Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
What makes Internet users visit cyber stores again? key design factors for customer loyalty
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
Privacy in e-commerce: examining user scenarios and privacy preferences
Proceedings of the 1st ACM conference on Electronic commerce
Anonymity, unobservability, and pseudeonymity — a proposal for terminology
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Knowledge management and data mining for marketing
Decision Support Systems - Knowledge management support of decision making
IntelliShopper: a proactive, personal, private shopping assistant
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 3
Privacy, economics, and price discrimination on the Internet
ICEC '03 Proceedings of the 5th international conference on Electronic commerce
A critical review of multi-objective optimization in data mining: a position paper
ACM SIGKDD Explorations Newsletter
Privacy enhancing identity management: protection against re-identification and profiling
Proceedings of the 2005 workshop on Digital identity management
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Profiling the European Citizen: Cross-Disciplinary Perspectives
Profiling the European Citizen: Cross-Disciplinary Perspectives
Enforcing security in the AgentScape middleware
Proceedings of the 2008 workshop on Middleware security
IEEE Transactions on Software Engineering
The Future of Identity in the Information Society: Challenges and Opportunities
The Future of Identity in the Information Society: Challenges and Opportunities
Anonymity services for multi-agent systems
Web Intelligence and Agent Systems
Privacy in inter-vehicular networks: why simple pseudonym change is not enough
WONS'10 Proceedings of the 7th international conference on Wireless on-demand network systems and services
Partial identities as a foundation for trust and reputation
Engineering Applications of Artificial Intelligence
Mining qualitative context models from multiagent interactions
The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 3
A group-oriented secure multiagent platform
Software—Practice & Experience
Beyond k-anonymity: a decision theoretic framework for assessing privacy risk
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
Magentix2: A privacy-enhancing Agent Platform
Engineering Applications of Artificial Intelligence
Hi-index | 0.00 |
In e-commerce applications, vendors can construct detailed profiles about customers' preferences, which is known as buyer profiling. These profiles can then be used by vendors in order to perform practices such as price discrimination, poor judgment, etc. The use of pseudonyms and, specially, changing pseudonyms from time to time are known to minimize profiling, minimizing the capacity of vendors to perform such practices in turn. Although there are some frameworks and tools that support pseudonym change, there are few proposals that suggest or directly change the pseudonym in an automated fashion. Instead, users are usually provided with the mechanisms to change pseudonyms but without any advise on when they should actually use these mechanisms. In this paper, we present an approach to control buyer profiling by means of automated pseudonym changes performed according to human privacy attitudes. We also present an application scenario and an evaluation of our proposal.