A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Towards an Architecture for Pseudonymous E-Commerce - Applying Privacy by Design to Online Shopping
2018
Sicherheit
In this paper we apply privacy by design in e-commerce. ...
We outline the requirements of a privacy-aware online shopping platform that satisfies the principle of data minimization and we suggest several architectures for building such a platform. ...
Acknowledgments The SIOC project [SI] is supported by the German Federal Ministry of Education and Research's (BMBF) program "Datenschutz: selbstbestimmt in der digitalen Welt". ...
doi:10.18420/sicherheit2018_01
dblp:conf/sicherheit/0001TBGLR18
fatcat:bezal3mkanbg3bq66jxmdvte3u
Identity management and its support of multilateral security
2001
Computer Networks
After examining digital pseudonyms and credentials as basic concepts of such a system, we give an introduction to technologies for multilateral security and describe an architecture which enables multilaterally ...
By means of dierent scenarios we show requirements of an identity management system, and outline an approach in developing an identity manager and its infrastructure. ...
Acknowledgements We would like to thank Andreas P®tzmann and Mike Gurski for their constructive and very helpful advice. ...
doi:10.1016/s1389-1286(01)00217-1
fatcat:geg747q35bgozkkqp23zx3cvxu
A multi‐agent approach for provisioning of e‐services in u‐commerce environments
2010
Internet Research
Design/methodology/approach -The multi-agent systems (MAS) approach is based on an MAS model developed for AmI that has been redesigned to support u-commerce. ...
Originality/value -The research proposes an MAS designed for u-commerce domains, analyzes the capacity of trust management techniques in this environment, and proposes several evaluation methods to show ...
Figure 1 . 1 MAS architecture
Figure 2 . 2 MAS architecture for u-commerce
Figure 3 . 3 Online (left) and Offline (right) quality evaluation
Figure 4 . 4 Processing of location information provided ...
doi:10.1108/10662241011050713
fatcat:3stqtvdy3nag7k4yjodwxy4y6e
Engineering Privacy
2009
IEEE Transactions on Software Engineering
In the second part of this paper, we develop guidelines for building privacy-friendly systems. We distinguish two approaches: "privacy-by-policy" and "privacy-by-architecture." ...
This paper aims to introduce engineers and computer scientists to the privacy research domain and provide concrete guidance on how to design privacy-friendly systems. ...
DAAD19-02-I-0389 ("Perpetually Available and Secure Information Systems") to Carnegie Mellon University's CyLab and by the Transcoop programme of the Humboldt-Shiftung. ...
doi:10.1109/tse.2008.88
fatcat:xyliz5gvgnf2bdojz2uh4puate
Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems
2012
User modeling and user-adapted interaction
This frameworks can help designers and researchers to contextualize privacy challenges of solutions when designing personalization systems. ...
For example, systems that personalize advertisements according to the physical location of the user or according to the user's friends' search history, introduce new privacy risks that may discourage wide ...
E-commerce services, such as Shopkick, are using location-based price discrimination, offering coupons based on location and user profile. ...
doi:10.1007/s11257-011-9110-z
fatcat:qxghk5txzfel3j5365yktbei3i
Tailoring Privacy to Users' Needs 1
[chapter]
2001
Lecture Notes in Computer Science
Most privacy laws however also impose demands that call for new technologies that still need to be researched. ...
This article discusses how the deployment of personalized systems is affected by users' privacy concerns and by privacy legislation. ...
Nielsen NetRatings [18] report that e-commerce sites offering personalized services convert significantly more visitors into buyers than e-commerce sites that do not offer personalized services. ...
doi:10.1007/3-540-44566-8_52
fatcat:v4hofsyxwjen5fx54v4cnypyve
Factors Influencing the Perception of Website Privacy Trustworthiness and Users' Purchasing Intentions: The Behavioral Economics Perspective
2019
Journal of Theoretical and Applied Electronic Commerce Research
In this study, we identified the factors that influence consumer purchasing intentions and their perceptions of the trustworthiness of the privacy-related practices of e-commerce websites. ...
Trust is expected to positively influence an individual's intention to conduct online transactions [118] . ...
Acknowledgments The authors are grateful to the colleagues and reviewers for their insights and useful comments. Funding for this study was supported by a fellowship from Telecom Italia (TIM). ...
doi:10.4067/s0718-18762019000300107
fatcat:do5srqbjjrcbrmupbudtrztl6e
A Critical Analysis on the Evolution in the E-Payment System, Secuiry Risk, Threats and Vulnerability
2018
Communications on Applied Electronics
The main contribution of the present survey study is providing the landscape of digital e-payment system and its opportunities for future e-commerce systems. ...
In this research study, have analyzing the evolution of e-payment system and its terminology followed by different conventional e-payment mechanisms. ...
The e-commerce websites exploit an e-payment method to make ease transaction and more convenient to pay for their customers. ...
doi:10.5120/cae2018652800
fatcat:qqxdavvwp5cstbtxebqp7w6kuq
Privacy and e-commerce: a consumer-centric perspective
2007
Electronic Commerce Research
Privacy is an ancient concept, but its interpretation and application in the area of e-commerce are still new. ...
for current e-commerce applications, and identifies directions for the future development of successful privacy enhancing technologies. ...
Furthermore, how this right to privacy fares when applied to the world of e-commerce is an even more contentious issue. ...
doi:10.1007/s10660-007-9002-9
fatcat:vs253toq4zeuxinqqzaqrfjiiu
Impacts of User Privacy Preferences on Personalized Systems
[chapter]
2004
Designing Personalized User Experiences in eCommerce
Similar methods to ease privacy concerns could be applied in the system described by Hoelscher and Dietrich in their chapter "E-Commerce Personalization and Real-Time Site Monitoring". ...
s chapter on "How Personalization of an E-Commerce Website Affects Consumer Trust", the authors address the issue of user trust in personalized e-commerce applications. ...
doi:10.1007/1-4020-2148-8_17
fatcat:wnu4j5oykjc65imv46awbfjdba
A survey of privacy in multi-agent systems
2013
Knowledge engineering review (Print)
It also surveys privacy-related studies in the field of multi-agent systems and identifies open challenges to be addressed by future research. liable for their acts. ...
Moreover, autonomous agents themselves can be used to increase the privacy of computer applications by taking advantage of the intrinsic features they provide, such as artificial intelligence, pro-activeness ...
Acknowledgments This work has been partially supported by CONSOLIDER-INGENIO 2010 under grant CSD2007-00022, and project TIN2011-27652-C03-00 of the Spanish Government. ...
doi:10.1017/s0269888913000180
fatcat:q5diblx5mba7vckepmnn46fhx4
Privacy through pseudonymity in user-adaptive systems
2003
ACM Transactions on Internet Technology
A reference model for pseudonymous and secure user modeling is presented that meets many of the proposed requirements. ...
Both is in conflict with users' privacy concerns that became manifest in numerous recent consumer polls, and with data protection laws and guidelines that call for parsimony, purpose-orientation, and user ...
ACKNOWLEDGMENTS We would like to thank Lorrie Cranor, Günter Pernul, Gene Tsudik, and the three anonymous TOIT reviewers for their valuable comments on an earlier version of this article. ...
doi:10.1145/767193.767196
fatcat:2qbotspjbnd7nnstvkwuqvd75m
The impact of blockchain on e-commerce: A framework for salient research topics
2021
Electronic Commerce Research and Applications
A B S T R A C T Blockchain-based technologies are predicted as major disruptors for numerous business applications and processes, which bears huge implications for e-commerce. ...
In this paper, a framework and 19 high-level research questions are developed to inspire researchers to closely investigate the potential impact of blockchain on e-commerce. ...
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper. ...
doi:10.1016/j.elerap.2021.101054
fatcat:vgu3h2vjgbaubmfzncodspzqfi
What's happened to PETs?
2009
Information Security Technical Report
I then describe an application of "S-curve" and maturity models to the analysis of this problem, and conclude by using it to examine the success factors for adoption of innovative privacy-related technology ...
Privacy Privacy enhancing technology Innovation Maturity models S-curves Digital identity Anonymity Pseudonymity a b s t r a c t Given that many candidate technical elements have been available for some ...
to 'design privacy in' to their systems. ...
doi:10.1016/j.istr.2009.10.010
fatcat:ehd4hkyyurekzpsaygzvkksvxe
Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication
[chapter]
2014
Lecture Notes in Computer Science
As an authentication token, an eID card is a gateway to personal information and as such it is subject to privacy risks. ...
Then we study two approaches for integrating Privacy-ABCs with eID systems. ...
Acknowledgements The research leading to these results has received funding from the European Community's Seventh Framework Programme (FP7/2007-2013) under Grant Agreement no. 257782 for the project Attribute-based ...
doi:10.1007/978-3-642-54069-1_7
fatcat:r2bef2fnifaftbo32lzmiqpoei
« Previous
Showing results 1 — 15 out of 657 results