84,020 Hits in 3.4 sec

Online anonymity for personalized web services

Yabo Xu, Ke Wang, Guoliang Yang, Ada W.C. Fu
2009 Proceeding of the 18th ACM conference on Information and knowledge management - CIKM '09  
We propose the notion of online anonymity to enable users to issue personalized queries to an untrusted web service while with their anonymity preserved.  ...  The challenge for providing online anonymity is dealing with unknown and dynamic web users who can get online and offline at any time.  ...  User pool The function of user pool is to pull all web users together and determine for each web user the disclosure of personal information d in order to access personalized web services anonymously.  ... 
doi:10.1145/1645953.1646155 dblp:conf/cikm/XuWYF09 fatcat:s52vog3cbbgmhd67nkesh7uws4

A Survey on Privacy Assurance in Personalized Web Search

2016 International Journal of Science and Research (IJSR)  
Web search engine is a portal for ordinary people to access required information from the ,but generic web search provides the same results to different users for the same query.  ...  To overcome this drawback, personalized web search (PWS) develops which provides tailored results to the particular user based on his interest and preferences.  ...  the quality of an online service.  ... 
doi:10.21275/v5i4.nov162590 fatcat:56whao6g7zdexj6decxlw3sn3a

An offline foundation for online accountable pseudonyms

Bryan Ford, Jacob Strauss
2008 Proceedings of the 1st workshop on Social network systems - SocialNets '08  
rule that one real person gets one virtual persona on any participating online service.  ...  Online anonymity often appears to undermine accountability, offering little incentive for civil behavior, but accountability failures usually result not from anonymity itself but from the disposability  ...  Acknowledgements We would like to thank Frans Kaashoek, Robert Morris, and the anonymous reviewers for their many helpful comments.  ... 
doi:10.1145/1435497.1435503 dblp:conf/sns/FordS08 fatcat:nq2fa455nnerjj4lmidyk5lroi

Consumer Privacy and Online Marketing: Bringing the Human Back into the Picture [chapter]

Laurence Brooks, Alexis Airey
2001 IFIP Advances in Information and Communication Technology  
They provide all of the data gathering capabilities of traditional web technologies but with enough anonymity to allay consumers 'fears.  ...  This paper investigates the possible technological solutions to consumer concerns over privacy and online marketing.  ...  Often web sites cannot afford either the time or money to provide 24 hour human online services and simulated sales assistants offer a viable altemative.  ... 
doi:10.1007/978-0-387-35489-7_14 fatcat:xmucpolzojff7isotwoakqopaq

An honest man has nothing to fear

Gregory Conti, Edward Sobiesk
2007 Proceedings of the 3rd symposium on Usable privacy and security - SOUPS '07  
are met while still allowing online companies to innovate and provide functionality that users desire.  ...  As a critical foundation step to address this problem, we must first understand the attitudes, beliefs, behaviors, and expectations of web users in order to create an environment where user privacy needs  ...  Acknowledgments We would like to thank the New Security Paradigms Workshop and Defcon communities for their thoughtful feedback on the problem of web-based information disclosure.  ... 
doi:10.1145/1280680.1280695 dblp:conf/soups/ContiS07 fatcat:dehg464b5rdyblkv3qq2vcgobm

Privacy-Preserving WebID Analytics on the Decentralized Policy-Aware Social Web

Yuh Jong Hu
2014 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)  
protection in online social networks.4 Semantic Web technology has been used for establishing a privacy-aware policy Web architecture to provide flexible and effective privacy-preserving data analytics  ...  not the centralized online social networking architecture for WebID analytics. 1 We argue why we choose decentralized but not the centralized online social networking architecture for WebID analytics  ...  Part I An Ontology for Data Releasing Policy (DRP)  ... 
doi:10.1109/wi-iat.2014.140 dblp:conf/webi/Hu14 fatcat:b7ayeoho2vf4vlptjpx2rvk2im

Privacy on the web: facts, challenges, and solutions

A. Rezgur, A. Bouguettaya, M.Y. Eltoweissy
2003 IEEE Security and Privacy  
For example, an online business's privacy policy might state that only customer service employees are allowed to access personal information of customers.  ...  Examples of proxybased anonymizers include Anonymizer, Lucent Personal Web Assistant (LPWA), iPrivacy, and WebSecure.  ... 
doi:10.1109/msecp.2003.1253567 fatcat:v7zxhx62nzesrn3h4ebomsir4e

Anonymous online purchases with exhaustive operational security [article]

Vincent Van Mieghem, Johan Pouwelse
2015 arXiv   pre-print
Eventually it is shown how to anonymously purchase items and services from the hidden web, as well as the delivery.  ...  It focusses particularly on remaining anonymous while purchasing online goods, resulting in anonymously bought items.  ...  INTRODUCTION W E present a detailed approach to anonymously purchase goods and services online.  ... 
arXiv:1505.07370v1 fatcat:qijomd7pz5epvb7iv2y7zdouse

Privacy patterns for online interactions

Sasha Romanosky, Alessandro Acquisti, Jason Hong, Lorrie Faith Cranor, Batya Friedman
2006 Proceedings of the 2006 conference on Pattern languages of programs - PLoP '06  
Building on existing privacy pattern work, we identify three privacy patterns for web-based activity: INFORMED CONSENT FOR WEB-BASED TRANSACTIONS, MASKED ONLINE TRAFFIC, and MINIMAL INFORMATION ASYMMETRY  ...  The first pattern addresses a system architecture issue and draws on Friedman's model for informed consent.  ...  ACKNOWLEDGEMENTS The authors would like to thank Markus Schumacher, Munawar Hafiz, Uwe Zdun and the PLoP 2006 workshop members for their helpful comments and suggestions.  ... 
doi:10.1145/1415472.1415486 fatcat:2qvs3fekfjhonoxmizoys7igii

Understanding online anonymity

Thais Sardá, Simone Natale, Nikos Sotirakopoulos, Mark Monaghan
2019 Media Culture and Society  
Acknowledgments The project for this special section originated in a symposium on online anonymity organized with the support of the Centre for Research in Communication and Culture (CRCC) at Loughborough  ...  Funding The authors received no financial support for the research, authorship, and/or publication of this article.  ...  In recent years, spaces of anonymity online have been often described through the label of Dark Web, usually described in negative terms as an obscure part of the Web exploited for illegal activities and  ... 
doi:10.1177/0163443719842074 fatcat:kouiefmkmza5vhnfmeiexdag3q


Fei Xu, Ken Yau, Ping Zhang, Kam-Pui Chow
2015 IFIP Advances in Information and Communication Technology  
Internet real-name registration requires a user to provide personal identification credentials including his/her real name to an online service provider when registering for an account.  ...  However, real-name registration also potentially infringes on online privacy.  ...  When a user needs a web-name for an online service, he/she uses the public key to encrypt his/her personal authentication information, which is used to prove that he/she is the real owner of the web-name  ... 
doi:10.1007/978-3-319-24123-4_7 fatcat:ekwrmsa23vf3ta2ojz5qnn3plu

Tracking and Personalization [chapter]

Rahat Masood, Shlomo Berkovsky, Mohamed Ali Kaafar
2021 Modern Socio-Technical Perspectives on Privacy  
AbstractThis chapter studies the relationship between two important, often conflicting paradigms of online services: personalization and tracking.  ...  Then, the chapter turns to online tracking specific to mobile and web technologies, as well as the more advanced behavioral tracking.  ...  Web Personalization User modeling for web personalization purposes typically involves making sense of users' past information access and their interactions with online systems and other users.  ... 
doi:10.1007/978-3-030-82786-1_9 fatcat:au7bgwajqzeffb2cvtgn3ytasy

Definite Proxy Gateway for Secure Web Access

Anjali P. Kadam
2018 International Journal for Research in Applied Science and Engineering Technology  
The solution for such anonymity over the internet is Tor. This paper presents a web application on guidelines of TOR to preserve such anonymity.  ...  Internet is widely used these days by majority of the population for easy day to day activities like online shopping , social networking, bill payment to complex financial services. .Using Internet as  ...  At times military personal need to converse securely and anonymously over the web. Hence the project caters the need of such users to allow them to browse the web anonymously and securely. III.  ... 
doi:10.22214/ijraset.2018.4697 fatcat:p6oy3vnkhzfa5gtw74ysnjrrry

A Study on Interactions Between Anonymous and Non-anonymous Pre-service Teachers in Blended Learning Using Creative Problem Solving Technique to Enhance Pre-service Teachers' Ability in Professional Practices

Nuttaphong Kanchanachaya, Taminee Shinasharkey
2015 Procedia - Social and Behavioral Sciences  
For Non-anonymous group, the mean ( ) of online interactions was decreased from 333.50 counts to 292, 205, and 232.50 for the subsequence weeks.  ...  The sample group of this study was 28 pre-service teachers. The first group was treated anonymously when they were online while the second group was treated non-anonymously.  ...  For fourth week, the task was related to solution finding process in online based learning. Again, they need to interact via chat room and web board.  ... 
doi:10.1016/j.sbspro.2015.01.908 fatcat:ez3pch4j5jevzckfryccvwwaki

Harm reduction via online platforms for people who use drugs in Russia: a qualitative analysis of web outreach work

Arsen Davitadze, Peter Meylakhs, Aleksey Lakhov, Elizabeth J. King
2020 Harm Reduction Journal  
Conclusions Our research demonstrated that web outreach work is a convenient tool for delivering some harm reduction services to PWUD either partially or completely online and for recruiting new clients  ...  Several organizations have started to provide some harm reduction services via online platforms by web outreach.  ...  Acknowledgements We would like to thank Eurasian Harm Reduction Association and Elton John AIDS Foundation for their support.  ... 
doi:10.1186/s12954-020-00452-6 pmid:33298081 fatcat:hrvsbu3tzrhw7fxqr35ympww5i
« Previous Showing results 1 — 15 out of 84,020 results