Mostrar el registro sencillo del ítem
dc.contributor.author | Serrano, Emilio | es_ES |
dc.contributor.author | Such, Jose M. | es_ES |
dc.contributor.author | Botia, Juan A. | es_ES |
dc.contributor.author | García Fornes, Ana María | es_ES |
dc.date.accessioned | 2015-05-19T09:47:29Z | |
dc.date.available | 2015-05-19T09:47:29Z | |
dc.date.issued | 2014-01 | |
dc.identifier.issn | 0924-669X | |
dc.identifier.uri | http://hdl.handle.net/10251/50447 | |
dc.description.abstract | Agent-based electronic commerce is known to offer many advantages to users. However, very few studies have been devoted to deal with privacy issues in this domain. Privacy is of great concern and preserving users' privacy plays a crucial role to promote their trust in agent-based technologies. In this paper, we focus on preference profiling, which is a well-known threat to users' privacy. Specifically, we review strategies for customers' agents to prevent seller agents from obtaining accurate preference profiles of the former group by using data mining techniques. We experimentally show the efficacy of each of these strategies and discuss their suitability in different situations. Our experimental results show that customers can improve their privacy notably with these strategies. | es_ES |
dc.description.sponsorship | This research work is supported by the Spanish Ministry of Science and Innovation in the scope of the Research Projects TSI-020302-2010-129, TIN2011-28335-C02-02 and through the Fundacion Seneca within the Program 04552/GERM/06. | en_EN |
dc.language | Inglés | es_ES |
dc.publisher | Springer Verlag (Germany) | es_ES |
dc.relation.ispartof | Applied Intelligence | es_ES |
dc.rights | Reserva de todos los derechos | es_ES |
dc.subject | Privacy | es_ES |
dc.subject | Agent-based e-commerce | es_ES |
dc.subject | Preference profiling | es_ES |
dc.subject | Interaction analysis | es_ES |
dc.subject | Data mining | es_ES |
dc.subject.classification | LENGUAJES Y SISTEMAS INFORMATICOS | es_ES |
dc.title | Strategies for avoiding preference profiling in agent-based e-commerce environments | es_ES |
dc.type | Artículo | es_ES |
dc.identifier.doi | 10.1007/s10489-013-0448-2 | |
dc.relation.projectID | info:eu-repo/grantAgreement/MICINN//TIN2011-28335-C02-02/ES/FUNDAMENTOS PARA EL DESARROLLO DE SERVICIOS Y APLICACIONES AAL/ | es_ES |
dc.relation.projectID | info:eu-repo/grantAgreement/f SéNeCa/Funding Program for Research Groups of Excellence/04552%2FGERM%2F06/ | es_ES |
dc.relation.projectID | info:eu-repo/grantAgreement/MICINN//TSI-020302-2010-129/ES/ | es_ES |
dc.rights.accessRights | Abierto | es_ES |
dc.contributor.affiliation | Universitat Politècnica de València. Departamento de Sistemas Informáticos y Computación - Departament de Sistemes Informàtics i Computació | es_ES |
dc.description.bibliographicCitation | Serrano, E.; Such, JM.; Botia, JA.; García Fornes, AM. (2014). Strategies for avoiding preference profiling in agent-based e-commerce environments. Applied Intelligence. 40(1):127-142. https://doi.org/10.1007/s10489-013-0448-2 | es_ES |
dc.description.accrualMethod | S | es_ES |
dc.relation.publisherversion | http://dx.doi.org/10.1007/s10489-013-0448-2 | es_ES |
dc.description.upvformatpinicio | 127 | es_ES |
dc.description.upvformatpfin | 142 | es_ES |
dc.type.version | info:eu-repo/semantics/publishedVersion | es_ES |
dc.description.volume | 40 | es_ES |
dc.description.issue | 1 | es_ES |
dc.relation.senia | 245543 | |
dc.contributor.funder | Ministerio de Ciencia e Innovación | es_ES |
dc.contributor.funder | Fundación Séneca-Agencia de Ciencia y Tecnología de la Región de Murcia | es_ES |
dc.description.references | Abedin F, Chao K, Godwin N, Arochena H (2009) Preference ordering in agenda based multi-issue negotiation for service level agreement. In: International conference on Advanced Information Networking and Applications Workshops, 2009. WAINA’09. IEEE Press, New York, pp 19–24 | es_ES |
dc.description.references | Aïmeur E, Brassard G, Onana FSM (2005) Privacy-preserving physical delivery in electronic commerce. In: Proceedings of IADIS international conference on e-commerce, pp 25–33 | es_ES |
dc.description.references | Aydoğan R, Yolum P (2012) Learning opponent’s preferences for effective negotiation: an approach based on concept learning. Auton Agents Multi-Agent Syst 24(1):104–140. doi: 10.1007/s10458-010-9147-0 | es_ES |
dc.description.references | Bahrammirzaee A, Chohra A, Madani K (2013) An adaptive approach for decision making tactics in automated negotiation. Appl Intell. doi: 10.1007/s10489-013-0434-8 | es_ES |
dc.description.references | Borking J, Van Eck B, Siepel P, Bedrijf D (1999) Intelligent software agents: turning a privacy threat into a privacy protector. Registratiekamer, The Hague | es_ES |
dc.description.references | Bouckaert RR, Frank E, Hall M, Kirkby R, Reutemann P, Seewald A, Scuse D (2009) Weka manual (3.7.1). http://prdownloads.sourceforge.net/weka/WekaManual-3-7-1.pdf?download | es_ES |
dc.description.references | Buffett S, Spencer B (2005) Learning opponents’ preferences in multi-object automated negotiation. In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC’05. ACM, New York, pp 300–305 | es_ES |
dc.description.references | Chaum D (1985) Security without identification: transaction systems to make big brother obsolete. Commun ACM 28:1030–1044 | es_ES |
dc.description.references | Chaum D, Fiat A, Naor M (1990) Untraceable electronic cash. In: CRYPTO’88: proceedings on advances in cryptology. Springer, New York, pp 319–327 | es_ES |
dc.description.references | ClaußS, Kesdogan D, Kölsch T (2005) Privacy enhancing identity management: protection against re-identification and profiling. In: DIM’05: proceedings of the 2005 workshop on digital identity management. ACM, New York, pp 84–93 | es_ES |
dc.description.references | Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. In: 13th USENIX security symposium, San Diego, CA, USA, pp 303–320 | es_ES |
dc.description.references | Eyharabide V, Amandi A (2012) Ontology-based user profile learning. Appl Intell 36(4):857–869 | es_ES |
dc.description.references | Fasli M (2007) Agent technology for e-commerce. Wiley, New York | es_ES |
dc.description.references | Fip A (2001) FIPA Contract Net Interaction Protocol Specification. FIPA | es_ES |
dc.description.references | Fip A (2001) FIPA Iterated Contract Net Interaction Protocol Specification. FIPA | es_ES |
dc.description.references | Fischer-Hübner S, Hedbom H (2008) Benefits of privacy-enhancing identity management. Asia Pac Bus Rev 10(4):36–52 | es_ES |
dc.description.references | Garfinkel S (2001) Database nation: the death of privacy in the 21st century. O’Reilly & Associates, Sebastopol | es_ES |
dc.description.references | Gwak J, Sim K (2013) A novel method for coevolving ps-optimizing negotiation strategies using improved diversity controlling edas. Appl Intell 38(3):384–417 | es_ES |
dc.description.references | Hansen M, Berlich P, Camenisch J, Clau S, Pfitzmann A, Waidner M (2004) Privacy-enhancing identity management. Inf Secur Tech Rep 9(1):35–44 | es_ES |
dc.description.references | Hansen M, Schwartz A, Cooper A (2008) Privacy and identity management. IEEE Secur Priv 6(2):38–45 | es_ES |
dc.description.references | Hildebrandt M, Gutwirth S (2008) Profiling the European citizen: cross-disciplinary perspectives. Springer, Berlin | es_ES |
dc.description.references | Hindriks K, Tykhonov D (2008) Opponent modelling in automated multi-issue negotiation using Bayesian learning. In: Proceedings of the 7th international joint conference on autonomous agents and multiagent systems, AAMAS’08, vol 1, Richland, SC, pp 331–338. International Foundation for Autonomous Agents and Multiagent Systems | es_ES |
dc.description.references | Hoffman D, Novak T, Peralta M (1999) Building consumer trust online. Commun ACM 42(4):80–85 | es_ES |
