The Community for Technology Leaders
RSS Icon
Issue No.01 - Jan.-March (2012 vol.5)
pp: 62-73
M. Anwar , Sch. of Inf. Sci., Univ. of Pittsburgh, Pittsburgh, PA, USA
J. Greer , Dept. of Comput. Sci., Univ. of Saskatchewan, Saskatoon, SK, Canada
This research explores a new model for facilitating trust in online e-learning activities. We begin by protecting the privacy of learners through identity management (IM), where personal information can be protected through some degree of participant anonymity or pseudonymity. In order to expect learners to trust other pseudonymous participants, we realize that a reliable mechanism is needed for managing participants' reputations and assuring that such reputations are legitimately obtained. Further, because participants can hold multiple identities or can adopt new pseudonymous personas, a reliable and trustworthy mechanism for reputation transfer (RT) from one persona to another is required. Such a reputation transfer model must preserve privacy and at the same time prevent linkability of learners' identities and personas. In this paper, we present a privacy-preserving reputation management (RM) system which allows secure transfer of reputation. A prototypical implementation of our reputation transfer protocol and the successful experimental deployment of our reputation management solution in an e-learning discussion forum serve as a proof of concept.
data privacy, computer aided instruction, privacy-preserving reputation management system, privacy-preserving e-learning environment, online e-learning activity, learner privacy, identity management, participant anonymity degree, participant pseudonymity degree, participant reputation, reputation transfer mechanism, Privacy, Context, Electronic learning, Communities, Observers, Collaboration, Corporate acquisitions, privacy., E-learning environments, trust, reputation, reputation management, identity management
M. Anwar, J. Greer, "Facilitating Trust in Privacy-Preserving E-Learning Environments", IEEE Transactions on Learning Technologies, vol.5, no. 1, pp. 62-73, Jan.-March 2012, doi:10.1109/TLT.2011.23
[1] M. Anwar, J. Greer, and C. Brooks, "Privacy Enhanced Personalization in E-Learning," Proc. Int'l Conf. Privacy, Security, and Trust, 2006.
[2] K. Borcea, H. Donker, E. Franz, A. Pfitzmann, and H. Wahrig, "Towards Privacy-Aware eLearning," Proc. Privacy Enhancing Technologies, pp. 167-178, 2005.
[3] R.E. Leenes, "User-Centric Identity Management as an Indispensable Tool for Privacy Protection," Int'l J. Intellectual Property Management, vol. 2, no. 4, pp. 345-371, 2008.
[4] J. Mason and P. Lefrere, "Trust, Collaboration, and Organisational Transformation," Int'l J. Training and Development, vol. 7, no. 4, pp. 259-271, 2003.
[5] C. Haythornthwaite, "Facilitating Collaboration in Online Learning," J. Asynchronous Learning Networks, vol. 10, no. 1, pp. 7-23, 2006.
[6] J. Allan and N. Lawless, "Stress Caused by Online Collaboration in E-learning: A Developing Model," Education and Training, vol. 45, nos. 8/9, pp. 564-572, 2003.
[7] S. Patil and A. Kobsa, "Privacy in Collaboration: Managing Impression," Proc. First Int'l Conf. Online Communities and Social Computing, 2005.
[8] E. Aimeur, H. Hage, and F.S.M. Onana, "A Framework for Privacy-Preserving E-learning," Proc. Joint iTrust and PST Conf. Privacy, Trust Management and Security, vol. 238, pp. 223-238, 2007.
[9] E.T. Bates and L.R. Wiest, "Impact of Personalization of Mathematical Word Problems on Student Performance," The Math. Educator, vol. 14, no. 2, pp. 17-26, 2004.
[10] A. Kobsa and J. Schreck, "Privacy through Pseudonymity in User-Adaptive Systems," ACM Trans. Internet Technology, vol. 3, no. 2, pp. 149-183, 2003.
[11] P. Briggs, B. Simpson, and A.D. Angeli, "Personalisation and Trust: A Reciprocal Relationship?" Designing Personalized User Experiences in eCommerce, pp. 39-55, Kluwer Academic, 2004.
[12] L. Sweeney, "k-Anonymity: A Model for Protecting Privacy," Int'l J. Uncertainty Fuzziness and Knowledge-Based Systems, vol. 10, pp. 557-570, Oct. 2002.
[13] A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, "L-Diversity: Privacy Beyond K-anonymity," ACM Trans. Knowledge Discovery from Data, vol. 1, p. 3, Mar. 2007.
[14] E. Goffman, The Presentation of Self in Everyday Life. Anchor-Doubleday, 1961.
[15] S. Patil and A. Kobsa, "Privacy as Impression Management," Technical Report UCI-ISR-03-13, Inst. for Software Research, Univ. of California, Dec. 2003.
[16] M. Raento and A. Oulasvirta, "Designing for Privacy and Self-Presentation in Social Awareness," J. Personal and Ubiquitous Computing, vol. 12, no. 7, pp. 527-542, 2008.
