skip to main content
10.1145/1102199.1102209acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Determining user privacy preferences by asking the right questions: an automated approach

Published: 07 November 2005 Publication History

Abstract

One fundamental aspect of user privacy is to respect the privacy preferences that users have. A clear prerequisite to doing this is accurately gauging what user's privacy preferences are. Current approaches either offer limited privacy options or have so many choices that users are likely to be overwhelmed. We present a framework for modeling user privacy preferences in terms of a hierarchy of questions which can be asked. We describe two means of dynamically choosing which questions should be asked to efficiently determine what a user's privacy preferences are.

References

[1]
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. An XPath-based Preference Language for P3P. In 12th Int'l World Wide Web Conference, Budapest, Hungary, May 2003.
[2]
L. Cranor, M. Arjula, and P. Gudur. Use of a p3p user agent by early adopters. In WPES '02: Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society, pages 1--10, New York, NY, USA, 2002. ACM Press.
[3]
European Union Joint Research Council. JRC P3P Resource Center. http://p3p.jrc.it/downloadP3P.php.
[4]
W3C. A P3P Preference Exchange Language 1.0 (APPEL 1.0). http://www.w3.org/TR/P3P-preferences/.
[5]
W3C. Platform for Privacy Preferences (P3P) Specification. http://www.w3.org/TR/WD-P3P/Overview.html.

Cited By

View all
  • (2016)A Risk-Benefit Driven Architecture for Personal Data Release (Invited Paper)2016 IEEE 17th International Conference on Information Reuse and Integration (IRI)10.1109/IRI.2016.14(40-49)Online publication date: Jul-2016
  • (2015)A Hierarchical Multitier Approach for Privacy Policies in e-Government EnvironmentsFuture Internet10.3390/fi70405007:4(500-515)Online publication date: 21-Dec-2015
  • (2012)Enhancing privacy in cloud computing via policy-based obfuscationThe Journal of Supercomputing10.1007/s11227-010-0425-z61:2(267-291)Online publication date: 1-Aug-2012
  • Show More Cited By

Index Terms

  1. Determining user privacy preferences by asking the right questions: an automated approach

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WPES '05: Proceedings of the 2005 ACM workshop on Privacy in the electronic society
      November 2005
      116 pages
      ISBN:1595932283
      DOI:10.1145/1102199
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 07 November 2005

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. APPEL
      2. P3P
      3. preferences
      4. privacy

      Qualifiers

      • Article

      Conference

      CCS05
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 106 of 355 submissions, 30%

      Upcoming Conference

      CCS '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 17 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2016)A Risk-Benefit Driven Architecture for Personal Data Release (Invited Paper)2016 IEEE 17th International Conference on Information Reuse and Integration (IRI)10.1109/IRI.2016.14(40-49)Online publication date: Jul-2016
      • (2015)A Hierarchical Multitier Approach for Privacy Policies in e-Government EnvironmentsFuture Internet10.3390/fi70405007:4(500-515)Online publication date: 21-Dec-2015
      • (2012)Enhancing privacy in cloud computing via policy-based obfuscationThe Journal of Supercomputing10.1007/s11227-010-0425-z61:2(267-291)Online publication date: 1-Aug-2012
      • (2012)Protecting Personal Information in Cloud ComputingOn the Move to Meaningful Internet Systems: OTM 201210.1007/978-3-642-33615-7_3(475-491)Online publication date: 2012
      • (2007)A Hierarchical Approach to the Specification of Privacy Preferences2007 Innovations in Information Technologies (IIT)10.1109/IIT.2007.4430460(660-664)Online publication date: Nov-2007
      • (2006)Protecting privacy with the MPEG-21 IPMP frameworkProceedings of the 6th international conference on Privacy Enhancing Technologies10.1007/11957454_9(152-171)Online publication date: 28-Jun-2006

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media