Security and Privacy in User Modeling

Free Download

Authors:

Edition: 1

Series: Human-Computer Interaction Series 2

Volume: Vol.20

ISBN: 978-1-4020-0589-2, 978-1-4020-1130-6, 140201130X

Size: 8 MB (7942670 bytes)

Pages: 210/338

File format:

Language:

Publishing Year:

Category: Tags: , , , , ,

Jörg Schreck (auth.)978-1-4020-0589-2, 978-1-4020-1130-6, 140201130X

User-adaptive (or “personalized”) systems take individual character­ istics of their current users into account and adapt their behavior ac­ cordingly. Several empirical studies demonstrate their benefits in areas like education and training, online help for complex software, dynamic information delivery, provision of computer access to people with dis­ abilities, and to some extent information retrieval. Recently, personal­ ized systems have also started to appear on the World Wide Web where they are primarily used for customer relationship management. The aim hereby is to provide value to customers by serving them as individuals and by offering them a unique personal relationship with the business. Studies show that web visitors indeed spend considerably more time at personalized than at regular portals and view considerably more web pages. Personalized sites in general also draw more visitors and turn more visitors into buyers. Personalization therefore would look like a win-win technology for both consumers and online businesses. However, it has a major down­ side: in order to be able to exhibit personalized behavior, user-adaptive systems have to collect considerable amounts of personal data and “lay them in stock” for possible future usage. Moreover, the collection of information about the user is often performed in a relatively inconspic­ uous manner (such as by monitoring users’ web navigation behavior), in order not to distract users from their tasks.

Table of contents :
Front Matter….Pages i-xxi
Introduction….Pages 1-8
Front Matter….Pages 9-9
User Modeling….Pages 11-16
Privacy….Pages 17-25
Security….Pages 27-31
Front Matter….Pages 33-35
Requirements for Anonymity and Pseudonymity….Pages 37-46
Requirements for Security….Pages 47-61
Front Matter….Pages 63-66
Solutions for Anonymity and Pseudonymity….Pages 67-94
Solutions for Security….Pages 95-156
Front Matter….Pages 157-157
Selected User Modeling Components….Pages 159-179
Summary and Conclusion….Pages 181-186
Back Matter….Pages 187-210

Reviews

There are no reviews yet.

Be the first to review “Security and Privacy in User Modeling”
Shopping Cart
Scroll to Top