Learning Privacy Preferences

This paper suggests a machine learning approach to preference generation in the context of privacy agents. With this solution, users are relieved from the complex task of specifying their preferences beforehand, disconnected from actual situations. Instead, historical privacy decisions are used as a basis for providing privacy recommendations to users in new situations. The solution also takes into account the reasons why users act as they do, and allows users to benefit from information on the privacy trade-offs made by others.

[1]  Bettina Berendt,et al.  E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior , 2001, EC '01.

[2]  Mark S. Ackerman,et al.  The Intellectual Challenge of CSCW: The Gap Between Social Requirements and Technical Feasibility , 2000, Hum. Comput. Interact..

[3]  John Sören Pettersson,et al.  Making PRIME usable , 2005, SOUPS '05.

[4]  Mark S. Ackerman,et al.  Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.

[5]  Scott Flinn,et al.  User Perceptions of Privacy and Security on the Web , 2005, PST.

[6]  Susan T. Dumais,et al.  A Bayesian Approach to Filtering Junk E-Mail , 1998, AAAI 1998.

[7]  Lorrie Faith Cranor,et al.  A "nutrition label" for privacy , 2009, SOUPS.

[8]  Carlos Fernández-Valdivielso,et al.  Personal Privacy Management for Common Users , 2009 .

[9]  Ray Bareiss,et al.  Concept Learning and Heuristic Classification in WeakTtheory Domains , 1990, Artif. Intell..

[10]  Günther Pernul,et al.  Generating User-Understandable Privacy Preferences , 2009, 2009 International Conference on Availability, Reliability and Security.

[11]  James A. Landay,et al.  Personal privacy through understanding and action: five pitfalls for designers , 2004, Personal and Ubiquitous Computing.

[12]  小池 雄一 P3P(Platform for Privacy Preferences) , 2001 .

[13]  Agnar Aamodt,et al.  Knowledge-Intensive Case-Based Reasoning in CREEK , 2004, ECCBR.

[14]  Agnar Aamodt,et al.  Case-Based Reasoning: Foundational Issues, Methodological Variations, and System Approaches , 1994, AI Commun..

[15]  Inger Anne Tøndel,et al.  Towards a Similarity Metric for Comparing Machine-Readable Privacy Policies , 2011, iNetSeC.

[16]  Günther Pernul,et al.  Collaborative privacy management , 2010, Comput. Secur..

[17]  Lorrie Faith Cranor,et al.  User interfaces for privacy agents , 2006, TCHI.

[18]  Marit Hansen Putting Privacy Pictograms into Practice - a European Perspective , 2009, GI Jahrestagung.

[19]  Lorrie Faith Cranor,et al.  User-controllable learning of security and privacy policies , 2008, AISec '08.

[20]  Lorrie Faith Cranor,et al.  The platform for privacy preferences , 1999, CACM.

[21]  Elizabeth D. Mynatt,et al.  Supporting Privacy Management via Community Experience and Expertise , 2005 .

[22]  C. Michael Sperberg-McQueen,et al.  World Wide Web Consortium , 2009, Encyclopedia of Database Systems.

[23]  Robert W Proctor,et al.  A multimethod approach to examining usability of Web privacy polices and user agents for specifying privacy preferences , 2007, Behavior research methods.

[24]  John Riedl,et al.  Item-based collaborative filtering recommendation algorithms , 2001, WWW '01.

[25]  Oliver Günther,et al.  Privacy in e-commerce: stated preferences vs. actual behavior , 2005, CACM.

[26]  Lorrie Faith Cranor,et al.  Understanding and capturing people’s privacy policies in a mobile social networking application , 2009, Personal and Ubiquitous Computing.