메뉴 건너뛰기




Volumn 31, Issue 4-5, 2006, Pages 295-320

PeCAN: An architecture for users' privacy-aware electronic commerce contexts on the semantic web

Author keywords

Context aware; e commerce; Online trust and e privacy architecture; Owl application; P3P; Privacy; Private data management; Semantic web; User decision support; Web services

Indexed keywords

COMPUTER ARCHITECTURE; DATA PRIVACY; ELECTRONIC COMMERCE; SEMANTICS; SOFTWARE AGENTS;

EID: 33344479307     PISSN: 03064379     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.is.2005.02.004     Document Type: Article
Times cited : (25)

References (49)
  • 1
    • 33344471026 scopus 로고    scopus 로고
    • Forrester Forrester Research Cambridge, MA
    • Forrester The Privacy Best Practice 1999 Forrester Research Cambridge, MA
    • (1999) The Privacy Best Practice
  • 2
    • 33344469679 scopus 로고    scopus 로고
    • Graphics, Visualization, and Usability Lab, Georgia Tech
    • GVU's 10th WWW Survey. Graphics, Visualization, and Usability Lab, Georgia Tech, 1998, http://www.cc.gatech.edu/gvu/user_surveys/survey-1998-10/
    • (1998) GVU's 10th WWW Survey
  • 3
    • 0013106459 scopus 로고    scopus 로고
    • Tailoring privacy to user's needs
    • Southofen, Germany
    • A. Kobsa, Tailoring Privacy to User's Needs. 8th International Conference on User Modeling, 2001, Southofen, Germany, http://www.ics.uci.edu/~kobsa/ papers/2001um01-kobsa.pdf.
    • (2001) 8th International Conference on User Modeling
    • Kobsa, A.1
  • 5
    • 33344477611 scopus 로고    scopus 로고
    • Viewed on January 2003
    • J. Magourik, Partners in Privacy. Viewed on January 2003, Available at http://www.intelligententerprise.com/010918/414feat1_1.shtml ?ebusiness.
    • Partners in Privacy
    • Magourik, J.1
  • 8
    • 14744268217 scopus 로고    scopus 로고
    • Economic aspects of personal privacy
    • Report by National Telecommunications and Information Administration (NTIA), U.S. Department of Commerce
    • H.R. Varian, Economic aspects of personal privacy. in: Privacy and self-regulation in the information age, Report by National Telecommunications and Information Administration (NTIA), U.S. Department of Commerce, 1997.
    • (1997) Privacy and Self-regulation in the Information Age
    • Varian, H.R.1
  • 9
    • 3042822164 scopus 로고    scopus 로고
    • P3P: Making Privacy Policies More Useful
    • F.L. Cranor P3P: Making Privacy Policies More Useful IEEE Security & Privacy 2003 50 55
    • (2003) IEEE Security & Privacy , pp. 50-55
    • Cranor, F.L.1
  • 10
    • 0005415045 scopus 로고    scopus 로고
    • Electronic Privacy Information Center. June 2000 viewed on September 2001
    • EPIC 2000. Pretty Poor Privacy: An assessment of P3P and Internet privacy. Electronic Privacy Information Center. June 2000, available at http://www.epic.org/Reports/prettypoorprivacy.html, viewed on September 2001.
    • (2000) Pretty Poor Privacy: An Assessment of P3P and Internet Privacy
  • 11
    • 0037661099 scopus 로고    scopus 로고
    • Architecture for user-controlled e-privacy
    • Electronic Commerce Track, Melbourne, Florida, March 9-12
    • P. Bodorik, D.N. Jutla, Architecture for User-Controlled e-Privacy. ACM Symposium on Applied Computing, Electronic Commerce Track, Melbourne, Florida, March 9-12, 2003, pp. 607-616.
    • (2003) ACM Symposium on Applied Computing , pp. 607-616
    • Bodorik, P.1    Jutla, D.N.2
  • 13
    • 10444269844 scopus 로고    scopus 로고
    • The social contract core
    • Honolulu, Hawaii, USA May 7-11
    • J.H. Kaufmann, C. Powers, The Social Contract Core, Honolulu, Hawaii, USA, WWW 2002, May 7-11, pp. 210-220.
    • WWW 2002 , pp. 210-220
    • Kaufmann, J.H.1    Powers, C.2
  • 15
    • 35048825417 scopus 로고    scopus 로고
    • Management of private data with web services
    • W. Jonker, M. Petkovic (Eds.), VLDB Workshop on Secure Data Management, Toronto Canada, August 30
    • D.N. Jutla, P. Bodorik, D. Gao. Management of private data with Web Services. in: W. Jonker, M. Petkovic (Eds.), VLDB Workshop on Secure Data Management, Toronto Canada, August 30, 2004, Springer Verlag Lecture Notes in Computer Science, pp. 100-117.
    • (2004) Springer Verlag Lecture Notes in Computer Science , pp. 100-117
    • Jutla, D.N.1    Bodorik, P.2    Gao, D.3
  • 19
    • 33344467882 scopus 로고    scopus 로고
    • Socio-technical architecture for user-controlled online privacy
    • March/April
    • D.N. Jutla, P. Bodorik. Socio-technical architecture for user-controlled online privacy. IEEE Security & Privacy, March/April 2005, pp. 24-34.
    • (2005) IEEE Security and Privacy , pp. 24-34
    • Jutla, D.N.1    Bodorik, P.2
  • 20
    • 0038588452 scopus 로고    scopus 로고
    • Privacy in multimedia communications: Protecting users, not just data
    • A. Blandford et al. (Eds.), People and Computers XV - Interaction without Frontiers Springer, Lille, September
    • A. Adams, A. Sasse, Privacy in Multimedia Communications: Protecting Users, Not Just Data. in: A. Blandford et al. (Eds.), People and Computers XV - Interaction without Frontiers. Joint Proceedings of the HCI2001 and ICM2001, Springer, Lille, September 2001, pp. 49-64. http://www.cs.ucl.ac.uk/staff/A. Sasse/pub.html.
    • (2001) Joint Proceedings of the HCI2001 and ICM2001 , pp. 49-64
    • Adams, A.1    Sasse, A.2
  • 21
    • 0000652982 scopus 로고
    • Perceived control and the effects of crowding and consumer choice on the service experience
    • M.K. Hui, and J.E.G. Bateson Perceived control and the effects of crowding and consumer choice on the service experience Journal of Consumer Research 18 1991 174 184
    • (1991) Journal of Consumer Research , vol.18 , pp. 174-184
    • Hui, M.K.1    Bateson, J.E.G.2
  • 23
    • 17444409219 scopus 로고    scopus 로고
    • Context sensitive text mining and belief revision for adaptive information retrieval
    • IEEE Press
    • R.Y.K. Lau. Context sensitive text mining and belief revision for adaptive information retrieval. IEEE/WIC International Conference on Web Intelligence, IEEE Press, 2003, pp. 256-262.
    • (2003) IEEE/WIC International Conference on Web Intelligence , pp. 256-262
    • Lau, R.Y.K.1
  • 24
    • 0000128393 scopus 로고
    • On the logic of theory change: Partial meet contraction and revision functions
    • C. Alchourron, P. Gardenfors, and D. Makinson On the logic of theory change: partial meet contraction and revision functions Journal of Symbolic Logic 50 1985 510 530
    • (1985) Journal of Symbolic Logic , vol.50 , pp. 510-530
    • Alchourron, C.1    Gardenfors, P.2    Makinson, D.3
  • 26
    • 85043255919 scopus 로고    scopus 로고
    • DL reasoner vs. first-order prover
    • Proc. of the 2003 Description Logic Workshop (DL 2003)
    • D. Tsarkov, I. Horrocks, DL reasoner vs. first-order prover. In Proc. of the 2003 Description Logic Workshop (DL 2003), volume 81 of CEUR, (http://ceur-ws.org/ ), 2003, pp. 152-159.
    • (2003) CEUR , vol.81 , pp. 152-159
    • Tsarkov, D.1    Horrocks, I.2
  • 27
    • 33344468584 scopus 로고    scopus 로고
    • WSDL 2003 - Web Services Description Language version 2.0 part 1: Core language
    • 10, November
    • W3C WSDL 2003 - Web Services Description Language Version 2.0 Part 1: Core Language, Working Draft, 10, November 2003, available at http://www.w3.org/TR/2003/WD-wsdl20-20031110/.
    • (2003) Working Draft
  • 28
    • 33845422335 scopus 로고    scopus 로고
    • What we talk about when we talk about context
    • P. Dourish. What we talk about when we talk about context. Personal and Ubiquitous Computing, 8 (1), 2004, pp. 19-30.
    • (2004) Personal and Ubiquitous Computing , vol.8 , Issue.1 , pp. 19-30
    • Dourish, P.1
  • 30
    • 33344455138 scopus 로고    scopus 로고
    • LOOM, available at http://www.isi.edu/isd/LOOM/LOOM-HOME.html, 2004.
    • (2004)
  • 36
    • 0036607748 scopus 로고    scopus 로고
    • Individual trust in online firms: Scale development and initial test
    • A. Bhattacharjee Individual trust in online firms: scale development and initial test J. Manage. Inform. Syst. 19 1 2002 213 243
    • (2002) J. Manage. Inform. Syst. , vol.19 , Issue.1 , pp. 213-243
    • Bhattacharjee, A.1
  • 37
    • 0344096683 scopus 로고    scopus 로고
    • Trust and TAM in online shopping: An integrate model
    • D. Gefen, E. Karahanna, and D.W. Straub Trust and TAM in online shopping: an integrate model MIS Quart. 27 1 2003 51 90
    • (2003) MIS Quart. , vol.27 , Issue.1 , pp. 51-90
    • Gefen, D.1    Karahanna, E.2    Straub, D.W.3
  • 38
    • 0036737236 scopus 로고    scopus 로고
    • Developing and validating trust measures for e-commerce: An integrative typology
    • D.H. McKnight, V. Choudhury, and C. Kacmar Developing and validating trust measures for e-commerce: an integrative typology Inform. Syst. Res. 13 3 2002 334 362
    • (2002) Inform. Syst. Res. , vol.13 , Issue.3 , pp. 334-362
    • McKnight, D.H.1    Choudhury, V.2    Kacmar, C.3
  • 39
    • 10444259015 scopus 로고    scopus 로고
    • Evaluation of user intervention tools for privacy on SME online trust
    • July 6-9, San Diego, California
    • D.N. Jutla, E.K. Kelloway, S. Saifi. Evaluation of user intervention tools for privacy on SME online trust. IEEE Conference on Electronic Commerce, CEC 04, July 6-9, San Diego, California, 2004, pp. 281-288.
    • (2004) IEEE Conference on Electronic Commerce, CEC 04 , pp. 281-288
    • Jutla, D.N.1    Kelloway, E.K.2    Saifi, S.3
  • 42
    • 33344476311 scopus 로고    scopus 로고
    • EU 2002 - Benchmarking national and regional e-business policies for SMEs
    • June 12 Brussels: European Commission Services
    • EU 2002 - Benchmarking national and regional e-business policies for SMEs. Final Benchmarking Report, June 12 2002. Brussels: European Commission Services.
    • (2002) Final Benchmarking Report
  • 43
    • 30944450593 scopus 로고    scopus 로고
    • Usability meets security - The identity-manager as your personal security agent for the Internet
    • 11-15 New Orleans, Louisiana
    • U. Jendricke, D. Gerd tom Markotten, Usability meets Security - The Identity-Manager as your Personal Security Agent for the Internet. 16th Annual Computer Security Applications Conference, 11-15, 2000, New Orleans, Louisiana.
    • (2000) 16th Annual Computer Security Applications Conference
    • Jendricke, U.1    Markotten, D.G.T.2
  • 44
    • 33344465469 scopus 로고    scopus 로고
    • A conceptual model and a metaphor of everyday privacy in ubiquitous computing environments
    • Intel Corporation viewed on January 2003
    • S. Lederer, A.K. Dey, J. Mankoff, A Conceptual Model and a Metaphor of Everyday Privacy in Ubiquitous Computing Environments. Intel Research Berkley Report IRB-TR-02-017, Intel Corporation, Available at http://www.intel-research. net/Publications/Berkeley/120520020944_107.pdf, viewed on January 2003.
    • Intel Research Berkley Report , vol.IRB-TR-02-017
    • Lederer, S.1    Dey, A.K.2    Mankoff, J.3
  • 46
    • 33344466238 scopus 로고    scopus 로고
    • PrivacyBird, 2004, available at http://privacybird.com/
    • (2004)
  • 47
    • 0037912406 scopus 로고    scopus 로고
    • Supporting global user profiles through trusted authorities
    • I. Cingil Supporting global user profiles through trusted authorities SIGMOD Rec. 31 1 2002 1 17
    • (2002) SIGMOD Rec. , vol.31 , Issue.1 , pp. 1-17
    • Cingil, I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.