- -

Strategies for avoiding preference profiling in agent-based e-commerce environments

RiuNet: Repositorio Institucional de la Universidad Politécnica de Valencia

Compartir/Enviar a

Citas

Estadísticas

  • Estadisticas de Uso

Strategies for avoiding preference profiling in agent-based e-commerce environments

Mostrar el registro sencillo del ítem

Ficheros en el ítem

dc.contributor.author Serrano, Emilio es_ES
dc.contributor.author Such, Jose M. es_ES
dc.contributor.author Botia, Juan A. es_ES
dc.contributor.author García Fornes, Ana María es_ES
dc.date.accessioned 2015-05-19T09:47:29Z
dc.date.available 2015-05-19T09:47:29Z
dc.date.issued 2014-01
dc.identifier.issn 0924-669X
dc.identifier.uri http://hdl.handle.net/10251/50447
dc.description.abstract Agent-based electronic commerce is known to offer many advantages to users. However, very few studies have been devoted to deal with privacy issues in this domain. Privacy is of great concern and preserving users' privacy plays a crucial role to promote their trust in agent-based technologies. In this paper, we focus on preference profiling, which is a well-known threat to users' privacy. Specifically, we review strategies for customers' agents to prevent seller agents from obtaining accurate preference profiles of the former group by using data mining techniques. We experimentally show the efficacy of each of these strategies and discuss their suitability in different situations. Our experimental results show that customers can improve their privacy notably with these strategies. es_ES
dc.description.sponsorship This research work is supported by the Spanish Ministry of Science and Innovation in the scope of the Research Projects TSI-020302-2010-129, TIN2011-28335-C02-02 and through the Fundacion Seneca within the Program 04552/GERM/06. en_EN
dc.language Inglés es_ES
dc.publisher Springer Verlag (Germany) es_ES
dc.relation.ispartof Applied Intelligence es_ES
dc.rights Reserva de todos los derechos es_ES
dc.subject Privacy es_ES
dc.subject Agent-based e-commerce es_ES
dc.subject Preference profiling es_ES
dc.subject Interaction analysis es_ES
dc.subject Data mining es_ES
dc.subject.classification LENGUAJES Y SISTEMAS INFORMATICOS es_ES
dc.title Strategies for avoiding preference profiling in agent-based e-commerce environments es_ES
dc.type Artículo es_ES
dc.identifier.doi 10.1007/s10489-013-0448-2
dc.relation.projectID info:eu-repo/grantAgreement/MICINN//TIN2011-28335-C02-02/ES/FUNDAMENTOS PARA EL DESARROLLO DE SERVICIOS Y APLICACIONES AAL/ es_ES
dc.relation.projectID info:eu-repo/grantAgreement/f SéNeCa/Funding Program for Research Groups of Excellence/04552%2FGERM%2F06/ es_ES
dc.relation.projectID info:eu-repo/grantAgreement/MICINN//TSI-020302-2010-129/ES/ es_ES
dc.rights.accessRights Abierto es_ES
dc.contributor.affiliation Universitat Politècnica de València. Departamento de Sistemas Informáticos y Computación - Departament de Sistemes Informàtics i Computació es_ES
dc.description.bibliographicCitation Serrano, E.; Such, JM.; Botia, JA.; García Fornes, AM. (2014). Strategies for avoiding preference profiling in agent-based e-commerce environments. Applied Intelligence. 40(1):127-142. https://doi.org/10.1007/s10489-013-0448-2 es_ES
dc.description.accrualMethod S es_ES
dc.relation.publisherversion http://dx.doi.org/10.1007/s10489-013-0448-2 es_ES
dc.description.upvformatpinicio 127 es_ES
dc.description.upvformatpfin 142 es_ES
dc.type.version info:eu-repo/semantics/publishedVersion es_ES
dc.description.volume 40 es_ES
dc.description.issue 1 es_ES
dc.relation.senia 245543
dc.contributor.funder Ministerio de Ciencia e Innovación es_ES
dc.contributor.funder Fundación Séneca-Agencia de Ciencia y Tecnología de la Región de Murcia es_ES
dc.description.references Abedin F, Chao K, Godwin N, Arochena H (2009) Preference ordering in agenda based multi-issue negotiation for service level agreement. In: International conference on Advanced Information Networking and Applications Workshops, 2009. WAINA’09. IEEE Press, New York, pp 19–24 es_ES
dc.description.references Aïmeur E, Brassard G, Onana FSM (2005) Privacy-preserving physical delivery in electronic commerce. In: Proceedings of IADIS international conference on e-commerce, pp 25–33 es_ES
dc.description.references Aydoğan R, Yolum P (2012) Learning opponent’s preferences for effective negotiation: an approach based on concept learning. Auton Agents Multi-Agent Syst 24(1):104–140. doi: 10.1007/s10458-010-9147-0 es_ES
dc.description.references Bahrammirzaee A, Chohra A, Madani K (2013) An adaptive approach for decision making tactics in automated negotiation. Appl Intell. doi: 10.1007/s10489-013-0434-8 es_ES
dc.description.references Borking J, Van Eck B, Siepel P, Bedrijf D (1999) Intelligent software agents: turning a privacy threat into a privacy protector. Registratiekamer, The Hague es_ES
dc.description.references Bouckaert RR, Frank E, Hall M, Kirkby R, Reutemann P, Seewald A, Scuse D (2009) Weka manual (3.7.1). http://prdownloads.sourceforge.net/weka/WekaManual-3-7-1.pdf?download es_ES
dc.description.references Buffett S, Spencer B (2005) Learning opponents’ preferences in multi-object automated negotiation. In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC’05. ACM, New York, pp 300–305 es_ES
dc.description.references Chaum D (1985) Security without identification: transaction systems to make big brother obsolete. Commun ACM 28:1030–1044 es_ES
dc.description.references Chaum D, Fiat A, Naor M (1990) Untraceable electronic cash. In: CRYPTO’88: proceedings on advances in cryptology. Springer, New York, pp 319–327 es_ES
dc.description.references ClaußS, Kesdogan D, Kölsch T (2005) Privacy enhancing identity management: protection against re-identification and profiling. In: DIM’05: proceedings of the 2005 workshop on digital identity management. ACM, New York, pp 84–93 es_ES
dc.description.references Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. In: 13th USENIX security symposium, San Diego, CA, USA, pp 303–320 es_ES
dc.description.references Eyharabide V, Amandi A (2012) Ontology-based user profile learning. Appl Intell 36(4):857–869 es_ES
dc.description.references Fasli M (2007) Agent technology for e-commerce. Wiley, New York es_ES
dc.description.references Fip A (2001) FIPA Contract Net Interaction Protocol Specification. FIPA es_ES
dc.description.references Fip A (2001) FIPA Iterated Contract Net Interaction Protocol Specification. FIPA es_ES
dc.description.references Fischer-Hübner S, Hedbom H (2008) Benefits of privacy-enhancing identity management. Asia Pac Bus Rev 10(4):36–52 es_ES
dc.description.references Garfinkel S (2001) Database nation: the death of privacy in the 21st century. O’Reilly & Associates, Sebastopol es_ES
dc.description.references Gwak J, Sim K (2013) A novel method for coevolving ps-optimizing negotiation strategies using improved diversity controlling edas. Appl Intell 38(3):384–417 es_ES
dc.description.references Hansen M, Berlich P, Camenisch J, Clau S, Pfitzmann A, Waidner M (2004) Privacy-enhancing identity management. Inf Secur Tech Rep 9(1):35–44 es_ES
dc.description.references Hansen M, Schwartz A, Cooper A (2008) Privacy and identity management. IEEE Secur Priv 6(2):38–45 es_ES
dc.description.references Hildebrandt M, Gutwirth S (2008) Profiling the European citizen: cross-disciplinary perspectives. Springer, Berlin es_ES
dc.description.references Hindriks K, Tykhonov D (2008) Opponent modelling in automated multi-issue negotiation using Bayesian learning. In: Proceedings of the 7th international joint conference on autonomous agents and multiagent systems, AAMAS’08, vol 1, Richland, SC, pp 331–338. International Foundation for Autonomous Agents and Multiagent Systems es_ES
dc.description.references Hoffman D, Novak T, Peralta M (1999) Building consumer trust online. Commun ACM 42(4):80–85 es_ES
dc.description.references JADE Board. Jade security guide (2005). http://jade.tilab.com es_ES
dc.description.references Kang J-G, Kim S, An S-Y, Oh S-Y (2012) A new approach to simultaneous localization and map building with implicit model learning using neuro evolutionary optimization. Appl Intell 36(1):242–269 es_ES
dc.description.references Khor K-C, Ting C-Y, Phon-Amnuaisuk S (2012) A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection. Appl Intell 36(2):320–329 es_ES
dc.description.references Kim K-J, Ahn H (2012) Simultaneous optimization of artificial neural networks for financial forecasting. Appl Intell 36(4):887–898 es_ES
dc.description.references Korba L, Song R, Yee G (2002) Anonymous communications for mobile agents. In: Proceedings of the 4th international workshop on mobile agents for telecommunication applications, MATA’02, pp 171–181 es_ES
dc.description.references Krause A, Horvitz E (2008) A utility-theoretic approach to privacy and personalization. In: Proceedings of the twenty-third conference on artificial intelligence (AAAI-08) es_ES
dc.description.references Lee J, Kim J, Moon JY (2000) What makes Internet users visit cyber stores again? Key design factors for customer loyalty. In: Proceedings of the SIGCHI conference on human factors in computing systems, CHI’00. ACM, New York, pp 305–312 es_ES
dc.description.references Márquez-Vera C, Cano A, Romero C, Ventura S (2013) Predicting student failure at school using genetic programming and different data mining approaches with high dimensional and imbalanced data. Appl Intell 38(3):315–330 es_ES
dc.description.references Menczer F, Street WN, Vishwakarma N, Monge AE, Jakobsson M (2002) Intellishopper: a proactive, personal, private shopping assistant. In: Proceedings of the first international joint conference on autonomous agents and multiagent systems: part 3, AAMAS’02, pp 1001–1008 es_ES
dc.description.references Newman AE (2004) Cougaar developers’ guide. http://www.cougaar.org es_ES
dc.description.references Odlyzko A (2003) Privacy, economics, and price discrimination on the Internet. In: Proceedings of the 5th International Conference on Electronic Commerce, ICEC’03. ACM, New York, pp 355–366 es_ES
dc.description.references Petkovic M, Jonker W (eds) (2007) Security, privacy and trust in modern data management (Data-centric systems and applications). Springer, Berlin es_ES
dc.description.references Pfitzmann A, Hansen M (2010) A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. v0.34. http://dud.inf.tu-dresden.de/Anon_Terminology.shtml es_ES
dc.description.references Quillinan TB, Warnier M, Oey M, Timmer R, Brazier F (2008) Enforcing security in the agentscape middleware. In: Proceedings of the 2008 workshop on middleware security, MidSec’08. ACM, New York, pp 25–30 es_ES
dc.description.references Rannenberg K, Royer D, Deuker A (eds) (2009) The future of identity in the information society: challenges and opportunities. Springer, Berlin es_ES
dc.description.references Recursion Software Inc. (2008) Voyager security guide. http://www.recursionsw.com/ es_ES
dc.description.references Roth V, Jalali-Sohi M (2001) Concepts and architecture of a security-centric mobile agent server. In: ISADS es_ES
dc.description.references Serrano E, Gómez-Sanz JJ, Botia JA, Pavón J (2009) Intelligent data analysis applied to debug complex software systems. Neurocomputing 72(13–15):2785–2795 es_ES
dc.description.references Serrano E, Quirin A, Botia J, Cordón O (2010) Debugging complex software systems by means of pathfinder networks. Inf Sci 180(5):561–583 es_ES
dc.description.references Serrano E, Muñoz A, Botia J (2012) An approach to debug interactions in multi-agent system software tests. Inf Sci 205:38–57 es_ES
dc.description.references Serrano E, Rovatsos M, Botia J (2012) A qualitative reputation system for multiagent systems with protocol-based communication. In: Proceedings of the 11th international conference on autonomous agents and multiagent systems, AAMAS’12, vol 1, Richland, SC, pp 307–314. International Foundation for Autonomous Agents and Multiagent Systems es_ES
dc.description.references Serrano E, Rovatsos M, Botía JA (2013) Data mining agent conversations: a qualitative approach to multiagent systems analysis. Inf Sci 230(0):132–146 es_ES
dc.description.references Shie B-E, Yu P, Tseng V (2013) Mining interesting user behavior patterns in mobile commerce environments. Appl Intell 38(3):418–435 es_ES
dc.description.references Sierra C, Jennings NR, Noriega P, Parsons S (1997) A framework for argumentation-based negotiation. In: Singh MP, Rao AS, Wooldridge M (eds) ATAL. Lecture notes in computer science, vol 1365. Springer, Berlin, pp 177–192 es_ES
dc.description.references Smith HJ, Milberg SJ (1996) Information privacy: measuring individuals’ concerns about organizational practices. MIS Q 20:167–196 es_ES
dc.description.references Solove D (2006) A taxonomy of privacy. Univ PA Law Rev 154(3):477 es_ES
dc.description.references Spiekermann S (2006) Individual price discrimination—an impossibility? In: International Conference for Human-Computer Interaction (CHI’2006), workshop on privacy and personalization es_ES
dc.description.references Spiekermann S, Cranor LF (2009) Engineering privacy. IEEE Trans Softw Eng 35(1):67–82 es_ES
dc.description.references Such JM (2011) Enhancing Privacy in Multi-agent Systems. PhD thesis, Departament de Sistemes Informàtics i Computació, Universitat Politècnica de València es_ES
dc.description.references Such JM, Alberola JM, Espinosa A, García-Fornes A (2011) A Group-oriented Secure Multiagent Platform. Softw Pract Exp 41(11):1289–1302 es_ES
dc.description.references Such JM, Espinosa A, García-Fornes A, Botti V (2011) Partial identities as a foundation for trust and reputation. Eng Appl Artif Intell 24(7):1128–1136 es_ES
dc.description.references Such JM, Espinosa A, García-Fornes A (2013) A Survey of Privacy in Multi-agent Systems. Knowl Eng Rev. doi: 10.1017/S0269888913000180 es_ES
dc.description.references Such JM, García-Fornes A, Espinosa A, Bellver J (2013) Magentix2: a privacy-enhancing agent platform. Eng Appl Artif Intell 26(1):96–109 es_ES
dc.description.references TRUSTe and TNS (2009) 2009 study: Consumer attitudes about behavioral targeting es_ES
dc.description.references Turow J, King J, Hoofnagle C, Bleakley A, Hennessy M (2009) Americans reject tailored advertising and three activities that enable it. Available at SSRN 1478214 es_ES
dc.description.references Ugurlu S, Erdogan N (2005) An overview of secmap secure mobile agent platform. In: Proceedings of second international workshop on safety and security in multiagent systems es_ES
dc.description.references van Blarkom G, Borking J, Olk J (eds) (2003) Handbook of privacy and privacy-enhancing technologies: the case of intelligent software agents. College bescherming persoonsgegevens, The Hague es_ES
dc.description.references Warnier M, Brazier F (2010) Anonymity services for multi-agent systems. Web Intell Agent Syst 8(2):219–232 es_ES
dc.description.references Westin A (2003) Social and political dimensions of privacy. J Soc Issues 59(2):431–453 es_ES
dc.description.references Wine (2009). http://www.w3.org/TR/2004/REC-owl-guide-20040210/wine.rdf es_ES
dc.description.references Witten IH, Frank E (1999) Data mining: practical machine learning tools and techniques with Java implementations (The Morgan Kaufmann series in data management systems), 1st edn. Morgan Kaufmann, San Mateo es_ES
dc.description.references Xu H, Shatz SM (2003) Adk: an agent development kit based on a formal design model for multi-agent systems. Autom Softw Eng 10:337–365 es_ES


Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem