Abstract
Consumer studies demonstrate that online users value personalized content. At the same time, providing personalization on websites seems quite profitable for web vendors. This win-win situation is however marred by privacy concerns since personalizing people’s interaction entails gathering considerable amounts of data about them. As numerous recent surveys have consistently demonstrated, computer users are very concerned about their privacy on the Internet. More over, the collection of personal data is also subject to legal regulations in many countries and states. Both user concerns and privacy regulations impact frequently used personalization methods. This article analyzes the tension between personal ization and privacy, and presents approaches to reconcile the both.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ackerman, M.S., Cranor, L.F., Reagle, J.: Privacy in E-commerce: Examining User Scenarios and Privacy Preferences. First ACM Conference on Electronic Commerce, Denver, CO, pp. 1–8. ACM Press, New York (1999), doi:10.1145/336992.336995
Acquisti, A.: Privacy in Electronic Commerce and the Economics of Immediate Gratification. EC’04 ACM Conference on Electronic Commerce, pp. 21–29. ACM Press, New York (2004), doi:10.1145/988772.988777
Acquisti, A., Grossklags, J.: Privacy and Rationality in Individual Decision Making. IEEE Security & Privacy 3, 26–33 (2005)
Agrawal, D., Aggarwal, C.C.: On the Design and Quantification of Privacy Preserving Data Mining Algorithms. In: 20th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database System, Santa Barbara, CA, pp. 247–255. ACM Press, New York (2001)
Andrade, E.B., Kaltcheva, V., Weitz, B.: Self-Disclosure on the Web: The Impact of Privacy Policy, Reward, and Brand Reputation. In: Broniarczyk, S.M., Nakamoto, K. (eds.) Advances in Consumer Research, pp. 350–353. Assoc. for Consumer Research, Valdosta (2002), http://bear.cba.ufl.edu/weitz/papers/Andrade, Kaltcheva, Weitz.pdf
APEC Privacy Framework. Asia-Pacific Economic Cooperation, Singapore, Report APEC#205-SO-01.2 (2005)
Archstudio: ArchStudio 3.0 (2006), http://www.isr.uci.edu/projects/archstudio/
Arlein, R.M., Jai, B., Jakobsson, M., Monrose, F., Reiter, M.K.: Privacy-Preserving Global Customization. In: 2nd ACM Conference on Electronic Commerce, Minneapolis, MN, pp. 176–184. ACM Press, New York (2000), doi:10.1145/352871.352891
AT&T: AT&T Privacybird (2006), http://www.privacybird.com/
AU-NPP: National Privacy Principles. The Office of the Privacy Commissioner, Australia (2001), http://www.privacy.gov.au/publications/npps01.html
Bachem, C.: Profilgestütztes Online Marketing. Personalisierung im E-Commerce, Hamburg, Germany (1999)
Bart, Y., Shankar, V., Sultan III, F., Urban, G.L.: Are the Drivers and Role of Online Trust the Same for All Web Sites and Consumers? A Large-Scale Exploratory Empirical Study. Journal of Marketing 69, 133–152 (2005), doi:10.1509/jmkg.2005.69.4.133
Basso, A., Goldberg, D., Greenspan, S., Weimer, D.: First Impressions: Emotional and Cognitive Factors Underlying Judgments of Trust E-Commerce. In: 3rd ACM Conference on Electronic Commerce, pp. 137–143. ACM Press, New York (2001), doi:10.1145/501158.501173
Baumeister, R.F., Leary, M.R.: The Need to Belong: Desire for Interpersonal Attachments as a Fundamental Human Motivation. Psychological Bulletin 117, 497–529 (1995)
Behrens, L. (ed.): Privacy and Security: The Hidden Growth Strategy (2001), http://www.gartner.com/5_about/press_releases/2001/pr20010807d.html
Bellman, S., Lohse, G.L., Johnson, E.J.: Predictors of Online Buying Behavior. Communications of the ACM 42, 32–38 (1999), doi:10.1145/322796.322805
Berendt, B., Günther, O., Spiekermann, S.: Privacy in E-Commerce: Stated Preferences vs. Actual Behavior. Communications of the ACM 48, 101–106 (2005), doi:10.1145/1053291.1053295
Berkovsky, S.: Personal Communication (2006)
Berkovsky, S., Eytani, Y., Kuflik, T., Ricci, F.: Privacy-Enhanced Collaborative Filtering. In: Kobsa, A., Cranor, L. (eds.) PEP05, UM05 Workshop on Privacy-Enhanced Personalization, Edinburgh, Scotland, pp. 75–83 (2005), http://www.isr.uci.edu/pep05/papers/PEPfinal.pdf
Berkovsky, S., Eytani, Y., Kuflik, T., Ricci, F.: Hierarchical Neighborhood Topology for Privacy Enhanced Collaborative Filtering. In: Proceedings of PEP06, CHI 2006 Workshop on Privacy-Enhanced Personalization, Montreal, Canada, pp. 6–13 (2006), http://www.isr.uci.edu/pep06/papers/PEP06_BerkovskyEtAl.pdf
Borking, J.J., Raab, C.D.: Laws, PETs and other Technologies for Privacy Protection. Journal of Information, Law and Technology (2001), http://elj.warwick.ac.uk/jilt/01-1/borking.html
Bosch, J.: Design and Use of Software Architectures: Adopting and Evolving a Product-Line Approach. Addison-Wesley, New York (2000)
Brusilovsky, P., Millán, E.: User Models for Adaptive Hypermedia and Adaptive Educational Systems. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) The Adaptive Web: Methods and Strategies of Web Personalization. LNCS, vol. 4321, pp. 3–53. Springer, Heidelberg (2007)
Burke, R.: Hybrid Web Recommender Systems. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) The Adaptive Web: Methods and Strategies of Web Personalization. LNCS, vol. 4321, pp. 377–408. Springer, Heidelberg (2007)
Burkert, H.: Privacy-Enhancing Technologies: Typology, Critique, Vision. In: Agre, P.E., Rotenberg, M. (eds.) Technology and Privacy: The New Landscape, pp. 126–143. MIT Press, Boston (1997)
Canny, J.: Collaborative Filtering with Privacy. IEEE Symposium on Security and Privacy, Oakland, CA, pp. 45–57 (2002), doi:10.1109/SECPRI.2002.1004361
Canny, J.: Collaborative Filtering with Privacy via Factor Analysis. In: 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2002), Tampere, Finland, pp. 238–245. ACM Press, New York (2002), doi:10.1145/564376.564419
Cassel, L., Wolz, U.: Client Side Personalization. DELOS Workshop: Personalisation and Recommender Systems in Digital Libraries, Dublin, Ireland (2001), http://www.ercim.org/publication/ws-proceedings/DelNoe02/CasselWolz.pdf
Ceri, S., Dolog, P., Matera, M., Nejdl, W.: Model-Driven Design of Web Applications with Client-Side Adaptation. In: Koch, N., Fraternali, P., Wirsing, M. (eds.) ICWE 2004. LNCS, vol. 3140, pp. 201–214. Springer, Heidelberg (2004)
Privacy Policies Critical to Online Consumer Trust. Columbus Group and Ipsos-Reid, Canadian Inter@ctive Reid Report (2001), http://www.ipsos-na.com/news/pressrelease.cfm?id=1171
Chellappa, R.K., Sin, R.: Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma. Information Technology and Management 6, 181–202 (2005)
ChoiceStream Personalization Survey: Consumer Trends and Perceptions (2005), http://www.choicestream.com/pdf/ChoiceStream_PersonalizationSurveyResults2005.pdf
Clements, P., Northrop, L.: Software Product Lines: Practices and Patterns. Addison-Wesley, New York (2002)
Cooperstein, D., Delhagen, K., Aber, A., Levin, K.: Making Net Shoppers Loyal. Forrester Research, Cambridge (June 1999)
Coroama, V.: The Smart Tachograph: Individual Accounting of Traffic Costs and Its Implications. In: Fishkin, K.P., Schiele, B., Nixon, P., Quigley, A. (eds.) PERVASIVE 2006. LNCS, vol. 3968, pp. 135–152. Springer, Heidelberg (2006)
Coroama, V., Langheinrich, M.: Personalized Vehicle Insurance Rates: A Case for Client-Side Personalization in Ubiquitous Computing. In: Proceedings of PEP06, CHI 2006 Workshop on Privacy-Enhanced Personalization, Montreal, Canada, pp. 56–59 (2006), http://www.isr.uci.edu/pep06/papers/PEP06_CoroamaLangheinrich.pdf
Cranor, L.F.: ’I Didn’t Buy it for Myself’: Privacy and Ecommerce Personalization. ACM Workshop on Privacy in the Electronic Society, Washington, DC (2003), doi:10.1145/1005140.1005158
Cranor, L.F., Guduru, P., Arjula, M.: User Interfaces for Privacy Agents. ACM Transactions on Human-Computer Interactions (2006), doi:10.1145/1165734.1165735
Cranor, L.F., Reagle, J., Ackerman, M.S.: Beyond Concern: Understanding Net Users’ Attitudes About Online Privacy. AT&T Labs - Research, Technical Report TR 99.4.3 (1999), http://www.research.att.com/resources/trs/TRs/99/99.4/99.4.3/report.htm
Largest 100 US Firms Rated on Customer Online Experience They Provide in Third Annual Customer Respect Group Study. The Customer Respect Group (2004), http://www.customerrespect.com
Model Code for the Protection of Personal Information. Canadian Standards Association (1996), http://www.csa.ca/standards/privacy/code/Default.asp?language=English
Culnan, M.J.: Managing Privacy Concerns Through Fairness and Trust: Implications for Marketing. Visions for Privacy in the 21st Century: A Search for Solutions. Conference Papers, Victoria, BC (1996), http://www.privacyexchange.org/iss/confpro/bcculnan.html
Culnan, M.J., Armstrong, P.K.: Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation. Organization Science 10, 104–115 (1999), http://links.jstor.org/sici?sici=1047-7039%28199901%2F02%2910%3A1%3C104%3AIPCPFA%3E2.0.CO%3B2-H
Culnan, M.J., Milne, G.R.: The Culnan-Milne Survey on Consumers & Online Privacy Notices: Summary of Responses. Interagency Public Workshop: Get Noticed: Effective Financial Privacy Notices, Washington, D.C (2001), http://www.ftc.gov/bcp/workshops/glb/supporting/culnan-milne.pdf
UCO Software To Address Retailers $6.2 Billion Privacy Problem: Cyber Dialogue Survey Data Reveals Lost Revenue for Retailers Due to Widespread Consumer Privacy Concerns. In: Cyber Dialogue, pp. 11–17 (2001), http://www.cyberdialogue.com/news/releases/2001/11-07-uco-retail.pdf
Act 101 of April 4, 2000 on the Protection of Personal Data and on Amendment to Some Acts. Czech Republic (2000):105, http://www.uoou.cz/index.php?l=en&m=left&mid=01
Czarkowski, M., Kay, J.: Bringing Scrutability to Adaptive Hypertext Teaching. In: Gauthier, G., VanLehn, K., Frasson, C. (eds.) ITS 2000. LNCS, vol. 1839, pp. 423–433. Springer, Heidelberg (2000)
Czarkowski, M., Kay, J.: How to Give the User a Sense of Control Over the Personalization of AH? AH2003: Workshop on Adaptive Hypermedia and Adaptive Web-Based Systems, Budapest, Hungary; Johnstown, PA; Nottingham, England (2003), http://wwwis.win.tue.nl/ah2003/proceedings/paper11.pdf
D’Hertefelt, S.: Trust and the Perception of Security (Jan. 2000), http://www.interactionarchitect.com/research/report20000103shd.htm
Teleservices Data Protection Act 1997, as amended on 14 Dec. 2001 (2001), http://bundesrecht.juris.de/tddsg/BJNR187100997.html
Personal Communication, Chief Privacy Officer, Disney Corporation (2002).
Dommeyer, C.J., Gross, B.L.: What Consumers Know and What They Do: An Investigation of Consumer Knowledge, Awareness, and Use of Privacy Protection Strategies. Journal of Interactive Marketing 17, 34–51 (2003), doi:10.1002/dir.10053
Earp, J.B., Baumer, D.: Innovative Web Use to Learn About Consumer Behavior and Online Privacy. Communications of the ACM Archive 46, 81–83 (2003), doi:10.1145/641205.641209
Edelman, B.: Adverse Selection in Online “Trust” Certifications. Harvard University, Working Draft (15 Oct. 2006), http://www.benedelman.org/publications/advsel-trust-draft.pdf
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of such Data. Official Journal of the European Communities, 31 (1995), http://158.169.50.95:10080/legal/en/dataprot/directiv/directiv.html
Directive 2002/58/EC of the European Parliament and of the Council Concerning the Processing of Personal Data and the Protection of Privacy in the Electronic Communications Sector (2002), http://register.consilium.eu.int/pdf/en/02/st03/03636en2.pdf
Fink, J.: User Modeling Servers - Requirements, Design, and Evaluation. IOS Press, Amsterdam, Netherlands (2004), http://books.google.com/books?q=isbn:1586034057
Fink, J., Kobsa, A., Nill, A.: Adaptable and Adaptive Information Provision for All Users, Including Disabled and Elderly People. The New Review of Hypermedia and Multimedia 4, 163–188 (1998), http://www.ics.uci.edu/~kobsa/papers/1998-NRHM-kobsa.pdf
Fogg, B.J.: Persuasive Technology: Using Computers to Change What We Think and Do. Morgan Kaufmann Publishers, San Francisco (2003)
Fogg, B.J., Kameda, T., Boyd, J., Marshall, J., Sethi, R., Sockol, M., Trowbridge, T.: Stanford-Makovsky Web Credibility Study 2002: Investigating What Makes Web Sites Credible Today. A Research Report by the Stanford Persuasive Technology Lab & Makovsky & Company, Stanford, CA (2002), http://www.webcredibility.org/pdf/Stanford-MakovskyWebCredStudy2002-prelim.pdf
Fogg, B.J., Soohoo, C., Danielson, D.R., Marable, L., Stanford, J., Tauber, E.R.: How Do Users Evaluate the Credibility of Web Sites?: a Study with over 2,500 Participants. Conference on Designing for User Experiences, San Francisco, CA, pp. 1–15 (2003), doi:10.1145/997078.997097
Foner, L.N.: Yenta: A Multi-Agent Referral-Based Matchmaking System. In: International Conference on Autonomous Agents, Marina del Rey, CA, pp. 301–307 (1997), doi:10.1145/267658.267732
Fox, S., Rainie, L., Horrigan, J., Lenhart, A., Spooner, T., Carter, C.: Trust and Privacy Online: Why Americans Want to Rewrite the Rules. The Pew Internet & American Life Project, Washington, DC (2000), http://www.pewinternet.org/report_ display.asp?r=19
Frankowski, D., Cosley, D., Sen, S., Terveen, L., Riedl, J.: You Are What You Say: Privacy Risks of Public Mentions. In: 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Seattle, WA, pp. 565–572. ACM Press, New York (2006), doi:10.1145/1148170.1148267
Privacy Online: Fair Information Practices in the Electronic Marketplace. A Report to Congress. Federal Trade Commission (2000), http://www.ftc.gov/reports/privacy2000/privacy2000.pdf
Gabber, E., Gibbons, P.B., Matias, Y., Mayer, A.: How to Make Personalized Web Browsing Simple, Secure, and Anonymous. In: Financial Cryptography’97, Springer, Springer (1997)
Garg, A., Critchlow, M., Chen, P., van der Westhuizen, C., van der Hoek, A.: An Environment for Managing Evolving Product Line Architectures. In: 19th IEEE International Conference on Software Maintenance, Amsterdam, Netherlands, pp. 358–367. IEEE Computer Society Press, Los Alamitos (2003), http://www.ics.uci.edu/~andre/papers/C31.pdf
Gefen, D., Karahanna, E., Straub, D.W.: Trust and TAM in Online Shopping: An Integrated Model. MIS Quarterly 27, 51–90 (2003), http://search.epnet.com/login.aspx?direct=true&db=buh&an=9284295
Gefen, D., Srinivasan Rao, V., Tractinsky, N.: The Conceptualization of Trust, Risk and Their Electronic Commerce: the Need for Clarifications. In: 36th Annual Hawaii International Conference on Systems Sciences, Big Island, HI (2003), doi:10.1109/HICSS.2003.1174442
Gideon, J., Cranor, L., Egelman, S., Acquisti, A.: Power Strips, Prophylactics, and Privacy, Oh My! In: Second Symposium on Usable Privacy and Security, Pittsburgh, Pennsylvania, pp. 133–144 (2006), doi:10.1145/1143120.1143137
Goldberg, I.A.: Privacy-Enhancing Technologies for the Internet, II: Five Years Later. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 1–12. Springer, Heidelberg (2003)
Goy, A., Ardissono, L., Petrone, G.: Personalization in E-Commerce Applications. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) The Adaptive Web: Methods and Strategies of Web Personalization. LNCS, vol. 4321, pp. 485–520. Springer, Heidelberg (2007)
Grabner-Kräuter, S., Kaluscha, E.A.: Empirical Research in On-line Trust: a Review and Critical Assessment. International Journal of Human-Computer Studies 58, 783–812 (2003)
GroupLens Research: movielens: Helping You Find the Right Movies (2007), http://movielens.umn.edu/login
Gupta, D., Digiovanni, M., Narita, H., Goldberg, K.: Jester 2.0: A New Linear-Time Collaborative Filtering Algorithm Applied to Jokes. In: Workshop on Recommender Systems Algorithms and Evaluation, 22nd International Conference on Research and Development in Information Retrieval, Berkeley, CA (2000)
GVU: GVU’s 10th WWW User Survey. Graphics, Visualization and Usability Lab, Georgia Tech (1998)
Hagen, P.R., Manning, H., Souza, R.: Smart Personalization. Forrester Research, Cambridge (1999)
Hann, I.-H., Hui, K.-L., Lee, T.S., Png, I.P.L.: Online Information Privacy: Measuring the Cost-Benefit Tradeoff. In: Proceedings of the Twenty-Third Annual International Conference on Information Systems, Barcelona, Spain, pp. 1–10 (2002), http://aisel.isworld.org/pdf.asp?Vpath=ICIS/2002&PDFpath=02CRP01.pdf
Hansen, M.: Personal communication (2002)
Harper, J., Singleton, S.: With a Grain of Salt: What Consumer Privacy Surveys Don’t Tell Us. Competative Enterprises Institute (2001), http://www.cei.org/PDFs/with_a_grain_of_salt.pdf
Harris, Louis and Associates and Westin, A.F.: Harris-Equifax Consumer Privacy Survey. Equifax Inc., Atlanta (1991)
A Survey of Consumer Privacy Attitudes and Behaviors. Harris Interactive (2000), http://www.bbbonline.org/UnderstandingPrivacy/library/harrissummary.pdf
Privacy Notices Research: Final Results. Harris Interactive Inc. Study No. 15338 (Dec. 2001), http://www.bbbonline.org/UnderstandingPrivacy/library/datasum.pdf
Henze, N., Brusilivsky, P.: Open Corpus Adaptive Educational Hypermedia. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) The Adaptive Web: Methods and Strategies of Web Personalization. LNCS, vol. 4321, pp. 671–696. Springer, Heidelberg (2007)
Hitchens, M., Kay, J., Kummerfeld, B., Brar, A.: Secure Identity Management for Pseudo-Anonymous Service Access. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 6–8. Springer, Heidelberg (2005)
Hof, R., Green, H., Himmelstein, L.: Now it’s YOUR WEB. Business Week 5, 68–75 (1998)
Hoffman, D.L., Novak, T.P., Peralta, M.: Building Consumer Trust Online. Communications of the ACM 42, 80–85 (1999), doi:10.1145/299157.299175
Huberman, B.A., Adar, E., Fine, L.R.: Valuating Privacy. Fourth Workshop on the Economics of Information Security (WEIS05), Cambridge, MA (2005), http://infosecon.net/workshop/pdf/58.pdf
Hui, K.-L., Tan, B.C.Y., Goh, C.-Y.: Online Information Disclosure: Motivators and Measurements. ACM Transactions on Internet Technology 6, 415–441 (2006), doi:10.1145/1183463.1183467
Hui, K.-L., Teo, H.H., Lee, S.-Y.T.: The Value of Privacy Assurance: An Exploratory Field Experiment. MIS Quarterly 31 (2007), www.comp.nus.edu.sg/~lung/PrivacyAssurance.pdf
Personal Communication, Chief Privacy Officer, IBM Zurich (2003)
Ishitani, L., Almeida, V., Wagner Jr., M.: Masks: Bringing Anonymity and Personalization Together. IEEE Security & Privacy Magazine 1, 18–23 (2003)
ISO: ISO/IEC 15408-2: Information Technology — Security Techniques — Evaluation Criteria for IT Security: Part 2: Security Functional Requirements (1999), http://csrc.nist.gov/cc/t4/wg3/15408-2.zip
Jarvenpaa, S., Tractinsky, N.: Consumer Trust in an Internet Store: A Cross-Cultural Validation. Journal of Computer Mediated Communication 5, 1–36 (1999), http://jcmc.indiana.edu/vol5/issue2/jarvenpaa.html
Jarvenpaa, S.L., Tractinsky, N., Vitale, M.: Consumer Trust in an Internet Store. Information Technology and Management 1, 45–71 (2000)
Jensen, C., Potts, C.: Privacy Policies as Decision-Making Tools: An Evaluation of Online Privacy Notices. Conference on Human Factors in Computing Systems, Vienna, Austria, pp. 471–478 (2004)
Jensen, C., Potts, C., Jensen, C.: Privacy Practices of Internet Users: Self-Reports versus Observed Behavior. International Journal of Human-Computer Studies 63, 203–227 (2005), doi:10.1016/j.ijhcs.2005.04.019
Kahneman, D., Tversky, A.: Choices, Values, and Frames. Cambridge Univ. Press, Cambridge (2000)
Kay, J.: A Scrutable User Modelling Shell for User-Adapted Interaction. Basser Department of Computer Science, University of Sydney, Australia (1999), http://www.cs.usyd.edu.au/~judy/Homec/Pubs/thesis.bz2
Kay, J.: Accretion Representation for Scrutable User Modeling. In: Gauthier, G., van Lehn, K., Frasson, C. (eds.) ITS 2000. LNCS, vol. 1839, Springer, Heidelberg (2000)
Kay, J.: Stereotypes, Student Models and Scrutability. In: Gauthier, G., van Lehn, K., Frasson, C. (eds.) ITS 2000. LNCS, vol. 1839, Springer, Heidelberg (2000)
Kay, J., Kummerfeld, R.J., Lauder, P.: Foundations for Personalized Documents: a Scrutable User Model Server. In: Proceedings of ADCS’2001, Australian Document Computing Symposium, pp. 43–50 (2001), http://www.cs.usyd.edu.au/~judy/Homec/Pubs/ 2001_adcs_personis.pdf
Kilian, J., Petrank, E.: Identity Escrow. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 169–185. Springer, Heidelberg (1998)
Kobsa, A.: User Modeling in Dialog Systems: Potentials and Hazards. In: IFIP/GI Conference on Opportunities and Risks of Artificial Intelligence Systems, Hamburg, Germany, pp. 147–165 (1989)
Kobsa, A.: User Modeling in Dialog Systems: Potentials and Hazards. AI & Society 4, 214–240 (1990)
Kobsa, A.: Tailoring Privacy to Users’ Needs (Invited Keynote). In: Bauer, M., Gmytrasiewicz, P.J., Vassileva, J. (eds.) UM 2001. LNCS (LNAI), vol. 2109, pp. 303–313. Springer, Heidelberg (2001)
Kobsa, A.: Personalization and International Privacy. Communications of the ACM 45, 64–67 (2002), doi:10.1145/767193.767196
Kobsa, A., Cranor, L. (eds.): Proceedings of the UM05 Workshop ’Privacy-Enhanced Personalization’, Edinburgh, Scotland (2005), http://www.isr.uci.edu/pep05/papers/w9-proceedings.pdf
Kobsa, A., Koenemann, J., Pohl, W.: Personalized Hypermedia Presentation Techniques for Improving Customer Relationships. The Knowledge Engineering Review 16, 111–155 (2001)
Kobsa, A., Schreck, J.: Privacy through Pseudonymity in User-Adaptive Systems. ACM Transactions on Internet Technology 3, 149–183 (2003)
Kobsa, A., Teltzrow, M.: Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users’ Data Sharing Behavior. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 329–343. Springer, Heidelberg (2005)
Kohavi, R.: Mining E-Commerce Data: the Good, the Bad, and the Ugly. In: Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, pp. 8–13. ACM Press, New York (2001), doi:10.1145/502512.502518
Krause, J., Hirschmann, A., Mittermaier, E.: The Intelligent Help System COMFOHELP: Towards a Solution of the Practicability Problem for User Modeling and Adaptive Systems. User Modeling and User-Adapted Interaction: The Journal of Personalization Research 3, 249–282 (1993)
Kumaraguru, P., Cranor, L.F.: Privacy Indexes: A Survey of Westin’s Studies. Institute for Software Research International, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, Technical Report CMU-ISRI-5-138 (Dec. 2005), http://reports-archive.adm.cs.cmu.edu/anon/isri2005/CMU-ISRI-05-138.pdf
LaRose, R., Rifon, N.J.: Your Privacy Is Assured—of Being Disturbed: Comparing Web Sites with and Without Privacy Seals. New Media and Society 8, 1009–1029 (2006), doi:10.1177/1461444806069652
LaRose, R., Rifon, N.J., Lee, A.: Promoting I-Safety: Effects of Privacy Warning Boxes and Privacy Seals on Risk Assessment and Online Privacy Behaviors. Paper presented at AMA, Marketing and Public Policy Conference, Salt Lake City, UT (2004)
Laufer, R.S., Proshansky, H.M., Wolfe, M.: Some Analytic Dimensions of Privacy. In: Kuller, R. (ed.) Architectural Psychology. Proceedings of the Lund Conference, pp. 353–372. Dowden, Hutchinson & Ross, Stroundsbourg (1974)
Laufer, R.S., Wolfe, M.: Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory. Journal of Social Issues 33, 22–42 (1977)
Louis Harris and Associates, Westin, A. F.: Commerce, Communications, and Privacy Online: A National Survey of Computer Users (1997), http://www.harrisinteractive.org
Lu, Y., Tan, B.C.Y., Hui, K.-L.: Inducing Customers to Disclose Personal Information to Internet Businesses with Social Adjustment Benefits. In: ICIS 2004, Twenty-Fifth International Conference on Information Systems, Washington, D.C., pp. 272–281 (2004), http://aisel.isworld.org/Publications/ICIS/2004/2004RP45.pdf
Lutz, W.: Statement of William Lutz. American Council of Life Insurers, et al. vs. Vermont Department of Banking, Securities, and Healthcare Administration, et al. (2004), http://www.epic.org/privacy/glba/vtlutz.pdf
Mabley, K.: Privacy vs. Personalization: Part III. Cyber Dialogue Inc. (2000), http://www.cyberdialogue.com/library/pdfs/wp-cd-2000-privacy.pdf
Malin, B., Sweeney, L., Newton, E.: Trail Re-Identification: Learning Who You Are From Where You Have Been. Technical Report LIDAP-WP12, Carnegie Mellon University, Laboratory for International Data Privacy, Pittsburgh, PA (March 2003), http://privacy.cs.cmu.edu/people/sweeney/trails1.pdf
Mayer, R.C., Davis, J.H., Schoorman, F.D.: An Integrative Model of Organizational Trust. Academy of Management Review 20, 709–734 (1995)
McJones, P.: Eachmovie Collaborative Filtering Data Set (1997), http://research.compaq.com/SRC/eachmovie/
Metzger, M.: Communication Privacy Management in Electronic Commerce. Journal of Computer-Mediated Communication 12 (2007), http://jcmc.indiana.edu/vol12/issue2/metzger.html
Metzger, M. J.: Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce. Journal of Computer-Mediated Communication 9 (2004), http://jcmc.indiana.edu/vol9/issue4/metzger.html
Metzger, M.J.: Effects of Site, Vendor, and Consumer Characteristics on Web Site Trust and Disclosure. Communication Research 33, 155–179 (2006)
Metzger, M.J.: Personal Communication (2007)
Micarelli, A., Gasparetti, F., Sciarrone, F., Gauch, S.: Personalized Search on the World Wide Web. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) The Adaptive Web: Methods and Strategies of Web Personalization. LNCS, vol. 4321, pp. 195–230. Springer, Heidelberg (2007)
Miller, B.N., Konstan, J.A., Riedl, J.: PocketLens: Toward a Personal Recommender System. ACM Transactions on Information Systems 22, 437–476 (2004), doi:10.1145/1010614.1010618
Milne, G.R., Boza, M.-E.: Trust and Concern in Consumers’ Perceptions of Marketing Information Management Practices. Journal of Interactive Marketing 13, 5–24 (1999)
Milne, G.R., Culnan, M.J.: Strategies for Reducing Online Privacy Risks: Why Consumers Read (or Don’t Read) Online Privacy Notices. Journal of Interactive Marketing 18, 15–29 (2004), doi:10.1002/dir.20009
Miyazaki, A.D., Krishnamurthy, S.: Internet Seals of Approval: Effects on Online Privacy Policies and Consumer Perceptions. Journal of Consumer Affairs 36, 28 (2002)
Mobasher, B.: Data Mining for Web Personalization. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) The Adaptive Web: Methods and Strategies of Web Personalization. LNCS, vol. 4321, pp. 90–135. Springer, Heidelberg (2007)
Moores, T.: Do Consumers Understand the Role of Privacy Seals in E-Commerce? Communications of the ACM 48, 86–91 (2005), doi:10.1145/1047671.1047674
Moores, T.T., Dhillon, G.: Do Privacy Seals in E-Commerce Really Work? Communications of the ACM 46, 265–271 (2003), doi:10.1145/953460.953510
Mulligan, D., Schwartz, A.: Your Place or Mine?: Privacy Concerns and Solutions for Server and Client-Side Storage of Personal Information. Computers, Freedom & Privacy Conference, pp. 81–84 (1999), doi:10.1145/332186.332255
Self-Regulatory Principles for Online Preference Marketing by Network Advertisers. Network Advertising Initiative (2006), http://www.networkadvertising.org/pdfs/NAI_principles.pdf
Nakashima, E.: AOL Search Queries Open Window Onto Users’ Worlds. washingtonpost.com (2006), http://www.washingtonpost.com/wp-dyn/content/article/2006/08/16/AR2006081601751_pf.html
Neale, J.M., Liebert, R.M.: Science and Behavior: An Introduction to Methods of Research. Prentice-Hall, Englewood Cliffs (1973)
Recommendation of the Council Concerning Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data. OCD (1980), www1.oecd.org/publications/e-book/9302011E.PDF
Orwant, J.: Heterogenous Learning in the Doppelgänger User Modeling System The. Journal of Personalization Research 4, 107–130 (1995)
Microsoft Passport Network (2006), http://www.passport.net
Pavlou, P.A.: Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model. International Journal of Electronic Commerce 7, 101–134 (2003), http://mesharpe.metapress.com/link.asp?id=ymy1p2ngk06wt39f
Pazzani, M.J., Billsus, D.: Content-Based Recommendation Systems. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) The Adaptive Web: Methods and Strategies of Web Personalization. LNCS, vol. 4321, pp. 325–341. Springer, Heidelberg (2007)
Summary Report. Privacy Commissioner – Te Mana Matapono Matatapu, New Zealand (2006), http://www.privacy.org.nz/filestore/docfiles/24153322.pdf
Personalization & Privacy Survey. Personalization Consortium (2000), http://www.personalization.org/SurveyResults.pdf
New Survey Shows Consumers Are More Likely to Purchase At Web Sites That Offer Personalization: Consumers Willing to Provide Personal Information in Exchange for Improved Service and Benefits. Personalization Consortium, Wakefield, MA, Press Release May 9 (2001), http://web.archive.org/web/20010526174824/http://www.personalization.org/pr050901.html
Pfitzmann, A., Köhntopp, M.: Anonymity, Unobservability, and Pseudonymity: A Proposal for Terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 1–9. Springer, Heidelberg (2001)
Phelps, J., Nowak, G., Ferrell, E.: Privacy Concerns and Consumer Willingness to Provide Personal Information. Journal of Public Policy & Marketing 19, 27–41 (2000), http://search.epnet.com/login.aspx?direct=true&db=buh&an=3215141
Polat, H., Du, W.: Privacy-Preserving Collaborative Filtering. International Journal of Electronic Commerce 9, 9–35 (2003), http://ejournals.ebsco.com/direct.asp?ArticleID=1A72U87WVYJ61B9C
Polat, H., Du, W.: SVD-based Collaborative Filtering with Privacy. In: ACM Symposium on Applied Computing, Santa Fe, New Mexico, pp. 791–795. ACM, New York (2005)
Portz, K., Strong, J.M., Busta, B., Schneider, K.: Do Consumers Understand What Web-Trust Means? The CPA Journal 70, 46–52 (2000), http://www.nysscpa.org/cpajournal/2000/1000/features/f104600a.htm
Preece, J., Rogers, Y., Sharp, H.: Interaction Design: Beyond Human-Computer Interaction. Wiley, New York (2002)
Opinion surveys. Privacy Exchange (2003), http://www.privacyexchange.org/iss/surveys/surveys.html
Rao, J.R., Rohatgi, P. (eds.): Can Pseudonymity Really Guarantee Privacy? In: 9th USENIX Security Symposium, pp. 85–96 (2000), http://www.usenix.org/publications/library/proceedings/sec2000/full_papers/rao/rao_html
Regan, K.: Does Anyone Read Online Privacy Policies? E-Commerce Times (2001), http://www.ecommercetimes.com/story/11303.html
Riegelsberger, J., Sasse, M.A., McCarthy, J.D.: Shiny Happy People Building Trust?: Photos on E-commerce Websites and Consumer Trust. In: SIGCHI Conference on Human Factors in Computing Systems, Ft. Lauderdale, FL, pp. 121–128 (2003)
Rifon, N.J., LaRose, R., Choi, S.M.: Your Privacy Is Sealed: Effects of Web Privacy Seals on Trust and Personal Disclosures. Journal of Consumer Affairs 39, 339–360 (2005), doi:10.1111/j.1745
Rotenberg, M.: The Privacy Law Sourcebook 2004: United States Law, International Law, and Recent Developments. EPIC, Washington (2005)
Roy, M.C., Dewit, O., Aubert, B.A.: The Impact of Interface Usability on Trust in Web Retailers. Internet Research 11, 388–398 (2001), doi:10.1108/10662240110410165
Roy Morgan Research: Privacy and the Community. Prepared for the Office of the Federal Privacy Commissioner, Sydney (2001), http://www.privacy.gov.au/publications/rcommunity.pdf
Schafer, J.B., Frankowski, D., Herlocker, J., Sen, S.: Collaborative Filtering Recommender Systems. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) The Adaptive Web: Methods and Strategies of Web Personalization. LNCS, vol. 4321, pp. 291–324. Springer, Heidelberg (2007)
Schoenbachler, D.D., Gordon, G.L.: Trust and Customer Willingness to Provide Information in Database-Driven Relationship Marketing. Journal of Interactive Marketing 16, 2–16 (2002), doi:10.1002/dir.10033
Schreck, J.: Security and Privacy in User Modeling. Kluwer Academic Publishers, Dordrecht, Netherlands (2003), http://www.security-and-privacy-in-user-modeling.info
Sheehan, K.B., Hoy, M.G.: Flaming, Complaining, Abstaining: How Online Users Respond to Privacy Concerns. Journal of Advertising 28, 37–51 (1999), http://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=2791549&site=ehost-live
Sheehan, K.B., Hoy, M.G.: Dimensions of Privacy Concern Among Online Consumers. Journal of Public Policy & Marketing 19, 62–73 (2000), http://search.epnet.com/login.aspx?direct=true&db=buh&an=3215144
Singel, R.: ’Free IPod’ Takes Privacy Toll. Wired, No. Issue, March 16 (2006), http://www.wired.com/news/technology/0,70420-0.html
Smith, H.J., Milberg, S.J., Burke, S.J.: Information Privacy: Measuring Individuals’ Concerns about Organizational Practices. MIS Quarterly 20, 167–196 (1996), http://links.jstor.org/sici?sici=0276-7783%28199606%2920%3A2%3C167%3AIPMICA%3E2.0.CO%3B2-W
Smyth, B.: Case-Based Recommendation. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) The Adaptive Web: Methods and Strategies of Web Personalization. LNCS, vol. 4321, pp. 342–376. Springer, Heidelberg (2007)
Spiekermann, S., Grossklags, J., Berendt, B.: E-privacy in 2nd Generation E-Commerce: Privacy Preferences versus Actual Behavior. In: EC’01: Third ACM Conference on Electronic Commerce, Tampa, FL, pp. 38–47. ACM Press, New York (2001), doi:10.1145/501158.501163
Spiekermann, S., Grossklags, J., Berendt, B.: Stated Privacy Preferences versus Actual Behaviour in EC Environments: a Reality Check. In: WI-IF 2001, the 5th International Conference Wirtschaftsinformatik - 3rd Conference Information Systems in Finance, Augsburg, Germany, pp. 129–148 (2001)
Stephanidis, C.: Adaptive Techniques for Universal Access. User Modeling and User-Adapted Interaction: The Journal of Personalization Research 11, 159–179 (2001)
Stone, D., Jarrett, C., Woodroffe, M., Minocha, S.: User Interface Design and Evaluation. Morgan Kaufmann, San Francisco (2005)
Sweeney, L.: k-Anonymity: A Model for Protecting Privacy. International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems 10, 557–570 (2002)
Tam, E.-C., Hui, K.-L., Tan, B.C.Y.: What Do They Want? Motivating Consumers to Disclose Personal Information to Internet Businesses. In: Proceedings of the Twenty-Third Annual International Conference on Information Systems, Barcelona, Spain, pp. 11–21 (2002), http://aisel.isworld.org/pdf.asp?Vpath=ICIS/2002&PDFpath=02CRP02.pdf
Tam, K.Y., Ho, S.Y.: Web Personalization: is it Effective? IT Professional 5, 53–57 (2003)
Taylor, H.: Most People Are “Privacy Pragmatists” Who, While Concerned about Privacy, Will Sometimes Trade It Off for Other Benefits. The Harris Poll 17, March 19 (2003), http://www.harrisinteractive.com/harris_poll/index.asp?PID=365
Teltzrow, M., Kobsa, A.: Impacts of User Privacy Preferences on Personalized Systems: a Comparative Study. In: Karat, C.-M., Blom, J., Karat, J. (eds.) Designing Personalized User Experiences for eCommerce, pp. 315–332. Kluwer Academic Publishers, Dordrecht (2004)
Turner, C.W., Zavod, M., Yurcik, W.: Factors that Affect the Perception of Security and Privacy of Ecommerce Web Sites. In: Fourth International Conference on Electronic Commerce Research, Dallas TX, pp. 628–636 (2001), http://www.sosresearch.org/publications/icecr01.pdf
Turow, J.: Americans and Online Privacy: The System is Broken. Annenberg Public Policy Center, University of Pennsylvania (2003), http://www.asc.upenn.edu/usr/jturow/internet-privacy-report/36-page-turow-version-9.pdf
Health Insurance Portability and Accountability Act of 1996. 104th Congress, Aug. 21 (1996), http://aspe.hhs.gov/admnsimp/pl104191.htm
Children’s Online Privacy Protection Act of 1998, http://www.ftc.gov/ogc/coppa1.htm
Gramm-Leach-Bliley Act of 1999. Public Law No 106-102 (1999), http://thomas.loc.gov/cgi-bin/bdquery/z?d106:SN00900:|
USACM Policy Recommendations on Privacy. U.S. Public Policy Committee of the Association for Computing Machinery, New York, NY (June 2006), http://www.acm.org/usacm/Issues/Privacy.htm
Fifth Study of the Internet by the Digital Future Project Finds Major New Trends in Online Use for Political Campaigns. Center for the Digital Future, Annenberg School, University of Southern California (2005), http://www.digitalcenter.org/pdf/Center-for-the-Digital-Future-2005-Highlights.pdf
van Blarkom, G.W., Borking, J.J., and Olk, J.G.E. (eds.): Handbook of Privacy and Privacy-Enhancing Technologies: The Case of Intelligent Software Agents. The Hague, The Netherlands: TNO-FEL (2003), http://www.andrewpatrick.ca/pisa/handbook/Handbook_Privacy_and_PET_final.pdf
van der Hoek, A., Rakic, M., Roshandel, R., Medvidovic, N.: Taming Architectural Evolution. In: Sixth European Software Engineering Conference (ESEC) and the Ninth ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-9), Irvine, CA, pp. 1–10. ACM Press, New York (2001), doi:10.1145/503209.503211
Wang, Y., Chen, Z., Kobsa, A.: A Collection and Systematization of International Privacy Laws, with Special Consideration of Internationally Operating Personalized Websites (2006), http://www.ics.uci.edu/~kobsa/privacy
Wang, Y., Kobsa, A.: A Software Product Line Approach for Handling Privacy Constraints in Web Personalization. In: Kobsa, A., Cranor, L. (eds.) PEP05, UM05 Workshop on Privacy-Enhanced Personalization, Edinburgh, Scotland, pp. 35–45 (2005), http://www.ics.uci.edu/~kobsa/papers/2005-PEP-kobsa.pdf
Wang, Y., Kobsa, A., van der Hoek, A., White, J.: PLA-based Runtime Dynamism in Support of Privacy-Enhanced Web Personalization. In: 10th International Software Product Line Conference, Baltimore, MD, pp. 151–162 (2006)
Wenning, R. (ed.): The Platform for Privacy Preferences 1.1 (P3P1.1) Specification: W3C Working Draft (2006), http://www.w3.org/TR/P3P11
White, T.B.: Consumer Disclosure and Disclosure Avoidance: A Motivational Framework. Journal of Consumer Psychology 14, 41–51 (2004)
Xu, Y., Tan, B.C.Y., Hui, K.-L., Tang, W.-K.: Consumer Trust and Online Information Privacy. In: International Conference on Information Systems 2003, Seattle, WA, pp. 538–548 (2003), http://aisel.isworld.org/Publications/ICIS/2003/03CRP45.pdf
Yankee: Interactive Consumers in the Twenty-First Century: Emerging Online Consumer Profiles, Access Strategies and Application Usage”. Yankee Group 23 (Oct. 2001), http://www.yankeegroup.com
Zaslow, J.: If TiVo Thinks You Are Gay, Here’s How to Set It Straight. Wall Street Journal (Eastern Edition) A.1 (2002)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this chapter
Cite this chapter
Kobsa, A. (2007). Privacy-Enhanced Web Personalization. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds) The Adaptive Web. Lecture Notes in Computer Science, vol 4321. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72079-9_21
Download citation
DOI: https://doi.org/10.1007/978-3-540-72079-9_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-72078-2
Online ISBN: 978-3-540-72079-9
eBook Packages: Computer ScienceComputer Science (R0)