Workshop 9 Privacy-Enhanced Personalization Workshop co-chairs: Alfred Kobsa & Lorrie Cranor

Slides:



Advertisements
Similar presentations
School of something FACULTY OF OTHER School of Computing FACULTY OF ENGINEERING Web Search Personalization via Social Bookmarking and Tagging COMP3740.
Advertisements

Software change management
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 1 Privacy Authorization Languages.
John Richards Clients Replacement Project Board 30 June 2006.
Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by the U.S. Department of Defense © 1998 by Carnegie Mellon.
Enterprise Content Management Pre-Proposal Conference for RFP No. ISD2006ECM-SS December 6, 2006 California Administrative Office of the Courts Information.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Privacy in Social Networks CSCE 201. Reading Dwyer, Hiltz, Passerini, Trust and privacy concern within social networking sites: A comparison of Facebook.
Standardizing Usable Security and Privacy: Taking It To the Next Level, or Settling for Less? Mary Ellen Zurko, IBM Maritza Johnson, Columbia University.
S5-1 © 2001 Carnegie Mellon University OCTAVE SM Process 5 Identify Key Components Software Engineering Institute Carnegie Mellon University Pittsburgh,
Do You Trust Your Recommender? An Exploration of Privacy and Trust in Recommender Systems Dan Frankowski, Dan Cosley, Shilad Sen, Tony Lam, Loren Terveen,
Artificial Intelligence and Case-Based Reasoning Computer Science and Engineering Mälardalen University Västerås, Mikael Sollenborn, CSL,
DocuBrowse Faceted Searching, Browsing, and Recommendations in an Enterprise Context Paper by: Girgensohn, Shipman, Chen, Wilcox Published in Proceeding.
WebKDD – Future Directions. Research directions Forum directions.
Usable Privacy and Security Carnegie Mellon University Spring 2008 Lorrie Cranor 1 Designing user studies February.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Data Privacy.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Search Engines.
Thursday, July 8, 2004DIMACS Workshop, NJ Instant Messaging and Privacy Sameer Patil University of California, Irvine (& IBM T. J. Watson Research Center)
Sparsity, Scalability and Distribution in Recommender Systems
Institute of Information Systems, Humboldt University, 2006· Privacy Engineering Sarah Spiekermann & Lorrie Faith Cranor DIMACS Workshop, Rutgers University.
Enterprise social bookmarking - in a community of practice in IBM, Denmark by Joachim Florentz Boye and Marianne Lykke Nielsen Royal School of Library.
E-Profile-based Security for Critical Transactions in Web Applications Written by: Jean Stephan et al., 2009 Reported by: Renato Casipe, 2/15/2010.
Mark Ackerman Department of Electrical Engineering and Computer Science and School of Information University of Michigan HCI Issues in Privacy DIMACS July,
Copyright © Norman Sadeh Semantic Web Technologies to Reconcile Privacy and Context Awareness Norman M. Sadeh ISRI- School of Computer Science.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Privacy Policy.
MSF Testing Introduction Functional Testing Performance Testing.
Learning Table Extraction from Examples Ashwin Tengli, Yiming Yang and Nian Li Ma School of Computer Science Carnegie Mellon University Coling 04.
Accessibility, Integrity, & Confidentiality: Security Challenges for E-Business Rodney J. Petersen University of Maryland & Educause/Internet2 Security.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 Privacy Self-Regulation.
Esri UC2013. Technical Workshop. Technical Workshop 2013 Esri International User Conference July 8–12, 2013 | San Diego, California Configuring ArcGIS.
July 25, 2005 PEP Workshop, UM A Single Sign-On Identity Management System Without a Trusted Third Party Brian Richardson and Jim Greer ARIES Lab.
Information Security Research Program Henry Lee Manager, Security Policy and Research Office of the Chief Information Officer December 2007.
● Problem statement ● Proposed solution ● Proposed product ● Product Features ● Web Service ● Delegation ● Revocation ● Report Generation ● XACML 3.0.
