Introduction: The use of mobile applications has increased in the last years. Most of them require the knowledge of the user location, either for their core service or for marketing purposes. Location-based services (LBS) offer context-based assistance to users based on their location. Although these applications ask the user for permission to use their location and even explain in detail how this information will be used in its terms and conditions, most users are not aware or even interested in the fact that their location information is stored in databases and monetized by selling it to third-party companies. Regarding this situation, we developed a study with the aim to assess perception, concerns and awareness from users about their location information. Methods: This work is based on an exploratory survey applied to the university community, mainly from the North Coast of Colombia, to measure the perception of location privacy of users with mobile devices. The questionnaire was applied using Google Forms. The survey has nineteen questions organized in three sections: personal information, identification of privacy and privacy management. These questions were designed to know the users’ perceptions of privacy concerns in LBS and any actions they take to preserve it. Results: The results show that, in general, the respondents do not have a real concern regarding the privacy of their geolocation data, and the majority is not willing to pay to protect their privacy. Conclusions: This type of surveys can generate awareness among participants about the use of their private information. The results expose in this paper can be used to create government policies and regulations by technology companies about the privacy management.
Privacidad en la localización, Servicios basados en localización, Percepción de privacidadLocation privacy, Privacy perception, Location-Based Services
 P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, “Preventing location-based identity inference in anonymous spatial queries,” IEEE Trans. Knowl. Data Eng., vol. 19, no. 12, pp. 1719–1733, Dec. 2007. doi: 10.1109/TKDE.2007.190662
 M. Zurbaran, L. Gonzalez, P. Wightman Rojas, and M. Labrador, “A survey on privacy in location-based services,” Ing. Desarr., vol. 32, no. 2, pp. 314–343, 2014. Available: http://bit.ly/2ENeA9i
 J. K. Burgoon, R. Parrott, B. A. Le Poire, D. L. Kelley, J. B. Walther, and D. Perry, “Maintaining and restoring privacy through communication in different types of relationships,” J. Soc. Pers. Relat., vol. 6, no. 2, pp. 131–158, May 1989. https://doi.org/10.1177/026540758900600201
 A. F. Westin, “Washington and Lee Law Review Privacy and Freedom,” Lee L. Rev., vol. 166, no. 1, 1968. Available: http://bit.ly/2HU9dak
 L. Steinfeld and K. Sutherland Archuleta, “Privacy protection and compliance in higher education: The role of the CPO,” EDUCAUSE Rev., vol. 41, no. 5, pp. 62–71, Sept./Oct. 2006. Available: http://bit.ly/2Zb1J8R
 UN High Commissioner for Human Rights, “The right to privacy in the digital age,” Human Rights Council 27th Session, Jun. 30 2014. Available: http://bit.ly/2IfAZgl
 C. Paine, U.-D. Reips, S. Stieger, A. Joinson, and T. Buchanan, “Internet users’ perceptions of ‘privacy concerns’ and ‘privacy actions,’” Int. J. Hum. Comput. Stud., vol. 65, no. 6, pp. 526– 536, 2007. https://doi.org/10.1016/j.ijhcs.2006.12.001
 EFF, “The problem with mobile phones,” Surveillance Self-Defense - EFF, 2015. [Online]. Accessed on: Aug. 06 2018. Available: http://bit.ly/2wyrnrP
 Y.-A. de Montjoye and C. A. Hidalgo, “Unique in the crowd: The privacy bounds of human mobility,” Sci. Rep., vol. 3, pp. 193–220, Mar. 2013. Available: https://go.nature.com/2Wimanf
 R. Mekovec and N. Vrþek, “Factors that influence internet users’ privacy perception,” in 33rd Int. Conf. Inf. Technol. Interfaces, Cavtat, Croatia, Jun. 2011, pp. 27–30. Available: http://bit.ly/2WGXc0a
 J. L. Boyles, A. Smith, and M. Madden, “Privacy and data management on mobile devices,” Pew Research Center [Online]. Available: https://pewrsr.ch/2HRxrln
 I. Boutsis and V. Kalogeraki, “A fast and efficient entity resolution approach for preserving privacy in mobile data,” in 2016 IEEE Int. Congr. Big Data, BigData Congr., pp. 173–180. doi: 10.1109/BigDataCongress.2016.29
 L. Tang, S. Vrbsky, and X. Hong, “Collaborated camouflaging mobility for mobile privacy,” in IEEE GLOBECOM 2008, pp. 2154–2158. doi: 10.1109/GLOCOM.2008.ECP.415
 R. Liu, J. Cao, L. Yang, and K. Zhang, “PriWe: Recommendation for privacy settings of mobile apps based on crowdsourced users’ expectations,” in 2015 IEEE Int. Conf. Mobile Services, pp.150–157. doi: 10.1109/MobServ.2015.30
 Y. Gong, L. Wei, Y. Guo, C. Zhang, and Y. Fang, “Optimal task recommendation for mobile crowdsourcing with privacy control,” in IEEE Internet Things J., vol. 3, no. 5, pp. 745–756, Oct. 2016. doi: 10.1109/JIOT.2015.2512282
 G. Font, J. Bustos, S. Blasco, and A. Hevia, “Location privacy for a monitoring system of the quality of access to mobile internet,” in IEEE Lat. Am. Trans., vol. 14, no. 6, pp. 2894–2896, Jun. 2016. doi: 10.1109/CNS.2014.6997533
 M. Poikela, R. Schmidt, I. Wechsung, and S. Moller, “About your smartphone usage: Privacy in location-based mobile participation,” in 2015 IEEE Int. Symp. Technol. Soc., ISTAS, pp. 1–6. doi: 10.1109/ISTAS.2015.7439421
 Instituto Nacional de Tecnologías de la Comunicación, INTECO, “Estudio sobre seguridad en dispositivos móviles y smartphones,” Observ. Seguridad Inform., 2011. Available: http://bit.ly/2JTWJSk
 D. Wagner et al., “Hide and seek,” in Proc. 12th Int. Conf. Human Comput. Interaction Mobile Devices Serv. - MobileHCI ’10, 2010, pp. 55–58.
 GSMA, “Mobile privacy: Consumer research insights and considerations for policymakers,” 2014. Available: http://bit.ly/2Xn2oUb
 A. Fink, J. Kosecoff, M. Chassin, and R. H. Brook, “Consensus methods: Characteristics and guidelines for use,” Am. J. Public Health, vol. 74, no. 9, pp. 979–83, Sep. 1984.
 J. Casas Anguita, J. R. Repullo Labrador, and J. Donado Campos, “La encuesta como técnica de investigación. Elaboración de cuestionarios y tratamiento estadístico de los datos (I),” Aten. Primaria, vol. 31, no. 8, pp. 469–558, 2003. https://doi.org/10.1016/S0212-6567(03)70728-8
 D. Christin, C. Buchner, and N. Leibecke, “What’s the value of your privacy? Exploring factors that influence privacy-sensitive contributions to participatory sensing applications,” in 38th Ann. IEEE Conf. Local Comput. Netw.-Workshops, 2013, pp. 918–923. doi: 10.1109/LCNW.2013.6758532
 A. J. B. Brush, J. Krumm, and J. Scott, “Exploring end user preferences for location obfuscation, location-based services, and the value of location,” in Proc. 12th ACM Int. Conf. Ubiquitous Comput., 2010, pp. 95–104. Available: http://bit.ly/2KpDyzl
 M. Arriaza Balmón, Guía práctica de análisis de datos. S. l.: Instituto de Investigación y Formación Agraria y Pesquera, 2006. Available: http://bit.ly/2JYnyEW
 L. Galvis, “Geografía económica del Caribe continental,” Doc. Trabajo Econom. Regional, no. 119, 2009.
 U.-D. Reips, “Standards for internet-based experimenting,” Exp. Psychol., vol. 49, no. 4, pp. 243–256, 2002. Available: http://bit.ly/2Xk7e4m