Privacy Respecting Targeted Advertising for Social Networks

  • Christian Kahl
  • Stephen Crane
  • Markus Tschersich
  • Kai Rannenberg
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6633)

Abstract

Online Social Networks form an increasingly important part of people’s lives. As mobile technologies improve accessibility, concerns about privacy and trust are more apparent as advertising becomes a critical component of most social network’s economic model. In this paper we describe the PICOS project’s research into privacy preserving advertising options for social networks. We introduce an architecture that includes new concepts and technologies specifically designed to improve privacy and trust as well as advertising opportunities within social networks.

Keywords

Communities Identity Management Mobile Advertising Mobile Marketing Mobile Social Networks Privacy Trust 

References

  1. 1.
    Nielsen: Critical Mass - Worldwide State of the Mobile Web. Nielsen Mobile (2008)Google Scholar
  2. 2.
    Nielsen: Global Faces and Networked Places - A Nielsen report on Social Networking’s New Global Footprint. Nielsen (2009)Google Scholar
  3. 3.
    Liesebach, K., Scherner, T.: D2.4 Requirements. Public Deliverable of EU Project PICOS (2008), www.picos-project.eu/Public-Deliverables.29.0.html
  4. 4.
    Hoegg, R., et al.: Overview of business models for Web 2.0 communities. In: Proceedings of Workshop ‘Gemeinschaften in Neuen Medien’, pp. 33–49. TUD Press, Dresden (2006)Google Scholar
  5. 5.
    Crane, S.: D4.2 Architecture v2. Public Deliverable of EU Project PICOS (2010), www.picos-project.eu/Public-Deliverables.29.0.html
  6. 6.
    Leskovec, J., Adamic, L.A., Huberman, B.A.: The Dynamics of Viral Marketing. ACM Trans. Web 1, 1 (2007), Article 5 CrossRefGoogle Scholar
  7. 7.
    Kempe, D., Kleinberg, J., Tardos, É.: Maximizing the Spread of Influence through a Social Network. In: Proceedings of Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD 2003), Washington, DC, USA (2003)Google Scholar
  8. 8.
    Hartline, J., Mirrokni, V.S., Sundararajan, M.: Optimal Marketing Strategies over Social Networks. In: Proceedings of the International World Wide Web Conference Committee 2008 (WWW 2008), Beijing, China, April 21-25 (2008)Google Scholar
  9. 9.
    Schrammel, J., Köffel, C., Weiss, S., Kahl, C.: D2.2 Categorisation of Communities. Public Deliverable of EU Project PICOS (2008), www.picos-project.eu/Public-Deliverables.29.0.html
  10. 10.
    Kosta, E., Dumortier, J.: D2.3 Contextual Framework. Public Deliverable of EU Project PICOS (2008), www.picos-project.eu/Public-Deliverables.29.0.html
  11. 11.
    Müller, G., Wohlgemuth, S.: Study on Mobile Identity Management, Public Deliverable of EU Project FIDIS (2005), www.fidis.net/fileadmin/fidis/deliverables/fidis-wp3-del3.3.study_on_mobile_identity_management.pdf
  12. 12.
    Hansen, M., Berlich, P., Camenisch, J., Clauß, S., Pfitzmann, A., Waidner, M.: Privacy-Enhancing Identity Management. Information Security Technical Report 9(1), 35–44 (2004)CrossRefGoogle Scholar
  13. 13.
    Chew, M., Balfanz, D., Laurie, B.: Undermining Privacy in Social Networks. In: Web 2.0 Security and Privacy (in conj. with IEEE Symposium on Security and Privacy) (2008)Google Scholar
  14. 14.
    Adu-Oppong, F., Gardiner, C.K., Kapadia, A., Tsang, P.P.: Social Circles: Tackling Privacy in Social Networks. In: Proceedings of the 4th Symposium on Usable Privacy and Security (SOUPS 2008), Pittsburgh, Pennsylvania, July 23-25 (2008)Google Scholar
  15. 15.
    Hiltz, S.R., Passerini, K.: Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace. In: Proceedings of AMCIS 2007 (2007)Google Scholar
  16. 16.
    Dobele, A., Lindgreen, A., Beverland, M., Vanhamme, J., van Wijk, R.: Why pass on viral messages? Because they connect emotionally. Business Horizons 50(4), 291–304 (2007)CrossRefGoogle Scholar
  17. 17.
    Kahl, C., Böttcher, K., Tschersich, M., Heim, S., Rannenberg, K.: How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project. In: Rannenberg, K., Varadharajan, V., Weber, C. (eds.) SEC 2010. IFIP Advances in Information and Communication Technology, vol. 330, pp. 277–288. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  18. 18.
    Kotler, P., Armstrong, G.: Principles of Marketing, 11th edn. Prentice-Hall, New Jersey (2006)Google Scholar
  19. 19.
    Kollmann, T.: E-Venture, 1st edn., Gabler, Germany (2006)Google Scholar
  20. 20.
    Schulz, S., Mau, G., Löffler, S.: Virales Marketing im Web 2.0. In: Kilian, T., Hass, B., Walsh, G. (Hg.) Web 2.0 – Neue Perspektiven im E-Business, pp. 249–268. Springer, Heidelberg (2007)Google Scholar
  21. 21.
    Dobele, A., Toleman, D., Beverland, M.: Controlled infection! Spreading the brand message through viral marketing. Business Horizons 48(2), 143–149 (2005)CrossRefGoogle Scholar
  22. 22.
    Study on Social Network Adertisements. Linkshare (2009), www.netimperative.com/news/2009/august/social-network-ads-2018failing-to-engage-users2019 (retrieved on 2010-06-08)
  23. 23.
    IDC Report. U.S. Consumer Online Attitudes Survey Results, Part III: Social Networking. IDC (2008), www.idc.com/getdoc.jsp?containerId=214899 (retrieved on 2010-06-08)
  24. 24.
    Kahl, C., Albers, A.: Towards reasonable Revenue Streams through Marketing in Mobile Social Networks. In: Proceedings of the Multikonferenz Wirtschaftsinformatik (MKWI), Göttingen, Germany (2010)Google Scholar
  25. 25.
    Palmer, A., Koenig-Lewis, N.: An experiential, social network-based approach to direct marketing. Direct Marketing: An International Journal 3(3), 162–176 (2009)CrossRefGoogle Scholar
  26. 26.
    Phelps, J.E., Lewis, R., Mobilio, L., Perry, D., Raman, N.: Viral Marketing or Electronic Word-of-Mouth Advertising: Examining Consumer Responses and Motivations to Pass Along Email. Journal of Advertising Research 44(4), 333–348 (2004)Google Scholar
  27. 27.
    Ho, S.Y.: Opportunities and challenges of mobile personalization: An exploratory study. In: Newell, S., Whitley, E.A., Pouloudi, N., Wareham, J., Mathiassen, L. (eds.) Proceedings of 17th European Conference on Information Systems (ECIS 2009), Verona, Italy, pp. 1211–1222 (2009)Google Scholar
  28. 28.
    Albers, A., Kahl, C.: Prototypical Implementation of an Intermediary Platform for Context-sensitive Mobile Marketing Applications. In: Proceedings of the 14th Americas Conference on Information Systems (AMCIS), Toronto, Canada (2008)Google Scholar
  29. 29.
    Commercialisation of Context-sensitive Mobile Attention in Mobile Media Markets - Design Recommendations for Mobile Marketing Providers, Schriften zum Mobile Commerce und zum Mobilfunk, Verlag Dr. Kovač, Hamburg, GermanyGoogle Scholar
  30. 30.
    Pousttchi, K., Turowski, K., Wiedemann, D.G.: Mobile Viral Marketing - Ein State of the Art. In: Bauer, H.H., Dirks, T., Bryant, M.D. (Hrsg.) (eds.) Erfolgsfaktoren des Mobile Marketing. Strategien, Konzepte und Instrumente, pp. S.289–S.304. Springer, Berlin (2008)Google Scholar
  31. 31.
    Subramani, M., Rajagopalan, B.: Knowledge Sharing and Influence in Online Social Networks via Viral Marketing. Communications of the ACM 46(12), 300–307 (2003)CrossRefGoogle Scholar
  32. 32.
    Carroll, E.: Success Factors of Online Social Networks. The University of North Carolina, Chapel Hill, USA (2007)Google Scholar
  33. 33.
    Ho, S.Y., Kwok, S.H.: The Attraction of Personalized Service for Users in Mobile Commerce: An Empirical Study. ACM SIGecom Exchanges 3(4), 10–18 (2002)CrossRefGoogle Scholar
  34. 34.
    Schmidt, A., Beigl, M., Gellersen, H.-W.: There is more to Context than Location. Computers and Graphics 20, S.893–S.901 (1998)Google Scholar
  35. 35.
    Hristova, N., O’Hare, G.M.P.: Ad-me: Wireless Advertising Adapted to the User Location, Device and Emotions. In: Proceedings of 37th Hawaii International Conference on System Sciences, Hawaii, USA (2005)Google Scholar
  36. 36.
    Beales, H.: The Value of Behavioral Targeting (Study), Networked Advertising Initative (2010)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2011

Authors and Affiliations

  • Christian Kahl
    • 1
  • Stephen Crane
    • 2
  • Markus Tschersich
    • 1
  • Kai Rannenberg
    • 1
  1. 1.Chair of Mobile Business & Multilateral SecurityGoethe University FrankfurtFrankfurt am MainGermany
  2. 2.Hewlett-Packard LabsBRISTOLUK

Personalised recommendations