Skip to main content

Privacy-Enhanced Web Personalization

  • Chapter
The Adaptive Web

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4321))

Abstract

Consumer studies demonstrate that online users value personalized content. At the same time, providing personalization on websites seems quite profitable for web vendors. This win-win situation is however marred by privacy concerns since personalizing people’s interaction entails gathering considerable amounts of data about them. As numerous recent surveys have consistently demonstrated, computer users are very concerned about their privacy on the Internet. More over, the collection of personal data is also subject to legal regulations in many countries and states. Both user concerns and privacy regulations impact frequently used personalization methods. This article analyzes the tension between personal ization and privacy, and presents approaches to reconcile the both.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ackerman, M.S., Cranor, L.F., Reagle, J.: Privacy in E-commerce: Examining User Scenarios and Privacy Preferences. First ACM Conference on Electronic Commerce, Denver, CO, pp. 1–8. ACM Press, New York (1999), doi:10.1145/336992.336995

    Google Scholar 

  2. Acquisti, A.: Privacy in Electronic Commerce and the Economics of Immediate Gratification. EC’04 ACM Conference on Electronic Commerce, pp. 21–29. ACM Press, New York (2004), doi:10.1145/988772.988777

    Google Scholar 

  3. Acquisti, A., Grossklags, J.: Privacy and Rationality in Individual Decision Making. IEEE Security & Privacy 3, 26–33 (2005)

    Article  Google Scholar 

  4. Agrawal, D., Aggarwal, C.C.: On the Design and Quantification of Privacy Preserving Data Mining Algorithms. In: 20th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database System, Santa Barbara, CA, pp. 247–255. ACM Press, New York (2001)

    Google Scholar 

  5. Andrade, E.B., Kaltcheva, V., Weitz, B.: Self-Disclosure on the Web: The Impact of Privacy Policy, Reward, and Brand Reputation. In: Broniarczyk, S.M., Nakamoto, K. (eds.) Advances in Consumer Research, pp. 350–353. Assoc. for Consumer Research, Valdosta (2002), http://bear.cba.ufl.edu/weitz/papers/Andrade, Kaltcheva, Weitz.pdf

    Google Scholar 

  6. APEC Privacy Framework. Asia-Pacific Economic Cooperation, Singapore, Report APEC#205-SO-01.2 (2005)

    Google Scholar 

  7. Archstudio: ArchStudio 3.0 (2006), http://www.isr.uci.edu/projects/archstudio/

  8. Arlein, R.M., Jai, B., Jakobsson, M., Monrose, F., Reiter, M.K.: Privacy-Preserving Global Customization. In: 2nd ACM Conference on Electronic Commerce, Minneapolis, MN, pp. 176–184. ACM Press, New York (2000), doi:10.1145/352871.352891

    Chapter  Google Scholar 

  9. AT&T: AT&T Privacybird (2006), http://www.privacybird.com/

  10. AU-NPP: National Privacy Principles. The Office of the Privacy Commissioner, Australia (2001), http://www.privacy.gov.au/publications/npps01.html

  11. Bachem, C.: Profilgestütztes Online Marketing. Personalisierung im E-Commerce, Hamburg, Germany (1999)

    Google Scholar 

  12. Bart, Y., Shankar, V., Sultan III, F., Urban, G.L.: Are the Drivers and Role of Online Trust the Same for All Web Sites and Consumers? A Large-Scale Exploratory Empirical Study. Journal of Marketing 69, 133–152 (2005), doi:10.1509/jmkg.2005.69.4.133

    Article  Google Scholar 

  13. Basso, A., Goldberg, D., Greenspan, S., Weimer, D.: First Impressions: Emotional and Cognitive Factors Underlying Judgments of Trust E-Commerce. In: 3rd ACM Conference on Electronic Commerce, pp. 137–143. ACM Press, New York (2001), doi:10.1145/501158.501173

    Chapter  Google Scholar 

  14. Baumeister, R.F., Leary, M.R.: The Need to Belong: Desire for Interpersonal Attachments as a Fundamental Human Motivation. Psychological Bulletin 117, 497–529 (1995)

    Article  Google Scholar 

  15. Behrens, L. (ed.): Privacy and Security: The Hidden Growth Strategy (2001), http://www.gartner.com/5_about/press_releases/2001/pr20010807d.html

  16. Bellman, S., Lohse, G.L., Johnson, E.J.: Predictors of Online Buying Behavior. Communications of the ACM 42, 32–38 (1999), doi:10.1145/322796.322805

    Article  Google Scholar 

  17. Berendt, B., Günther, O., Spiekermann, S.: Privacy in E-Commerce: Stated Preferences vs. Actual Behavior. Communications of the ACM 48, 101–106 (2005), doi:10.1145/1053291.1053295

    Article  Google Scholar 

  18. Berkovsky, S.: Personal Communication (2006)

    Google Scholar 

  19. Berkovsky, S., Eytani, Y., Kuflik, T., Ricci, F.: Privacy-Enhanced Collaborative Filtering. In: Kobsa, A., Cranor, L. (eds.) PEP05, UM05 Workshop on Privacy-Enhanced Personalization, Edinburgh, Scotland, pp. 75–83 (2005), http://www.isr.uci.edu/pep05/papers/PEPfinal.pdf

  20. Berkovsky, S., Eytani, Y., Kuflik, T., Ricci, F.: Hierarchical Neighborhood Topology for Privacy Enhanced Collaborative Filtering. In: Proceedings of PEP06, CHI 2006 Workshop on Privacy-Enhanced Personalization, Montreal, Canada, pp. 6–13 (2006), http://www.isr.uci.edu/pep06/papers/PEP06_BerkovskyEtAl.pdf

  21. Borking, J.J., Raab, C.D.: Laws, PETs and other Technologies for Privacy Protection. Journal of Information, Law and Technology (2001), http://elj.warwick.ac.uk/jilt/01-1/borking.html

  22. Bosch, J.: Design and Use of Software Architectures: Adopting and Evolving a Product-Line Approach. Addison-Wesley, New York (2000)

    Google Scholar 

  23. Brusilovsky, P., Millán, E.: User Models for Adaptive Hypermedia and Adaptive Educational Systems. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) The Adaptive Web: Methods and Strategies of Web Personalization. LNCS, vol. 4321, pp. 3–53. Springer, Heidelberg (2007)

    Google Scholar 

  24. Burke, R.: Hybrid Web Recommender Systems. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) The Adaptive Web: Methods and Strategies of Web Personalization. LNCS, vol. 4321, pp. 377–408. Springer, Heidelberg (2007)

    Google Scholar 

  25. Burkert, H.: Privacy-Enhancing Technologies: Typology, Critique, Vision. In: Agre, P.E., Rotenberg, M. (eds.) Technology and Privacy: The New Landscape, pp. 126–143. MIT Press, Boston (1997)

    Google Scholar 

  26. Canny, J.: Collaborative Filtering with Privacy. IEEE Symposium on Security and Privacy, Oakland, CA, pp. 45–57 (2002), doi:10.1109/SECPRI.2002.1004361

    Google Scholar 

  27. Canny, J.: Collaborative Filtering with Privacy via Factor Analysis. In: 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2002), Tampere, Finland, pp. 238–245. ACM Press, New York (2002), doi:10.1145/564376.564419

    Chapter  Google Scholar 

  28. Cassel, L., Wolz, U.: Client Side Personalization. DELOS Workshop: Personalisation and Recommender Systems in Digital Libraries, Dublin, Ireland (2001), http://www.ercim.org/publication/ws-proceedings/DelNoe02/CasselWolz.pdf

  29. Ceri, S., Dolog, P., Matera, M., Nejdl, W.: Model-Driven Design of Web Applications with Client-Side Adaptation. In: Koch, N., Fraternali, P., Wirsing, M. (eds.) ICWE 2004. LNCS, vol. 3140, pp. 201–214. Springer, Heidelberg (2004)

    Google Scholar 

  30. Privacy Policies Critical to Online Consumer Trust. Columbus Group and Ipsos-Reid, Canadian Inter@ctive Reid Report (2001), http://www.ipsos-na.com/news/pressrelease.cfm?id=1171

  31. Chellappa, R.K., Sin, R.: Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma. Information Technology and Management 6, 181–202 (2005)

    Article  Google Scholar 

  32. ChoiceStream Personalization Survey: Consumer Trends and Perceptions (2005), http://www.choicestream.com/pdf/ChoiceStream_PersonalizationSurveyResults2005.pdf

  33. Clements, P., Northrop, L.: Software Product Lines: Practices and Patterns. Addison-Wesley, New York (2002)

    Google Scholar 

  34. Cooperstein, D., Delhagen, K., Aber, A., Levin, K.: Making Net Shoppers Loyal. Forrester Research, Cambridge (June 1999)

    Google Scholar 

  35. Coroama, V.: The Smart Tachograph: Individual Accounting of Traffic Costs and Its Implications. In: Fishkin, K.P., Schiele, B., Nixon, P., Quigley, A. (eds.) PERVASIVE 2006. LNCS, vol. 3968, pp. 135–152. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  36. Coroama, V., Langheinrich, M.: Personalized Vehicle Insurance Rates: A Case for Client-Side Personalization in Ubiquitous Computing. In: Proceedings of PEP06, CHI 2006 Workshop on Privacy-Enhanced Personalization, Montreal, Canada, pp. 56–59 (2006), http://www.isr.uci.edu/pep06/papers/PEP06_CoroamaLangheinrich.pdf

  37. Cranor, L.F.: ’I Didn’t Buy it for Myself’: Privacy and Ecommerce Personalization. ACM Workshop on Privacy in the Electronic Society, Washington, DC (2003), doi:10.1145/1005140.1005158

    Google Scholar 

  38. Cranor, L.F., Guduru, P., Arjula, M.: User Interfaces for Privacy Agents. ACM Transactions on Human-Computer Interactions (2006), doi:10.1145/1165734.1165735

    Google Scholar 

  39. Cranor, L.F., Reagle, J., Ackerman, M.S.: Beyond Concern: Understanding Net Users’ Attitudes About Online Privacy. AT&T Labs - Research, Technical Report TR 99.4.3 (1999), http://www.research.att.com/resources/trs/TRs/99/99.4/99.4.3/report.htm

  40. Largest 100 US Firms Rated on Customer Online Experience They Provide in Third Annual Customer Respect Group Study. The Customer Respect Group (2004), http://www.customerrespect.com

  41. Model Code for the Protection of Personal Information. Canadian Standards Association (1996), http://www.csa.ca/standards/privacy/code/Default.asp?language=English

  42. Culnan, M.J.: Managing Privacy Concerns Through Fairness and Trust: Implications for Marketing. Visions for Privacy in the 21st Century: A Search for Solutions. Conference Papers, Victoria, BC (1996), http://www.privacyexchange.org/iss/confpro/bcculnan.html

  43. Culnan, M.J., Armstrong, P.K.: Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation. Organization Science 10, 104–115 (1999), http://links.jstor.org/sici?sici=1047-7039%28199901%2F02%2910%3A1%3C104%3AIPCPFA%3E2.0.CO%3B2-H

    Article  Google Scholar 

  44. Culnan, M.J., Milne, G.R.: The Culnan-Milne Survey on Consumers & Online Privacy Notices: Summary of Responses. Interagency Public Workshop: Get Noticed: Effective Financial Privacy Notices, Washington, D.C (2001), http://www.ftc.gov/bcp/workshops/glb/supporting/culnan-milne.pdf

  45. UCO Software To Address Retailers $6.2 Billion Privacy Problem: Cyber Dialogue Survey Data Reveals Lost Revenue for Retailers Due to Widespread Consumer Privacy Concerns. In: Cyber Dialogue, pp. 11–17 (2001), http://www.cyberdialogue.com/news/releases/2001/11-07-uco-retail.pdf

  46. Act 101 of April 4, 2000 on the Protection of Personal Data and on Amendment to Some Acts. Czech Republic (2000):105, http://www.uoou.cz/index.php?l=en&m=left&mid=01

  47. Czarkowski, M., Kay, J.: Bringing Scrutability to Adaptive Hypertext Teaching. In: Gauthier, G., VanLehn, K., Frasson, C. (eds.) ITS 2000. LNCS, vol. 1839, pp. 423–433. Springer, Heidelberg (2000)

    Google Scholar 

  48. Czarkowski, M., Kay, J.: How to Give the User a Sense of Control Over the Personalization of AH? AH2003: Workshop on Adaptive Hypermedia and Adaptive Web-Based Systems, Budapest, Hungary; Johnstown, PA; Nottingham, England (2003), http://wwwis.win.tue.nl/ah2003/proceedings/paper11.pdf

  49. D’Hertefelt, S.: Trust and the Perception of Security (Jan. 2000), http://www.interactionarchitect.com/research/report20000103shd.htm

  50. Teleservices Data Protection Act 1997, as amended on 14 Dec. 2001 (2001), http://bundesrecht.juris.de/tddsg/BJNR187100997.html

  51. Personal Communication, Chief Privacy Officer, Disney Corporation (2002).

    Google Scholar 

  52. Dommeyer, C.J., Gross, B.L.: What Consumers Know and What They Do: An Investigation of Consumer Knowledge, Awareness, and Use of Privacy Protection Strategies. Journal of Interactive Marketing 17, 34–51 (2003), doi:10.1002/dir.10053

    Article  Google Scholar 

  53. Earp, J.B., Baumer, D.: Innovative Web Use to Learn About Consumer Behavior and Online Privacy. Communications of the ACM Archive 46, 81–83 (2003), doi:10.1145/641205.641209

    Article  Google Scholar 

  54. Edelman, B.: Adverse Selection in Online “Trust” Certifications. Harvard University, Working Draft (15 Oct. 2006), http://www.benedelman.org/publications/advsel-trust-draft.pdf

  55. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of such Data. Official Journal of the European Communities, 31 (1995), http://158.169.50.95:10080/legal/en/dataprot/directiv/directiv.html

  56. Directive 2002/58/EC of the European Parliament and of the Council Concerning the Processing of Personal Data and the Protection of Privacy in the Electronic Communications Sector (2002), http://register.consilium.eu.int/pdf/en/02/st03/03636en2.pdf

  57. Fink, J.: User Modeling Servers - Requirements, Design, and Evaluation. IOS Press, Amsterdam, Netherlands (2004), http://books.google.com/books?q=isbn:1586034057

    MATH  Google Scholar 

  58. Fink, J., Kobsa, A., Nill, A.: Adaptable and Adaptive Information Provision for All Users, Including Disabled and Elderly People. The New Review of Hypermedia and Multimedia 4, 163–188 (1998), http://www.ics.uci.edu/~kobsa/papers/1998-NRHM-kobsa.pdf

    Google Scholar 

  59. Fogg, B.J.: Persuasive Technology: Using Computers to Change What We Think and Do. Morgan Kaufmann Publishers, San Francisco (2003)

    Google Scholar 

  60. Fogg, B.J., Kameda, T., Boyd, J., Marshall, J., Sethi, R., Sockol, M., Trowbridge, T.: Stanford-Makovsky Web Credibility Study 2002: Investigating What Makes Web Sites Credible Today. A Research Report by the Stanford Persuasive Technology Lab & Makovsky & Company, Stanford, CA (2002), http://www.webcredibility.org/pdf/Stanford-MakovskyWebCredStudy2002-prelim.pdf

  61. Fogg, B.J., Soohoo, C., Danielson, D.R., Marable, L., Stanford, J., Tauber, E.R.: How Do Users Evaluate the Credibility of Web Sites?: a Study with over 2,500 Participants. Conference on Designing for User Experiences, San Francisco, CA, pp. 1–15 (2003), doi:10.1145/997078.997097

    Google Scholar 

  62. Foner, L.N.: Yenta: A Multi-Agent Referral-Based Matchmaking System. In: International Conference on Autonomous Agents, Marina del Rey, CA, pp. 301–307 (1997), doi:10.1145/267658.267732

    Google Scholar 

  63. Fox, S., Rainie, L., Horrigan, J., Lenhart, A., Spooner, T., Carter, C.: Trust and Privacy Online: Why Americans Want to Rewrite the Rules. The Pew Internet & American Life Project, Washington, DC (2000), http://www.pewinternet.org/report_ display.asp?r=19

  64. Frankowski, D., Cosley, D., Sen, S., Terveen, L., Riedl, J.: You Are What You Say: Privacy Risks of Public Mentions. In: 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Seattle, WA, pp. 565–572. ACM Press, New York (2006), doi:10.1145/1148170.1148267

    Chapter  Google Scholar 

  65. Privacy Online: Fair Information Practices in the Electronic Marketplace. A Report to Congress. Federal Trade Commission (2000), http://www.ftc.gov/reports/privacy2000/privacy2000.pdf

  66. Gabber, E., Gibbons, P.B., Matias, Y., Mayer, A.: How to Make Personalized Web Browsing Simple, Secure, and Anonymous. In: Financial Cryptography’97, Springer, Springer (1997)

    Google Scholar 

  67. Garg, A., Critchlow, M., Chen, P., van der Westhuizen, C., van der Hoek, A.: An Environment for Managing Evolving Product Line Architectures. In: 19th IEEE International Conference on Software Maintenance, Amsterdam, Netherlands, pp. 358–367. IEEE Computer Society Press, Los Alamitos (2003), http://www.ics.uci.edu/~andre/papers/C31.pdf

    Google Scholar 

  68. Gefen, D., Karahanna, E., Straub, D.W.: Trust and TAM in Online Shopping: An Integrated Model. MIS Quarterly 27, 51–90 (2003), http://search.epnet.com/login.aspx?direct=true&db=buh&an=9284295

    Google Scholar 

  69. Gefen, D., Srinivasan Rao, V., Tractinsky, N.: The Conceptualization of Trust, Risk and Their Electronic Commerce: the Need for Clarifications. In: 36th Annual Hawaii International Conference on Systems Sciences, Big Island, HI (2003), doi:10.1109/HICSS.2003.1174442

