article

Privacy-enhanced personalization

Online:01 August 2007Publication History

Abstract

Multi-pronged strategies are needed to reconcile the tension between personalization and privacy.

Supplemental Material

References

  1. Acquisti, A. Privacy in electronic commerce and the economics of immediate gratification. In EC'04 ACM Conference on Electronic Commerce, (New York, NY, 2004), 21--29; doi 10.1145/988772.988777. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Brusilovsky, P., Kobsa, A. and Nejdl, W. Eds. The Adaptive Web: Methods and Strategies of Web Personalization. Springer Verlag, 2007; doi 10.1007/978--3--540--72079--9.Google ScholarGoogle Scholar
  3. Chellappa, R.K. and Sin, R. Personalization versus privacy: An empirical examination of the online consumer's dilemma. Information Technology and Management 6, 2--3 (2005), 181--202; doi 10.1007/s10799-005--5879-y. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Cranor, L.F. `I didn't buy it for myself': Privacy and ecommerce personalization. In 2003 ACM Workshop on Privacy in the Electronic Society, (Washington, DC, 2003), ACM Press; doi 10.1145/1005140. 1005158. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Fogg, B.J. Persuasive Technology: Using Computers to Change What We Think and Do. Morgan Kaufmann Publishers, San Francisco, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Gideon, J., Cranor, L., Egelman, S. and Acquisti, A. Power strips, prophylactics, and privacy, oh my! In Second Symposium on Usable Privacy and Security, (Pittsburgh, PA, 2006), ACM Press, 133--144; doi 10.1145/1143120.1143137. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Huberman, B.A., Adar, E. and Fine, L.R. Valuating privacy. In Fourth Workshop on the Economics of Information Security, (Cambridge, MA, 2005); http://infosecon.net/workshop/pdf/7.pdf.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Kobsa, A. Privacy-enhanced Web personalization. In The Adaptive Web: Methods and Strategies of Web Personalization. P. Brusilovsky, A. Kobsa, and W. Nejdl, eds. Springer Verlag, 2007, 628--670; doi 10.1007/978-3-540--72079--9_21. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Kobsa, A., Chellappa, R.K. and Spiekermann, S. Eds. Proceedings of CHI-2006 Workshop on Privacy-Enhanced Personalization (Montréal, Canada, 2006); www.isr.uci.edu/pep06/papers/Proceedings_ PEP06.pdf.Google ScholarGoogle Scholar
  10. Kobsa, A. and Cranor, L., Eds. Proceedings of the UM05 Workshop `Privacy-Enhanced Personalization.' Edinburgh, Scotland, 2005; www.isr.uci.edu/pep05/papers/w9-proceedings.pdf.Google ScholarGoogle Scholar
  11. Kobsa, A. and Teltzrow, M. Contextualized communication of privacy practices and personalization benefits: Impacts on users' data sharing behavior. In Privacy Enhancing Technologies: Fourth International Workshop (Toronto, Canada, 2005). D. Martin and and A. Serjantov, Eds. Springer Verlag, 329-343; doi 10.1007/11423409_21. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Schreck, J. Security and Privacy in User Modeling. Kluwer Academic Publishers, Dordrecht, Netherlands, 2003; http://www.security-and-privacy-in-user-modeling.info. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Privacy-enhanced personalization

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            Communications of the ACM cover image
            Communications of the ACM  Volume 50, Issue 8
            August 2007
            94 pages
            ISSN:0001-0782
            EISSN:1557-7317
            DOI:10.1145/1278201
            Issue’s Table of Contents

            Copyright © 2007 ACM

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Online: 1 August 2007

            Permissions

            Request permissions about this article.

            Request Permissions

            Qualifiers

            • article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format
          About Cookies On This Site

          We use cookies to ensure that we give you the best experience on our website.

          Learn more

          Got it!