2003
DOI: 10.1145/767193.767196
|View full text |Cite
|
Sign up to set email alerts
|

Privacy through pseudonymity in user-adaptive systems

Abstract: User-adaptive applications cater to the needs of each individual computer user, taking for example users' interests, level of expertise, preferences, perceptual and motoric abilities, and the usage environment into account. Central user modeling servers collect and process the information about users that different user-adaptive systems require to personalize their user interaction.Adaptive systems are generally better able to cater to users the more data their user modeling systems collect and process about t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
92
0

Year Published

2004
2004
2016
2016

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 132 publications
(92 citation statements)
references
References 53 publications
0
92
0
Order By: Relevance
“…The approaches of collaborative filtering [12] and K-anonymity [13,20,22,23] assume some semantics (e.g., spatial or temporal) on the underlying data to implicitly control the granularity of data exposure. Similarly, approaches such as "faces" [14] or pseudonym [15] focus on implicit specification of user privacy preferences. In contrast, CPE employs an explicit privacy model, where the evaluation algorithm does not understand the semantics or the value of the data.…”
Section: Related Workmentioning
confidence: 99%
“…The approaches of collaborative filtering [12] and K-anonymity [13,20,22,23] assume some semantics (e.g., spatial or temporal) on the underlying data to implicitly control the granularity of data exposure. Similarly, approaches such as "faces" [14] or pseudonym [15] focus on implicit specification of user privacy preferences. In contrast, CPE employs an explicit privacy model, where the evaluation algorithm does not understand the semantics or the value of the data.…”
Section: Related Workmentioning
confidence: 99%
“…Privacy is a constant interaction where information flows between parties [Jiang et al, 2002]. Privacy expectations vary [Brunk, 2002, Jiang et al, 2002 and depend on context [Kobsa and Schreck, 2003]. So, privacy policies based on context [Goecks and Mynatt, 2002, Jendricke et al, 2002, Langheinrich, 2002, Lederer et al, 2003 and trust [Seigneur and Jensen, 2004b] can be made closer to the realworld privacy expectations.…”
Section: Contrasting Digital and Real-world Trustmentioning
confidence: 99%
“…This is why pseudonymity, the level of indirection between trust and the real-world entity, is necessary. Transaction pseudonyms [Kobsa and Schreck, 2003] (i.e., a pseudonym used for only one transaction) and anonymity cannot be effectively used because they do not allow linkability between transactions as required when building trust. There is an inherent conflict between trust and privacy because both depend on knowledge about an entity but in the opposite ways.…”
Section: Secure: Feedback On Choices Made Regarding Identitymentioning
confidence: 99%
See 2 more Smart Citations