burglary is on average 52.85 minutes (SD=57.58). The correlation of run duration within runners (i.e. ICC) is 0.13 (F=11.11; d f=210/14,213; p=0.000). Regarding gender differences, the correlation of run duration for female runners is 0.17 (F=11.14; d f=159/11,458; p=0.000) whilst it is 0.13 for males (F=2.39; d f=34/1,989; p=0.000). With regards to age differences, the correlation of run duration for younger runners is 0.15 (F=9.58; d f=130/6,768; p=0.000) whilst it is 0.11 for older ones (F=12.89; d f=55/5,365; p=0.000).
The correlation of hour of run start within runners is 0.20 (F=18.27; d f=210/14,213; p=0.000). Regarding gender differences, the correlation of hour of run start within female runners is 0.16 (F=11.35; d f=34/1,989; p=0.000) whilst it is 0.20 for males (F=19.31; d f=159/11,458; p=0.000). With regards to age differences, the correlation of the hour of run start for younger runners is 0.19 (F=12.31; d f=139/6,768; p=0.000) whilst it is 0.18 for older ones (F=21.75; d f=55/5,365; p=0.000).
Intraclass correlations for gender
Variable and categories
Male (ref. cat.)
Hour of run start
Male (ref. cat.)
Day of week
Male (ref. cat.)
Intraclass correlations for age
Variable and categories
Younger than 35 (ref. cat)
35 or older
Hour of run start
Younger than 35 (ref. cat)
35 or older
Day of week
Younger than 35 (ref. cat)
35 or older
This research has shown that a runner’s home location can be predicted via sports tracking application data. A home address, together with other information, can increase crime opportunity for burglars or identity fraudsters. An algorithm was described to determine a home address based on public workouts. For 36 out of 69 runners both directly and indirectly located, the home address matched.
The first research question related to the accuracy of an address identified on the basis of online social sports networks and its implication in the Dutch context. The estimated average error of the algorithm is 45 metres. Assuming a typical Dutch urban neighbourhood consisting of single family houses (i.e. parcel widths of 10 metres, houses on both sides of the road with back entrances), the algorithm narrows the estimated position down to within 8 possible houses. A quick field expedition to check family name signs on the front door of houses would enable the correct house to be identified. In addition, although evidence shows that burglars do not necessarily target more affluent areas (Bernasco and Nieuwbeerta ) (since these have often higher security), it is possible that those who go to the trouble of preparing a burglary using online sources might consider the trade-offs of targeting more affluent areas over less affluent ones. Since the parcel sizes in more affluent areas are generally larger, this algorithm would most likely yield the exact house or the one next door. The same would apply in other countries where the parcel sizes are in general larger (e.g. USA). Although the runners that took part in the algorithm validation had ‘private’ workouts, most were surprised about the accuracy of the algorithm.
The second question aimed to identify whether a statistically significant difference existed between the indirect disclosure and the direct disclosure of a home addresses. Table 1 shows that runners tend to disclose their address indirectly more often than directly. The ratio of indirect to direct disclosure is 1.89. 23% of the participants of the research conducted by Madden and Smith () did not know if their home address (direct address in this case) was available online. We suspect that a higher percentage might be unaware that it is possible to determine an address based on sports data.
The third research question regarded the relation between the age and gender of a runner and the disclosure of the home address (either directly or indirectly). The ratio of indirect to direct disclosure of home addresses is higher for younger people than for older people. A possible explanation is that older people are more likely to be found in the phone book, since younger people have not settled down yet and/or prefer a mobile telephone line instead of a fixed line. Disclosure of home address via both methods increases with age. The findings support the view of Madden and Smith () who found that the disclosure of home address increases with age. Older people possibly have less understanding of Internet-based risks. Regarding gender, the ratio of indirect to direct disclosure of home addresses is higher for males than for females. No literature was found to explain this difference but we suspect that females might be more cautious, possibly for fear of assault. Women are less likely to disclose their home address via both methods than males (result is marginally significant). This finding is in line with Stutzman and Kramer-Duffield (), who found that women are more cautious than males with regards to online privacy.
The fourth research question aimed to identify the window of opportunity for a residential burglary based on the running activity. It was found that there is a window of approximately one-hour. Since many sources (e.g. Cusson ; Safewise ) indicate that most burglars spend less than 10 minutes at the crime scene, such a window provides sufficient time to carry out the crime.
The fifth research question related to whether previous temporal characteristics predict future temporal characteristics for the same runner. The general finding is that the hour of start of a run is the most predictable temporal variable, followed by its duration and day of week. The temporal predictability always decreases with age but the results are mixed for gender. Males have more predictable patterns with respect to the run’s starting hour and the day of week whilst females are more predictable with respect to the duration. Knowledge of this temporal predictability would probably increase the confidence of the motivated criminal.
