E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior
Proceedings of the 3rd ACM conference on Electronic Commerce
Mining the peanut gallery: opinion extraction and semantic classification of product reviews
WWW '03 Proceedings of the 12th international conference on World Wide Web
Mining and summarizing customer reviews
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
HT06, tagging paper, taxonomy, Flickr, academic article, to read
Proceedings of the seventeenth conference on Hypertext and hypermedia
tagging, communities, vocabulary, evolution
CSCW '06 Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work
Getting our head in the clouds: toward evaluation studies of tagclouds
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Fighting Spam on Social Web Sites: A Survey of Approaches and Future Challenges
IEEE Internet Computing
Evaluating tagging behavior in social bookmarking systems: metrics and design heuristics
Proceedings of the 2007 international ACM conference on Supporting group work
FORPS: friends-oriented reputation privacy score
Proceedings of the First International Workshop on Security and Privacy Preserving in e-Societies
Hi-index | 0.00 |
While data privacy is a human right, it is challenging to enforce it. For example, if multiple retailers execute a single order at Amazon Marketplace, each retailer can use different agencies for shipment, payment etc., resulting in unmanageable flows of personal data. In this work, we present the Privacy 2.0 system, which enables people to share experiences, observations, and recommendations regarding the privacy practices of data collectors. The basis of Privacy 2.0 is a folksonomy where a user community tags web sites on the Internet with privacy-related labels, e.g., "no privacy policy" or "collects too much personal data". Privacy 2.0 evaluates this folksonomy, and issues a warning if a user is about to enter a web site that has been marked with alarming tags by the majority of users. We have evaluated an operative implementation of our approach by means of a user study. The study indicates that the Privacy 2.0 system helps to assess the privacy practices of service providers and adapts well to a wide range of privacy threats.