    Google Scholar 

  70. Gideon, J., Cranor, L., Egelman, S., Acquisti, A.: Power Strips, Prophylactics, and Privacy, Oh My! In: Second Symposium on Usable Privacy and Security, Pittsburgh, Pennsylvania, pp. 133–144 (2006), doi:10.1145/1143120.1143137

    Google Scholar 

  71. Goldberg, I.A.: Privacy-Enhancing Technologies for the Internet, II: Five Years Later. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 1–12. Springer, Heidelberg (2003)

    Google Scholar 

  72. Goy, A., Ardissono, L., Petrone, G.: Personalization in E-Commerce Applications. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) The Adaptive Web: Methods and Strategies of Web Personalization. LNCS, vol. 4321, pp. 485–520. Springer, Heidelberg (2007)

    Google Scholar 

  73. Grabner-Kräuter, S., Kaluscha, E.A.: Empirical Research in On-line Trust: a Review and Critical Assessment. International Journal of Human-Computer Studies 58, 783–812 (2003)

    Article  Google Scholar 

  74. GroupLens Research: movielens: Helping You Find the Right Movies (2007), http://movielens.umn.edu/login

  75. Gupta, D., Digiovanni, M., Narita, H., Goldberg, K.: Jester 2.0: A New Linear-Time Collaborative Filtering Algorithm Applied to Jokes. In: Workshop on Recommender Systems Algorithms and Evaluation, 22nd International Conference on Research and Development in Information Retrieval, Berkeley, CA (2000)

    Google Scholar 

  76. GVU: GVU’s 10th WWW User Survey. Graphics, Visualization and Usability Lab, Georgia Tech (1998)

    Google Scholar 

  77. Hagen, P.R., Manning, H., Souza, R.: Smart Personalization. Forrester Research, Cambridge (1999)

    Google Scholar 

  78. Hann, I.-H., Hui, K.-L., Lee, T.S., Png, I.P.L.: Online Information Privacy: Measuring the Cost-Benefit Tradeoff. In: Proceedings of the Twenty-Third Annual International Conference on Information Systems, Barcelona, Spain, pp. 1–10 (2002), http://aisel.isworld.org/pdf.asp?Vpath=ICIS/2002&PDFpath=02CRP01.pdf

  79. Hansen, M.: Personal communication (2002)

    Google Scholar 

  80. Harper, J., Singleton, S.: With a Grain of Salt: What Consumer Privacy Surveys Don’t Tell Us. Competative Enterprises Institute (2001), http://www.cei.org/PDFs/with_a_grain_of_salt.pdf

  81. Harris, Louis and Associates and Westin, A.F.: Harris-Equifax Consumer Privacy Survey. Equifax Inc., Atlanta (1991)

    Google Scholar 

  82. A Survey of Consumer Privacy Attitudes and Behaviors. Harris Interactive (2000), http://www.bbbonline.org/UnderstandingPrivacy/library/harrissummary.pdf

  83. Privacy Notices Research: Final Results. Harris Interactive Inc. Study No. 15338 (Dec. 2001), http://www.bbbonline.org/UnderstandingPrivacy/library/datasum.pdf

  84. Henze, N., Brusilivsky, P.: Open Corpus Adaptive Educational Hypermedia. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) The Adaptive Web: Methods and Strategies of Web Personalization. LNCS, vol. 4321, pp. 671–696. Springer, Heidelberg (2007)

    Google Scholar 

  85. Hitchens, M., Kay, J., Kummerfeld, B., Brar, A.: Secure Identity Management for Pseudo-Anonymous Service Access. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 6–8. Springer, Heidelberg (2005)

    Google Scholar 

  86. Hof, R., Green, H., Himmelstein, L.: Now it’s YOUR WEB. Business Week 5, 68–75 (1998)

    Google Scholar 

  87. Hoffman, D.L., Novak, T.P., Peralta, M.: Building Consumer Trust Online. Communications of the ACM 42, 80–85 (1999), doi:10.1145/299157.299175

    Article  Google Scholar 

  88. Huberman, B.A., Adar, E., Fine, L.R.: Valuating Privacy. Fourth Workshop on the Economics of Information Security (WEIS05), Cambridge, MA (2005), http://infosecon.net/workshop/pdf/58.pdf

  89. Hui, K.-L., Tan, B.C.Y., Goh, C.-Y.: Online Information Disclosure: Motivators and Measurements. ACM Transactions on Internet Technology 6, 415–441 (2006), doi:10.1145/1183463.1183467

    Article  Google Scholar 

  90. Hui, K.-L., Teo, H.H., Lee, S.-Y.T.: The Value of Privacy Assurance: An Exploratory Field Experiment. MIS Quarterly 31 (2007), www.comp.nus.edu.sg/~lung/PrivacyAssurance.pdf

  91. Personal Communication, Chief Privacy Officer, IBM Zurich (2003)

    Google Scholar 

  92. Ishitani, L., Almeida, V., Wagner Jr., M.: Masks: Bringing Anonymity and Personalization Together. IEEE Security & Privacy Magazine 1, 18–23 (2003)

    Article  Google Scholar 

  93. ISO: ISO/IEC 15408-2: Information Technology — Security Techniques — Evaluation Criteria for IT Security: Part 2: Security Functional Requirements (1999), http://csrc.nist.gov/cc/t4/wg3/15408-2.zip

  94. Jarvenpaa, S., Tractinsky, N.: Consumer Trust in an Internet Store: A Cross-Cultural Validation. Journal of Computer Mediated Communication 5, 1–36 (1999), http://jcmc.indiana.edu/vol5/issue2/jarvenpaa.html

    Google Scholar 

  95. Jarvenpaa, S.L., Tractinsky, N., Vitale, M.: Consumer Trust in an Internet Store. Information Technology and Management 1, 45–71 (2000)

    Article  Google Scholar 

  96. Jensen, C., Potts, C.: Privacy Policies as Decision-Making Tools: An Evaluation of Online Privacy Notices. Conference on Human Factors in Computing Systems, Vienna, Austria, pp. 471–478 (2004)

    Google Scholar 

  97. Jensen, C., Potts, C., Jensen, C.: Privacy Practices of Internet Users: Self-Reports versus Observed Behavior. International Journal of Human-Computer Studies 63, 203–227 (2005), doi:10.1016/j.ijhcs.2005.04.019

    Article  Google Scholar 

  98. Kahneman, D., Tversky, A.: Choices, Values, and Frames. Cambridge Univ. Press, Cambridge (2000)

    Google Scholar 

  99. Kay, J.: A Scrutable User Modelling Shell for User-Adapted Interaction. Basser Department of Computer Science, University of Sydney, Australia  (1999), http://www.cs.usyd.edu.au/~judy/Homec/Pubs/thesis.bz2

  100. Kay, J.: Accretion Representation for Scrutable User Modeling. In: Gauthier, G., van Lehn, K., Frasson, C. (eds.) ITS 2000. LNCS, vol. 1839, Springer, Heidelberg (2000)

    Google Scholar 

  101. Kay, J.: Stereotypes, Student Models and Scrutability. In: Gauthier, G., van Lehn, K., Frasson, C. (eds.) ITS 2000. LNCS, vol. 1839, Springer, Heidelberg (2000)

    Google Scholar 

  102. Kay, J., Kummerfeld, R.J., Lauder, P.: Foundations for Personalized Documents: a Scrutable User Model Server. In: Proceedings of ADCS’2001, Australian Document Computing Symposium, pp. 43–50 (2001), http://www.cs.usyd.edu.au/~judy/Homec/Pubs/ 2001_adcs_personis.pdf

  103. Kilian, J., Petrank, E.: Identity Escrow. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 169–185. Springer, Heidelberg (1998)

    Google Scholar 

  104. Kobsa, A.: User Modeling in Dialog Systems: Potentials and Hazards. In: IFIP/GI Conference on Opportunities and Risks of Artificial Intelligence Systems, Hamburg, Germany, pp. 147–165 (1989)

    Google Scholar 

  105. Kobsa, A.: User Modeling in Dialog Systems: Potentials and Hazards. AI & Society 4, 214–240 (1990)

    Article  Google Scholar 

  106. Kobsa, A.: Tailoring Privacy to Users’ Needs (Invited Keynote). In: Bauer, M., Gmytrasiewicz, P.J., Vassileva, J. (eds.) UM 2001. LNCS (LNAI), vol. 2109, pp. 303–313. Springer, Heidelberg (2001)

    Google Scholar 

  107. Kobsa, A.: Personalization and International Privacy. Communications of the ACM 45, 64–67 (2002), doi:10.1145/767193.767196

    Article  Google Scholar 

  108. Kobsa, A., Cranor, L. (eds.): Proceedings of the UM05 Workshop ’Privacy-Enhanced Personalization’, Edinburgh, Scotland (2005), http://www.isr.uci.edu/pep05/papers/w9-proceedings.pdf

  109. Kobsa, A., Koenemann, J., Pohl, W.: Personalized Hypermedia Presentation Techniques for Improving Customer Relationships. The Knowledge Engineering Review 16, 111–155 (2001)

    Article  MATH  Google Scholar 

  110. Kobsa, A., Schreck, J.: Privacy through Pseudonymity in User-Adaptive Systems. ACM Transactions on Internet Technology 3, 149–183 (2003)

    Article  Google Scholar 

  111. Kobsa, A., Teltzrow, M.: Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users’ Data Sharing Behavior. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 329–343. Springer, Heidelberg (2005)

    Google Scholar 

  112. Kohavi, R.: Mining E-Commerce Data: the Good, the Bad, and the Ugly. In: Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, pp. 8–13. ACM Press, New York (2001), doi:10.1145/502512.502518

    Chapter  Google Scholar 

  113. Krause, J., Hirschmann, A., Mittermaier, E.: The Intelligent Help System COMFOHELP: Towards a Solution of the Practicability Problem for User Modeling and Adaptive Systems. User Modeling and User-Adapted Interaction: The Journal of Personalization Research 3, 249–282 (1993)

    Article  Google Scholar 

  114. Kumaraguru, P., Cranor, L.F.: Privacy Indexes: A Survey of Westin’s Studies. Institute for Software Research International, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, Technical Report CMU-ISRI-5-138 (Dec. 2005), http://reports-archive.adm.cs.cmu.edu/anon/isri2005/CMU-ISRI-05-138.pdf

  115. LaRose, R., Rifon, N.J.: Your Privacy Is Assured—of Being Disturbed: Comparing Web Sites with and Without Privacy Seals. New Media and Society 8, 1009–1029 (2006), doi:10.1177/1461444806069652

    Article  Google Scholar 

  116. LaRose, R., Rifon, N.J., Lee, A.: Promoting I-Safety: Effects of Privacy Warning Boxes and Privacy Seals on Risk Assessment and Online Privacy Behaviors. Paper presented at AMA, Marketing and Public Policy Conference, Salt Lake City, UT (2004)

    Google Scholar 

  117. Laufer, R.S., Proshansky, H.M., Wolfe, M.: Some Analytic Dimensions of Privacy. In: Kuller, R. (ed.) Architectural Psychology. Proceedings of the Lund Conference, pp. 353–372. Dowden, Hutchinson & Ross, Stroundsbourg (1974)

    Google Scholar 

  118. Laufer, R.S., Wolfe, M.: Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory. Journal of Social Issues 33, 22–42 (1977)

    Article  Google Scholar 

  119. Louis Harris and Associates, Westin, A. F.: Commerce, Communications, and Privacy Online: A National Survey of Computer Users (1997), http://www.harrisinteractive.org

  120. Lu, Y., Tan, B.C.Y., Hui, K.-L.: Inducing Customers to Disclose Personal Information to Internet Businesses with Social Adjustment Benefits. In: ICIS 2004, Twenty-Fifth International Conference on Information Systems, Washington, D.C., pp. 272–281 (2004), http://aisel.isworld.org/Publications/ICIS/2004/2004RP45.pdf

  121. Lutz, W.: Statement of William Lutz. American Council of Life Insurers, et al. vs. Vermont Department of Banking, Securities, and Healthcare Administration, et al. (2004), http://www.epic.org/privacy/glba/vtlutz.pdf

