Advertisement

Tailoring Collaboration According Privacy Needs in Real-Identity Collaborative Systems

  • Mohamed Bourimi
  • Falk Kühnel
  • Jörg M. Haake
  • Dhiah el Diehn I. Abou-Tair
  • Dogan Kesdogan
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5784)

Abstract

Nowadays, collaboration and social interaction among people become everyday activities in our evolving information age. In many learning platforms, collaborative platforms in the educational and industrial field or social networks like LinkedIn or Xing, users have to disclose private information and reveal their identities. Working with those systems allows them to create user profiles which could reveal more information about the user, than he wants to give. Furthermore, such environments may construct profiles about users’ interaction, which may be used for attacks; thus preserving privacy is an essential component of such environments. In this paper, a decentralized group-centric approach for tailoring collaboration according privacy needs is introduced. The main idea of our approach lays in its construction. In contrast to traditional collaboration environments with central hosting, our approach gives each group the whole responsibility of hosting the collaboration environment by using their own technical means. The feasibility of our approach is demonstrated through a lightweight ubiquitous collaboration platform. The experiences gathered are discussed.

Keywords

Shared workspaces adaptation group context privacy tailoring 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Implementing P3P using database technology. In: ICDE, pp. 595–606 (2003)Google Scholar
  2. 2.
    Antón, A.I., Bertino, E., Li, N., Yu, T.: A roadmap for comprehensive online privacy policy management. CACM 50(7), 109–116 (2007)CrossRefGoogle Scholar
  3. 3.
    Bellotti, V., Sellen, A.J.: Design for privacy in ubiquitous computing environments. In: de Michelis, G., Simone, C., Schmidt, K. (eds.) Proceedings of the Third European Conference on Computer Supported Cooperative Work - ECSCW 1993, pp. 77–92. Kluwer, Dordrecht (1993)Google Scholar
  4. 4.
    Borcea-Pfitzmann, K., Liesebach, K., Pfitzmann, A.: Establishing a privacy-aware collaborative elearning environment. In: Proceedings of the EADTU Annual Conference 2005: Towards Lisbon 2010: Collaboration for Innovative Content in Lifelong Open and Flexible Learning (2005)Google Scholar
  5. 5.
    Bourimi, M.: Collaborative design and tailoring of web based learning environments in CURE. In: Dimitriadis, Y.A., Zigurs, I., Gómez-Sánchez, E. (eds.) CRIWG 2006. LNCS, vol. 4154, pp. 421–436. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  6. 6.
    Bourimi, M., Lukosch, S., Kuehnel, F.: Leveraging visual tailoring and synchronous awareness in web-based collaborative systems. In: Haake, J.M., Ochoa, S.F., Cechich, A. (eds.) CRIWG 2007. LNCS, vol. 4715, pp. 40–55. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  7. 7.
    Boyle, M., Greenberg, S.: The language of privacy: Learning from video media space analysis and design. ACM Trans. Comput.-Hum. Interact. 12(2), 328–370 (2005)CrossRefGoogle Scholar
  8. 8.
    Boyle, M., Neustaedter, C., Greenberg, S.: Privacy factors in video-based media spaces. In: Harrision, S. (ed.) n Media Space: 20+ Years of Mediated Life, pp. 99–124. Springer, Heidelberg (2008)Google Scholar
  9. 9.
    Camenisch, J., Crane, S., Fischer-Hbner, S., Leenes, R., Pearson, S., Pettersson, J.S., Sommer, D., Andersson, C.: Trust in PRIME. In: Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, December 2005, pp. 552–559 (2005)Google Scholar
  10. 10.
    Cha, S.C., Joung, Y.J.: From P3P to data licenses. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 205–221. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  11. 11.
    Cheng, L.T., Patterson, J., Rohall, S.L., Hupfer, S., Ross, S.: Weaving a social fabric into existing software. In: AOSD 2005: Proceedings of the 4th international conference on Aspect-oriented software development, pp. 147–158. ACM Press, New York (2005)Google Scholar
  12. 12.
    Clement, A.: Considering privacy in the development of multimedia communications, pp. 907–931 (1996)Google Scholar
  13. 13.
    Cranor, L., Langheinrich, M., Marchioriand, M., Presler-Marshall, M., Reagle, J.: Platform for privacy preferences (p3p). In: W3C Recommendations (2002)Google Scholar
  14. 14.
    Dourish, P.: Culture and control in a media space. In: ECSCW 1993: Proceedings of the third conference on European Conference on Computer-Supported Cooperative Work, Norwell, MA, USA, pp. 125–137. Kluwer Academic Publishers, Dordrecht (1993)Google Scholar
  15. 15.
    EPAL: The enterprise privacy authorization language, epal 1.2 specification. IBM (2004)Google Scholar
  16. 16.
    EPIC, Junkbuster: Pretty Poor Privacy: An Assessment of P3P and Internet Privacy (2002)Google Scholar
  17. 17.
    EU News: Citizens’ privacy must become priority in digital age, says EU Commissioner Reding (2009), http://ec.europa.eu/informationsociety/newsroom/cf/itemdetail.cfm?itemid=4881
  18. 18.
    Fischer-Huebner, S.: Privacy-Enhancing Technologies, Lecture Notes in Computer Science. LNCS. Springer, Heidelberg (2001)Google Scholar
  19. 19.
    Gross, R., Acquisti, A., Heinz III, H.J.: Information revelation and privacy in online social networks. In: WPES 2005: Proceedings of the 2005 ACM workshop on Privacy in the electronic society, pp. 71–80. ACM, New York (2005)CrossRefGoogle Scholar
  20. 20.
    Gutwin, C., Stark, G., Greenberg, S.: Support for workspace awareness in educational groupware. In: CSCL 1995: The first international conference on Computer support for collaborative learning, Hillsdale, NJ, USA, pp. 147–156. L. Erlbaum Associates Inc., Mahwah (1995)CrossRefGoogle Scholar
  21. 21.
    Haake, J.M., Schümmer, T., Haake, A., Bourimi, M., Landgraf, B.: Supporting flexible collaborative distance learning in the cure platform, vol. 1, p. 10003a. IEEE Computer Society, Los Alamitos (2004)Google Scholar
  22. 22.
    Haake, J.M., Schümmer, T., Haake, A., Bourimi, M., Landgraf, B.: Two-level tailoring support for CSCL. In: Favela, J., Decouchant, D. (eds.) CRIWG 2003. LNCS, vol. 2806, pp. 74–81. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  23. 23.
    Haake, J.M., Haake, A., Schümmer, T., Bourimi, M., Landgraf, B.: End-user controlled group formation and access rights management in a shared workspace system. In: CSCW 2004: Proceedings of the 2004 ACM conference on Computer supported cooperative work, Chicago, Illinois, USA, November 6-10, pp. 554–563. ACM Press, New York (2004)Google Scholar
  24. 24.
    Isenberg, D.: GigaLaw Guide to Internet Law. Random House Inc., New York (2002)Google Scholar
  25. 25.
    Koch, M., Richter, A.: Enterprise 2.0: Planung, Einführung und erfolgreicher Einsatz von Social Software in Unternehmen: Planung, Einführung und erfolgreicher Einsatz von Social Software in Unternehmen. Oldenbourg, München, Wien (2007)Google Scholar
  26. 26.
    Kühnel, F.: Visual tailoring and synchronous awareness support in web-based collaborative systems. Master’s thesis, FernUniversität in Hagen (January 2008)Google Scholar
  27. 27.
    Lukosch, S., Bourimi, M.: Towards an enhanced adaptability and usability of web-based collaborative systems. International Journal of Cooperative Information Systems, Special Issue on ’Design, Implementation of Groupware, 467–494 (2008)Google Scholar
  28. 28.
    Narayanan, A., Shmatikov, V.: De-anonymizing social networks (2009)Google Scholar
  29. 29.
    Palen, L., Dourish, P.: Unpacking “privacy” for a networked world. In: CHI 2003: Proceedings of the SIGCHI conference on Human factors in computing systems, pp. 129–136. ACM Press, New York (2003)Google Scholar
  30. 30.
    Pearson, S.: Towards automated evaluation of trust constraints. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 252–266. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  31. 31.
  32. 32.
    Smale, S.K.: Collecting and Sharing Transient Personal Information Online. Master’s thesis, University Of Calgary (November 2007)Google Scholar
  33. 33.
    Szugat, M., Gewehr, J.E., Lochmann, C.: Social Software, 1st edn. Entwickler Press (2007)Google Scholar
  34. 34.
    Tang, J.C., Isaacs, E.A., Rua, M.: Supporting distributed groups with a montage of lightweight interactions. In: CSCW 1994: Proceedings of the 1994 ACM conference on Computer supported cooperative work, pp. 23–34. ACM, New York (1994)CrossRefGoogle Scholar
  35. 35.
    Woolf, B.P.: Building Intelligent Interactive Tutors. Morgan Kaufman, San Francisco (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Mohamed Bourimi
    • 1
  • Falk Kühnel
    • 2
  • Jörg M. Haake
    • 1
  • Dhiah el Diehn I. Abou-Tair
    • 3
  • Dogan Kesdogan
    • 3
  1. 1.Cooperative SystemsFernUniversität in HagenHagenGermany
  2. 2.justread GmbH&Co. KGBonnGermany
  3. 3.Chair for IT SecurityUniversity of SiegenSiegenGermany

Personalised recommendations