Privacy in e-commerce: examining user scenarios and privacy preferences
Proceedings of the 1st ACM conference on Electronic commerce
E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior
Proceedings of the 3rd ACM conference on Electronic Commerce
Supporting global user profiles through trusted authorities
ACM SIGMOD Record
Proceedings of the 11th international conference on World Wide Web
Consumer trust in an Internet store
Information Technology and Management
Users' perception of privacy in multimedia communication
CHI '99 Extended Abstracts on Human Factors in Computing Systems
Distributed and disappearing user interfaces in ubiquitous computing
CHI '01 Extended Abstracts on Human Factors in Computing Systems
Privacy in browser-based attribute exchange
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Trustbuilders and Trustbusters
I3E '01 Proceedings of the IFIP Conference on Towards The E-Society: E-Commerce, E-Business, E-Government
The Role of Policy and Stakeholder Privacy Values in Requirements Engineering
RE '01 Proceedings of the Fifth IEEE International Symposium on Requirements Engineering
Examining the technology acceptance model using physician acceptance of telemedicine technology
Journal of Management Information Systems - Special section: Strategic and competitive information systems
Human-Computer Interaction
PeCAN: an architecture for users' privacy-aware electronic commerce contexts on the semantic web
Information Systems - Special issue: The semantic web and web services
A Galois lattice approach to a context-aware privacy negotiation service
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |
Empowering users to make informed decision-making over online release of private data is a challenge in today's society. A large majority of users has rejected many e-privacy business models including Lumeria's, Zero-Knowledge's, and Microsoft's PassPort. In detailing privacy requirements for an architecture for user-controlled e-privacy, we provide some key reasons, mainly centered around user's perception of control, behind the apparent dismissal of business models for privacy based on trusted third parties. We describe an architecture, based on the P3P platform, that supports privacy requirements for enhanced user control of privacy. Privacy management issues that are addressed include the identification of data repositories and their purposes, user agents and their roles and interactions, and the separation of persona profile information from user preference information.