A privacy-protecting business-analytics service for on-line transactions

被引:10
作者
Berendt, Bettina [1 ]
Preibusch, Soeren [2 ]
Teltzrow, Maximilian [3 ]
机构
[1] Katholieke Univ Leuven, Dept Comp Sci, Louvain, Belgium
[2] German Inst Econ Res, Berlin, Germany
[3] Arthur D Little Inc, Munich, Germany
关键词
data mining; electronic business; P3P; privacy; Web analytics;
D O I
10.2753/JEC1086-4415120306
中图分类号
F [经济];
学科分类号
02 ;
摘要
Analysis of consumer-related and consumer-generated data is a very important way to measure the success of on-line retailing. The software packages for data analysis have two major shortcomings: (1) solutions are not offered as a service reachable by standard procedures over the Internet, but as isolated standalone applications or ERP system modules; (2) privacy restrictions need to be integrated into a framework of business analytics for Web retailers. The first aspect can be addressed with standardized developer software for Web services, but the second must consider privacy legislation, privacy specifications on Web sites (P3P), and data reidentification problems. These shortcomings are addressed by a proposed formal model of these problems and an implementation of the model as a declarative specification of privacy constraints, expressed as an extension of P3P. The constraints are complemented by a logic identifying the elements in a given set of Web analytics that might lead to data reidentification and therefore violate implicit privacy constraints. A Web-based service is presented that uses these components to automatically adapt the set of available Web analytics to an on-line retailer's P3P policy. The system was tested on a large data set from a major European multichannel retailer.
引用
收藏
页码:115 / 150
页数:36
相关论文
共 60 条
[51]  
Stallings William, 1999, Cryptography and network security: principles and practice
[52]   The dynamics of click-and-mortar electronic commerce: Opportunities and management strategies [J].
Steinfield, C ;
Bouwman, H ;
Adelaar, T .
INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE, 2002, 7 (01) :93-119
[53]   k-anonymity:: A model for protecting privacy [J].
Sweeney, L .
INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2002, 10 (05) :557-570
[54]  
Sweeney L., 2001, THESIS MIT CAMBRIDGE
[55]  
Teltzrow M, 2003, LECT NOTES COMPUT SC, V2738, P328
[56]  
TELTZROW M, 2004, DESIGNING PERSONALIZ, P315, DOI [DOI 10.1007/1-4020-2148-8_17, DOI 10.1007/1-4020-2148-8]
[57]  
TELTZROW M, 2003, P WEBKDD WORKSH WEB, P17
[58]  
*US DHEW, 1973, SEC ADV COMM AUT PER
[59]   State-of-the-art in privacy preserving data mining [J].
Verykios, VS ;
Bertino, E ;
Fovin, IN ;
Provenza, LP ;
Saygin, Y ;
Theodoridis, Y .
SIGMOD RECORD, 2004, 33 (01) :50-57
[60]  
WEIGEND A, 2003, ACM C KNOWL DISC DAT, P5