Community support and identity management

Computer based community support systems can provide powerful support in direct exchange of information and in finding people for information exchange. Such applications usually make use of information about the user (user profile information) for personalization and for supporting contact management As in real life, a user will interact with different communities (community support applications) hosted by different providers. With the current approach users have to provide and update information about their identity and interests for each community independently. That results in cold-start problems with new community support applications and in inconvenience for the user In this paper we discuss user-centric identity management for community support applications and concentrate on a platform for using user profiles in more than one application. We also propose mechanisms to address privacy issues in this framework.

[1]  Marc Langheinrich,et al.  The platform for privacy preferences 1.0 (p3p1.0) specification , 2002 .

[2]  Michael Koch,et al.  Integrating community services-a common infrastructure proposal , 2000, KES'2000. Fourth International Conference on Knowledge-Based Intelligent Engineering Systems and Allied Technologies. Proceedings (Cat. No.00TH8516).

[3]  Sara A. Bly,et al.  Virtual environments at work: ongoing use of MUDs in the workplace , 1999, Workshop on Cross-Organisational Workflow Management and Co-ordination.

[4]  David Chaum,et al.  Security without identification: transaction systems to make big brother obsolete , 1985, CACM.

[5]  Roger Clarke,et al.  Internet privacy concerns confirm the case for intervention , 1999, CACM.

[6]  R. Sandhu,et al.  Access control: principles and practice , 1994, IEEE Commun. Mag..

[7]  Lorrie Faith Cranor Agents of Choice: Tools that Facilitate Notice and Choice about Web Site Data Practices , 2000, ArXiv.

[8]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[9]  P. Kollock,et al.  Communities in Cyberspace , 2002 .

[10]  Mark S. Ackerman,et al.  Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.

[11]  Tim Howes,et al.  A MIME Content-Type for Directory Information , 1998, RFC.

[12]  Ari Schwartz,et al.  Your place or mine?: privacy concerns and solutions for server and client-side storage of personal information , 2000, CFP '00.

[13]  Judith Donath,et al.  Identity and deception in the virtual community , 1998 .

[14]  Oliver Berthold,et al.  Identity Management Based on P3P , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[15]  Antonietta Grasso,et al.  Augmenting recommender systems by embedding interfaces into practices , 1999, GROUP '99.

[16]  Michael Koch,et al.  The Comovie Movie Recommender-An Interoperable Community Support Application , 2001 .

[17]  Michael Koch,et al.  Das CommunityItemsTool—Interoperable Unterstützung von Interessens-Communities in der Praxis , 2001 .

[18]  Elizabeth D. Mynatt,et al.  Design for network communities , 1997, CHI.

[19]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[20]  P. Samarati,et al.  Access control: principle and practice , 1994, IEEE Communications Magazine.

[21]  Elizabeth F. Churchill,et al.  Virtual environments at work: ongoing use of MUDs in the workplace , 1999 .

[22]  John Riedl,et al.  GroupLens: an open architecture for collaborative filtering of netnews , 1994, CSCW '94.

[23]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[24]  Lorrie Faith Cranor,et al.  The platform for privacy preferences , 1999, CACM.

[25]  Victoria Neufeldt,et al.  Webster's New World Dictionary of American English , 1988 .