dc.description.references | JADE Board. Jade security guide (2005). http://jade.tilab.com | es_ES |
dc.description.references | Kang J-G, Kim S, An S-Y, Oh S-Y (2012) A new approach to simultaneous localization and map building with implicit model learning using neuro evolutionary optimization. Appl Intell 36(1):242–269 | es_ES |
dc.description.references | Khor K-C, Ting C-Y, Phon-Amnuaisuk S (2012) A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection. Appl Intell 36(2):320–329 | es_ES |
dc.description.references | Kim K-J, Ahn H (2012) Simultaneous optimization of artificial neural networks for financial forecasting. Appl Intell 36(4):887–898 | es_ES |
dc.description.references | Korba L, Song R, Yee G (2002) Anonymous communications for mobile agents. In: Proceedings of the 4th international workshop on mobile agents for telecommunication applications, MATA’02, pp 171–181 | es_ES |
dc.description.references | Krause A, Horvitz E (2008) A utility-theoretic approach to privacy and personalization. In: Proceedings of the twenty-third conference on artificial intelligence (AAAI-08) | es_ES |
dc.description.references | Lee J, Kim J, Moon JY (2000) What makes Internet users visit cyber stores again? Key design factors for customer loyalty. In: Proceedings of the SIGCHI conference on human factors in computing systems, CHI’00. ACM, New York, pp 305–312 | es_ES |
dc.description.references | Márquez-Vera C, Cano A, Romero C, Ventura S (2013) Predicting student failure at school using genetic programming and different data mining approaches with high dimensional and imbalanced data. Appl Intell 38(3):315–330 | es_ES |
dc.description.references | Menczer F, Street WN, Vishwakarma N, Monge AE, Jakobsson M (2002) Intellishopper: a proactive, personal, private shopping assistant. In: Proceedings of the first international joint conference on autonomous agents and multiagent systems: part 3, AAMAS’02, pp 1001–1008 | es_ES |
dc.description.references | Newman AE (2004) Cougaar developers’ guide. http://www.cougaar.org | es_ES |
dc.description.references | Odlyzko A (2003) Privacy, economics, and price discrimination on the Internet. In: Proceedings of the 5th International Conference on Electronic Commerce, ICEC’03. ACM, New York, pp 355–366 | es_ES |
dc.description.references | Petkovic M, Jonker W (eds) (2007) Security, privacy and trust in modern data management (Data-centric systems and applications). Springer, Berlin | es_ES |
dc.description.references | Pfitzmann A, Hansen M (2010) A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. v0.34. http://dud.inf.tu-dresden.de/Anon_Terminology.shtml | es_ES |
dc.description.references | Quillinan TB, Warnier M, Oey M, Timmer R, Brazier F (2008) Enforcing security in the agentscape middleware. In: Proceedings of the 2008 workshop on middleware security, MidSec’08. ACM, New York, pp 25–30 | es_ES |
dc.description.references | Rannenberg K, Royer D, Deuker A (eds) (2009) The future of identity in the information society: challenges and opportunities. Springer, Berlin | es_ES |
dc.description.references | Recursion Software Inc. (2008) Voyager security guide. http://www.recursionsw.com/ | es_ES |
dc.description.references | Roth V, Jalali-Sohi M (2001) Concepts and architecture of a security-centric mobile agent server. In: ISADS | es_ES |
dc.description.references | Serrano E, Gómez-Sanz JJ, Botia JA, Pavón J (2009) Intelligent data analysis applied to debug complex software systems. Neurocomputing 72(13–15):2785–2795 | es_ES |
dc.description.references | Serrano E, Quirin A, Botia J, Cordón O (2010) Debugging complex software systems by means of pathfinder networks. Inf Sci 180(5):561–583 | es_ES |
dc.description.references | Serrano E, Muñoz A, Botia J (2012) An approach to debug interactions in multi-agent system software tests. Inf Sci 205:38–57 | es_ES |
dc.description.references | Serrano E, Rovatsos M, Botia J (2012) A qualitative reputation system for multiagent systems with protocol-based communication. In: Proceedings of the 11th international conference on autonomous agents and multiagent systems, AAMAS’12, vol 1, Richland, SC, pp 307–314. International Foundation for Autonomous Agents and Multiagent Systems | es_ES |
dc.description.references | Serrano E, Rovatsos M, Botía JA (2013) Data mining agent conversations: a qualitative approach to multiagent systems analysis. Inf Sci 230(0):132–146 | es_ES |
dc.description.references | Shie B-E, Yu P, Tseng V (2013) Mining interesting user behavior patterns in mobile commerce environments. Appl Intell 38(3):418–435 | es_ES |
dc.description.references | Sierra C, Jennings NR, Noriega P, Parsons S (1997) A framework for argumentation-based negotiation. In: Singh MP, Rao AS, Wooldridge M (eds) ATAL. Lecture notes in computer science, vol 1365. Springer, Berlin, pp 177–192 | es_ES |
dc.description.references | Smith HJ, Milberg SJ (1996) Information privacy: measuring individuals’ concerns about organizational practices. MIS Q 20:167–196 | es_ES |
dc.description.references | Solove D (2006) A taxonomy of privacy. Univ PA Law Rev 154(3):477 | es_ES |
dc.description.references | Spiekermann S (2006) Individual price discrimination—an impossibility? In: International Conference for Human-Computer Interaction (CHI’2006), workshop on privacy and personalization | es_ES |
dc.description.references | Spiekermann S, Cranor LF (2009) Engineering privacy. IEEE Trans Softw Eng 35(1):67–82 | es_ES |
dc.description.references | Such JM (2011) Enhancing Privacy in Multi-agent Systems. PhD thesis, Departament de Sistemes Informàtics i Computació, Universitat Politècnica de València | es_ES |
dc.description.references | Such JM, Alberola JM, Espinosa A, García-Fornes A (2011) A Group-oriented Secure Multiagent Platform. Softw Pract Exp 41(11):1289–1302 | es_ES |
dc.description.references | Such JM, Espinosa A, García-Fornes A, Botti V (2011) Partial identities as a foundation for trust and reputation. Eng Appl Artif Intell 24(7):1128–1136 | es_ES |
dc.description.references | Such JM, Espinosa A, García-Fornes A (2013) A Survey of Privacy in Multi-agent Systems. Knowl Eng Rev. doi: 10.1017/S0269888913000180 | es_ES |
dc.description.references | Such JM, García-Fornes A, Espinosa A, Bellver J (2013) Magentix2: a privacy-enhancing agent platform. Eng Appl Artif Intell 26(1):96–109 | es_ES |
dc.description.references | TRUSTe and TNS (2009) 2009 study: Consumer attitudes about behavioral targeting | es_ES |
dc.description.references | Turow J, King J, Hoofnagle C, Bleakley A, Hennessy M (2009) Americans reject tailored advertising and three activities that enable it. Available at SSRN 1478214 | es_ES |
dc.description.references | Ugurlu S, Erdogan N (2005) An overview of secmap secure mobile agent platform. In: Proceedings of second international workshop on safety and security in multiagent systems | es_ES |
dc.description.references | van Blarkom G, Borking J, Olk J (eds) (2003) Handbook of privacy and privacy-enhancing technologies: the case of intelligent software agents. College bescherming persoonsgegevens, The Hague | es_ES |
dc.description.references | Warnier M, Brazier F (2010) Anonymity services for multi-agent systems. Web Intell Agent Syst 8(2):219–232 | es_ES |
dc.description.references | Westin A (2003) Social and political dimensions of privacy. J Soc Issues 59(2):431–453 | es_ES |
dc.description.references | Wine (2009). http://www.w3.org/TR/2004/REC-owl-guide-20040210/wine.rdf | es_ES |
dc.description.references | Witten IH, Frank E (1999) Data mining: practical machine learning tools and techniques with Java implementations (The Morgan Kaufmann series in data management systems), 1st edn. Morgan Kaufmann, San Mateo | es_ES |
dc.description.references | Xu H, Shatz SM (2003) Adk: an agent development kit based on a formal design model for multi-agent systems. Autom Softw Eng 10:337–365 | es_ES |