TESTING STRATEGY Requires a focus because there are many possible test areas and different types of testing available for each one of those areas. Because.
Sept 13-15, 2004IHE Interoperability Workshop 1 Integrating the Healthcare Enterprise Overview of IHE IT Infrastructure Patient Synchronized Applications.
Overview of CSCW Participation Types and Review Process David W. McDonald The Information School University of Washington October 15, 2012.
CILogon OSG CA Mine Altunay Jim Basney TAGPMA Meeting Pittsburgh May 27, 2015.
Decentralized, Agent Based, and Social Approaches to User Modeling (DASUM) Peter Dolog and Julita Vassileva
How P3P Works Lorrie Faith Cranor P3P Specification Working Group Chair AT&T Labs-Research 4 February 2002
PROLEARN - Professional Learning for Europe Research Issues and Application Scenarios PROLEARN Network of Excellence Martin Wolpers L3S.
Luisa Franconi Integration, Quality, Research and Production Networks Development Department Unit on microdata access ISTAT Essnet on Common Tools and.
Belnet Federation Belnet – Loriau Nicolas Brussels – 12 th of June 2014.
Informed Consent to Address Trust, Control, and Privacy Concerns in User Profiling Thea van der Geest, Willem Pieterson, Peter de Vries.
User Modeling, Recommender Systems & Personalization Pattie Maes MAS 961- week 6.
Sept 13-15, 2004IHE Interoperability Workshop 1 Integrating the Healthcare Enterprise Overview of IHE IT Infrastructure Patient Synchronized Applications.
Change Enhancement Process Overview Chris Walsh North American Area Representative SAGGroup Executive Committee In my spare time … Chief Technology Architect.
HIT Policy Committee Privacy & Security Tiger Team Update Deven McGraw, Co-Chair Center for Democracy & Technology Paul Egerman, Co-Chair June 25, 2010.
Collaborative Filtering Presented by; Ghulam Mujtaba MS CS, IBA, Karachi.
Xypoint Position Paper Mario G. Tapia Will Cousins Xypoint 2200 Alaskan Way,
Workshop Presentation [1] Investigating Liberty Alliance and Shibboleth Integration Nishen Naidoo, Supervisor: Dr. Steve Cassidy.
Context Awareness: From Dream to Reality Norman M. Sadeh School of Computer Science Carnegie Mellon University Research Sponsors: DARPA/DAML, IBM, Boeing,
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 Data Privacy Week 9 - October.
Preparing for Automation Dr. Dania Bilal IS 582 Spring 2007.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Law Enforcement.
1 Privacy-Enhanced Collaborative Filtering Privacy-Enhanced Personalization workshop July 25, 2005, Edinburgh, Scotland Shlomo Berkovsky 1, Yaniv Eytani.
New Developments in Access Management: Setting the Scene Alan Robiette JISC Development Group JISC-CNI Conference, June 2002.
PAPI: Simple and Ubiquitous Access to Internet Information Services JISC/CNI Conference - Edinburgh, 27 June 2002.
Publishing in English Language Journals: an editor’s view Beijing Foreign Study University October 2015.
Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA The Implications of a Single Mobile Computing.
Anonymity and Privacy Issues --- re-identification
The Air & Waste Management Association An Opportunity for the Environmental Professional.
IFIP TC5 Working Group 5.4 Computer Aided Innovation Objectives: The Working Group will: – Identify the different existing approaches – Share opinions,
Seventh International Workshop on Parallel Programming Models and Systems Software for High-End Computing (P2S2) Sep. 9 th, 2014, Minneapolis, MN PavanBalaji.
WWW10 / Taiwan Trip Report Jason I. Hong Group for User Interface Research University of California at Berkeley.
Business Challenges in the evolution of HOME AUTOMATION (IoT)
LIGO R&D1 Proposed Changes in LSC Publication Policy Committee »Jim Hough, Nergis Mavalvala, Dave Reitze, Kip Thorne »Input from Alan Wiseman Charge »to.
TC on Business Informatics and Systems
How P3P Works Lorrie Faith Cranor P3P Specification Working Group Chair AT&T Labs-Research 4 February
Getting Involved in the W3C
Managing Private and Public Views of DDI Metadata Repositories
Presentation transcript:

Workshop 9 Privacy-Enhanced Personalization Workshop co-chairs: Alfred Kobsa & Lorrie Cranor

2 Program committee Alfred Kobsa, University of California, Irvine, CA Alfred Kobsa, University of California, Irvine, CA Lorrie Cranor, Carnegie Mellon University, Pittsburgh, PA Lorrie Cranor, Carnegie Mellon University, Pittsburgh, PA John Canny, University of California, Berkeley, CA John Canny, University of California, Berkeley, CA Clare-Marie Karat, IBM Watson Research Ctr., Hawthorne, NY Clare-Marie Karat, IBM Watson Research Ctr., Hawthorne, NY Judy Kay, University of Sydney, Australia Judy Kay, University of Sydney, Australia Sarah Spiekermann, Humboldt University, Berlin, Germany Sarah Spiekermann, Humboldt University, Berlin, Germany Loren Terveen, University of Minnesota, Minneapolis, MN Loren Terveen, University of Minnesota, Minneapolis, MN

3 PEP Program Full-day workshop Full-day workshop 16 submissions received 16 submissions received 1 position paper 1 position paper 1 invited industry talk 1 invited industry talk Caspar Bowden, Microsoft Chief Privacy Advisor for Europe, Middle East and Asia The Need for an Identity Meta-System 4 long papers 4 long papers 5 short papers 5 short papers Discussion Discussion

4 Position paper Chris Demchak proposed a framework for escrowed identity, designed to protect privacy but allow for identification of bad actors Chris Demchak proposed a framework for escrowed identity, designed to protect privacy but allow for identification of bad actors

5 User studies Sara Spiekermann discussed privacy issues with RFID tags and a way of evaluating how users feel about proposed privacy enhancements Sara Spiekermann discussed privacy issues with RFID tags and a way of evaluating how users feel about proposed privacy enhancements Evelien Perik discussed a study to see whether user privacy preferences varied depending on type of data in a music recommendation system Evelien Perik discussed a study to see whether user privacy preferences varied depending on type of data in a music recommendation system Thea van der Geest discussed a project to address privacy concerns associated with an e- government web site that will use profiling to reduce the amount of forms people have to fill out Thea van der Geest discussed a project to address privacy concerns associated with an e- government web site that will use profiling to reduce the amount of forms people have to fill out

6 Catering to privacy requirements Yang Wang discussed a software product line approach to make it easier to automate the handling of privacy constraints in web personalization based on the needs of specific users/jurisdictions Yang Wang discussed a software product line approach to make it easier to automate the handling of privacy constraints in web personalization based on the needs of specific users/jurisdictions Judy Kay presented a framework for privacy in a ubiquitous personalized environment Judy Kay presented a framework for privacy in a ubiquitous personalized environment

7 Selective access to user data Jim Greer discussed a design for a single sign-on identity management system that avoids most of the pitfalls of systems such as Microsoft Passport and Liberty Jim Greer discussed a design for a single sign-on identity management system that avoids most of the pitfalls of systems such as Microsoft Passport and Liberty Elke Franz discussed a personalized tutoring system and various interfaces to allow users to specify when the system should record user data as part of different contexts Elke Franz discussed a personalized tutoring system and various interfaces to allow users to specify when the system should record user data as part of different contexts

8 Privacy in recommender systems Schlomo Berkovsky discussed an approach to increasing privacy in collaborative filtering by allowing users to store their own profiles and release obfuscated versions of them in response to a recommendation request Schlomo Berkovsky discussed an approach to increasing privacy in collaborative filtering by allowing users to store their own profiles and release obfuscated versions of them in response to a recommendation request John Riedl discussed the issue of shilling in recommender systems and raised a number of questions about privacy in recommender systems John Riedl discussed the issue of shilling in recommender systems and raised a number of questions about privacy in recommender systems

9 Discussion - A few highlights Much of this work is in early stages, many of us have more questions than answers Much of this work is in early stages, many of us have more questions than answers Identified profile management as problem that must be addressed to improve privacy in personalization Identified profile management as problem that must be addressed to improve privacy in personalization Does less information mean more privacy? Sometimes which information you keep is critical Does less information mean more privacy? Sometimes which information you keep is critical Important for user modeling community to think more about privacy, also collaboration needed with security/policy/UI communities Important for user modeling community to think more about privacy, also collaboration needed with security/policy/UI communities Interest in organizing similar workshop at another conference Interest in organizing similar workshop at another conference Interest in journal special issue that would reach interdisciplinary audience Interest in journal special issue that would reach interdisciplinary audience