RunKeeper offers three types of privacy settings: public, friends only and private. This research used public workouts which can be viewed by anyone, not requiring a RunKeeper user account. On average, the 18 runners who participated in the algorithm validation provided 24 routes per user whereas the 513 runners provided 30 routes per user. For 66 runners the address matched both directly and indirectly despite the 45 metre error of the algorithm. However, the accuracy of home addresses and the number of located runners could be increased if friends-only workouts were to be used.
This research identifies previously undetected crime risks that could be easily reduced. Regarding recommendations to reduce risk, an awareness campaign about the risks involved would probably have an impact since the participants in the algorithm validation were surprised about its accuracy and hence unaware of what can be achieved by analysing running data. In particular, users of these types of networks should be made aware of their potential for data mining which refers to the automatic or semi-automatic data analysis to extract previously unknown patterns. In addition, since some runners sometimes share their ‘favourite’ routes with strangers because they wish to suggest interesting, demanding or simply ‘nice’ runs, it would be advisable to remove the starting and ending portions of the route. The software developer should highlight the risks of runners sharing their routes, particularly when they start and end at home. In addition, an automatic removal of the starting and ending portions of all routes could be performed directly by the software developer. Such an action would constitute a known standard setting that would credit the developer with having a security policy to protect users.
By preventing a potential burglar or robber from finding a temporal pattern in the running activity (i.e. routine activity), his/her perception of risk would be increased, hence reducing the runner’s likelihood of becoming the victim of a burglar, robber or of a predatory offender. This last measure constitutes situational crime prevention because it involves the modification of the (potential) crime settings, making criminal action less attractive to offenders.
The present research focused on runners but further research could be carried out to estimate the spatio-temporal pattern of cyclists, since bicycle theft and/or robbery while out cycling is a problem in some countries.
This research suggests that people might neglect the risks of inadvertently disclosing personal information that could increase their susceptibility to victimization possibly as the wish to socialize and to highlight their sporting achievements overrides their natural caution. Rather than looking into the routine activities of the criminal, this research has looked into the routine activities of the target. It shows how the unique combination of spatial and temporal information available in online sports tracking networks can enable criminals to predict with high likelihood where a potential target lives and when he or she will be out running. On the basis of these findings one can conclude that online sports tracking networks have potential to be part of the modus operandi of several types of crime, both at home and en-route. This research therefore shows that there is scope for traditional crime to become increasingly ‘digitalized’.
a (a) (b) where t is the value for the selected alpha level of 0.25 in each tail (i.e. 1.96), (p)(1−p) is the estimate of variance (by manual inspection of workouts, we estimated p=1/3), d is the acceptable margin of error for the proportion being estimated (i.e. 5% or 0.05) and N is the population size. Formula (b) should be applied when n0 exceeds 5% of the population.
b The ICC is a measure of agreement unlike the commonly used Pearson correlation which is a measure of association. Therefore, the standards that apply to a Pearson correlation do not apply to an ICC. For example, while a Pearson correlation of 0.3 may be considered small, an ICC of 0.3 is quite large.
Appendix 1: Algorithm
For each route, the distance between the start point and end point is calculated.
For each route, the number of GPS points per distance unit is calculated.
The first metric allows non-circular routes to be filtered. The logic behind this is the following: running is an exercise that can be done everywhere but it tends to start and end at home; however, some people stop recording their workout just before they arrive home since they want to ‘cool down’. Since this interferes with the statistics of the run, it is common that runners do not record the last part (i.e. the ‘cool down’ phase) of their run. Therefore, the algorithm takes a distance D between the start and the end into account.
The second metric allows the algorithm to distinguish between good and bad recordings. It is common that a runner sets a GPS to record at once a second (i.e. 1 Hz). Under optimal circumstances and a running speed of 12 kilometres per hour, a location is recorded every 3.33 metres. However, poor reception perhaps due to atmospheric factors, terrain, tree canopy or tall buildings can produce unsuitable recordings. A limit P was chosen as a lower bound on the number of GPS recordings per distance of 1 kilometre (PPD). This classifies recorded workouts (including manually entered ones) into suitable and unsuitable ones. All routes that comply with the chosen thresholds are referred to as ‘valid routes’ (i.e. candidate routes).
Start-stop of all routes close to each other.
Start-stop of one route that exceeds a certain threshold.
Invalid route supports the cluster of two valid ones due to its start position.
An initial estimation and some experimenting with the thresholds therefore resulted in the following values:
Delta distance D=500 metres.
Lower bound of P=20 points per distance.
Average point weight W=0.90%.
Average point delta distance R=150 metres.
Cluster size S=3.
Bas Stottelaar and Jeroen Senden followed the computer security track of the computer science master degree programme at the University of Twente. Lorena Montoya is senior researcher at the Services, Cyber-security and Safety group of the University of Twente.
- Acquisti A, Gross R: Imagined communities: Awareness, information sharing, and privacy on the facebook. In Privacy Enhancing Technologies, volume 4258 of Lecture Notes in Computer Science. Edited by: Danezis G, Golle P. Springer, Cambridge, UK; 2006:36–58.Google Scholar
- Aguiar, M, & Hurst, E (2007). Measuring trends in leisure: The allocation of time over five decades. Quarterly Journal of Economics, 122, 969–1006.View ArticleGoogle Scholar
- Bartlett JI, Kotrlik JW, Higgins CC: Organizational research: Determining appropriate sample size in survey research. Information Technology, Learning, and Performance Journal 2001, 19(1):43.Google Scholar
- Bennett T: Burglars’ Choice of Targets. Routledge, London; 1992.Google Scholar
- Bennett T, Wright R: Burglars on Burglary - Prevention and the Offender. Gower, Hampshire, UK; 1984.Google Scholar
- Bernasco W, Nieuwbeerta P: How do residential burglars select target areas?: A new approach to the analysis of criminal location choice. British Journal of Criminology 2005, 45(3):296–315. 10.1093/bjc/azh070View ArticleGoogle Scholar
- Bottenburg M: De Tweede Loopgolf: Over Groei en Omvang van de Loopsportmarkt en hoe de Knau Haar Marktaandeel Verder Kan Vergroten. W.J.H. Mulier Instituut, ’s-Hertogenbosch, The Netherlands; 2006.Google Scholar
- Ellison N: Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication 2007, 13(1):210–230. 10.1111/j.1083-6101.2007.00393.xView ArticleGoogle Scholar
- Hargittai E: Facebook privacy settings: Who cares. First Monday 2010, 15(8):2.Google Scholar
- Choo K-KR, Smith RG, McCusker R: Future Directions in Technology-enabled Crime: 2007–09,. Australian Institute of Criminology, Canberra, Australia; 2007.Google Scholar
- Clarke, RV (1999). Hot products: Understanding, anticipating and reducing demand for stolen goods. Report 112, UK Home Office.Google Scholar
- Clarke RV, Eck JE: Crime Analysis for Problem Solvers in 60 Small Steps. U.S. Department of Justice, Washington DC; 2005.Google Scholar
- Cohen LE, Felson M: Social change and crime rate trends: a routine activity approach. American Sociological Review 1979, 44: 588–608. 10.2307/2094589View ArticleGoogle Scholar
- Cusson M: Situational Deterrence: Fear During the Criminal Event. Criminal Justice Press, Monsey, New York, USA; 1993.Google Scholar
- Dillon-Scott, P. (2011). Geolocation Apps Causing New Privacy and Safety Fears for Smartphone Users: Sociable Publishing Ltd. ., [http://sociable.co/mobile/geolocation-apps-causing-new-privacy-and-safety-fears-for-smartphone-users/]Google Scholar
- Distinctive Doors (2013). Infographic: How burglars are using social media. ., [http://www.distinctivedoors.co.uk/news/51-infographic-how-burglars-are-using-social-media]
- Douglas County, Sheriff (2013). Crime prevention/social media alert. ., [http://www.dcsheriff.net/newsroom/crime-prevention-social-media-alert/]
- Edith Cowan, University (2012). Inside the mind of a burglar. ., [http://www.ecu.edu.au/news/media-releases/2012/12/inside-the-mind-of-a-burglar]Google Scholar
- Ellison NB, Steinfield C, Lampe C: The benefits of facebook "friends:"İ social capital and college students’ use of online social network sites. Journal of Computer-Mediated Communication 2007, 12(4):1143–1168. 10.1111/j.1083-6101.2007.00367.xView ArticleGoogle Scholar
- Erez E: Planning of crime and the criminal career: Official and hidden offenses. Journal of Criminal Law and Criminology 1980, 71(1):73–76. 10.2307/1142801View ArticleGoogle Scholar
- Federal Bureau of, Investigation (2014). Internet social networking sites. ., [http://www.fbi.gov/about-us/investigate/counterintelligence/internet-social-networking-risks]Google Scholar
- Garmin (2013). What is gps?., [http://www.garmin.com/aboutGPS/]
- Gottfredson MR: Victims of crime: The Dimensions of Risk. HM Stationery Office, London, UK; 1984.Google Scholar
- GSMA (2013). Gsma reveals fears over mobile privacy are holding back the growth of mobile apps in latin america. ., [http://www.gsma.com/newsroom/gsma-reveals/]
- Hakim S, Rengert GF, Shachmurove Y: Target search of burglars: A revised economic model. Papers in Regional Science 2001, 80(2):121–137. 10.1007/PL00013617View ArticleGoogle Scholar
- Hindelang MJ, Gottfredson MR, Garofalo J: Victims of, Personal Crime: an Empirical Foundation for a Theory of Personal Victimization. Ballinger Publishing Co, Cambridge, Massachusets, USA; 1978.Google Scholar
- Ibrahim Y: The new risk communities: Social networking sites and risk. International Journal of Media and Cultural Politics 2008, 4(2):245–253. 10.1386/macp.4.2.245_3View ArticleGoogle Scholar
- Institute for Digital Research and Education (2014). Stata annotated output: Multinomial logistic regression. ., [http://www.ats.ucla.edu/stat/stata/output/stata_mlogit_output.htm].
- ISACA (2011). Geolocation: Risk, issues and strategies. Rolling Meadows, IL USA. ., [http://www.isaca.org/groups/professional-english/wireless/groupdocuments/geolocation_wp.pdf].
- ISACA (2012). 2012 geolocation use and concerns survey USA. Rolling Meadows, IL USA. ., [http://www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/Geolocation-Risks-Issues-and-Strategies.aspx].
- Klerks P, Kop N: Societal Trends and Crime-relevant Factors: an Overview for the Dutch National Threat Assessment on Organized Crime 2008 - 2012. Politieacademie, Apeldoorn, The Netherlands; 2008.Google Scholar
- Madden, M, & Smith, A (2010). Reputation management and social media. ., [http://www.pewinternet.org/2010/05/26/reputation-management-and-social-media/]
- McMillan, G (2011). Burglars now using twitter, facebook against you. ., [http://techland.time.com/2011/09/27/burglars-now-using-twitter-facebook-against-you/].
- Miller, D (2013). Cyclists beware: Gang of thieves target riders of expensive bicycles. ., [http://www.khou.com/news/local/Bikers-beware-Gangs-of-thieves-target-riders-of-expensive-bicycles-218917611.html].
- Newson, R (2002). Comparing two iccs. ., [http://www.stata.com/statalist/archive/2002–06/msg00246.html].
- OECD Special Focus: Measuring Leisure in OECD Countries. OECD Publishing, Paris, France; 2009.View ArticleGoogle Scholar
- Petee, TA, Corzine, J, Huff-Corzine, L, Clifford, J, Weaver, G (2010). Defining “cyber-crime”: Issues in determining the nature and scope of computer-related offenses. In: Finnie, T, Petee, T, Jarvis, J (Eds.) In Futures Working Group, (Vol. volume 5, Quantico, VA, USA. PFI/FBI, pp. 6–11).Google Scholar
- Rengert GF, Wasilchick J: Suburban Burglary: A Tale of 2 Suburbs. Charles C Thomas Pub Ltd, Springfield, Illinois, USA; 2000.Google Scholar
- JCGM (2012). International vocabulary of metrology: Basic and general concepts and associated terms (vim). ., [http://www.bipm.org/utils/common/documents/jcgm/JCGM_200_2012.pdf]
- Safewise (2013). You just got robbed (and it only took 10 minutes). ., [http://www.safewise.com/you-got-robbed].
- Sapa (2013). Three held for robbing cyclists. ., [http://www.news24.com/SouthAfrica/News/3-held-for-robbing-cyclists-20130326].
- Sparks RF: Research on Victims of Crime: Accomplishments, Issues, and New Directions. University of California Libraries, Rockville, MD, USA; 1982.Google Scholar
- Stutzman F, Kramer-Duffield J: Friends only: Examining a privacy-enhancing behavior in facebook. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’10. ACM, New York, NY, USA; 2010:1553–1562.Google Scholar
- The Dutch, Police (2012). Woninginbraak. ., [http://www.politie.nl/onderwerpen/woninginbraak.html].
- Tufekci Z: Can you see me now? audience and disclosure regulation in online social network sites. Bulletin of Science, Technology and Society 2008, 28(1):20–36. 10.1177/0270467607311484View ArticleGoogle Scholar
- Waller I, Okihiro NR: Burglary: The Victim and the Public. University of Toronto Press, Toronto, Canada; 1978.Google Scholar
- Wallsten, S (2011). What are we not doing when we’re online?Technical report, Technology Policy Institute, Washington DC, USA.Google Scholar
- Waters S, Ackerman J: Exploring privacy management on facebook: Motivations and perceived consequences of voluntary disclosure. Journal of Computer-Mediated Communication 2011, 17(1):101–115. 10.1111/j.1083-6101.2011.01559.xView ArticleGoogle Scholar
- Weisel, D (2002). Burglary of single-family houses. Technical report, US Department of Justice, Washington DC, USA.Google Scholar
- Winchester, S, & Jackson, H (1982). Residential burglary: the limits of prevention. Government document, UK Home Office, London, UK.Google Scholar
This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License(http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.