[17] M. Anwar and J. Greer, "Implementing Role- and Relationship-Based Identity Management in E-Learning Environments," Proc. 14th Int'l Conf. Artificial Intelligence in Education, 2009.
[18] T.D. Huynh, N.R. Jennings, and N.R. Shadbolt, "Certified Reputation: How an Agent Can Trust a Stranger," Proc. Fifth Int'l Joint Conf. Autonomous Agents and Multiagent Systems (AAMAS '06), pp. 1217-1224, 2006.
[19] D.F. Schoorman, R.C. Mayer, and J.H. Davis, "An Integrative Model of Organizational Trust: Past, Present, and Future," Academy of Management Rev., vol. 32, no. 2, pp. 344-354, 2007.
[20] J. Greer, G. McCalla, J. Vassileva, R. Deters, S. Bull, and L. Kettel, "Lessons Learned in Deploying a Multi-Agent Learning Support System: The I-Help Experience," Proc. Int'l AI and Education Conf. (AIED '01), pp. 410-421, 2001.
[21] M. Anwar and J. Greer, "Role- and Relationship-Based Identity Management for Private yet Accountable E-Learning," Proc. Joint iTrust and PST Conf. Privacy (IFIPTM '08), 2008.
[22] M. Hansen, A. Schwartz, and A. Cooper, "Privacy and Identity Management," IEEE Security and Privacy, vol. 6, no. 2, pp. 38-45, Mar./Apr. 2008.
[23] M. Anwar and J. Greer, "Enabling Reputation-Based Trust in Privacy-Enhanced Learning Systems," Proc. Ninth Int'l Conf. Intelligent Tutoring Systems (ITS '08), June 2008.
[24] C. Handy, "Trust and the Virtual Organization," Creating Value in the Network Economy, pp. 107-120, Harvard Business School, 1999.
[25] N. Luhmann, "Familiarity, Confidence, Trust: Problems and Alternatives," Trust: Making and Breaking Cooperative Relations, D. Gambetta, ed., pp. 94-107, Oxford Univ., 2000.
[26] T. Grandison and M. Sloman, "A Survey of Trust in Internet Applications," IEEE Comm. Surveys and Tutorials, vol. 3, no. 4, pp. 2-16, Oct.-Dec. 2000.
[27] V. Carchiolo, D. Correnti, A. Longheu, M. Malgeri, and G. Mangioni, "Exploiting Trust into E-Learning: Adding Reliability to Learning Paths," Int'l J. Technology Enhanced Learning, vol. 1, no. 4, pp. 253-265, 2009.
[28] D. Artz and Y. Gil, "A Survey of Trust in Computer Science and the Semantic Web," J. Web Semantics, vol. 5, no. 2, pp. 58-71, 2007.
[29] J.L. Steel, "Interpersonal Correlates of Trust and Self-Disclosure," Psychological Reports, vol. 68, pp. 1319-1320, 1991.
[30] B. Friedman, P.H. KahnJr., and D.C. Howe, "Trust Online," Comm. ACM, vol. 43, no. 12, pp. 34-40, 2000.
[31] W. Nejdl, D. Olmedilla, and M. Winslett, "Peertrust: Automated Trust Negotiation for Peers on the Semantic Web," Proc. 30th Workshop Secure Data Management in a Connected World (SDM '04), pp. 118-132, 2004.
[32] T. Yu and M. Winslett, "Policy Migration for Sensitive Credentials in Trust Negotiation," Proc. ACM Workshop Privacy in the Electronic Soc. (WPES '03), pp. 9-20, 2003.
[33] D.G. Johnson and K. Miller, "Anonymity, Pseudonymity, or Inescapable Identity on the Net (Abstract)," SIGCAS Computer Soc., vol. 28, no. 2, pp. 37-38, 1998.
[34] S. Marsh, "Formalising Trust as a Computational Concept," PhD dissertation, Univ. of Stirling, 1994.
[35] J. Golbeck and J. Hendler, "Accuracy of Metrics for Inferring Trust and Reputation in Semantic Web-Based Social Networks," Proc. Eng. Knowledge in the Age of the SemanticWeb, 2004.
[36] L.A. Adamic, "The Small World Web," Proc. Third European Conf. Research and Advanced Technology for Digital Libraries, Jan. 1999.
[37] C. Ridings and M. Shishigin, "Pagerank Uncovered," technical report, 2002.
[38] I. Agudo, M.C.F. Gago, and J. Lopez, "A Multidimensional Reputation Scheme for Identity Federations," Proc. Sixth European Conf. Public Key Infrastructures, Services and Applications (EuroPKI), pp. 225-238, 2009.
[39] F. Pingel and S. Steinbrecher, "Multilateral Secure Cross-Community Reputation Systems for Internet Communities," Proc. Fifth Int'l Conf. Trust, Privacy and Security in Digital Business (TrustBus), pp. 69-78, 2008.
[40] L. Lilien and B.K. Bhargava, "A Scheme for Privacy-preserving Data Dissemination," IEEE Trans. Systems, Man, and Cybernetics, vol. 36, no. 3, pp. 503-506, May 2006.
10 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool