Conference Paper

Temporal Blurring: A Privacy Model for OMS Users.

DOI: 10.1007/11527886_56 Conference: User Modeling 2005, 10th International Conference, UM 2005, Edinburgh, Scotland, UK, July 24-29, 2005, Proceedings
Source: DBLP

ABSTRACT Stereotypes and clustering are some techniques for creating user models from user behavior. Yet, they possess important risks as users actions could be misinterpreted or users could be associated with undesirable profiles. It could be worst if users' actions, beliefs, and comments are long term stored such as in Organizational Memory Systems (OMS) where users' contributions are available to the whole organization. We propose a privacy model based on four privacy roles that allow users to control the disclosure of their personal data and, when recovered, blurs such data as time passes.

  • [Show abstract] [Hide abstract]
    ABSTRACT: Collaborative activities such as coordination, decision-making and negotiation critically depend on historical information of an organization. This information is usually part of isolated legacy information systems, therefore, it can be inconsistent, redundant and difficult to retrieve and link. Previous research in CSCW has proposed the use of Organizational Memory Systems (OMS) to accumulate, organize, preserve, link and share diverse information coming from various sources, and thus support such collaborative activities. However, there is a need to provide a low-cost feeding process, to embed privacy mechanisms and to support information retrieval capabilities for all users of the OMS, in order to make these solutions useful to a broad range of organizations. As a way to deal with this need, this paper presents a transformational model able to: (a) facilitate the feeding of an OMS based on information stored in legacy information systems, (b) ease the information retrieval process, and (c) embed automatic mechanisms to evolve the information stored in the OMS, through a document privacy lifecycle. This is a low-cost solution that can be implemented using OpenSource technologies.
    Information Sciences 07/2009; DOI:10.1016/j.ins.2009.01.041 · 3.89 Impact Factor
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Protection of private data is one of the most challenging issues threatening the success of Pervasive Computing (PC). Regarding the principles of privacy and the vision of pervasive computing, one of the most troublesome problems is how to provide people's control of their data while not distract them to a great extent. A suitable approach for protecting people's private data in PC environments should consider the intention of all influential entities (data determiners), and invisibly gain their consent by applying their desired preferences. In extension of the current approaches which consider a single set of preference rules for a private data item when deciding about its disclosure, we propose dealing with different preferences of all involved determiners in a distributed manner. In this paper we investigate possible determiners of private data and propose a set of required meta-data as well as a multi-determiner protection procedure to protect private data with regard to the preferences of its determiners. Moreover, we propose the DELEGATION behavior as a determiner's response to a request instead of ACCEPT or REJECT. We demonstrate the efficiency of the suggested procedure and present a prototype implementation of a multi-determiner architecture to realize the protection procedure.
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: The use of past information is becoming critical for organizations. Coordination, decision making and negotiation are some of the collaborative activities that depend on it. However, the need to provide privacy and information retrieval capabilities to all users of an organizational memory system (OMS), requires a good strategy for acquiring and structuring the information. This paper presents a strategy intended to (a) facilitate the feeding of an OMS based on information stored in legacy information systems, (b) ease the information retrieval process, and (c) provide an automatic privacy mechanism for the information stored in the OMS.
    Computer Supported Cooperative Work in Design, 2007. CSCWD 2007. 11th International Conference on; 05/2007

Full-text (2 Sources)

Available from
May 27, 2014