  122. Mabley, K.: Privacy vs. Personalization: Part III. Cyber Dialogue Inc. (2000), http://www.cyberdialogue.com/library/pdfs/wp-cd-2000-privacy.pdf

  123. Malin, B., Sweeney, L., Newton, E.: Trail Re-Identification: Learning Who You Are From Where You Have Been. Technical Report LIDAP-WP12, Carnegie Mellon University, Laboratory for International Data Privacy, Pittsburgh, PA (March 2003), http://privacy.cs.cmu.edu/people/sweeney/trails1.pdf

  124. Mayer, R.C., Davis, J.H., Schoorman, F.D.: An Integrative Model of Organizational Trust. Academy of Management Review 20, 709–734 (1995)

    Article  Google Scholar 

  125. McJones, P.: Eachmovie Collaborative Filtering Data Set (1997), http://research.compaq.com/SRC/eachmovie/

  126. Metzger, M.: Communication Privacy Management in Electronic Commerce. Journal of Computer-Mediated Communication 12 (2007), http://jcmc.indiana.edu/vol12/issue2/metzger.html

  127. Metzger, M. J.: Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce. Journal of Computer-Mediated Communication 9 (2004), http://jcmc.indiana.edu/vol9/issue4/metzger.html

  128. Metzger, M.J.: Effects of Site, Vendor, and Consumer Characteristics on Web Site Trust and Disclosure. Communication Research 33, 155–179 (2006)

    Article  Google Scholar 

  129. Metzger, M.J.: Personal Communication (2007)

    Google Scholar 

  130. Micarelli, A., Gasparetti, F., Sciarrone, F., Gauch, S.: Personalized Search on the World Wide Web. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) The Adaptive Web: Methods and Strategies of Web Personalization. LNCS, vol. 4321, pp. 195–230. Springer, Heidelberg (2007)

    Google Scholar 

  131. Miller, B.N., Konstan, J.A., Riedl, J.: PocketLens: Toward a Personal Recommender System. ACM Transactions on Information Systems 22, 437–476 (2004), doi:10.1145/1010614.1010618

    Article  Google Scholar 

  132. Milne, G.R., Boza, M.-E.: Trust and Concern in Consumers’ Perceptions of Marketing Information Management Practices. Journal of Interactive Marketing 13, 5–24 (1999)

    Article  Google Scholar 

  133. Milne, G.R., Culnan, M.J.: Strategies for Reducing Online Privacy Risks: Why Consumers Read (or Don’t Read) Online Privacy Notices. Journal of Interactive Marketing 18, 15–29 (2004), doi:10.1002/dir.20009

    Article  Google Scholar 

  134. Miyazaki, A.D., Krishnamurthy, S.: Internet Seals of Approval: Effects on Online Privacy Policies and Consumer Perceptions. Journal of Consumer Affairs 36, 28 (2002)

    Article  Google Scholar 

  135. Mobasher, B.: Data Mining for Web Personalization. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) The Adaptive Web: Methods and Strategies of Web Personalization. LNCS, vol. 4321, pp. 90–135. Springer, Heidelberg (2007)

    Google Scholar 

  136. Moores, T.: Do Consumers Understand the Role of Privacy Seals in E-Commerce? Communications of the ACM 48, 86–91 (2005), doi:10.1145/1047671.1047674

    Article  Google Scholar 

  137. Moores, T.T., Dhillon, G.: Do Privacy Seals in E-Commerce Really Work? Communications of the ACM 46, 265–271 (2003), doi:10.1145/953460.953510

    Article  Google Scholar 

  138. Mulligan, D., Schwartz, A.: Your Place or Mine?: Privacy Concerns and Solutions for Server and Client-Side Storage of Personal Information. Computers, Freedom & Privacy Conference, pp. 81–84 (1999), doi:10.1145/332186.332255

    Google Scholar 

  139. Self-Regulatory Principles for Online Preference Marketing by Network Advertisers. Network Advertising Initiative (2006), http://www.networkadvertising.org/pdfs/NAI_principles.pdf

  140. Nakashima, E.: AOL Search Queries Open Window Onto Users’ Worlds. washingtonpost.com (2006), http://www.washingtonpost.com/wp-dyn/content/article/2006/08/16/AR2006081601751_pf.html

  141. Neale, J.M., Liebert, R.M.: Science and Behavior: An Introduction to Methods of Research. Prentice-Hall, Englewood Cliffs (1973)

    Google Scholar 

  142. Recommendation of the Council Concerning Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data. OCD (1980), www1.oecd.org/publications/e-book/9302011E.PDF

  143. Orwant, J.: Heterogenous Learning in the Doppelgänger User Modeling System The. Journal of Personalization Research 4, 107–130 (1995)

    Google Scholar 

  144. Microsoft Passport Network (2006), http://www.passport.net

  145. Pavlou, P.A.: Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model. International Journal of Electronic Commerce 7, 101–134 (2003), http://mesharpe.metapress.com/link.asp?id=ymy1p2ngk06wt39f

    Google Scholar 

  146. Pazzani, M.J., Billsus, D.: Content-Based Recommendation Systems. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) The Adaptive Web: Methods and Strategies of Web Personalization. LNCS, vol. 4321, pp. 325–341. Springer, Heidelberg (2007)

    Google Scholar 

  147. Summary Report. Privacy Commissioner – Te Mana Matapono Matatapu, New Zealand (2006), http://www.privacy.org.nz/filestore/docfiles/24153322.pdf

  148. Personalization & Privacy Survey. Personalization Consortium (2000), http://www.personalization.org/SurveyResults.pdf

  149. New Survey Shows Consumers Are More Likely to Purchase At Web Sites That Offer Personalization: Consumers Willing to Provide Personal Information in Exchange for Improved Service and Benefits. Personalization Consortium, Wakefield, MA, Press Release May 9 (2001), http://web.archive.org/web/20010526174824/http://www.personalization.org/pr050901.html

  150. Pfitzmann, A., Köhntopp, M.: Anonymity, Unobservability, and Pseudonymity: A Proposal for Terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 1–9. Springer, Heidelberg (2001)

    Google Scholar 

  151. Phelps, J., Nowak, G., Ferrell, E.: Privacy Concerns and Consumer Willingness to Provide Personal Information. Journal of Public Policy & Marketing 19, 27–41 (2000), http://search.epnet.com/login.aspx?direct=true&db=buh&an=3215141

    Article  Google Scholar 

  152. Polat, H., Du, W.: Privacy-Preserving Collaborative Filtering. International Journal of Electronic Commerce 9, 9–35 (2003), http://ejournals.ebsco.com/direct.asp?ArticleID=1A72U87WVYJ61B9C

    Google Scholar 

  153. Polat, H., Du, W.: SVD-based Collaborative Filtering with Privacy. In: ACM Symposium on Applied Computing, Santa Fe, New Mexico, pp. 791–795. ACM, New York (2005)

    Chapter  Google Scholar 

  154. Portz, K., Strong, J.M., Busta, B., Schneider, K.: Do Consumers Understand What Web-Trust Means? The CPA Journal 70, 46–52 (2000), http://www.nysscpa.org/cpajournal/2000/1000/features/f104600a.htm

    Google Scholar 

  155. Preece, J., Rogers, Y., Sharp, H.: Interaction Design: Beyond Human-Computer Interaction. Wiley, New York (2002)

    Google Scholar 

  156. Opinion surveys. Privacy Exchange (2003), http://www.privacyexchange.org/iss/surveys/surveys.html

  157. Rao, J.R., Rohatgi, P. (eds.): Can Pseudonymity Really Guarantee Privacy? In: 9th USENIX Security Symposium, pp. 85–96 (2000), http://www.usenix.org/publications/library/proceedings/sec2000/full_papers/rao/rao_html

  158. Regan, K.: Does Anyone Read Online Privacy Policies? E-Commerce Times (2001), http://www.ecommercetimes.com/story/11303.html

  159. Riegelsberger, J., Sasse, M.A., McCarthy, J.D.: Shiny Happy People Building Trust?: Photos on E-commerce Websites and Consumer Trust. In: SIGCHI Conference on Human Factors in Computing Systems, Ft. Lauderdale, FL, pp. 121–128 (2003)

    Google Scholar 

  160. Rifon, N.J., LaRose, R., Choi, S.M.: Your Privacy Is Sealed: Effects of Web Privacy Seals on Trust and Personal Disclosures. Journal of Consumer Affairs 39, 339–360 (2005), doi:10.1111/j.1745

    Article  Google Scholar 

  161. Rotenberg, M.: The Privacy Law Sourcebook 2004: United States Law, International Law, and Recent Developments. EPIC, Washington (2005)

    Google Scholar 

  162. Roy, M.C., Dewit, O., Aubert, B.A.: The Impact of Interface Usability on Trust in Web Retailers. Internet Research 11, 388–398 (2001), doi:10.1108/10662240110410165

    Article  Google Scholar 

  163. Roy Morgan Research: Privacy and the Community. Prepared for the Office of the Federal Privacy Commissioner, Sydney (2001), http://www.privacy.gov.au/publications/rcommunity.pdf

  164. Schafer, J.B., Frankowski, D., Herlocker, J., Sen, S.: Collaborative Filtering Recommender Systems. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) The Adaptive Web: Methods and Strategies of Web Personalization. LNCS, vol. 4321, pp. 291–324. Springer, Heidelberg (2007)

    Google Scholar 

  165. Schoenbachler, D.D., Gordon, G.L.: Trust and Customer Willingness to Provide Information in Database-Driven Relationship Marketing. Journal of Interactive Marketing 16, 2–16 (2002), doi:10.1002/dir.10033

    Article  Google Scholar 

  166. Schreck, J.: Security and Privacy in User Modeling. Kluwer Academic Publishers, Dordrecht, Netherlands (2003), http://www.security-and-privacy-in-user-modeling.info

    MATH  Google Scholar 

  167. Sheehan, K.B., Hoy, M.G.: Flaming, Complaining, Abstaining: How Online Users Respond to Privacy Concerns. Journal of Advertising 28, 37–51 (1999), http://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=2791549&site=ehost-live

    Google Scholar 

  168. Sheehan, K.B., Hoy, M.G.: Dimensions of Privacy Concern Among Online Consumers. Journal of Public Policy & Marketing 19, 62–73 (2000), http://search.epnet.com/login.aspx?direct=true&db=buh&an=3215144

    Article  Google Scholar 

  169. Singel, R.: ’Free IPod’ Takes Privacy Toll. Wired, No. Issue, March 16 (2006), http://www.wired.com/news/technology/0,70420-0.html

  170. Smith, H.J., Milberg, S.J., Burke, S.J.: Information Privacy: Measuring Individuals’ Concerns about Organizational Practices. MIS Quarterly 20, 167–196 (1996), http://links.jstor.org/sici?sici=0276-7783%28199606%2920%3A2%3C167%3AIPMICA%3E2.0.CO%3B2-W

    Article  Google Scholar 

  171. Smyth, B.: Case-Based Recommendation. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) The Adaptive Web: Methods and Strategies of Web Personalization. LNCS, vol. 4321, pp. 342–376. Springer, Heidelberg (2007)

    Google Scholar 

  172. Spiekermann, S., Grossklags, J., Berendt, B.: E-privacy in 2nd Generation E-Commerce: Privacy Preferences versus Actual Behavior. In: EC’01: Third ACM Conference on Electronic Commerce, Tampa, FL, pp. 38–47. ACM Press, New York (2001), doi:10.1145/501158.501163

    Google Scholar 

  173. Spiekermann, S., Grossklags, J., Berendt, B.: Stated Privacy Preferences versus Actual Behaviour in EC Environments: a Reality Check. In: WI-IF 2001, the 5th International Conference Wirtschaftsinformatik - 3rd Conference Information Systems in Finance, Augsburg, Germany, pp. 129–148 (2001)

    Google Scholar 

  174. Stephanidis, C.: Adaptive Techniques for Universal Access. User Modeling and User-Adapted Interaction: The Journal of Personalization Research 11, 159–179 (2001)

    Article  MATH  Google Scholar 

  175. Stone, D., Jarrett, C., Woodroffe, M., Minocha, S.: User Interface Design and Evaluation. Morgan Kaufmann, San Francisco (2005)

    Google Scholar 

  176. Sweeney, L.: k-Anonymity: A Model for Protecting Privacy. International Journal on Uncertainty, Fuzziness, and Knowledge-based Systems 10, 557–570 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  177. Tam, E.-C., Hui, K.-L., Tan, B.C.Y.: What Do They Want? Motivating Consumers to Disclose Personal Information to Internet Businesses. In: Proceedings of the Twenty-Third Annual International Conference on Information Systems, Barcelona, Spain, pp. 11–21 (2002), http://aisel.isworld.org/pdf.asp?Vpath=ICIS/2002&PDFpath=02CRP02.pdf

  178. Tam, K.Y., Ho, S.Y.: Web Personalization: is it Effective? IT Professional 5, 53–57 (2003)

    Article  Google Scholar 

  179. Taylor, H.: Most People Are “Privacy Pragmatists” Who, While Concerned about Privacy, Will Sometimes Trade It Off for Other Benefits. The Harris Poll 17, March 19 (2003), http://www.harrisinteractive.com/harris_poll/index.asp?PID=365

  180. Teltzrow, M., Kobsa, A.: Impacts of User Privacy Preferences on Personalized Systems: a Comparative Study. In: Karat, C.-M., Blom, J., Karat, J. (eds.) Designing Personalized User Experiences for eCommerce, pp. 315–332. Kluwer Academic Publishers, Dordrecht (2004)

    Chapter  Google Scholar 

  181. Turner, C.W., Zavod, M., Yurcik, W.: Factors that Affect the Perception of Security and Privacy of Ecommerce Web Sites. In: Fourth International Conference on Electronic Commerce Research, Dallas TX, pp. 628–636 (2001), http://www.sosresearch.org/publications/icecr01.pdf

  182. Turow, J.: Americans and Online Privacy: The System is Broken. Annenberg Public Policy Center, University of Pennsylvania (2003), http://www.asc.upenn.edu/usr/jturow/internet-privacy-report/36-page-turow-version-9.pdf

  183. Health Insurance Portability and Accountability Act of 1996. 104th Congress, Aug. 21 (1996), http://aspe.hhs.gov/admnsimp/pl104191.htm

  184. Children’s Online Privacy Protection Act of 1998, http://www.ftc.gov/ogc/coppa1.htm

  185. Gramm-Leach-Bliley Act of 1999. Public Law No 106-102 (1999), http://thomas.loc.gov/cgi-bin/bdquery/z?d106:SN00900:|

  186. USACM Policy Recommendations on Privacy. U.S. Public Policy Committee of the Association for Computing Machinery, New York, NY (June 2006), http://www.acm.org/usacm/Issues/Privacy.htm

  187. Fifth Study of the Internet by the Digital Future Project Finds Major New Trends in Online Use for Political Campaigns. Center for the Digital Future, Annenberg School, University of Southern California (2005), http://www.digitalcenter.org/pdf/Center-for-the-Digital-Future-2005-Highlights.pdf

  188. van Blarkom, G.W., Borking, J.J., and Olk, J.G.E. (eds.): Handbook of Privacy and Privacy-Enhancing Technologies: The Case of Intelligent Software Agents. The Hague, The Netherlands: TNO-FEL (2003), http://www.andrewpatrick.ca/pisa/handbook/Handbook_Privacy_and_PET_final.pdf

  189. van der Hoek, A., Rakic, M., Roshandel, R., Medvidovic, N.: Taming Architectural Evolution. In: Sixth European Software Engineering Conference (ESEC) and the Ninth ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-9), Irvine, CA, pp. 1–10. ACM Press, New York (2001), doi:10.1145/503209.503211

    Google Scholar 

  190. Wang, Y., Chen, Z., Kobsa, A.: A Collection and Systematization of International Privacy Laws, with Special Consideration of Internationally Operating Personalized Websites (2006), http://www.ics.uci.edu/~kobsa/privacy

  191. Wang, Y., Kobsa, A.: A Software Product Line Approach for Handling Privacy Constraints in Web Personalization. In: Kobsa, A., Cranor, L. (eds.) PEP05, UM05 Workshop on Privacy-Enhanced Personalization, Edinburgh, Scotland, pp. 35–45 (2005), http://www.ics.uci.edu/~kobsa/papers/2005-PEP-kobsa.pdf

  192. Wang, Y., Kobsa, A., van der Hoek, A., White, J.: PLA-based Runtime Dynamism in Support of Privacy-Enhanced Web Personalization. In: 10th International Software Product Line Conference, Baltimore, MD, pp. 151–162 (2006)

    Google Scholar 

  193. Wenning, R. (ed.): The Platform for Privacy Preferences 1.1 (P3P1.1) Specification: W3C Working Draft (2006), http://www.w3.org/TR/P3P11

  194. White, T.B.: Consumer Disclosure and Disclosure Avoidance: A Motivational Framework. Journal of Consumer Psychology 14, 41–51 (2004)

    Article  Google Scholar 

  195. Xu, Y., Tan, B.C.Y., Hui, K.-L., Tang, W.-K.: Consumer Trust and Online Information Privacy. In: International Conference on Information Systems 2003, Seattle, WA, pp. 538–548 (2003), http://aisel.isworld.org/Publications/ICIS/2003/03CRP45.pdf

  196. Yankee: Interactive Consumers in the Twenty-First Century: Emerging Online Consumer Profiles, Access Strategies and Application Usage”. Yankee Group 23 (Oct. 2001), http://www.yankeegroup.com

  197. Zaslow, J.: If TiVo Thinks You Are Gay, Here’s How to Set It Straight. Wall Street Journal (Eastern Edition) A.1 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Peter Brusilovsky Alfred Kobsa Wolfgang Nejdl

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this chapter

Cite this chapter

Kobsa, A. (2007). Privacy-Enhanced Web Personalization. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds) The Adaptive Web. Lecture Notes in Computer Science, vol 4321. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72079-9_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72079-9_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72078-2

  • Online ISBN: 978-3-540-72079-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics