657 Hits in 7.7 sec

Towards an Architecture for Pseudonymous E-Commerce - Applying Privacy by Design to Online Shopping

Sebastian Pape, Daniel Tasche, Iulia Bastys, Akos Grosz, Joerg Laessig, Kai Rannenberg
2018 Sicherheit  
In this paper we apply privacy by design in e-commerce.  ...  We outline the requirements of a privacy-aware online shopping platform that satisfies the principle of data minimization and we suggest several architectures for building such a platform.  ...  Acknowledgments The SIOC project [SI] is supported by the German Federal Ministry of Education and Research's (BMBF) program "Datenschutz: selbstbestimmt in der digitalen Welt".  ... 
doi:10.18420/sicherheit2018_01 dblp:conf/sicherheit/0001TBGLR18 fatcat:bezal3mkanbg3bq66jxmdvte3u

Identity management and its support of multilateral security

Sebastian Clauß, Marit Köhntopp
2001 Computer Networks  
After examining digital pseudonyms and credentials as basic concepts of such a system, we give an introduction to technologies for multilateral security and describe an architecture which enables multilaterally  ...  By means of dierent scenarios we show requirements of an identity management system, and outline an approach in developing an identity manager and its infrastructure.  ...  Acknowledgements We would like to thank Andreas P®tzmann and Mike Gurski for their constructive and very helpful advice.  ... 
doi:10.1016/s1389-1286(01)00217-1 fatcat:geg747q35bgozkkqp23zx3cvxu

A multi‐agent approach for provisioning of e‐services in u‐commerce environments

Nayat Sanchez‐Pi, Jose Manuel Molina, L. Martínez‐López
2010 Internet Research  
Design/methodology/approach -The multi-agent systems (MAS) approach is based on an MAS model developed for AmI that has been redesigned to support u-commerce.  ...  Originality/value -The research proposes an MAS designed for u-commerce domains, analyzes the capacity of trust management techniques in this environment, and proposes several evaluation methods to show  ...  Figure 1 . 1 MAS architecture Figure 2 . 2 MAS architecture for u-commerce Figure 3 . 3 Online (left) and Offline (right) quality evaluation Figure 4 . 4 Processing of location information provided  ... 
doi:10.1108/10662241011050713 fatcat:3stqtvdy3nag7k4yjodwxy4y6e

Engineering Privacy

S. Spiekermann, L.F. Cranor
2009 IEEE Transactions on Software Engineering  
In the second part of this paper, we develop guidelines for building privacy-friendly systems. We distinguish two approaches: "privacy-by-policy" and "privacy-by-architecture."  ...  This paper aims to introduce engineers and computer scientists to the privacy research domain and provide concrete guidance on how to design privacy-friendly systems.  ...  DAAD19-02-I-0389 ("Perpetually Available and Secure Information Systems") to Carnegie Mellon University's CyLab and by the Transcoop programme of the Humboldt-Shiftung.  ... 
doi:10.1109/tse.2008.88 fatcat:xyliz5gvgnf2bdojz2uh4puate

Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems

Eran Toch, Yang Wang, Lorrie Faith Cranor
2012 User modeling and user-adapted interaction  
This frameworks can help designers and researchers to contextualize privacy challenges of solutions when designing personalization systems.  ...  For example, systems that personalize advertisements according to the physical location of the user or according to the user's friends' search history, introduce new privacy risks that may discourage wide  ...  E-commerce services, such as Shopkick, are using location-based price discrimination, offering coupons based on location and user profile.  ... 
doi:10.1007/s11257-011-9110-z fatcat:qxghk5txzfel3j5365yktbei3i

Tailoring Privacy to Users' Needs 1 [chapter]

Alfred Kobsa
2001 Lecture Notes in Computer Science  
Most privacy laws however also impose demands that call for new technologies that still need to be researched.  ...  This article discusses how the deployment of personalized systems is affected by users' privacy concerns and by privacy legislation.  ...  Nielsen NetRatings [18] report that e-commerce sites offering personalized services convert significantly more visitors into buyers than e-commerce sites that do not offer personalized services.  ... 
doi:10.1007/3-540-44566-8_52 fatcat:v4hofsyxwjen5fx54v4cnypyve

Factors Influencing the Perception of Website Privacy Trustworthiness and Users' Purchasing Intentions: The Behavioral Economics Perspective

Alisa Frik, Luigi Mittone
2019 Journal of Theoretical and Applied Electronic Commerce Research  
In this study, we identified the factors that influence consumer purchasing intentions and their perceptions of the trustworthiness of the privacy-related practices of e-commerce websites.  ...  Trust is expected to positively influence an individual's intention to conduct online transactions [118] .  ...  Acknowledgments The authors are grateful to the colleagues and reviewers for their insights and useful comments. Funding for this study was supported by a fellowship from Telecom Italia (TIM).  ... 
doi:10.4067/s0718-18762019000300107 fatcat:do5srqbjjrcbrmupbudtrztl6e

A Critical Analysis on the Evolution in the E-Payment System, Secuiry Risk, Threats and Vulnerability

Jerrin Yomas, Chitra Kiran
2018 Communications on Applied Electronics  
The main contribution of the present survey study is providing the landscape of digital e-payment system and its opportunities for future e-commerce systems.  ...  In this research study, have analyzing the evolution of e-payment system and its terminology followed by different conventional e-payment mechanisms.  ...  The e-commerce websites exploit an e-payment method to make ease transaction and more convenient to pay for their customers.  ... 
doi:10.5120/cae2018652800 fatcat:qqxdavvwp5cstbtxebqp7w6kuq

Privacy and e-commerce: a consumer-centric perspective

Rhys Smith, Jianhua Shao
2007 Electronic Commerce Research  
Privacy is an ancient concept, but its interpretation and application in the area of e-commerce are still new.  ...  for current e-commerce applications, and identifies directions for the future development of successful privacy enhancing technologies.  ...  Furthermore, how this right to privacy fares when applied to the world of e-commerce is an even more contentious issue.  ... 
doi:10.1007/s10660-007-9002-9 fatcat:vs253toq4zeuxinqqzaqrfjiiu

Impacts of User Privacy Preferences on Personalized Systems [chapter]

Maximilian Teltzrow, Alfred Kobsa
2004 Designing Personalized User Experiences in eCommerce  
Similar methods to ease privacy concerns could be applied in the system described by Hoelscher and Dietrich in their chapter "E-Commerce Personalization and Real-Time Site Monitoring".  ...  s chapter on "How Personalization of an E-Commerce Website Affects Consumer Trust", the authors address the issue of user trust in personalized e-commerce applications.  ... 
doi:10.1007/1-4020-2148-8_17 fatcat:wnu4j5oykjc65imv46awbfjdba

A survey of privacy in multi-agent systems

Jose M. Such, Agustín Espinosa, Ana García-Fornes
2013 Knowledge engineering review (Print)  
It also surveys privacy-related studies in the field of multi-agent systems and identifies open challenges to be addressed by future research. liable for their acts.  ...  Moreover, autonomous agents themselves can be used to increase the privacy of computer applications by taking advantage of the intrinsic features they provide, such as artificial intelligence, pro-activeness  ...  Acknowledgments This work has been partially supported by CONSOLIDER-INGENIO 2010 under grant CSD2007-00022, and project TIN2011-27652-C03-00 of the Spanish Government.  ... 
doi:10.1017/s0269888913000180 fatcat:q5diblx5mba7vckepmnn46fhx4

Privacy through pseudonymity in user-adaptive systems

Alfred Kobsa, Jörg Schreck
2003 ACM Transactions on Internet Technology  
A reference model for pseudonymous and secure user modeling is presented that meets many of the proposed requirements.  ...  Both is in conflict with users' privacy concerns that became manifest in numerous recent consumer polls, and with data protection laws and guidelines that call for parsimony, purpose-orientation, and user  ...  ACKNOWLEDGMENTS We would like to thank Lorrie Cranor, Günter Pernul, Gene Tsudik, and the three anonymous TOIT reviewers for their valuable comments on an earlier version of this article.  ... 
doi:10.1145/767193.767196 fatcat:2qbotspjbnd7nnstvkwuqvd75m

The impact of blockchain on e-commerce: A framework for salient research topics

Horst Treiblmaier, Christian Sillaber
2021 Electronic Commerce Research and Applications  
A B S T R A C T Blockchain-based technologies are predicted as major disruptors for numerous business applications and processes, which bears huge implications for e-commerce.  ...  In this paper, a framework and 19 high-level research questions are developed to inspire researchers to closely investigate the potential impact of blockchain on e-commerce.  ...  The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.  ... 
doi:10.1016/j.elerap.2021.101054 fatcat:vgu3h2vjgbaubmfzncodspzqfi

What's happened to PETs?

Robin Wilton
2009 Information Security Technical Report  
I then describe an application of "S-curve" and maturity models to the analysis of this problem, and conclude by using it to examine the success factors for adoption of innovative privacy-related technology  ...  Privacy Privacy enhancing technology Innovation Maturity models S-curves Digital identity Anonymity Pseudonymity a b s t r a c t Given that many candidate technical elements have been available for some  ...  to 'design privacy in' to their systems.  ... 
doi:10.1016/j.istr.2009.10.010 fatcat:ehd4hkyyurekzpsaygzvkksvxe

Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication [chapter]

Ronny Bjones, Ioannis Krontiris, Pascal Paillier, Kai Rannenberg
2014 Lecture Notes in Computer Science  
As an authentication token, an eID card is a gateway to personal information and as such it is subject to privacy risks.  ...  Then we study two approaches for integrating Privacy-ABCs with eID systems.  ...  Acknowledgements The research leading to these results has received funding from the European Community's Seventh Framework Programme (FP7/2007-2013) under Grant Agreement no. 257782 for the project Attribute-based  ... 
doi:10.1007/978-3-642-54069-1_7 fatcat:r2bef2fnifaftbo32lzmiqpoei
« Previous Showing results 1 — 15 out of 657 results