Skip to main content

Enforcing Privacy in Secondary User Information Sharing and Usage

  • Conference paper
User Modeling, Adaptation, and Personalization (UMAP 2013)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7899))

Abstract

Secondary user information sharing and usage for purposes other than what it was primarily collected for has become an increasing trend, especially, as we witness a surge in the volume of data collected from and about users online. Although, allowing secondary sharing and usage of data in new and innovative ways is beneficial to the user and the society at large, it also poses the privacy risks of sharing and using personal information for unintended purposes. This paper discusses my PhD thesis towards creating a privacy framework for secondary user information sharing. The aim is to develop an infrastructure that enables sharing of user information across applications and services for beneficial purposes, while balancing it with protecting the user against the potential privacy risks. This paper discusses current work and open challenges.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Breslin, J.G., Passant, A., Decker, S.: The Social Semantic Web. Springer, Heidelberg (2009) ISBN: 3642011713, 9783642011719.

    Book  Google Scholar 

  2. Heckmann, D., Schwartz, T., Brandherm, B., Kröner, A.: Decentralized User Modeling with UserML and GUMO. In: Dolog, P., Vassileva, J. (eds.) Proceedings of the Workshop on Decentralized, Agent Based and Social Approaches to User Modeling, DASUM 2005, at UM 2005, Edinburgh, Scotland, pp. 61–66 (July 2005)

    Google Scholar 

  3. World Economic Forum Report. Unlocking the Economic Value of Personal Data: Balancing Growth and Protection (October 2012), http://www3.weforum.org/docs/WEF_IT_/UnlockingValueData_BalancingGrowthProtection_SessionSummary.pdf

  4. Cena, F., Gena, C.: Designing and evaluating new generation user models (NewGUMs). Tutorial at UMAP (2012), Slides accessed, http://umap2012.polymtl.ca/en/workshops-and-tutorials/84-workshops-and-tutorials/104

  5. Kobsa, A.: Generic User Modeling Systems. User Modeling and User-Adapted Interaction 11, 49–63 (2001)

    Article  MATH  Google Scholar 

  6. Dolog, P., Kay, J., Kummerfeld, B.: Personal lifelong user model clouds. In: Proceeding of the Lifelong User Modelling Workshop at UMAP 2009 User Modeling Adaptation, and Personalization, pp. 1–8 (2009)

    Google Scholar 

  7. Berkovsky, S., Kuflik, T., Ricci, F.: Mediation of User Models for Enhanced Personalization in Recommender Systems. User Modeling and User-Adapted Interaction 18(3), 245–286 (2007)

    Article  Google Scholar 

  8. Abel, F., Henze, N., Herder, E., Krause, D.: Linkage, Aggregation, Alignment and Enrichment of Public User Profiles with Mypes. In: Proc. 6th Int. Conf. Semantic Systems (I-SEMANTICS), Graz, Austria, Article No. 11 (September 2010) ISBN: 978-1-4503-0014-8

    Google Scholar 

  9. Wang, Y., Kobsa, A.: Respecting users’ individual privacy constraints in web personalization. In: Conati, C., McCoy, K., Paliouras, G. (eds.) UM 2007. LNCS (LNAI), vol. 4511, pp. 157–166. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  10. Acquisti, A., John, L., Loewenstein, G.: What is privacy worth? In: Twenty First Workshop on Information Systems and Economics (WISE) (2009)

    Google Scholar 

  11. Knijnenburg, B.P., Kobsa, A.: Helping Users with Information Disclosure Decisions: Potential for Adaptation. In: Conference on Intelligent User Interfaces, IUI (2013), http://www.usabart.nl/portfolio/paper-iui2013.html

  12. Tsai, J.Y., Egelman, S., Cranor, L., Acquisti, A.: The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study. Journal of Information Systems Research 22(2), 254–291 (2011)

    Article  Google Scholar 

  13. Westin, A.: Harris Louis & Associates. Harris-Equifax Consumer Privacy Survey.Tech. rep, Conducted for Equifax Inc. 1,255 adults of the U.S. public (1991)

    Google Scholar 

  14. Iyilade, J., Vassileva, J.: A Framework for Privacy-Aware User Data Trading. In: Carberry, S., Weibelzahl, S., Micarelli, A., Semeraro, G. (eds.) UMAP 2013. LNCS, vol. 7899, pp. 310–317. Springer, Heidelberg (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Iyilade, J. (2013). Enforcing Privacy in Secondary User Information Sharing and Usage. In: Carberry, S., Weibelzahl, S., Micarelli, A., Semeraro, G. (eds) User Modeling, Adaptation, and Personalization. UMAP 2013. Lecture Notes in Computer Science, vol 7899. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38844-6_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38844-6_48

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38843-9

  • Online ISBN: 978-3-642-38844-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics