The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May/June (2009 vol.7)
pp: 78-81
Michael Lesk , Rutgers University
ABSTRACT
Today, Amazon recommends books to you based on the books you've previously bought or searched for—soon, it could know exactly what paragraphs you've read. But will this help it make better recommendations? Is this customer service or an invasion of privacy? The author takes a look at recommender systems and if they truly deliver on what they promise or portend a much more error-prone method of tracking people.
INDEX TERMS
economics, security, privacy, recommender systems, security & privacy economics, security & privacy
CITATION
Michael Lesk, "Reading Over Your Shoulder", IEEE Security & Privacy, vol.7, no. 3, pp. 78-81, May/June 2009, doi:10.1109/MSP.2009.74
REFERENCES
1. R. McRoskey, "The Kindle vs. the Gadget Hall of Fame: How Will Amazon's Sales Stack Up?", The Business Insider,17 May 2008; www.businessinsider.com/2008/5the-kindle-vs-the-gizmo-legends .
2. D. Harman, "Relevance Feedback Revisited," ACM Special Interest Group on Information Retrieval Conf., ACM Press, 1992, pp. 1–10.
3. J. Allan, "Relevance Feedback with Too Much Data," ACM Special Interest Group on Information Retrieval Conf., ACM Press, 1995, pp. 337–343.
4. S. Hansell, "Marketers Trace Paths Users Leave on Internet," The New York Times,15 Aug. 2006; www.nytimes.com/2006/08/15/technology15search.html .
5. S. Hansell, "Your Privacy Is Protected Only if You Are Really Sick," The New York Times,17 Dec. 2008; http://bits.blogs.nytimes.com/2008/12/17/ your-privacy-is-protected-only-if-you-are-really-sick ?scp=1&sq=hansell%202008%20%20really%20sick&st=cse .
6. B. Schneier, "Schneier on Security,"23 Aug. 2006; www.schneier.com/blog/archives/2006/08trackmenot_1.html .
7. S. Dumais et al., "Stuff I've Seen: A System for Personal Information Retrieval and Re-Use," Proc. Special Interest Group on Information Retrieval 2003, ACM Press, 2003; http://research.microsoft.com/en-us/um/people/ sdumaissiscore-sigir2003-final.pdf .
8. J. Hadley, "'Loyalty' Cards Cause Griping over Swiping; Some Like Savings at Grocers, Others See 'Big Brother,'" Seattle Post Intelligencer,11 May 2002; www.seattlepi.com/local70072_loyal11.asp .
9. G. Danezis et al., "How Much Is Location Privacy Worth?" Proc. 4th Workshop on the Economics of Information Security, 2005; http://infosecon.net/workshop/pdflocation-privacy.pdf .
10. D. Cvrcek et al., "A Study on the Value of Location Privacy," Proc. 5th ACM Workshop on Privacy in the Electronic Soc., ACM Press, 2006, pp. 109–118.
11. J. Grossklags and A. Acquisti, "When 25 Cents Is Too Much: An Experiment on Willingness-to-Sell and Willingness-to-Protect Personal Information," Proc. 6th Workshop Economics of Information Security (WEIS 07), 2007; http://people.ischool.berkeley.edu/~jensg/ research/paperGrossklags_Acquisti-WEIS07.pdf .
12. A. Acquisti and J. Grossklags, "Privacy and Rationality in Individual Decision Making," IEEE Security &Privacy, vol. 3, no. 1, 2005, pp. 26–33.
34 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool