This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Reading Over Your Shoulder
May/June 2009 (vol. 7 no. 3)
pp. 78-81
Michael Lesk, Rutgers University
Today, Amazon recommends books to you based on the books you've previously bought or searched for—soon, it could know exactly what paragraphs you've read. But will this help it make better recommendations? Is this customer service or an invasion of privacy? The author takes a look at recommender systems and if they truly deliver on what they promise or portend a much more error-prone method of tracking people.

1. R. McRoskey, "The Kindle vs. the Gadget Hall of Fame: How Will Amazon's Sales Stack Up?", The Business Insider,17 May 2008; www.businessinsider.com/2008/5the-kindle-vs-the-gizmo-legends .
2. D. Harman, "Relevance Feedback Revisited," ACM Special Interest Group on Information Retrieval Conf., ACM Press, 1992, pp. 1–10.
3. J. Allan, "Relevance Feedback with Too Much Data," ACM Special Interest Group on Information Retrieval Conf., ACM Press, 1995, pp. 337–343.
4. S. Hansell, "Marketers Trace Paths Users Leave on Internet," The New York Times,15 Aug. 2006; www.nytimes.com/2006/08/15/technology15search.html .
5. S. Hansell, "Your Privacy Is Protected Only if You Are Really Sick," The New York Times,17 Dec. 2008; http://bits.blogs.nytimes.com/2008/12/17/ your-privacy-is-protected-only-if-you-are-really-sick ?scp=1&sq=hansell%202008%20%20really%20sick&st=cse .
6. B. Schneier, "Schneier on Security,"23 Aug. 2006; www.schneier.com/blog/archives/2006/08trackmenot_1.html .
7. S. Dumais et al., "Stuff I've Seen: A System for Personal Information Retrieval and Re-Use," Proc. Special Interest Group on Information Retrieval 2003, ACM Press, 2003; http://research.microsoft.com/en-us/um/people/ sdumaissiscore-sigir2003-final.pdf .
8. J. Hadley, "'Loyalty' Cards Cause Griping over Swiping; Some Like Savings at Grocers, Others See 'Big Brother,'" Seattle Post Intelligencer,11 May 2002; www.seattlepi.com/local70072_loyal11.asp .
9. G. Danezis et al., "How Much Is Location Privacy Worth?" Proc. 4th Workshop on the Economics of Information Security, 2005; http://infosecon.net/workshop/pdflocation-privacy.pdf .
10. D. Cvrcek et al., "A Study on the Value of Location Privacy," Proc. 5th ACM Workshop on Privacy in the Electronic Soc., ACM Press, 2006, pp. 109–118.
11. J. Grossklags and A. Acquisti, "When 25 Cents Is Too Much: An Experiment on Willingness-to-Sell and Willingness-to-Protect Personal Information," Proc. 6th Workshop Economics of Information Security (WEIS 07), 2007; http://people.ischool.berkeley.edu/~jensg/ research/paperGrossklags_Acquisti-WEIS07.pdf .
12. A. Acquisti and J. Grossklags, "Privacy and Rationality in Individual Decision Making," IEEE Security &Privacy, vol. 3, no. 1, 2005, pp. 26–33.

Index Terms:
economics, security, privacy, recommender systems, security & privacy economics, security & privacy
Citation:
Michael Lesk, "Reading Over Your Shoulder," IEEE Security & Privacy, vol. 7, no. 3, pp. 78-81, May-June 2009, doi:10.1109/MSP.2009.74
Usage of this product signifies your acceptance of the Terms of Use.